Detect Leaked Data
With The Industry-Leading API

Detect compromised and leaked data with the world's largest data breach feeds

Detect Compromised

Credentials and Access Tokens

ilu1-1

Unrivaled coverage

Gain real-time access to structured data from info stealer logs, public and private breaches, and underground combo lists, all unified into one schema for comprehensive detection.

ilu2

Built For Action

The API provides rich contextual metadata, including device details, geolocation, and source context, empowering security teams and fraud analysts to act with speed and confidence.

ilu3-1

24-hour protection

Webz.io continuously updates its data from underground forums, Telegram channels, and stealer sources, ensuring you receive actionable breach intelligence within minutes of new compromises.

Stay Ahead With

Data Breach Detection API

enrich-icon

All breach types, including info stealer logs, database dumps, combo lists, and cookies, share a single, consistent JSON structure for simplified parsing and integration.

icon2-1

Access newly added combo lists (URL, username, password combinations) and cookies data (cookie name, value, and expiration).

icon3-1

Find exactly what you need with advanced query parameters such as dual-domain search, password filters, data-type filters, and searching by breach UUID, date range, or infection timeframe.

Bigger Threat Insights with

Data Breach API

Threat Intelligence Teams

Threat Intelligence Teams

Map exposures of corporate or client domains, including stolen cookies and session tokens across multiple underground sources to uncover early indicators of compromise.

Fraud Detection Systems

Fraud Detection Systems

Identify credential and cookie reuse across breaches to stop business email compromise (BEC) and session hijacking before they occur.

Digital Risk Monitoring

Digital Risk Monitoring

Power real-time alerts for newly leaked credentials, authentication cookies, and session tokens tied to monitored domains and brands.

Data Enrichment Providers

Data Enrichment Providers

Correlate breach data, including credential leaks and compromised cookies with other threat intelligence feeds for complete context and more effective response.

Prevent Account Takeovers (ATO)

Prevent Account Takeovers (ATO)

Detect exposed usernames, passwords, and session cookies reused across platforms, helping organizations secure customer and employee accounts before attackers exploit them for unauthorized access.

Prevent Ransomware Attacks

Prevent Ransomware Attacks

Identify stolen credentials, authentication cookies, and infected endpoints associated with stealer malware, allowing security teams to isolate compromised assets and disrupt ransomware delivery before encryption begins.

Threat Intelligence Teams

Threat Intelligence Teams

Threat Intelligence Teams

Map exposures of corporate or client domains, including stolen cookies and session tokens across multiple underground sources to uncover early indicators of compromise.

Fraud Detection Systems

Fraud Detection Systems

Fraud Detection Systems

Identify credential and cookie reuse across breaches to stop business email compromise (BEC) and session hijacking before they occur.

Digital Risk Monitoring

Digital Risk Monitoring

Digital Risk Monitoring

Power real-time alerts for newly leaked credentials, authentication cookies, and session tokens tied to monitored domains and brands.

Data Enrichment Providers

Data Enrichment Providers

Data Enrichment Providers

Correlate breach data, including credential leaks and compromised cookies with other threat intelligence feeds for complete context and more effective response.

Prevent Account Takeovers (ATO)

Prevent Account Takeovers (ATO)

Prevent Account Takeovers (ATO)

Detect exposed usernames, passwords, and session cookies reused across platforms, helping organizations secure customer and employee accounts before attackers exploit them for unauthorized access.

Prevent Ransomware Attacks

Prevent Ransomware Attacks

Prevent Ransomware Attacks

Identify stolen credentials, authentication cookies, and infected endpoints associated with stealer malware, allowing security teams to isolate compromised assets and disrupt ransomware delivery before encryption begins.

Big Leaked Data Feeds for

Better Breach Detection

RECORD INFORMATION icon

Get basic information about the record and the user credentials associated with it.

ACCOUNT INFORMATION icon

Stay ahead of threats with structured compromised account information, including email, account name, password, and password type.

DEVICE INFORMATION icon

Get the full details about the infected device, typically present in infostealer-related events.

"records": [

{

uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

crawled_date: “2025-09-13T20:56:00.000+03:00”

type: “Infostealer”

sub_type: “stealer_logs”

login_url: “https://salc.gov.uk/login/”

login_domain: “salc.gov.uk”

}

]

"account_info": {

email: [email protected]

account_name: null

password: “123qwe!”

password_type: “plaintext”

}

device_info: {

infection_uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

exfiltration_date: “2025-09-13T00:00:00.000+03:00”

log_file_name: “GR[7AFB0CFC3F*****37EB27C90BA] [2025-09-02T12_11_52.1931867]”

hwid: “2EFD********45ADE0C”

ip_address: “41.150.***.**”

location: {

country: “GR”

city: “Portaria, Kentriki Makedonia”

zip_code: “630 87”

},

computer_username: “admin”

os: “Windows 10 Home x64”

antivirus_software: [

“Windows Defender”

“avast”

],

malware_family: “Redline”

malware_path: “C:\\Users\\2025\\Pictures\\Minor Policy\\********.exe”

},

breach_info: {

uuid: NULL

breach_date: NULL

breach_name: NULL

compromised_assets: NULL

},

publication_source_info: {

file_name: NULL

file_link: NULL

post_url: NULL

site_domain: “t.me”

is_premium: true

}

RECORD INFORMATION icon

Get basic information about the record and the user credentials associated with it.

"records": [

{

uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

crawled_date: “2025-09-13T20:56:00.000+03:00”

type: “Infostealer”

sub_type: “stealer_logs”

login_url: “https://salc.gov.uk/login/”

login_domain: “salc.gov.uk”

}

]

ACCOUNT INFORMATION icon

Stay ahead of threats with structured compromised account information, including email, account name, password, and password type.

"account_info": {

email: [email protected]

account_name: null

password: “123qwe!”

password_type: “plaintext”

}

DEVICE INFORMATION icon

Get the full details about the infected device, typically present in infostealer-related events.

device_info: {

infection_uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

exfiltration_date: “2025-09-13T00:00:00.000+03:00”

log_file_name: “GR[7AFB0CFC3F*****37EB27C90BA] [2025-09-02T12_11_52.1931867]”

hwid: “2EFD********45ADE0C”

ip_address: “41.150.***.**”

location: {

country: “GR”

city: “Portaria, Kentriki Makedonia”

zip_code: “630 87”

},

computer_username: “admin”

os: “Windows 10 Home x64”

antivirus_software: [

“Windows Defender”

“avast”

],

malware_family: “Redline”

malware_path: “C:\\Users\\2025\\Pictures\\Minor Policy\\********.exe”

},

breach_info: {

uuid: NULL

breach_date: NULL

breach_name: NULL

compromised_assets: NULL

},

publication_source_info: {

file_name: NULL

file_link: NULL

post_url: NULL

site_domain: “t.me”

is_premium: true

}

The Reviews

Our Big Secret Is Out

Have a

Question?

What is the Webz.io Breach API? arrow icon

The Webz.io Breach API provides real-time access to structured data from info stealer logs, public and private breaches, and underground combo lists, all unified into one schema for seamless integration.

 

 

Why is the Webz.io Breach API important? arrow icon

It helps detect, investigate, and mitigate exposed credentials before attackers can exploit them, addressing the issue of billions of credentials being leaked annually across the open, deep, and dark web.

What types of breach data does the API cover? arrow icon

The API covers info stealer logs, database dumps, combo lists (URL, username, password combinations), and cookies data (cookie name, value, and expiration).

 

 

What are the key features of the Webz.io Breach API? arrow icon

Key features include a unified JSON schema, expanded data coverage, advanced search and filtering options, richer contextual metadata, and consolidated records.

How can I search and filter results using the API? arrow icon

You can search by email domain, login domain, password presence/type, data type (infostealer, data breach, combo list), breach UUID, date range, or infection timeframe. Results can also be sorted and paginated.

 

What kind of contextual metadata is included with each record? arrow icon

Each record includes device details (IP, OS, hardware ID, antivirus info, stealer family, file name), geolocation data (country, city, ZIP code), and source context (publication URL, breach domain, premium channel indicators).

 

How does the Webz.io Breach API work? arrow icon

It works as a simple, powerful REST API where you make a single GET request with a token and relevant search parameters (e.g., email_domain).

 

What are the main use cases for the Breach API? arrow icon

Use cases include threat intelligence, fraud detection, digital risk monitoring, data enrichment, preventing account takeovers (ATO), and preventing ransomware attacks.

 

What makes Webz.io a trusted choice for breach data? arrow icon

Webz.io offers proven expertise, enterprise-grade uptime and support, real-time data collection, consistent data structure, and a time-bounded dataset covering approximately 1.5 years of active, high-relevance breach data.
Footer Background Large
Footer Background Small

Expand Your Dark Web Data Footprint

icon

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources
Create your API account and get instant access to millions of web sources