Detect Leaked Data
With a Powerful API

Detect every compromised and leaked data with big data breach feeds.

Track Leaked Data With

Big Web Data

ilu1-1

Unrivaled coverage

Automate your data breach detection with big feeds of the latest leaks, going 5 years back

ilu2

Single Endpoint

Access a big pool of leaked records from different dark web networks, sites, and applications with a single API query

ilu3-1

Continuous Monitoring

Get every compromised record, all the time

Stay Ahead With

Data Breach Detection API

enrich-icon

Access compromised data from millions of sites, forums, markets and other sites in the deep and dark web

icon2-1

Monitor leaked data from across the web, including email, domain, credit card, BIN, phone number, SSN and more

icon3-1

Easily track breached information with standardized and structure breach data feeds

Bigger Threat Insights with

Data Breach API

Digital Risk Protection

Digital Risk Protection

Gain contextualized real-time insight to protect organizations from cyber risks, including cyber attacks, ransomware, and phishing

Fraud Detection

Fraud Detection

Create an automatic alert system for leaked credit card numbers, PII, and monitor blockchain addresses involved in Illegal cryptocurrency transactions

Brand Protection

Brand Protection

Mitigate risk factors such as counterfeiting attempts, unlicensed use, and leaked information to protect your brand and avoid crises

Web Intelligence

Web Intelligence

Monitor darknet marketplaces, forums, and networks for illicit drug and weapon trafficking, and hacking activities, and track hidden communications between terrorists and other bad actors

Cryptocurrency Investigations

Cryptocurrency Investigations

Search cryptocurrency addresses and transactions to “follow the money” and trace cryptocurrency footprints as part of anti-money laundering, compliance, and due diligence investigations

Dark Web Monitoring

Dark Web Monitoring

Track threats, threat actors, groups, and malicious trends on the deep and dark web

VIP Protection

VIP Protection

Investigate cyber threats against company executives, board members, investors, and key personnel

Threat Intelligence

Threat Intelligence

Gather early indications of cyber threats on forums, marketplaces, and other hidden spaces on the dark web.

Digital Risk Protection

Digital Risk Protection

Digital Risk Protection

Gain contextualized real-time insight to protect organizations from cyber risks, including cyber attacks, ransomware, and phishing

Fraud Detection

Fraud Detection

Fraud Detection

Create an automatic alert system for leaked credit card numbers, PII, and monitor blockchain addresses involved in Illegal cryptocurrency transactions

Brand Protection

Brand Protection

Brand Protection

Mitigate risk factors such as counterfeiting attempts, unlicensed use, and leaked information to protect your brand and avoid crises

Web Intelligence

Web Intelligence

Web Intelligence

Monitor darknet marketplaces, forums, and networks for illicit drug and weapon trafficking, and hacking activities, and track hidden communications between terrorists and other bad actors

Cryptocurrency Investigations

Cryptocurrency Investigations

Cryptocurrency Investigations

Search cryptocurrency addresses and transactions to “follow the money” and trace cryptocurrency footprints as part of anti-money laundering, compliance, and due diligence investigations

Dark Web Monitoring

Dark Web Monitoring

Dark Web Monitoring

Track threats, threat actors, groups, and malicious trends on the deep and dark web

VIP Protection

VIP Protection

VIP Protection

Investigate cyber threats against company executives, board members, investors, and key personnel

Threat Intelligence

Threat Intelligence

Threat Intelligence

Gather early indications of cyber threats on forums, marketplaces, and other hidden spaces on the dark web.

Big Leaked Data Feeds for

Better Breach Detection

ENTITIES icon

Stay ahead of threats with structured compromised information including domain name, PII, date, and leaked data

SOURCE CONTEXT icon

Get the full context to discover the original source of the leak including file hosting links

LASER-FOCUSED icon

Search for specific compromised entities such as emails, domains, credit card details, SSN, phone numbers, passport details, and account names

uuid: “4cf1dee756027361087b9ff1fb250e2f4c187a53” ,

author: [

“Foxprox”

] ,

author_extended: [

{

display_name: “Foxprox” ,

user_id: “236677” ,

user_link: “https://xss.is/members/236677/”

} ,

] ,

language: “russian” ,

site: {

name: “XSS” ,

is_live: true ,

domain: “xss.is” ,

type: “discussions” ,

country: “RU”

}

uuid: “8f324448660dbe2a12e12042f3129eaac7fd2ad0” ,

external_links: [

“https://www.instagram.com/ef7gqhk4wdnyuqrc.onion/” ,

“http://asim5qa2epcoftyg.onion” ,

“https://feeds2.feedburner.com/ef7gqhk4wdnyuqrc.onion” ,

“https://twitter.com/ef7gqhk4wdnyuqrc.onion” ,

“https://www.malwarebytes.com”

] ,

external_images: [

{

url: “http://documents.trendmicro.com/images/TEx/articles/password-hack.jpg” ,

meta_info: “/imageFilter?token=a948bd43-9517-413c-a844-bc50be66d494&format=json&q=uuid:151210890091777400541684210162620275161” ,

uuid: “151210890091777400541684210162620275161” ,

label: [

“Phone” ,

“Electronics” ,

“Cell Phone” ,

“Mobile Phone” ,

“Text”

] ,

text: “Password: *********”

} ,

]

uuid: “0e537a1202234554f9cd0a48df735bd0f9d1d4b5” ,

categories: [

“financial” ,

“pii”

] ,

emails: {

value: [

“Gemini******@shaw.ca” ,

“aheath****@gmail.com” ,

“Shayne*****@shaw.ca”

] ,

count: 3

} ,

phones: {

value: [

“+1769802****” ,

“+1416725****”

] ,

count: 2

} ,

credit_cards: {

value: [

“4724090243******” ,

“4506445713******” ,

“4506446469******”

] ,

count: 3

} ,

ssns: {

value: [

“475-83-****”

] ,

count: 1

} ,

wallet_ids: NULL ,

ips: {

value: [

“70.49.**.***” ,

“184.151.***.***” ,

“174.118.***.*”

] ,

count: 3

}

ENTITIES icon

Stay ahead of threats with structured compromised information including domain name, PII, date, and leaked data

uuid: “4cf1dee756027361087b9ff1fb250e2f4c187a53” ,

author: [

“Foxprox”

] ,

author_extended: [

{

display_name: “Foxprox” ,

user_id: “236677” ,

user_link: “https://xss.is/members/236677/”

} ,

] ,

language: “russian” ,

site: {

name: “XSS” ,

is_live: true ,

domain: “xss.is” ,

type: “discussions” ,

country: “RU”

}

SOURCE CONTEXT icon

Get the full context to discover the original source of the leak including file hosting links

uuid: “8f324448660dbe2a12e12042f3129eaac7fd2ad0” ,

external_links: [

“https://www.instagram.com/ef7gqhk4wdnyuqrc.onion/” ,

“http://asim5qa2epcoftyg.onion” ,

“https://feeds2.feedburner.com/ef7gqhk4wdnyuqrc.onion” ,

“https://twitter.com/ef7gqhk4wdnyuqrc.onion” ,

“https://www.malwarebytes.com”

] ,

external_images: [

{

url: “http://documents.trendmicro.com/images/TEx/articles/password-hack.jpg” ,

meta_info: “/imageFilter?token=a948bd43-9517-413c-a844-bc50be66d494&format=json&q=uuid:151210890091777400541684210162620275161” ,

uuid: “151210890091777400541684210162620275161” ,

label: [

“Phone” ,

“Electronics” ,

“Cell Phone” ,

“Mobile Phone” ,

“Text”

] ,

text: “Password: *********”

} ,

]

LASER-FOCUSED icon

Search for specific compromised entities such as emails, domains, credit card details, SSN, phone numbers, passport details, and account names

uuid: “0e537a1202234554f9cd0a48df735bd0f9d1d4b5” ,

categories: [

“financial” ,

“pii”

] ,

emails: {

value: [

“Gemini******@shaw.ca” ,

“aheath****@gmail.com” ,

“Shayne*****@shaw.ca”

] ,

count: 3

} ,

phones: {

value: [

“+1769802****” ,

“+1416725****”

] ,

count: 2

} ,

credit_cards: {

value: [

“4724090243******” ,

“4506445713******” ,

“4506446469******”

] ,

count: 3

} ,

ssns: {

value: [

“475-83-****”

] ,

count: 1

} ,

wallet_ids: NULL ,

ips: {

value: [

“70.49.**.***” ,

“184.151.***.***” ,

“174.118.***.*”

] ,

count: 3

}

Our Big Secret Is Out

Have a

Question?

What entities are supported in the DBD endpoint? arrow icon

Our Data Breach Detection endpoint includes emails, credit cards, BIN numbers (6 or 8 digits), SSN, domains, phone numbers, account names, and passports

Can I retrieve results from the latest crawled leaks? arrow icon

Yes. Use the “&since HTTP GET” parameter and set it to the desired Unix timestamp (epoch time) in milliseconds. The retrieved data will then match the time frame you set in the query – from the defined “since GET” parameter, the time you set, until now

Where do you get the breached data from? arrow icon

We collect leaked data from hundreds of thousands of forums, paste sites, chat application groups and marketplaces from across the deep and dark web. Alongside using our advanced automated system that constantly discovers new entities, our expert cyber analysts run their own search to add other relevant databases and ensure the quality of our data feeds

What is DBD good for? arrow icon

Our breached data feeds keep you ahead of the next breach. The leaked data we discover on the dark web can put your company’s reputation, assets, like servers and systems, and top executives and employees at risk. The breached data we cover expose many companies to loss of business-critical information, the risk of heavy fines and mistrust from customers

What breached data do you cover? arrow icon

We cover databases that are connected to domains, which means they belong to companies. To ensure the quality of our feeds and keep them spam-free, we usually do not cover combo lists or word lists which are used to dump large volumes of leaked data of individuals from various sources, usually used for sending targeted spam

Do you provide alerts for specific entities? arrow icon

No, we provide an API which helps you constantly monitor new information by pulling new data in according to a timeframe you can define and control. This can help you create an alert using your system

How far back does your breached data feed go? arrow icon

We cover breached data that go up to five years back. To keep you ahead of the game, our data feeds are being updated a few times a day, every day

What is the format of your breached data feeds? arrow icon

We collect the leaks, which are published online in CSV, SQL, TXT and other formats, and standardize them, providing you with a clean JSON feed, ready for your machine

Can I ask that you do not log my queries? arrow icon

Of course. Just let us know and we’ll disable logging for your subscription
Footer Background Large
Footer Background Small

Expand Your Dark Web Data Footprint

icon

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources
Create your API account and get instant access to millions of web sources