Detect Leaked Data
With The Industry-Leading API

Detect compromised and leaked data with the world's largest data breach feeds

Track Leaked Data With

Big Web Data

ilu1-1

Unrivaled coverage

Automate your data breach detection with big feeds of the latest leaks, going 5 years back

ilu2

Single Endpoint

Access a big pool of leaked records from different dark web networks, sites, and applications with a single API query

ilu3-1

Continuous Monitoring

Get every compromised record, all the time

Stay Ahead With

Data Breach Detection API

enrich-icon

Access compromised data from millions of sites, forums, markets and other sites in the deep and dark web

icon2-1

Monitor leaked data from across the web, including email, domain, credit card, BIN, phone number, SSN and more

icon3-1

Easily track breached information with standardized and structure breach data feeds

Bigger Threat Insights with

Data Breach API

Digital Risk Protection

Digital Risk Protection

Gain contextualized real-time insight to protect organizations from cyber risks, including cyber attacks, ransomware, and phishing

Fraud Detection

Fraud Detection

Create an automatic alert system for leaked credit card numbers, PII, and monitor blockchain addresses involved in Illegal cryptocurrency transactions

Brand Protection

Brand Protection

Mitigate risk factors such as counterfeiting attempts, unlicensed use, and leaked information to protect your brand and avoid crises

Web Intelligence

Web Intelligence

Monitor darknet marketplaces, forums, and networks for illicit drug and weapon trafficking, and hacking activities, and track hidden communications between terrorists and other bad actors

Cryptocurrency Investigations

Cryptocurrency Investigations

Search cryptocurrency addresses and transactions to “follow the money” and trace cryptocurrency footprints as part of anti-money laundering, compliance, and due diligence investigations

Dark Web Monitoring

Dark Web Monitoring

Track threats, threat actors, groups, and malicious trends on the deep and dark web

VIP Protection

VIP Protection

Investigate cyber threats against company executives, board members, investors, and key personnel

Threat Intelligence

Threat Intelligence

Gather early indications of cyber threats on forums, marketplaces, and other hidden spaces on the dark web.

Digital Risk Protection

Digital Risk Protection

Digital Risk Protection

Gain contextualized real-time insight to protect organizations from cyber risks, including cyber attacks, ransomware, and phishing

Fraud Detection

Fraud Detection

Fraud Detection

Create an automatic alert system for leaked credit card numbers, PII, and monitor blockchain addresses involved in Illegal cryptocurrency transactions

Brand Protection

Brand Protection

Brand Protection

Mitigate risk factors such as counterfeiting attempts, unlicensed use, and leaked information to protect your brand and avoid crises

Web Intelligence

Web Intelligence

Web Intelligence

Monitor darknet marketplaces, forums, and networks for illicit drug and weapon trafficking, and hacking activities, and track hidden communications between terrorists and other bad actors

Cryptocurrency Investigations

Cryptocurrency Investigations

Cryptocurrency Investigations

Search cryptocurrency addresses and transactions to “follow the money” and trace cryptocurrency footprints as part of anti-money laundering, compliance, and due diligence investigations

Dark Web Monitoring

Dark Web Monitoring

Dark Web Monitoring

Track threats, threat actors, groups, and malicious trends on the deep and dark web

VIP Protection

VIP Protection

VIP Protection

Investigate cyber threats against company executives, board members, investors, and key personnel

Threat Intelligence

Threat Intelligence

Threat Intelligence

Gather early indications of cyber threats on forums, marketplaces, and other hidden spaces on the dark web.

Big Leaked Data Feeds for

Better Breach Detection

RECORD INFORMATION icon

Get basic information about the record and the user credentials associated with it.

ACCOUNT INFORMATION icon

Stay ahead of threats with structured compromised account information, including email, account name, password, and password type.

DEVICE INFORMATION icon

Get the full details about the infected device, typically present in infostealer-related events.

"records": [

{

uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

crawled_date: “2025-09-13T20:56:00.000+03:00”

type: “Infostealer”

sub_type: “stealer_logs”

login_url: “https://salc.gov.uk/login/”

login_domain: “salc.gov.uk”

}

]

"account_info": {

email: [email protected]

account_name: null

password: “123qwe!”

password_type: “plaintext”

}

device_info: {

infection_uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

exfiltration_date: “2025-09-13T00:00:00.000+03:00”

log_file_name: “GR[7AFB0CFC3F*****37EB27C90BA] [2025-09-02T12_11_52.1931867]”

hwid: “2EFD********45ADE0C”

ip_address: “41.150.***.**”

location: {

country: “GR”

city: “Portaria, Kentriki Makedonia”

zip_code: “630 87”

},

computer_username: “admin”

os: “Windows 10 Home x64”

antivirus_software: [

“Windows Defender”

“avast”

],

malware_family: “Redline”

malware_path: “C:\\Users\\2025\\Pictures\\Minor Policy\\********.exe”

},

breach_info: {

uuid: NULL

breach_date: NULL

breach_name: NULL

compromised_assets: NULL

},

publication_source_info: {

file_name: NULL

file_link: NULL

post_url: NULL

site_domain: “t.me”

is_premium: true

}

RECORD INFORMATION icon

Get basic information about the record and the user credentials associated with it.

"records": [

{

uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

crawled_date: “2025-09-13T20:56:00.000+03:00”

type: “Infostealer”

sub_type: “stealer_logs”

login_url: “https://salc.gov.uk/login/”

login_domain: “salc.gov.uk”

}

]

ACCOUNT INFORMATION icon

Stay ahead of threats with structured compromised account information, including email, account name, password, and password type.

"account_info": {

email: [email protected]

account_name: null

password: “123qwe!”

password_type: “plaintext”

}

DEVICE INFORMATION icon

Get the full details about the infected device, typically present in infostealer-related events.

device_info: {

infection_uuid: “94bd1d9fded1e40b8843f31df97b807eef35f6aa”

exfiltration_date: “2025-09-13T00:00:00.000+03:00”

log_file_name: “GR[7AFB0CFC3F*****37EB27C90BA] [2025-09-02T12_11_52.1931867]”

hwid: “2EFD********45ADE0C”

ip_address: “41.150.***.**”

location: {

country: “GR”

city: “Portaria, Kentriki Makedonia”

zip_code: “630 87”

},

computer_username: “admin”

os: “Windows 10 Home x64”

antivirus_software: [

“Windows Defender”

“avast”

],

malware_family: “Redline”

malware_path: “C:\\Users\\2025\\Pictures\\Minor Policy\\********.exe”

},

breach_info: {

uuid: NULL

breach_date: NULL

breach_name: NULL

compromised_assets: NULL

},

publication_source_info: {

file_name: NULL

file_link: NULL

post_url: NULL

site_domain: “t.me”

is_premium: true

}

The Reviews

Our Big Secret Is Out

Have a

Question?

What entities are supported in the DBD 3 endpoint? arrow icon

DBD 3 supports a wide range of searchable entities, including emails, domains, credit‑card numbers (BIN 6/8 digits), SSNs, phone numbers, account names, and passports.
Each record is enriched with standardized metadata and Cyber Risk Scores for better classification and filtering accuracy.

Can I query newly published breaches in real time? arrow icon

Yes. Use the “&since” HTTP GET parameter and enter a Unix timestamp (in milliseconds).
You can retrieve only the records indexed since your specified time to detect breaches appearing within minutes of publication.

Where do you get the breached data from? arrow icon

Our data is collected from hundreds of thousands of dark‑web forums, marketplaces, paste sites, and encrypted chat channels.
We combine automated crawling with continuous human validation by cyber analysts to ensure high‑fidelity feeds with extensive infostealer coverage—the gold standard for credential and identity intelligence.

What makes DBD 3 different from earlier versions? arrow icon

DBD 3 uses a unified taxonomy shared across Webz.io’s Cyber and Dark Web APIs.
Every record is categorized (e.g., data_breach, stealer_logs, carding) and scored (0–10) to quantify risk relevance and confidence.
These enhancements enable smarter correlation between breached data and the threat actors or campaigns behind them.

How far back does the feed go? arrow icon

Our breach index covers up to five years of historical records, including reclassified datasets and freshly detected breaches.
Older entries have been retagged using the new taxonomy to improve data quality and consistency across feeds.

Do you support custom alerts or monitoring? arrow icon

We do not send alerts directly, but the API is built for integration with your own systems.
By using time‑based parameters and incremental queries, you can create automated alerting and monitoring flows for specific domains or entities.

What formats are used for the data feeds? arrow icon

All leaks—originally exposed in various formats such as CSV, SQL, or TXT—are standardized into a clean JSON output.
Each JSON object includes contextual metadata such as source URL, timestamp, and entity types, making it ready for machine‑to‑machine use.

How do you handle privacy and query logging? arrow icon

We log API queries to help optimize performance and security, but you can request that logging be disabled for your subscription to comply with privacy requirements.

Can I ask that you do not log my queries? arrow icon

Of course. Just let us know and we’ll disable logging for your subscription
Footer Background Large
Footer Background Small

Expand Your Dark Web Data Footprint

icon

Ready to Explore Web Data at Scale?

Speak with a data expert to learn more about Webz.io’s solutions
Speak with a data expert to learn more about Webz.io’s solutions
Create your API account and get instant access to millions of web sources
Create your API account and get instant access to millions of web sources