Identities
List by Domain
Authentication API
- Tokens
Leaked Credentials API
- Credentials
- Sources
- Identities
- Cookies
Events API
- Events
- Event Feeds
- Global Search
Management API
- Identifiers
- Identifier Groups
- Alerts
- Current User
- Organization Members
- Reporting
- Tenants
Threat-Flow API
- Reports
Deprecated APIs
- Global Search
- Identities
- Event Feeds
Identities
List by Domain
GET
/
leaksdb
/
identities
/
by_domain
/
{domain}
curl --request GET \
--url https://api.flare.io/leaksdb/identities/by_domain/{domain} \
--header 'Authorization: Bearer <token>'
[
{
"links": {},
"name": "price.glenn@example.com",
"passwords": [
{
"credential_hash": "da7932a62841a48cc06e639be10cdb1f",
"domain": "example.com",
"extra": {},
"hash": "Secret123!",
"hash_type": "unknown",
"id": 5378,
"imported_at": "2019-06-03T14:20:25.132662+00:00",
"source": {
"breached_at": "2019-01-07T21:59:00+00:00",
"description": "In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services.",
"description_fr": "En janvier 2019, une grande collection de listes de bourrage d'identifiants (combinaisons d'adresses \u00e9lectroniques et de mots de passe utilis\u00e9s pour prendre contr\u00f4le de comptes sur d'autres services) a \u00e9t\u00e9 diffus\u00e9e sur un forum de piratage populaire. Les donn\u00e9es contenaient pr\u00e8s de 2,7 milliards d'enregistrements, dont 773 millions d'adresses \u00e9lectroniques uniques aux c\u00f4t\u00e9s de mots de passe que ces adresses avaient utilis\u00e9s sur d'autres services ayant subi des br\u00e8ches de donn\u00e9es.",
"hash_description": "plaintext",
"hash_type": "Plaintext",
"id": "collection-1",
"is_alerts_enabled": false,
"leaked_at": "2019-01-07T21:59:00+00:00",
"name": "Collection-1",
"related_urls": [
"https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/"
],
"url": null
},
"source_id": "collection-1",
"source_params": null
}
]
}
]
DEPRECATED: This endpoint should be replaced by /credentials/_search
Returns a list of accounts matching the domain provided.
The format of the domain should include everything after the @
.
Results are returned in ascending order by id.
[
{
"links": {},
"name": "price.glenn@example.com",
"passwords": [
{
"credential_hash": "da7932a62841a48cc06e639be10cdb1f",
"domain": "example.com",
"extra": {},
"hash": "Secret123!",
"hash_type": "unknown",
"id": 5378,
"imported_at": "2019-06-03T14:20:25.132662+00:00",
"source": {
"breached_at": "2019-01-07T21:59:00+00:00",
"description": "In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services.",
"description_fr": "En janvier 2019, une grande collection de listes de bourrage d'identifiants (combinaisons d'adresses \u00e9lectroniques et de mots de passe utilis\u00e9s pour prendre contr\u00f4le de comptes sur d'autres services) a \u00e9t\u00e9 diffus\u00e9e sur un forum de piratage populaire. Les donn\u00e9es contenaient pr\u00e8s de 2,7 milliards d'enregistrements, dont 773 millions d'adresses \u00e9lectroniques uniques aux c\u00f4t\u00e9s de mots de passe que ces adresses avaient utilis\u00e9s sur d'autres services ayant subi des br\u00e8ches de donn\u00e9es.",
"hash_description": "plaintext",
"hash_type": "Plaintext",
"id": "collection-1",
"is_alerts_enabled": false,
"leaked_at": "2019-01-07T21:59:00+00:00",
"name": "Collection-1",
"related_urls": [
"https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/"
],
"url": null
},
"source_id": "collection-1",
"source_params": null
}
]
}
]
Paging
By using the id of the last item from a request as the value for the query parameter from of the following request, you will be able to scroll through results. When the result contains an empty list, you know that you received all results
Path Parameters
The domain to look up.
Query Parameters
Maximum size of the JSON object that will be returned (maximum 10 000)
Id of the database entry you want to start from (excluding this id).
Was this page helpful?
curl --request GET \
--url https://api.flare.io/leaksdb/identities/by_domain/{domain} \
--header 'Authorization: Bearer <token>'
[
{
"links": {},
"name": "price.glenn@example.com",
"passwords": [
{
"credential_hash": "da7932a62841a48cc06e639be10cdb1f",
"domain": "example.com",
"extra": {},
"hash": "Secret123!",
"hash_type": "unknown",
"id": 5378,
"imported_at": "2019-06-03T14:20:25.132662+00:00",
"source": {
"breached_at": "2019-01-07T21:59:00+00:00",
"description": "In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services.",
"description_fr": "En janvier 2019, une grande collection de listes de bourrage d'identifiants (combinaisons d'adresses \u00e9lectroniques et de mots de passe utilis\u00e9s pour prendre contr\u00f4le de comptes sur d'autres services) a \u00e9t\u00e9 diffus\u00e9e sur un forum de piratage populaire. Les donn\u00e9es contenaient pr\u00e8s de 2,7 milliards d'enregistrements, dont 773 millions d'adresses \u00e9lectroniques uniques aux c\u00f4t\u00e9s de mots de passe que ces adresses avaient utilis\u00e9s sur d'autres services ayant subi des br\u00e8ches de donn\u00e9es.",
"hash_description": "plaintext",
"hash_type": "Plaintext",
"id": "collection-1",
"is_alerts_enabled": false,
"leaked_at": "2019-01-07T21:59:00+00:00",
"name": "Collection-1",
"related_urls": [
"https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/"
],
"url": null
},
"source_id": "collection-1",
"source_params": null
}
]
}
]