GET
/
leaksdb
/
v2
/
sources
curl --request GET \
  --url https://api.flare.io/leaksdb/v2/sources \
  --header 'Authorization: Bearer <token>'
{
    "cursors": [],
    "items": [
        {
            "breached_at": "2007-07-12T17:03:00+00:00",
            "description": "In July 2007, the multiplayer game portal known as gPotato suffered a data breach and over 2 million user accounts were exposed. The site later merged into the Webzen portal where the original accounts still exist today. The exposed data included usernames, email and IP addresses, passwords and personal attributes such as gender, birth date, physical address and security questions and answers.",
            "description_fr": "En juillet 2007, le portail de jeux multijoueurs connu sous le nom de gPotato a subi une fuite de donn\u00e9es qui a expos\u00e9 plus de 2 millions de comptes utilisateurs. Le site a ensuite fusionn\u00e9 avec le portail Webzen, o\u00f9 les comptes originaux existent encore aujourd'hui. Les donn\u00e9es expos\u00e9es comprenaient des noms d'utilisateur, des adresses \u00e9lectroniques, des adresses IP, des mots de passe et des attributs personnels tels que le sexe, la date de naissance, l'adresse physique et les questions et r\u00e9ponses de s\u00e9curit\u00e9.",
            "hash_description": "MD5",
            "hash_type": null,
            "id": "2007_gpotato",
            "is_alerts_enabled": false,
            "leaked_at": "2008-01-01T18:03:00+00:00",
            "name": "gPotato",
            "related_urls": [
                ""
            ],
            "url": "https://www.webzen.com/"
        }
    ],
    "next": "WzFd",
    "total_count": null
}

This endpoint will return all sources, paginated and in ascending order from least recently added to most recently added.

{
    "cursors": [],
    "items": [
        {
            "breached_at": "2007-07-12T17:03:00+00:00",
            "description": "In July 2007, the multiplayer game portal known as gPotato suffered a data breach and over 2 million user accounts were exposed. The site later merged into the Webzen portal where the original accounts still exist today. The exposed data included usernames, email and IP addresses, passwords and personal attributes such as gender, birth date, physical address and security questions and answers.",
            "description_fr": "En juillet 2007, le portail de jeux multijoueurs connu sous le nom de gPotato a subi une fuite de donn\u00e9es qui a expos\u00e9 plus de 2 millions de comptes utilisateurs. Le site a ensuite fusionn\u00e9 avec le portail Webzen, o\u00f9 les comptes originaux existent encore aujourd'hui. Les donn\u00e9es expos\u00e9es comprenaient des noms d'utilisateur, des adresses \u00e9lectroniques, des adresses IP, des mots de passe et des attributs personnels tels que le sexe, la date de naissance, l'adresse physique et les questions et r\u00e9ponses de s\u00e9curit\u00e9.",
            "hash_description": "MD5",
            "hash_type": null,
            "id": "2007_gpotato",
            "is_alerts_enabled": false,
            "leaked_at": "2008-01-01T18:03:00+00:00",
            "name": "gPotato",
            "related_urls": [
                ""
            ],
            "url": "https://www.webzen.com/"
        }
    ],
    "next": "WzFd",
    "total_count": null
}

Query Parameters

size
number

Maximum size of the JSON object that will be returned (maximum 10 000).

from
string

Cursor from which you want to continue paginating. This value comes from the next field in the response. For example WzFd the example response.