Integrate breach lookup into your applications with our simple, powerful API
This page provides an overview of our API capabilities. Full technical documentation, including authentication details, endpoint specifications, code examples, and interactive API explorer will be accessible once you subscribe to any of our API plans.
Our API provides on-demand breach lookup capabilities. Search any email or username across our complete database of breaches and stealer logs programmatically.
Note: The API provides lookup functionality only. For continuous monitoring with alerts, use our dashboard plans.