{ New } - Company Search Endpoint
by Dan BenshitritDocs: Search by Company Endpoint | Get Company IDs
-
Added a new endpoint:
POST /search-by-companyPurpose: Enables targeted compromise searches within a specific company's digital asset portfolio, supporting unified querying across corporate domains, mobile applications (APKs), and external third-party services.
-
Prerequisites: Use the
GET /my-accountendpoint to retrieve your availablecompany_idvalues before using this search capability.- Response includes:
-
stealer: Associated stealer ID and compromise metadata for correlation -
credentials: Filtered credential data matching specified company assets and search criteria -
ip: IP address and system information from compromised machines -
computer_name: Name of the compromised computer for asset identification -
date_compromised: Timeline data for incident response and forensic analysis -
date_uploaded: When the compromise data was integrated into the platformThis enterprise-focused search capability provides comprehensive organizational compromise assessment with intelligent asset correlation. The endpoint features smart external domain logic that automatically includes the company name as a keyword when searching external domains, enhancing third-party risk detection and shadow IT discovery workflows.
-
- Response includes:
Example Request:
curl --request POST \
--url https://api.hudsonrock.com/json/v3/search-by-company \
--header 'accept: application/json' \
--header 'api-key: <API_KEY>' \
--header 'content-type: application/json' \
--data '{
"company_id": "695cebd77ef1529e2862efea",
"company_asset_types": ["domains", "external_domains"],
"keywords": ["admin", "portal"],
"types": ["employees"],
"subdomains": ["auth", "vpn"],
"sort_by": "date_compromised"
}'Use Cases:
- Enterprise Security Assessment: Comprehensive compromise monitoring across all company digital assets including corporate domains, mobile applications, and third-party services
- Asset-Specific Investigation: Granular searches within specific asset categories (domains, APKs, external domains) based on organizational security requirements
- Third-Party Risk Management: Enhanced detection of compromises in external services through intelligent company name correlation and keyword matching
- Incident Response: Focused threat hunting within organizational asset portfolios for rapid impact assessment and containment planning
- Shadow IT Discovery: Identification of unauthorized external services and applications through external domain compromise correlation with company identifiers
