🕵️♂️ Overview

Hudson Rock provides its clients with the ability to query a database of over 30,000,000 computers compromised through global info-stealer campaigns conducted by threat actors.
The database is updated daily with newly compromised computers, enabling cybersecurity providers to alert security teams ahead of imminent attacks when users are compromised and their credentials are stolen.
In this guide we will demonstrate all query shapes available using our API endpoints.
Start building
Search for infostealers data by domain names
Discover compromised assets linked to your domains
Assess third-party domain exposure
Get statistical overview for domains
Search for compromised credentials by email
Search for compromised credentials by username
Search for compromises by IP or CIDR range
Search infections by specific stealer ID
Search for infostealers data by password
Find domains based on specific keywords
Discover URLs matching keyword indicators
Find compromised credentials based on file names
Need help with the new API?Our AI Assistant is here to guide you through the transition to v3.0—instantly answer questions, suggest code updates, and more. Try it now →
Updated 9 months ago
