π΅οΈββοΈ Overview

Hudson Rock provides its clients with the ability to query a database of over 30,000,000 computers compromised through global info-stealer campaigns conducted by threat actors.
The database is updated daily with newly compromised computers, enabling cybersecurity providers to alert security teams ahead of imminent attacks when users are compromised and their credentials are stolen.
In this guide we will demonstrate all query shapes available using our API endpoints.
Start building
Domain Intelligence
Search for infostealers data by domain names
Assets Discovery
Discover compromised assets linked to your domains
Third Party Risk
Assess third-party domain exposure
Domains Overview
Get statistical overview for domains
Search by Email
Search for compromised credentials by email
Search by Username
Search for compromised credentials by username
Search by IP/CIDR
Search for compromises by IP or CIDR range
Search by Stealer ID
Search infections by specific stealer ID
Password Search
Search for infostealers data by password
Keyword Search
Find domains based on specific keywords
Keyword URL Search
Discover URLs matching keyword indicators
File Search
Find compromised credentials based on file names
Need help with the new API?
Our AI Assistant is here to guide you through the transition to v3.0βinstantly answer questions, suggest code updates, and more. Try it now β
Updated 6 days ago