Get overview about domain-wide compromises and intelligence

Required Permissions

search-by-domain

Response Models (Schema)

domain

Response Limits

  • Rate limit: 50 requests per 10 seconds
  • Maximum response per page: 500 domains
  • Maximum response time: 90 seconds
Body Params
domains
array of strings
required
length between 1 and 500

List of domains to retrieve compromise overview statistics for. Accepts root domains (example.com) and will aggregate data across all subdomains. Between 1-500 domains can be specified per request.

domains*
number
≥ 0

Minimum threshold for employee compromises. Returns only domains with at least this many compromised employee accounts. Useful for filtering out domains with negligible compromise counts.

number
≥ 0

Maximum threshold for employee compromises. Returns only domains with no more than this many compromised employee accounts. Useful for focusing on organizations within specific size ranges.

number
≥ 0

Minimum threshold for user compromises. Returns only domains with at least this many compromised user accounts. Helps identify domains with significant consumer impact.

number
≥ 0

Maximum threshold for user compromises. Returns only domains with no more than this many compromised user accounts. Helps focus on domains with specific consumer impact ranges.

date-time

ISO 8601 formatted timestamp (YYYY-MM-DDThh:mm:ssZ) to filter for domains with employee compromises after this date. Identifies domains with recent corporate breaches.

date-time

ISO 8601 formatted timestamp (YYYY-MM-DDThh:mm:ssZ) to filter for domains with user compromises after this date. Identifies domains with recent consumer-facing breaches.

date-time

ISO 8601 formatted timestamp (YYYY-MM-DDThh:mm:ssZ) to filter for domains with employee data uploaded after this date. Reflects when the data became available in our system.

date-time

ISO 8601 formatted timestamp (YYYY-MM-DDThh:mm:ssZ) to filter for domains with user data uploaded after this date. Reflects when the data became available in our system.

string
Defaults to last_employee_compromised

Field to sort overview results by. Time-based sorting helps identify recent breaches, while count-based sorting identifies the most severely affected domains.

string
Defaults to desc

Direction to sort overview results. 'desc' prioritizes recent breaches or highest compromise counts (recommended for threat monitoring), while 'asc' shows oldest breaches or lowest counts first.

string

Base64 encoded pagination cursor for retrieving the next set of overview results. Obtained from the 'nextCursor' field in the previous response. Essential for processing large domain lists.

Responses

Response body
object
data
array of objects
data
object
string

Unique identifier for the domain

string

Domain

number

Number of compromised employees

number

Number of compromised users

date-time

Last employee compromised date

date-time

Last user compromised date

date-time

Last employee uploaded date

date-time

Last user uploaded date

string

Base64 encoded cursor for the next page

Language
Credentials