Shopify Store Leads Scraper — Detect, Extract, Enrich avatar

Shopify Store Leads Scraper — Detect, Extract, Enrich

Pricing

Pay per usage

Go to Apify Store
Shopify Store Leads Scraper — Detect, Extract, Enrich

Shopify Store Leads Scraper — Detect, Extract, Enrich

Detect Shopify stores, extract full product catalogue, identify installed apps & theme, pull contact leads (email, phone, socials, legal business name), estimate plan tier. Works on native Shopify and headless storefronts.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

yossef Nagy

yossef Nagy

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

3 days ago

Last modified

Share

A one-stop Shopify intelligence actor. Give it any URL — get back whether it's a Shopify store, its plan tier, theme, currency, country, installed apps, full product catalogue, and a contact lead (email, phone, social profiles, legal business name).

What it does

For every URL you give it, the actor will:

  1. Detect Shopify with confidence score (handles native Shopify and headless / Hydrogen / Next.js storefronts that use Shopify as backend).
  2. Identify the tech stack: 60+ Shopify apps detected — Klaviyo, Recharge, Judge.me, Loox, Yotpo, Gorgias, Tapcart, Smile.io, Postscript, Attentive, Bold, Stamped, PageFly, GemPages, Triple Whale, Northbeam, Algolia, Klevu, Weglot, and many more.
  3. Extract the full product catalogue — every product with all variants, prices, SKUs, images, tags, vendor, type, availability, sale flag.
  4. Estimate the Shopify plan tier (Basic / Shopify / Advanced / Plus / headless).
  5. Pull contact info — emails (mailto, footer, JSON-LD), phones (tel, JSON-LD), social profiles (Instagram, TikTok, Facebook, Twitter/X, YouTube, Pinterest, LinkedIn), the business's legal name (from privacy policy), country hints.
  6. Map collections with product counts and handles.

Who uses it

  • B2B SaaS sales teams finding ecommerce prospects in their ICP.
  • Agencies prospecting Shopify stores using a specific app stack ("show me stores running Klaviyo + Recharge").
  • Competitive intel — pull a competitor's entire catalogue, see what's on sale, what's new, what's out of stock.
  • Dropshippers / resellers monitoring price & inventory.
  • Investors sizing up DTC brands (plan tier, app stack, product count = revenue proxy).
  • Tech-stack analysts building "what apps does this store run?" reports.

Five run modes

Change behavior with the mode input:

ModeOutputWhen to use
fingerprint (default)One row per store: detection + apps + theme + lead summaryBulk-enrich a CRM list
productsOne row per store + one row per productCatalogue scraping
collectionsOne row per store with embedded collections arrayTaxonomy mapping
leadsOne row per store with deep contact infoB2B outreach lists
fullEverything: store row + products + collections + leadSingle-store deep dive

Filters

In products or full mode:

  • maxProductsPerStore — cap per store
  • minPrice / maxPrice — price range
  • onlyAvailable — drop sold-out products
  • onlyOnSale — only items where compare-at-price > price
  • createdSinceDays — only products added in the last N days (new-arrival monitor)
  • vendorFilter, productTypeFilter — narrow by vendor or product_type
  • collectionHandles — scope to specific collections only

App-based discovery

Set appsFilter to drop stores that don't have at least one of the listed apps installed. Example:

{ "startUrls": [{"url":"..."}], "appsFilter": ["klaviyo", "recharge"] }

→ only returns stores running Klaviyo OR Recharge.

Example inputs

1. Bulk fingerprint a list of domains

{
"startUrls": [
{ "url": "https://www.allbirds.com" },
{ "url": "kith.com" },
{ "url": "colourpop.com" },
{ "url": "https://shop.tesla.com" }
],
"mode": "fingerprint"
}

2. Pull entire catalogue of a single store

{
"startUrls": [{ "url": "https://www.allbirds.com" }],
"mode": "products",
"maxProductsPerStore": 5000
}

3. Find new arrivals on multiple competitors

{
"startUrls": [{"url":"competitor1.com"},{"url":"competitor2.com"}],
"mode": "products",
"createdSinceDays": 7,
"onlyAvailable": true
}

4. Build a Klaviyo-using-beauty-brand leads list

{
"startUrls": [{"url":"https://www.colourpop.com"}, {"url":"..."} ],
"mode": "leads",
"appsFilter": ["klaviyo"]
}

Output (fingerprint mode)

{
"_kind": "store",
"url": "https://www.allbirds.com",
"isShopify": true,
"confidence": 1.0,
"headless": false,
"shop_id": "11044168",
"myshopify_domain": "allbirds.myshopify.com",
"theme_id": "129798963280",
"products_json_accessible": true,
"product_count": 312,
"plan_tier_estimate": "Advanced",
"apps": ["klaviyo", "judge_me", "tapcart"],
"apps_detail": [{"id":"klaviyo","name":"Klaviyo","category":"email_marketing"}, ...],
"lead": {
"email": ["help@allbirds.com"],
"phone": ["+1 888 963 8944"],
"socials": {
"instagram": "https://www.instagram.com/allbirds",
"tiktok": "https://www.tiktok.com/@allbirds"
},
"legal_name": "Allbirds, Inc.",
"address": "..."
},
"signals": ["header:powered-by=Shopify","html_cdn_shopify","products_json_ok"]
}

Output (products mode, one row per product)

{
"_kind": "product",
"store": "https://www.allbirds.com",
"product_id": 6616124981328,
"title": "Trino® Cozy Crew - Heathered Onyx",
"handle": "trino-cozy-crew-heathered-onyx",
"vendor": "Allbirds",
"product_type": "Socks",
"url": "https://www.allbirds.com/products/trino-cozy-crew-heathered-onyx",
"price_min": 12.0,
"price_max": 12.0,
"compare_at_price_max": 24.0,
"on_sale": true,
"available": true,
"variant_count": 4,
"variants": [{...}],
"images": [{...}],
"tags": ["..."],
"created_at": "...",
"updated_at": "..."
}

Pricing (pay-per-event)

EventPrice
Actor start$0.005
Per store fingerprinted$0.002
Per product extracted$0.0005
Per lead enriched$0.005

A typical fingerprint-only run on 1,000 domains costs ~$2.01. A full catalogue pull on 100 stores averaging 200 products each costs ~$10.20.

Ethics & robots.txt

The actor honors robots.txt by default. Shopify's /products.json, /collections.json and /sitemap.xml are publicly indexable on every store unless the merchant explicitly disallows them in robots.txt — this actor will not bypass that without an explicit input flag.

The actor does not scrape behind authentication, attempt to access admin paths, bypass Cloudflare/WAF on protected storefronts, or extract customer/order/PII data.

License

MIT.