DeHashed Password Breach Scanner avatar
DeHashed Password Breach Scanner
Under maintenance

Pricing

Pay per event

Go to Apify Store
DeHashed Password Breach Scanner

DeHashed Password Breach Scanner

Under maintenance

Developed by

Kevin

Kevin

Maintained by Community

Scan 15+ billion breached records instantly! Protect your org from credential compromise. Find leaked passwords, emails & personal data across 1,000+ breach databases. Perfect for security teams, compliance & risk management. $0.50/search. Start protecting today!

5.0 (1)

Pricing

Pay per event

0

6

6

Last modified

16 days ago

Instantly scan 15+ billion breached records to protect your organization from credential compromise.

Deploy to Apify

๐Ÿšจ Why You Need This

  • 4.5 billion compromised records exposed in 2023 alone
  • 83% of data breaches involve weak or stolen passwords
  • Average cost of a data breach: $4.45 million
  • Credential stuffing attacks increased 300% in recent years

โœจ Features

  • ๐Ÿ” Scan 15+ billion records across 1,000+ breach databases
  • โšก Instant results with lightning-fast API responses
  • ๐Ÿ›ก๏ธ Multiple query types: Email, username, password, IP, domain, phone, VIN
  • ๐Ÿ“Š Flexible output: JSON and CSV formats
  • ๐Ÿ”’ Data sensitivity controls: Redact sensitive data for compliance
  • โšก Rate limiting: Built-in protection against API abuse
  • ๐Ÿข Enterprise ready: Scalable for organizations of any size

๐ŸŽฏ Perfect For

  • Security Teams - Proactive threat hunting and vulnerability assessment
  • Compliance Officers - Meet regulatory requirements and audit standards
  • IT Administrators - Secure user onboarding and ongoing monitoring
  • Penetration Testers - Identify weak credentials during security assessments
  • Risk Managers - Quantify and mitigate credential exposure risks

๐Ÿš€ Quick Start

1. Get DeHashed API Credentials

  1. Sign up at DeHashed
  2. Go to Settings > API
  3. Generate your API key and note your email

2. Configure Environment Variables

In your Apify Console:

  1. Go to your Actor settings
  2. Add these environment variables:
    • DEHASHED_API_KEY = your_api_key_here
    • DEHASHED_EMAIL = your_email_here

3. Run the Actor

  1. Go to the Input tab
  2. Enter your search parameters
  3. Click Start

๐Ÿ“‹ Input Parameters

ParameterTypeRequiredDescriptionExample
querystringโœ…Search termuser@example.com
queryTypestringโŒType of data to searchemail, username, password
maxResultsintegerโŒMax results (1-1000)100
includeRawDatabooleanโŒInclude raw breach datatrue
formatstringโŒOutput formatjson, csv

๐Ÿ” Query Types

  • email - Email addresses
  • username - Usernames
  • password - Plain text passwords
  • hashed_password - Hashed passwords
  • ip - IP addresses
  • name - Full names
  • address - Physical addresses
  • phone - Phone numbers
  • vin - Vehicle VIN numbers
  • domain - Domain names

๐Ÿ“Š Example Inputs

{
"query": "user@example.com",
"queryType": "email",
"maxResults": 50,
"includeRawData": false,
"format": "json"
}
{
"query": "john.doe",
"queryType": "username",
"maxResults": 100
}
{
"query": "password123",
"queryType": "password",
"maxResults": 25,
"includeRawData": true
}

๐Ÿ“ˆ Output

The Actor returns structured data including:

  • Search Results: List of compromised records
  • Summary: Statistics about the search
  • Metadata: Search timestamp, query details
  • CSV Export: Optional CSV file for results

Sample Output

{
"query": "user@example.com",
"queryType": "email",
"totalResults": 3,
"entries": [
{
"id": "12345",
"email": "user@example.com",
"password": "***REDACTED***",
"database": "Example Breach 2023",
"leaked_at": "2023-01-15",
"created_at": "2023-01-20T10:30:00Z"
}
],
"searchTimestamp": "2024-01-15T10:30:00Z"
}

๐Ÿ’ฐ Pricing

  • $0.50 per search query
  • Unlimited Results: Get all matching records for each search
  • No Monthly Commitments: Pay only for what you use

๐Ÿ” Security & Compliance

  • ๐Ÿ” Secure API credentials stored as environment variables
  • ๐Ÿ”’ Data redaction options for sensitive information
  • โšก Rate limiting prevents API abuse
  • ๐Ÿ›ก๏ธ Error handling for various API responses
  • ๐Ÿ“‹ Audit trails for compliance reporting

๐Ÿš€ Use Cases

  • Security Audits: Check if company emails are compromised
  • User Onboarding: Verify new user credentials
  • Compliance: Meet security requirements and regulations
  • Monitoring: Track ongoing credential exposure
  • Research: Analyze breach patterns and trends
  • Incident Response: Investigate security incidents

๐Ÿ“ž Support

For issues with:

  • DeHashed API: Contact DeHashed support
  • This Actor: Check the logs and error messages
  • Apify Platform: Use Apify support channels

๐Ÿ“„ License

MIT License - see LICENSE file for details.


Ready to protect your organization? Deploy this Actor now!