DeHashed Password Breach Scanner
Pricing
Pay per event
Go to Apify Store
DeHashed Password Breach Scanner
Under maintenanceScan 15+ billion breached records instantly! Protect your org from credential compromise. Find leaked passwords, emails & personal data across 1,000+ breach databases. Perfect for security teams, compliance & risk management. $0.50/search. Start protecting today!
5.0 (1)
Pricing
Pay per event
0
6
6
Last modified
16 days ago
Instantly scan 15+ billion breached records to protect your organization from credential compromise.
๐จ Why You Need This
- 4.5 billion compromised records exposed in 2023 alone
- 83% of data breaches involve weak or stolen passwords
- Average cost of a data breach: $4.45 million
- Credential stuffing attacks increased 300% in recent years
โจ Features
- ๐ Scan 15+ billion records across 1,000+ breach databases
- โก Instant results with lightning-fast API responses
- ๐ก๏ธ Multiple query types: Email, username, password, IP, domain, phone, VIN
- ๐ Flexible output: JSON and CSV formats
- ๐ Data sensitivity controls: Redact sensitive data for compliance
- โก Rate limiting: Built-in protection against API abuse
- ๐ข Enterprise ready: Scalable for organizations of any size
๐ฏ Perfect For
- Security Teams - Proactive threat hunting and vulnerability assessment
- Compliance Officers - Meet regulatory requirements and audit standards
- IT Administrators - Secure user onboarding and ongoing monitoring
- Penetration Testers - Identify weak credentials during security assessments
- Risk Managers - Quantify and mitigate credential exposure risks
๐ Quick Start
1. Get DeHashed API Credentials
- Sign up at DeHashed
- Go to Settings > API
- Generate your API key and note your email
2. Configure Environment Variables
In your Apify Console:
- Go to your Actor settings
- Add these environment variables:
DEHASHED_API_KEY= your_api_key_hereDEHASHED_EMAIL= your_email_here
3. Run the Actor
- Go to the Input tab
- Enter your search parameters
- Click Start
๐ Input Parameters
| Parameter | Type | Required | Description | Example |
|---|---|---|---|---|
query | string | โ | Search term | user@example.com |
queryType | string | โ | Type of data to search | email, username, password |
maxResults | integer | โ | Max results (1-1000) | 100 |
includeRawData | boolean | โ | Include raw breach data | true |
format | string | โ | Output format | json, csv |
๐ Query Types
email- Email addressesusername- Usernamespassword- Plain text passwordshashed_password- Hashed passwordsip- IP addressesname- Full namesaddress- Physical addressesphone- Phone numbersvin- Vehicle VIN numbersdomain- Domain names
๐ Example Inputs
Email Search
{"query": "user@example.com","queryType": "email","maxResults": 50,"includeRawData": false,"format": "json"}
Username Search
{"query": "john.doe","queryType": "username","maxResults": 100}
Password Search
{"query": "password123","queryType": "password","maxResults": 25,"includeRawData": true}
๐ Output
The Actor returns structured data including:
- Search Results: List of compromised records
- Summary: Statistics about the search
- Metadata: Search timestamp, query details
- CSV Export: Optional CSV file for results
Sample Output
{"query": "user@example.com","queryType": "email","totalResults": 3,"entries": [{"id": "12345","email": "user@example.com","password": "***REDACTED***","database": "Example Breach 2023","leaked_at": "2023-01-15","created_at": "2023-01-20T10:30:00Z"}],"searchTimestamp": "2024-01-15T10:30:00Z"}
๐ฐ Pricing
- $0.50 per search query
- Unlimited Results: Get all matching records for each search
- No Monthly Commitments: Pay only for what you use
๐ Security & Compliance
- ๐ Secure API credentials stored as environment variables
- ๐ Data redaction options for sensitive information
- โก Rate limiting prevents API abuse
- ๐ก๏ธ Error handling for various API responses
- ๐ Audit trails for compliance reporting
๐ Use Cases
- Security Audits: Check if company emails are compromised
- User Onboarding: Verify new user credentials
- Compliance: Meet security requirements and regulations
- Monitoring: Track ongoing credential exposure
- Research: Analyze breach patterns and trends
- Incident Response: Investigate security incidents
๐ Support
For issues with:
- DeHashed API: Contact DeHashed support
- This Actor: Check the logs and error messages
- Apify Platform: Use Apify support channels
๐ License
MIT License - see LICENSE file for details.
Ready to protect your organization? Deploy this Actor now!

