DeHashed Password Breach Scanner avatar

DeHashed Password Breach Scanner

Deprecated

Pricing

Pay per event

Go to Apify Store
DeHashed Password Breach Scanner

DeHashed Password Breach Scanner

Deprecated

Scan 15+ billion breached records instantly! Protect your org from credential compromise. Find leaked passwords, emails & personal data across 1,000+ breach databases. Perfect for security teams, compliance & risk management. $0.50/search. Start protecting today!

Pricing

Pay per event

Rating

0.0

(0)

Developer

Kevin

Kevin

Maintained by Community

Actor stats

0

Bookmarked

9

Total users

5

Monthly active users

7 months ago

Last modified

Share

Instantly scan 15+ billion breached records to protect your organization from credential compromise.

Deploy to Apify

๐Ÿšจ Why You Need This

  • 4.5 billion compromised records exposed in 2023 alone
  • 83% of data breaches involve weak or stolen passwords
  • Average cost of a data breach: $4.45 million
  • Credential stuffing attacks increased 300% in recent years

โœจ Features

  • ๐Ÿ” Scan 15+ billion records across 1,000+ breach databases
  • โšก Instant results with lightning-fast API responses
  • ๐Ÿ›ก๏ธ Multiple query types: Email, username, password, IP, domain, phone, VIN
  • ๐Ÿ“Š Flexible output: JSON and CSV formats
  • ๐Ÿ”’ Data sensitivity controls: Redact sensitive data for compliance
  • โšก Rate limiting: Built-in protection against API abuse
  • ๐Ÿข Enterprise ready: Scalable for organizations of any size

๐ŸŽฏ Perfect For

  • Security Teams - Proactive threat hunting and vulnerability assessment
  • Compliance Officers - Meet regulatory requirements and audit standards
  • IT Administrators - Secure user onboarding and ongoing monitoring
  • Penetration Testers - Identify weak credentials during security assessments
  • Risk Managers - Quantify and mitigate credential exposure risks

๐Ÿš€ Quick Start

1. Get DeHashed API Credentials

  1. Sign up at DeHashed
  2. Go to Settings > API
  3. Generate your API key and note your email

2. Configure Environment Variables

In your Apify Console:

  1. Go to your Actor settings
  2. Add these environment variables:
    • DEHASHED_API_KEY = your_api_key_here
    • DEHASHED_EMAIL = your_email_here

3. Run the Actor

  1. Go to the Input tab
  2. Enter your search parameters
  3. Click Start

๐Ÿ“‹ Input Parameters

ParameterTypeRequiredDescriptionExample
querystringโœ…Search termuser@example.com
queryTypestringโŒType of data to searchemail, username, password
maxResultsintegerโŒMax results (1-1000)100
includeRawDatabooleanโŒInclude raw breach datatrue
formatstringโŒOutput formatjson, csv

๐Ÿ” Query Types

  • email - Email addresses
  • username - Usernames
  • password - Plain text passwords
  • hashed_password - Hashed passwords
  • ip - IP addresses
  • name - Full names
  • address - Physical addresses
  • phone - Phone numbers
  • vin - Vehicle VIN numbers
  • domain - Domain names

๐Ÿ“Š Example Inputs

{
"query": "user@example.com",
"queryType": "email",
"maxResults": 50,
"includeRawData": false,
"format": "json"
}
{
"query": "john.doe",
"queryType": "username",
"maxResults": 100
}
{
"query": "password123",
"queryType": "password",
"maxResults": 25,
"includeRawData": true
}

๐Ÿ“ˆ Output

The Actor returns structured data including:

  • Search Results: List of compromised records
  • Summary: Statistics about the search
  • Metadata: Search timestamp, query details
  • CSV Export: Optional CSV file for results

Sample Output

{
"query": "user@example.com",
"queryType": "email",
"totalResults": 3,
"entries": [
{
"id": "12345",
"email": "user@example.com",
"password": "***REDACTED***",
"database": "Example Breach 2023",
"leaked_at": "2023-01-15",
"created_at": "2023-01-20T10:30:00Z"
}
],
"searchTimestamp": "2024-01-15T10:30:00Z"
}

๐Ÿ’ฐ Pricing

  • $0.50 per search query
  • Unlimited Results: Get all matching records for each search
  • No Monthly Commitments: Pay only for what you use

๐Ÿ” Security & Compliance

  • ๐Ÿ” Secure API credentials stored as environment variables
  • ๐Ÿ”’ Data redaction options for sensitive information
  • โšก Rate limiting prevents API abuse
  • ๐Ÿ›ก๏ธ Error handling for various API responses
  • ๐Ÿ“‹ Audit trails for compliance reporting

๐Ÿš€ Use Cases

  • Security Audits: Check if company emails are compromised
  • User Onboarding: Verify new user credentials
  • Compliance: Meet security requirements and regulations
  • Monitoring: Track ongoing credential exposure
  • Research: Analyze breach patterns and trends
  • Incident Response: Investigate security incidents

๐Ÿ“ž Support

For issues with:

  • DeHashed API: Contact DeHashed support
  • This Actor: Check the logs and error messages
  • Apify Platform: Use Apify support channels

๐Ÿ“„ License

MIT License - see LICENSE file for details.


Ready to protect your organization? Deploy this Actor now!