DeHashed Password Breach Scanner avatar
DeHashed Password Breach Scanner
Deprecated

Pricing

Pay per event

Go to Apify Store
DeHashed Password Breach Scanner

DeHashed Password Breach Scanner

Deprecated

Scan 15+ billion breached records instantly! Protect your org from credential compromise. Find leaked passwords, emails & personal data across 1,000+ breach databases. Perfect for security teams, compliance & risk management. $0.50/search. Start protecting today!

Pricing

Pay per event

Rating

5.0

(1)

Developer

Kevin

Kevin

Maintained by Community

Actor stats

0

Bookmarked

9

Total users

5

Monthly active users

2 months ago

Last modified

Share

Instantly scan 15+ billion breached records to protect your organization from credential compromise.

Deploy to Apify

🚨 Why You Need This

  • 4.5 billion compromised records exposed in 2023 alone
  • 83% of data breaches involve weak or stolen passwords
  • Average cost of a data breach: $4.45 million
  • Credential stuffing attacks increased 300% in recent years

✨ Features

  • πŸ” Scan 15+ billion records across 1,000+ breach databases
  • ⚑ Instant results with lightning-fast API responses
  • πŸ›‘οΈ Multiple query types: Email, username, password, IP, domain, phone, VIN
  • πŸ“Š Flexible output: JSON and CSV formats
  • πŸ”’ Data sensitivity controls: Redact sensitive data for compliance
  • ⚑ Rate limiting: Built-in protection against API abuse
  • 🏒 Enterprise ready: Scalable for organizations of any size

🎯 Perfect For

  • Security Teams - Proactive threat hunting and vulnerability assessment
  • Compliance Officers - Meet regulatory requirements and audit standards
  • IT Administrators - Secure user onboarding and ongoing monitoring
  • Penetration Testers - Identify weak credentials during security assessments
  • Risk Managers - Quantify and mitigate credential exposure risks

πŸš€ Quick Start

1. Get DeHashed API Credentials

  1. Sign up at DeHashed
  2. Go to Settings > API
  3. Generate your API key and note your email

2. Configure Environment Variables

In your Apify Console:

  1. Go to your Actor settings
  2. Add these environment variables:
    • DEHASHED_API_KEY = your_api_key_here
    • DEHASHED_EMAIL = your_email_here

3. Run the Actor

  1. Go to the Input tab
  2. Enter your search parameters
  3. Click Start

πŸ“‹ Input Parameters

ParameterTypeRequiredDescriptionExample
querystringβœ…Search termuser@example.com
queryTypestring❌Type of data to searchemail, username, password
maxResultsinteger❌Max results (1-1000)100
includeRawDataboolean❌Include raw breach datatrue
formatstring❌Output formatjson, csv

πŸ” Query Types

  • email - Email addresses
  • username - Usernames
  • password - Plain text passwords
  • hashed_password - Hashed passwords
  • ip - IP addresses
  • name - Full names
  • address - Physical addresses
  • phone - Phone numbers
  • vin - Vehicle VIN numbers
  • domain - Domain names

πŸ“Š Example Inputs

{
"query": "user@example.com",
"queryType": "email",
"maxResults": 50,
"includeRawData": false,
"format": "json"
}
{
"query": "john.doe",
"queryType": "username",
"maxResults": 100
}
{
"query": "password123",
"queryType": "password",
"maxResults": 25,
"includeRawData": true
}

πŸ“ˆ Output

The Actor returns structured data including:

  • Search Results: List of compromised records
  • Summary: Statistics about the search
  • Metadata: Search timestamp, query details
  • CSV Export: Optional CSV file for results

Sample Output

{
"query": "user@example.com",
"queryType": "email",
"totalResults": 3,
"entries": [
{
"id": "12345",
"email": "user@example.com",
"password": "***REDACTED***",
"database": "Example Breach 2023",
"leaked_at": "2023-01-15",
"created_at": "2023-01-20T10:30:00Z"
}
],
"searchTimestamp": "2024-01-15T10:30:00Z"
}

πŸ’° Pricing

  • $0.50 per search query
  • Unlimited Results: Get all matching records for each search
  • No Monthly Commitments: Pay only for what you use

πŸ” Security & Compliance

  • πŸ” Secure API credentials stored as environment variables
  • πŸ”’ Data redaction options for sensitive information
  • ⚑ Rate limiting prevents API abuse
  • πŸ›‘οΈ Error handling for various API responses
  • πŸ“‹ Audit trails for compliance reporting

πŸš€ Use Cases

  • Security Audits: Check if company emails are compromised
  • User Onboarding: Verify new user credentials
  • Compliance: Meet security requirements and regulations
  • Monitoring: Track ongoing credential exposure
  • Research: Analyze breach patterns and trends
  • Incident Response: Investigate security incidents

πŸ“ž Support

For issues with:

  • DeHashed API: Contact DeHashed support
  • This Actor: Check the logs and error messages
  • Apify Platform: Use Apify support channels

πŸ“„ License

MIT License - see LICENSE file for details.


Ready to protect your organization? Deploy this Actor now!