Categories: Announcements

An Enterprise Edition of The BreachDirectory API Is Now Available!

The BreachDirectory API is used widely by companies in all kinds of industries – from online shopping and universities to cyber security. The use cases of the API range from operations in the open source intelligence (OSINT) sector to supporting the projects of private cyber security enthusiasts. However, the API has always had one downside – people could only check one account against the API at a time. Now, everything has changed – BreachDirectory also has an Enterprise edition of its API offering allowing bulk account checks. When an Enterprise edition of the BreachDirectory API is in use, users can not only make use of the powerful features offered by the API in the first place, but also check whether accounts are at risk of identity theft by scanning through a set of them at once – here‘s how everything looks like:

The bulk version of BreachDirectory‘s API is available here (you can also see how the page looks by looking at the image above), and its core principle is indeed very simple:

  1. Provide the system with the email address you‘ve purchased access to the bulk version of the API with.
  2. Provide a CSV file with the accounts you‘d like to be scanned through the API (at present, the API can scan through up to 100 accounts at once – we‘re working to increase the capabilities.)
  3. Last but not least, choose what types of data are in the CSV file – if you‘ve used the BreachDirectory API before you will know that the API supports all types of data supported by the search engine itself including email addresses, usernames, IP addresses, and domains of websites.

Wrapping Up

We hope that the bulk version of the API will be useful to both cybersecurity enthusiasts and information security experts alike. However, the next set of features is already in the works, so subscribe to our newsletter, and make sure to follow us on LinkedIn and Twitter for future updates.

Nirium

Recent Posts

How to Fix Packet Loss in CS2? Causes & Solutions

This blog on how to fix packet loss CS2 will provide you with a couple…

4 weeks ago

Crypto Users Targeted by North Korean Hackers: Zero-Days at Fault?

A hacking group related to North Korea is exploiting a zero-day in the Chromium browser…

2 months ago

What are Crypto Bubbles?

What are crypto bubbles, how do they form, and should you worry about them? Learn…

2 months ago

What is the Crypto-Engine.pro Blog and Who’s Behind it?

Is the crypto-engine.pro blog legit and should you trust this resource? Learn here!

2 months ago

Twitter (X) Now Suspended in Brazil – Why?

Reside in Brazil and found that your Twitter account suspended? There’s a good reason for…

2 months ago

Black Hat USA 2024, DEFCON 2024, and Mandatory Hotel Room Checks

This blog covers the recent Black Hat USA 2024 (DEFCON 2024) conference and digs into…

2 months ago