Breachsense CTI API Documentation

ASM - attack surface management listing both assets and potential phishing domains
Combo - focuses on combo lists that contain plaintext credentials
Creds - focuses on 3rd party breaches that contain credentials
Darkweb - focuses on company data being leaked or sold on the darkweb
Monitor - manages monitored assets
Radar - focuses on domains that threat actors have announced as targets
Sessions - focuses on session tokens extracted from malware infected devices
Stealer - focuses on credentials extracted from malware infected devices

Endpoint

Domain NamePath
api.breachsense.com/asm

Supported Parameters

ParameterDescription
assetsfilter results to only display assets
countdisplay the number of results available for a given target
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/asm?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/asm?search=[DomainName]
pphishfilter results to only display potential phishing domains
rreturn the number of remaining monthly queries allowed
searchaccepts a domain name or email address
updatereturn the Unix timestamp the combo database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch)

Output**

JSON KeyValue
api*The name of the API endpoint that generated the alert
cname*The CNAME of the domain name identified
domThe domain name found
foundThe date (in YYYYMMDD or unixtime format) the domain was found
ip*The IP address of the domain name identified
typeThe type of asset identified
ns represents a nameserver
mx represents a mail server
ast represents a domain name asset.
pphish represents a potential phishing domain found.
* Optional JSON object keys
** Output based on domain names configured in the monitor API endpoint

Endpoint

Domain NamePath
api.breachsense.com/combo

Supported Parameters

ParameterDescription
countdisplay the number of results available for a given target
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/combo?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/combo?search=[DomainName]
pto reduce latency for targets with many results, enable pagination via p=1 in the initial request.
when an HTTP 206 response status is returned, increase the page number to view the next page.
p is a numeric page value and must be accessed sequentially.
rreturn the number of remaining monthly queries allowed
searchaccepts a domain name or email address
updatereturn the Unix timestamp the combo database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch)

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
cnt*The number of results available for the searched target
fleThe file name the credential was found in
fndThe date (in YYYYMMDD or unixtime format) the credentials were found
pwdThe password used to authenticate
src*The target URL or IP that the victim authenticated to
usrThe username used to authenticate
* Optional JSON object keys

Test Data :

ParameterString
search[email protected]

Endpoint

Domain NamePath
api.breachsense.com/creds

Supported Parameters

ParameterDescription
attrdisplay a short description of the breach
countdisplay the number of results available for a given target
csvdisplay results in CSV format (default is JSON)
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
hashreturn a 0 if the password is in hashed format and a 1 if the password has been decrypted
importdisplay the date the breach was imported into the database
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/creds?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/creds?search=[DomainName]
listlist the breaches and dates they were imported
limitincrease / decrease the number of records returned in the response
pto reduce latency for targets with many results, enable pagination via p=1 in the initial request.
when an HTTP 206 response status is returned, increase the page number to view the next page.
p is a numeric page value and must be accessed sequentially.
results are limited to 500 credentials per request (by default).
rreturn the number of remaining monthly queries allowed
searchaccepts a domain name or email address
updatereturn the Unix timestamp the creds database was last updated
uniqreturn a list of all unique email addresses and plaintext passwords
unixtimedisplay the import date in unixtime (aliases: unix,epoch

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
atr*The attribution data associated with the breach
cnt*The number of results available for the searched target
emlThe email address used to authenticate
impThe date (in YYYYMMDD format) the breach was found
pwdThe password used to authenticate
srcThe name of the breached website or collection
* Optional JSON object keys

Test Data :

ParameterString
search[email protected]

Endpoint

Domain NamePath
api.breachsense.com/darkweb

Supported Parameters

ParameterDescription
countdisplay the number of results available for a given target
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
descdisplay a short description of the victim
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/darkweb?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/darkweb?search=[DomainName]
rreturn the number of remaining monthly queries allowed
rangerange - accepts a date range in YYYYMMDD-YYYYMMDD format (30 day limit)
searchsearch term - accepts a domain name
tadescdisplay a short description of the threat actor
updatereturn the Unix timestamp the darkweb database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch)

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
dataThe domain name associated with the victim
desc*A short description of the victim
foundThe date the data was indexed (in YYYYMMDD format)
img*A signed URL linking to a screenshot of the relevant data
The URL is valid for 20 minutes
This output is only available in the Business and Enterprise tiers
nameThe company name of the victim
siteThe name of the threat actor
srcA URL containing data associated with the target
tadesc*A short description of the threat actor
* Optional JSON object keys

Test Data :

ParameterString
searchexample.com

Endpoint

Domain NamePath
api.breachsense.com/monitor

Supported Parameters

ParameterDescription
actionmanage monitored assets
must be set to add, del or list
astadd/delete the asset you wish to monitor
per asset notifications can be set using the :: separator, e.g.:
example.com::[email protected]
or
example.com::https://user:[email protected]/Path/To/Webhook
must be used in conjunction with the action parameter

Session tokens can be set using the ~~ seperator, e.g.:
example.com~~JSESSIONID
or
example.com~~JSESSIONID~~https://user:[email protected]/Path/To/Webhook
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/monitor?lic=[YourLicenseKey]&action=add&ast=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/monitor?action=add&ast=[DomainName]
notifyadd/delete the default email address or webhook you wish to receive alerts at
this is used when a per asset notification is not set
must be used in conjunction with the action parameter
credsadd/delete the basic auth credentials you wish to use when sending an alert to a webhook
must be used in conjunction with the action parameter

Output

JSON KeyValue
ast*asset that will be monitored
notify*email or webhook that will be notified
* Optional JSON object keys

Endpoint

Domain NamePath
api.breachsense.com/radar

Supported Parameters

ParameterDescription
countdisplay the number of results available for a given target
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/radar?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/radar?search=[DomainName]
rreturn the number of remaining monthly queries allowed
searchsearch term - accepts a domain name
updatereturn the Unix timestamp the radar database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
dataThe domain name associated with the victim
foundThe date the data was indexed (in YYYYMMDD format)
img*A signed URL linking to a screenshot of the relevant data
The URL is valid for 20 minutes
This output is only available in the Business and Enterprise tiers
srcA URL containing data associated with the target
* Optional JSON object keys

Test Data :

ParameterString
searchexample.com

Endpoint

Domain NamePath
api.breachsense.com/sessions

Supported Parameters

ParameterDescription
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/sessions?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/sessions?search=[DomainName]
rreturn the number of remaining monthly queries allowed
searchsearch term - accepts a domain name, email address or IP address
updatereturn the Unix timestamp the sessions database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
domThe domain name associated with the victim
expiresThe date (in unixtime) that the cookie is set to expire
fndThe date the data was found (in YYYYMMDD format)
nameThe name of the cookie
pathThe cookie path
valThe value of the cookie
* Optional JSON object keys

Test Data :

ParameterString
searchexample.com

Endpoint

Domain NamePath
api.breachsense.com/stealer

Supported Parameters

ParameterDescription
countdisplay the number of results available for a given target
dateonly display results newer that this value. Value set in YYYYMMDD or unixtime formats
liclicense key
can be sent via a GET parameter or request header, for example:
curl https://api.breachsense.com/stealer?lic=[YourLicenseKey]&search=[DomainName]
curl -H “lic: YourLicenseKey” https://api.breachsense.com/stealer?search=[DomainName]
pto reduce latency for targets with many results, enable pagination via p=1 in the initial request.
when an HTTP 206 response status is returned, increase the page number to view the next page.
p is a numeric page value and must be accessed sequentially.
rreturn the number of remaining monthly queries allowed
searchsearch term - accepts a domain name, email address, IP address, crypto wallet address, or a truncated credit card number (e.g. 123456-1234)
updatereturn the Unix timestamp the stealer database was last updated
unixtimedisplay the import date in unixtime (aliases: unix,epoch

Output

JSON KeyValue
api*The name of the API endpoint that generated the alert
ccn*The disclosed credit card number
ccx*The exposed credit card number’s expiration date
cnt*The number of results available for the searched target
cwa*The exposed crypto wallet address
bid*The build ID of the malware
fleThe file name the credential was found in
fndThe date the credential was found
hid*The hardware ID of the infected device
iip*The IP address of the infected device
inf*The date the machine was infected on
mac*The name assigned to the infected device
mal*The type of malware infected on the device
nme*The user logged in on the infected device
os*The operating system installed on the infected device
pth*The filesystem path for the malware executable
pwdThe password used to authenticate
srcThe target URL or IP that the victim authenticated to
usrThe username used to authenticate to the target
* Optional JSON object keys

Test Data :

ParameterString
search[email protected]
411111-1111