WhiteIntel API Documentation
  • WhiteIntel API
  • Authentication
  • Postman Collections
  • Webhooks
    • WhiteIntel Webhook API
    • Signature Validation
  • WhiteIntel API v2
    • Consumer Leaks API
  • Corporate Leaks API
  • Username Leaks API
  • IP Leaks API
  • Computer Leaks API
  • Get Leaks By ID API
  • Overall Stats API
  • Last Leaks API
  • Whiteintel API v1
    • Combolists API
      • ComboLists Username Leaks API
      • ComboLists Customer Leaks API
      • ComboLists Corporate Email Leaks API
      • Get IDs From Leaks
      • Get Customer Leaks by Id API
      • Get Corporate Leaks by Id API
      • Get Username Leaks by Id API
    • Infostealer API
      • Customer Leaks API
      • Corporate Email Leaks API
      • Username Leaks API
      • Password Leaks API
      • IP Leaks API
      • Hostname Leaks API
      • Get IDs From Leaks
      • Get Multiple Leaks By Ids
      • Get Leak by Id
    • Overall Stats API
    • Last Leaks API
Powered by GitBook
On this page
  • Endpoint
  • Required Headers
  • Parameters
  • Sample Request
  • Request URL
  • Example Success Response
  • Example Error Response
  • Code Examples
  1. Whiteintel API v1
  2. Infostealer API

Hostname Leaks API

The Hostname Leaks API allows users to check infostealer related leaks attached to an Hostname. The request must include the query parameter and apikey.

Hostname Leaks API is only available for CTI Firm licenses.

Endpoint

POST /api/get_leaks_by_hostname.php

Required Headers

Name
Description

Content-Type

Must be set to application/json

Parameters

Name
Type
Required
Default
Description

apikey

string

Yes

N/A

Your API key.

query

string

Yes

N/A

Device hostname to search for.

start_date

string

No

N/A

The start date for retrieving leaks in YYYY-MM-DD format

end_date

string

No

N/A

The end date for retrieving leaks in YYYY-MM-DD format

limit

int

No

N/A

Limits the result to given number

If no date is specified, API will return all of the results related to given Hostname.

Sample Request

Request URL

POST /api/get_leaks_by_hostname.php

{
    "query": "Sample Hostname",
    "apikey": "yourapikey"
}

Example Success Response

{"total_leaks":1,"remaining_daily_api_calls":980,"data":[{"url":"https:\/\/sampleurl.com\/sample_endpoint\/","username":"sampleusername","password":"sample_pass","compromised_device_ip":"IP Address","compromised_host_username":"device_username","compromised_host_hostname":"device_hostname","compromised_host_os":"Windows 10 Home Single Language [x64]","malware_path":"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe","country":"COUNTRY CODE","log_date":"2024-10-23"}

Example Error Response

{"error":"Missing search parameter."}

Code Examples

Example with Curl

curl -X POST https://whiteintel.io/api/get_leaks_by_hostname.php \
     -H "Content-Type: application/json" \
     -d '{
           "apikey": "yourapikey",
           "query": "HOSTNAME TO SEARCH FOR"
         }'

Example with Python


import requests

url = "https://whiteintel.io/api/get_leaks_by_hostname.php"
payload = {
    "apikey": "yourapikey",
    "query": "HOSTNAME TO SEARCH FOR"
}
headers = {
    "Content-Type": "application/json"
}

response = requests.post(url, json=payload, headers=headers)

if response.status_code == 200:
    print("Response:", response.json())
else:
    print("Failed to retrieve Hostname leaks:", response.status_code, response.text)
PreviousIP Leaks APINextGet IDs From Leaks

Last updated 5 months ago