Corporate Leaks API
This endpoint can be used for retrieving corporate leaks related to the given domain address.
Endpoint: https://api.whiteintel.io/get_corporate_leaks.php
Method: POST
Content-Type: application/json
Parameters
Parameter
Required
Default
Description
apikey
Yes
N/A
Your API Key
query
Yes
N/A
Target domain address (ex. xyz.com)
type
No
all
Leak type. Accepted values are: stealer, combolist or all.
limit
No
500
Intiger value of limit. Min 1, maximum 5000.
include_system_info
No
0
Returns compromised systeminfo along with the leaked credentials (if available). Accepted values are 1 or 0.
page
No
1
Page number for pagination starts from 1.
mask_password
No
0
Hide password field from responses.
Response Fields
Response Key
Response Values
success
true or false
remaining_daily_calls
Integer
results
Array of returned results. See below for example "results": [ { "data_type": "stealer", "url": "application_login_url", "log_id": 13371337, "username": "leaked_user", "password": "leaked_password", "log_date": "2025-04-29", "hostname": "compromised_computer_name", "ip": "compromised_ip", "malware_path": "malware_path", "anti_virus": null }, { "data_type": "combolist", "url": "application_login_url", "username": "leaked_user", "password": "leaked_password", "log_date": "2025-04-27" } ]
Full Sample Result
{ "success": true, "remaining_daily_calls": 1974, "results": [ { "data_type": "stealer", "url": "application_login_url", "log_id": 13371337, "username": "leaked_user", "password": "leaked_password", "log_date": "2025-04-29", "hostname": "compromised_computer_name", "ip": "compromised_ip", "malware_path": "malware_path", "anti_virus": null }, { "data_type": "combolist", "url": "application_login_url", "username": "leaked_user", "password": "leaked_password", "log_date": "2025-04-27" } ] }
Sample Request
Notes
Replace
"YOUR API KEY"with your actual API key.The
queryfield should be a domain likeexample.com.
Last updated