Export leaked credentials with same filtering options as GET /v1/leaks
/v1/leaks endpoint response.
/v1/leaks endpoint in the request body:
limit and page_number) for large exportsgroup_by for summary reports instead of full exportsRetrieve the Team ID from: https://cloud.projectdiscovery.io/settings/team
Export format (json or csv)
json, csv Filter by specific leak type (single value only)
all, personal, employee, customer, external_vendor_leaks, organization_leaks Filter leaks by specific domain (applies to employee/customer leaks)
Filter leaks by specific email (can be personal, employee, or customer email from user's authorized results)
Search query to filter results across all fields
Number of results per page for pagination
Page number for pagination (starts from 1)
time filter start date
all_time, current_month, last_month, last_3_months, last_6_months, last_12_months time filter end date
supported sort fields
url, username, log_date, country, device_ip, host_username, hostname, os, hardware_id, malware_path supported sort order (asc or desc)
asc, desc supported status (fixed or open)
fixed, open Group results by field - returns group summaries when used without field-specific filtering
url, country, device_ip, hostname, email, hardware_id Filter by specific URL (used with group_by for drill-down)
Filter by specific country (used with group_by for drill-down)
Filter by specific device IP (used with group_by for drill-down)
Filter by specific hostname (used with group_by for drill-down)
Filter by specific hardware ID (used with group_by for drill-down)