Detect and respond to compromised credentials from dark web sources and infostealer logs
Feature | Free Users | Free Business Domain Users | Enterprise Users |
---|---|---|---|
Personal email exposures | ✓ | ✓ | ✓ |
Organization-wide credential exposures | - | ✓ (Requires DNS verification) | ✓ |
View employee passwords | - | ✓ (Requires DNS verification) | ✓ |
Export data (JSON/CSV) | ✓ | ✓ | ✓ |
API access | ✓ | ✓ | ✓ |
Multi-domain monitoring | - | - | ✓ |
Priority support | - | - | ✓ |
admin@hooli.com
, this shows all malware logs containing admin@hooli.com
credentialsjohn.doe@hooli.com
→ mail.hooli.com
(company email)sarah.smith@hooli.com
→ intranet.hooli.com
(internal systems)john.doe@hooli.com
→ github.com
(code repositories)sarah.smith@hooli.com
→ aws.amazon.com
(cloud services)support@hooli.com
→ slack.com
(communication tools)admin@hooli.com
→ dropbox.com
(file sharing)user123@gmail.com
with login URL containing hooli.com
customer@yahoo.com
accessing services at app.hooli.com
buyer@outlook.com
with stored passwords for shop.hooli.com
john@hooli.com
used on GitHub ✓ Employee Leaksarah@hooli.com
used on AWS ✓ Employee Leakadmin@hooli.com
used on Dropbox ✓ Employee Leakuser@gmail.com
used on app.hooli.com
✓ Customer Leakcustomer@yahoo.com
used on shop.hooli.com
✓ Customer LeakLeak Type | Priority | Actions Required | Notifications |
---|---|---|---|
My Leaks | Critical | Immediate password reset, enable MFA | Real-time email alerts |
Employee Leaks | High | Force password resets, audit 3rd party access, security training | Dashboard alerts + email |
Customer Leaks | Medium-High | Customer notification, password reset prompts | Dashboard alerts + email |
GET /v1/leaks/domain
- Get all malware-exposed credentials for your monitored domainsGET /v1/leaks/email
- Get credential exposures for specific email addressesGET /v1/leaks/domain/customers
- Get customer email addresses (returns only email addresses of customers, not full credential exposures)