MSP Dark Intel API Platform

    Interactive API Documentation

    Comprehensive API playground for searching compromised data from infostealer malware, ULPs (User Login Profiles), and public data breaches. Test endpoints, explore parameters, and integrate our powerful dark web monitoring capabilities into your applications.

    Authentication
    Enter your API key to test the endpoints. Contact [email protected] to get your API credentials.
    Available Endpoints
    GET /api/v1/search_infostealer_data

    Purpose: Search through compromised credentials from infostealer malware

    Data includes: Email addresses, passwords, URLs, domains, compromise dates, malware families

    Request Parameters
    Configure your API request parameters

    Search term (domain, email, password, etc.)

    Leave empty to search all fields

    Cannot be used together with Start/End Date filters

    Test the API with your configured parameters

    Generated cURL Command
    Ready-to-use command for terminal execution
    curl -X GET "https://api.mspdarkintel.com/api/v1/search_infostealer_data?query=example.com" \
      -H "X-MSPDARKINTEL-TOKEN: YOUR_API_KEY" \
      -H "Content-Type: application/json"
    API Response
    Live response data or example output
    JSON Response
    Response Format
    Understanding the API response structure

    Common Response Fields

    • total
      - Total number of results
    • hits
      - Array of result objects
    • current_page
      - Current page number
    • total_pages
      - Total pages available
    • search_after
      - Pagination cursor

    Error Handling

    • 400
      - Bad Request (invalid parameters)
    • 401
      - Unauthorized (invalid API key)
    • 422
      - Validation Error
    • 500
      - Internal Server Error