User Intel API Reference
The User Intel service allows you to check a large repository of breach data to see if a user’s Personally Identifiable Data (PII) or credentials have been compromised.
Base URL
user-intel.<csp>.<region>.pangea.cloud
curl -sSLX POST 'https://user-intel.aws.us.pangea.cloud/v2/user/breached' \
-H 'Authorization: Bearer <your_token>' \
-H 'Content-Type: application/json' \
-d '{}'
Response
Look up breached users
Determine if an email address, username, phone number, or IP address was exposed in a security breach. When requesting breach data for multiple values, the response will be asynchronous. See API Reference/Asynchronous Responses
curl -sSLX POST 'https://user-intel.aws.us.pangea.cloud/v2/password/breached' \
-H 'Authorization: Bearer <your_token>' \
-H 'Content-Type: application/json' \
-d '{}'
Response
Look up breached passwords
Determine if a password has been exposed in a security breach using a 5 character prefix of the password hash. When requesting breach data for multiple hash prefixes, the response will be asynchronous. See API Reference/Asynchronous Responses
curl -sSLX POST 'https://user-intel.aws.us.pangea.cloud/v1/user/breached' \
-H 'Authorization: Bearer <your_token>' \
-H 'Content-Type: application/json' \
-d '{}'
Response
Look up breached users
Determine if an email address, username, phone number, or IP address was exposed in a security breach.
curl -sSLX POST 'https://user-intel.aws.us.pangea.cloud/v1/breach' \
-H 'Authorization: Bearer <your_token>' \
-H 'Content-Type: application/json' \
-d '{}'
Response
Look up information about a specific breach
Given a provider specific breach ID, find details about the breach.
curl -sSLX POST 'https://user-intel.aws.us.pangea.cloud/v1/password/breached' \
-H 'Authorization: Bearer <your_token>' \
-H 'Content-Type: application/json' \
-d '{}'
Response
Look up breached passwords (deprecated)
Determine if a password has been exposed in a security breach using a 5 character prefix of the password hash.
Was this article helpful?