Skip to main content

User Intel | Node.js SDK

User Intel

constructor(token: string, config: PangeaConfig): UserIntelService

Creates a new UserIntelService with the given Pangea API token and configuration.

required parameters

string

Pangea API token.

Configuration.

Response Object

UserIntelService
const config = new PangeaConfig({ domain: "pangea_domain" });
const userIntel = new UserIntelService("pangea_token", config);

Look up breached passwords

passwordBreached(hashType: HashType, hashPrefix: string, options: BreachedOptions): Promise<PangeaResponse<BreachedResult>>

Determine if a password has been exposed in a security breach using a 5 character prefix of the password hash.

required parameters

HashType

Hash type to be looked up

string

The prefix of the hash to be looked up.

An object of optional parameters. Parameters supported:

  • provider {String} - Use breached data from this provider: "spycloud". Default provider defined by the configuration.
  • verbose {Boolean} - Echo the API parameters in the response. Default: verbose=false.
  • raw {Boolean} - Include raw data from this provider. Default: raw=false.

Response Object

Promise<PangeaResponse<BreachedResult>>
const response = await userIntel.passwordBreached(
  Intel.HashType.SHA256,
  "5baa6",
  {
    provider: "spycloud",
    verbose: true,
    raw: true
  }
);

Look up breached passwords V2

passwordBreachedBulk(hashType: HashType, hashPrefixes: string[], options: BreachedOptions): Promise<PangeaResponse<BreachedBulkResult>>

Find out if a password has been exposed in security breaches by providing a 5 character prefix of the password hash.

required parameters

HashType

Hash type to be looked up

Array<string>

The list of prefixes of the hash to be looked up.

An object of optional parameters. Parameters supported:

  • provider {String} - Use breached data from this provider: "spycloud". Default provider defined by the configuration.
  • verbose {Boolean} - Echo the API parameters in the response. Default: verbose=false.
  • raw {Boolean} - Include raw data from this provider. Default: raw=false.

Response Object

Promise<PangeaResponse<BreachedBulkResult>>
const response = await userIntel.passwordBreachedBulk(
  Intel.HashType.SHA256,
  ["5baa6"],
  {
    provider: "spycloud",
    verbose: true,
    raw: true
  }
);

post(endpoint: string, data: object, options: PostOptions): Promise<PangeaResponse<R>>

POST request.

required parameters

string

Endpoint path.

object

Request body.

Additional options.

Response Object

Promise<PangeaResponse<R>>

Look up breached users

userBreached(request: BreachedRequest): Promise<PangeaResponse<BreachedResult>>

Determine if an email address, username, phone number, or IP address was exposed in a security breach.

required parameters

BreachedRequest

Request to send to user/breached endpoint

Response Object

Promise<PangeaResponse<BreachedResult>>
const response = await userIntel.userBreached({
  phone_number: "8005550123",
  verbose: true,
  raw: true,
});

Look up breached users V2

userBreachedBulk(request: BreachedBulkRequest): Promise<PangeaResponse<BreachedBulkResult>>

Determine if an email address, username, phone number, or IP address was exposed in a security breach.

required parameters

BreachedBulkRequest

Request to send to user/breached endpoint

Response Object

Promise<PangeaResponse<BreachedBulkResult>>
const response = await userIntel.userBreachedBulk({
  phone_numbers: ["8005550123"],
  verbose: true,
  raw: true,
});