User Intel | Python SDK
Initializes a new Pangea service client.
UserIntel(token, config, logger_name)download-file
UserIntel.download_file()is-password-breached
UserIntel.is_password_breached()Look up breached passwords
UserIntel.password_breached(hash_type, hash_prefix, verbose, raw, provider)Determine if a password has been exposed in a security breach using a 5 character prefix of the password hash.
response = user_intel.password_breached(
hash_prefix="5baa6",
hash_type=HashType.SHA256,
provider="spycloud",
)
Look up breached passwords V2
UserIntel.password_breached_bulk(hash_type, hash_prefixes, verbose, raw, provider)Determine if a password has been exposed in a security breach using a 5 character prefix of the password hash.
response = user_intel.password_breached_bulk(
hash_prefixes=["5baa6"],
hash_type=HashType.SHA256,
provider="spycloud",
)
Poll result
UserIntel.poll_result(exception)Returns request's result that has been accepted by the server
response = service.poll_result(exception)
Look up breached users
UserIntel.user_breached(email, username, ip, phone_number, start, end, verbose, raw, provider)Determine if an email address, username, phone number, or IP address was exposed in a security breach.
response = user_intel.user_breached(
phone_number="8005550123",
provider="spycloud",
verbose=True,
raw=True,
)
Look up breached users V2
UserIntel.user_breached_bulk(emails, usernames, ips, phone_numbers, domains, start, end, verbose, raw, provider)Determine if an email address, username, phone number, or IP address was exposed in a security breach.
response = user_intel.user_breached_bulk(
phone_numbers=["8005550123"],
provider="spycloud",
verbose=True,
raw=True,
)