Developer Authentication
The breach.rip API uses a standard header-based authentication protocol. All requests must be authenticated using your unique API key found in your account dashboard. Never expose your API key in client-side code.
x-api-key custom header.curl -X POST "https://breach.rip/api/v1/search" \
-H "x-api-key: BR_LIVE_9283..." \
-H "Content-Type: application/json" \
-d '{"query": "admin@breach.rip", "type": "breaches"}'
Integration Guide
Learn how to seamlessly integrate breach.rip intelligence into your own security tools, web applications, or automated threat hunting pipelines.
async function lookupBreach(query) {
const response = await axios.post('https://breach.rip/api/v1/search', {
query: query,
type: 'breaches'
}, {
headers: { 'x-api-key': process.env.BREACH_API_KEY }
});
return response.data.results;
}
- Environment Variables: Always store your API key in secure environment variables (e.g., .env files).
- Proxy Requests: Always call the breach.rip API from your backend server. Do not call it from the browser (Frontend) to avoid key theft.
- Caching: Consider caching results for 24 hours to optimize credit usage for repeated queries.
- Error Handling: Implement robust retry logic for rate limits (HTTP 429).
Billing & Rate Limits
Our API is designed for high-performance security operations. Credit deduction only occurs on successful data retrieval.
If exceeded, a 5-minute block is automatically applied.
Breaches Search
Query over 15 billion records from 3,000+ historical data breaches. This endpoint provides deep exposure analysis including emails, usernames, and associated metadata.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"test@example.com","type":"breaches"}'
Stealer Logs
Access intelligence from modern malware infections (RedLine, Raccoon, Vidar). This endpoint extracts compromised credentials, system info, and browser session data.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"target_username","type":"stealer"}'
Passwords
Query directly against our massive password dictionary and dehashed database.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"example@gmail.com","type":"passwords"}'
Domains
Perform reconnaissance on target domains to extract linked subdomains and infrastructure details.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"example.com","type":"domains"}'
Discord ID
Resolve Discord Snowflakes (IDs) to extract historical usernames, avatar hashes, and linked accounts.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"123456789012345678","type":"discord id"}'
Roblox
Extract deep account information for Roblox users, including historical data.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"target_username","type":"roblox"}'
Telegram
Investigate Telegram usernames or IDs to find linked phone numbers or historical aliases.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"target_user","type":"telegram"}'
IP Geolocation
Retrieve highly accurate geolocation data, ISP info, and ASN details for any IPv4/IPv6 address.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"8.8.8.8","type":"ip geolocation"}'
Phone Lookup
Cross-reference international phone numbers against telecommunication breaches and public records.
-H "x-api-key: YOUR_KEY" \
-d '{"query":"+1234567890","type":"phone lookup"}'