Searches across breach databases for leaked credentials and data.
Response fields vary depending on the breach source. Common fields include:
email, username, password, ip, domain, source, date, dbnamePagination: Use nextCursorMark as cursor for next page.
Legacy breach search remains available, but new integrations should prefer V2 Breach Search. Use the legacy endpoint only if you need compatibility with an existing client that already consumes the older response format.Documentation Index
Fetch the complete documentation index at: https://docs.oathnet.org/llms.txt
Use this file to discover all available pages before exploring further.
API key for authentication (lowercase header name)
Search query (email, username, domain, etc.)
Pagination cursor from previous response
Search session ID from /service/search/init
Filter to specific breach databases (comma-separated or single)