What is OathNet?
OathNet is an enterprise-grade data intelligence platform that provides programmatic access to one of the world’s largest collections of breach data, stealer logs, and OSINT information. Our API enables security researchers, threat intelligence teams, and enterprises to:- Detect compromised credentials before they’re exploited
- Investigate security incidents with comprehensive data
- Monitor brand exposure across breach databases
- Build custom security tools with reliable data feeds
Platform Capabilities
Breach Database
50+ billion records from thousands of breach sources, searchable by email, username, password, IP, or domain. Updated daily with new data.
Stealer Logs (V2)
Access raw stealer log data with victim profiles, file trees, and credential extraction. Search by domain, email, Discord ID, or hardware ID.
OSINT Lookups
Instant lookups for 10+ platforms: Discord, Steam, Xbox, Roblox, Google, and more. Get usernames, avatars, account history, and linked accounts.
API Architecture
OathNet’s API follows REST conventions with predictable resource-oriented URLs:Base URL
All API requests are made to:Authentication
Every request requires an API key passed in thex-api-key header:
Response Format
All responses follow a consistent envelope:Service Categories
| Category | Endpoints | Description |
|---|---|---|
| Search Session | 1 | Initialize quota-tracked search sessions |
| Breach Search | 1 | Search leaked credentials and data |
| Stealer (V2) | 3 | Enhanced stealer log search with filtering |
| Victims (V2) | 4 | Victim profiles, file trees, and downloads |
| File Search (V2) | 2 | Regex/wildcard search within victim files |
| Export (V2) | 3 | Async export to JSONL or CSV |
| OSINT | 12 | Platform-specific lookups (Discord, Steam, Xbox, Roblox, Minecraft, etc.) |
| Utility | 3 | Database autocomplete, health check, analytics |
Interactive Playground
Every endpoint page includes an interactive playground where you can test API requests directly in your browser. Simply enter your API key and parameters, then click Send to see live responses.Explore API Endpoints
Try the interactive playground on any endpoint
Use Cases
Credential Monitoring
Credential Monitoring
Monitor your organization’s domains for leaked credentials. Get alerts when employee emails appear in new breaches.
Incident Response
Incident Response
Investigate compromised accounts by tracing credentials across breaches and stealer logs.
OSINT Investigation
OSINT Investigation
Build comprehensive profiles by linking Discord, Steam, Roblox, and other platform accounts.
Threat Intelligence
Threat Intelligence
Extract IOCs from stealer logs including passwords, cookies, and configuration files.