Documentation Index
Fetch the complete documentation index at: https://docs.oathnet.org/llms.txt
Use this file to discover all available pages before exploring further.
What is OathNet?
OathNet is a data intelligence platform that provides programmatic access to breach data, stealer logs, victim files, and OSINT enrichment. Teams use the API to:- detect compromised credentials before they are abused
- investigate incidents with breach and stealer context
- monitor new exposure with automated scanners
- build custom security workflows on top of a single API surface
Platform Capabilities
Breach Database
Search large breach datasets by email, domain, username, password, phone, DB name, and more.
Stealer Logs
Search credential records, pivot into victim manifests, inspect files, and download archives.
Scanners
Monitor newly indexed stealer or breach data and deliver alerts to email, Discord, or custom webhooks.
OSINT Lookups
Run point lookups for Discord, Steam, Xbox, Roblox, Google, Minecraft, email presence, and IP intelligence.
API Architecture
OathNet exposes three customer-facing API families:Base URL
All API requests are made to:Authentication
Every request requires an API key passed in thex-api-key header:
Response Patterns
Successful responses are not all shaped the same way anymore:- many search and legacy lookup endpoints return
success,message, anddata - many v2 utility and job endpoints return raw JSON payloads
- download endpoints return raw text or binary streams
Service Categories
| Category | Surface | Description |
|---|---|---|
| Legacy Search & OSINT | /service/* | Search sessions, legacy breach and stealer search, and point lookups |
| Current Search & Jobs | /service/v2/* | Breach, stealer, victims, autocomplete, AI filter, file search, exports, bulk search, analytics, and health |
| Scanners | /scanners/* | Automated monitoring, delivery tests, webhook security, and run history |
Interactive Playground
Every endpoint page includes an interactive playground where you can test requests directly in your browser.Explore API Endpoints
Browse the API reference and use the playground
Use Cases
Credential Monitoring
Credential Monitoring
Search current breach or stealer data for domains, emails, usernames, or passwords, then move to scanners when you need recurring monitoring.
Incident Response
Incident Response
Pivot from a stealer credential hit into the victim manifest, inspect captured files, and download the archive when deeper review is needed.
OSINT Investigation
OSINT Investigation
Enrich identities and accounts with Discord, Roblox, Steam, Xbox, Google, email, and IP lookups.
Automation & Monitoring
Automation & Monitoring
Use exports, bulk search, file search, and scanner webhooks to automate enrichment and alerting pipelines.
Next Steps
Get Your API Key
Generate an API key from the dashboard
Quickstart Guide
Make your first API call in under 5 minutes