Comment on page
Enzoic has a series of simple hosted REST APIs which allow you to harness the power of our massive database of compromised credentials and accounts for integration into your application or website.
While any of our APIs are callable directly, by far the easiest way to get started using Enzoic is to use one of our rich suite of libraries that you can use within your applications. We offer a series of Quick Start tutorials for each.
Enzoic consists of the following:
Lookup whether a given password exists in our database of compromised passwords.
Integration into account signup forms and password change forms to alert users if they enter a known compromised password in order to ensure users aren’t using exposed passwords that cybercriminals routinely include in password cracking dictionaries.
Securely lookup whether a given username/password combination exists in our database of compromised account credentials.
As users log into a website or application, their credentials are checked against this API and, if compromised, the login can be blocked and redirected into a password reset flow. This prevents cybercriminals from logging in using stolen credentials.
Securely lookup all the compromised passwords Enzoic has for a given user. The passwords are returned in cleartext, if available, or in the raw hash format that was recovered.
A user’s credentials are periodically checked offline to determine if they are compromised. Note: This API is extremely sensitive and restricted to organizations that pass extensive vetting. Please contact sales if you believe you have an appropriate use case for this API.
Allows you to register email addresses (or domain) so that you will be notified when a new exposure of that address occurs. Notification occurs via a POST to a webhook URL you specify.
Proactive notification about whether your users are involved in a new exposure provides a way to enrich your threat intelligence and allow immediate notification the moment a new exposure is found.
Allows you to register an individual's identity by submitting relevant personally identifiable information (PII) and financial data for monitoring. You will be notified when a new exposure of any portion of that PII occurs. Notification occurs via a POST to a webhook URL you specify.
Proactive notification about whether your users' identities are involved in a new exposure provides a way to prevent fraud, identity theft and exploitation.
Allows you to register your financial institution's Bank Identification Numbers (BINs) for monitoring. You will be notified when a new exposure of any credit card associated with one of the monitored BINs occurs. Notification occurs via a POST to a webhook URL you specify.
Prevent fraudulent usage of your institution's issued credit cards by intercepting the exposure of a stolen number the moment it is shared online. Newly found numbers will typically be posted to you within seconds of being recovered by Enzoic.
The easiest way to use Enzoic. We have libraries available for most major development languages. If you don’t see the one you’re looking for, give us a shout. We’ll be happy to add it for you!
Unless otherwise noted, all APIs are implemented as REST web services with JSON responses.