Skip to main content

HOW IT WORKS

APIs for Quick Implementation and Scalability

Passwords API

A compromised password is any password that has been found in a data breach or password cracking dictionary used by cybercriminals.

Check whether a password is unsafe.

Credentials API

A compromised credential is an exact username and password combination that has been found in a data breach, data exposure, or combo-list used by cybercriminals.

Determine whether a username/password combination is available to hackers.

Exposure API

An exposure is any unintended release of user credentials. This could be due to a data breach at a site, malware that has captured user credentials, a phishing site that has been capturing user credentials, etc.

Look up all the exposures for your users and obtain detailed information about each.

HOW IT CAN HELP ME

Bring Actionable Dark Web Intelligence to Your Projects and Workflows

Easily integrate our APIs to receive the earliest possible insight into data breaches or PII exposure, allowing you to mitigate damage caused by leaked credentials and remediate when customer or employee data becomes available on the Dark Web.

Scalability Icon

Scalability

Get started with a free API key. With free plans up to 2,000 calls, our pricing is designed to scale with you.

Quick Implementation Icon

Quick Implementation

While all of our APIs are callable directly, by far the easiest way to get started using Enzoic is to use one of our rich suite of libraries that you can use within your applications. We offer a series of Quick Start tutorials for each.

Mitigate Damage Icon

Mitigate Damage

Our APIs give you multiple options for proactively avoiding exposure.

api json

Read the Technical Docs

Explore quick-start guides, code snippets, and a comprehensive resource library to integrate into your workflows.

Read Docs
Backblaze

Tim Nufire, Founder & Chief Cloud Officer

“We’re impressed with Enzoic’s creative approach to catching credential stuffing attacks using their database of compromised credentials as a proactive defensive against ATO. Enzoic does this securely without cracking hashed passwords or being given access to our users’ credentials and doesn’t add unnecessary steps to our customers’ login process.”

Enzoic API Plans

Startup
Business
Enterprise

Calls

Startup

Free for up to 2,000 Calls!

Business

First 2,000 Calls: $0 / Call
Next 3,000 Calls: $0.040 / Call
Next 5,000 Calls: $0.020 / Call
Next 40,000 Calls: $0.015 / Call
Next 50,000 Calls: $0.010 / Call
Next 100,000 Calls: $0.008 / Call
Next 800,000 Calls: $0.005 / Call
Over 1M Calls: Contact Us

Enterprise

Contact Us

Billing Cycle

Startup

-

Business

Monthly

Enterprise

Custom

Payment Methods

Startup

-

Business

Credit Card

Enterprise

Custom

Max Calls

Startup

2,000

Business

1,000,000

Enterprise

Custom

Support

Startup

Self-Service /
Knowledge Base

Business

24-hour response
during business week

Enterprise

4-hour response
during business week

SLA

Startup

-

Business

-

Enterprise

Custom

Passwords API

Startup

Business

Enterprise

Credentials API

Startup

Business

Enterprise

Exposures API

Startup

Business

Enterprise

Cleartext Credentials API

Startup

-

Business

-

Enterprise

Try Now      Talk to Us      Find Partner

Resources

Blog

ATO Attacks: What Organizations Need to Know

Attackers can use compromised credentials to gain unauthorized access to an organization's information, leading to ATO attacks.

Read More

Blog

A Guide to GDPR Compliance

Ensure GDPR Compliance and Protect Your Organization from Costly Penalties. Learn the key steps to take when handling EU citizens' data in the event of a data breach.

Read More

Blog

API’s Are Leaving Digital Banking Services Unlocked

Credential stuffing attacks are posing major risks to banks and credit unions. Read how to address the vulnerabilities in open banking.

Read More