Skip to main content

HOW IT WORKS

APIs for quick implementation and scalability

Passwords API

A compromised password is any password that has been found in a data breach or password cracking dictionary used by cybercriminals.

Check whether a password is unsafe.

Credentials API

A compromised credential is an exact username and password combination that has been found in a data breach, data exposure, or combo-list used by cybercriminals.

Determine whether a username/password combination is available to hackers, an obvious security gap.

Exposure API

An exposure is any unintended release of user credentials. This could be due to a data breach at a site, malware that has captured user credentials, a phishing site that has been capturing user credentials, etc.

Look up all the exposures for your users and obtain detailed information about each.

HOW IT CAN HELP ME

Bring Actionable Dark Web Intelligence to Your Projects and Workflows

Easily integrate our APIs to receive the earliest possible insight into data breaches or PII exposure, allowing you to mitigate damage caused by leaked credentials and remediate when customer or employee data becomes available on the Dark Web.

Quick Implementation Icon

Quick Implementation

While any of our APIs are callable directly, by far the easiest way to get started using Enzoic (formerly PasswordPing) is to use one of our rich suite of libraries that you can use within your applications. We offer a series of Quick Start tutorials for each.

Scalability Icon

Scalability

Get started with a free API key. With free plans up to 2,000 calls, our pricing is designed to scale with you.

Mitigate Damage Icon

Mitigate Damage

Our APIs give you multiple options for proactively avoiding exposure.

api json

Read the Technical Docs

Explore quick-start guides, code snippets, and a comprehensive resource library to integrate into your workflows.

Read Docs

What Our Customers Say

Backblaze
Tim Nufire, Founder & Chief Cloud Officer

“We’re impressed with Enzoic’s creative approach to catching credential stuffing attacks using their database of compromised credentials as a proactive defensive against ATO. Enzoic does this securely without cracking hashed passwords or being given access to our users’ credentials and doesn’t add unnecessary steps to our customers’ login process.”

Enzoic API Plans

Startup
Business
Enterprise

Calls

Startup

Free for up to 2,000 Calls!

Business

First 2,000 Calls: $0 / Call
Next 3,000 Calls: $0.040 / Call
Next 5,000 Calls: $0.020 / Call
Next 40,000 Calls: $0.015 / Call
Next 50,000 Calls: $0.010 / Call
Next 100,000 Calls: $0.008 / Call
Next 800,000 Calls: $0.005 / Call
Over 1M Calls: Contact Us

Enterprise

Contact Us

Billing Cycle

Startup

-

Business

Monthly

Enterprise

Custom

Payment Methods

Startup

-

Business

Credit Card

Enterprise

Custom

Max Calls

Startup

2,000

Business

1,000,000

Enterprise

Custom

Support

Startup

Self-Service /
Knowledge Base

Business

24-hour response
during business week

Enterprise

4-hour response
during business week

SLA

Startup

-

Business

-

Enterprise

Custom

Passwords API

Startup

Business

Enterprise

Credentials API

Startup

Business

Enterprise

Exposures API

Startup

Business

Enterprise

Cleartext Credentials API

Startup

-

Business

-

Enterprise

Resources

Blog

Enzoic’s Threat Research: From Extensive Knowledge to Decisive...

Effective threat intelligence for compromised credential screening involves discerning reconnaissance and real-time analysis and deployment.

Read More

Blog

What’s Missing from New FINRA Guidance

FINRA produced guidance for organizations to tighten their cybersecurity, but no advice was provided regarding the issue of password hygiene.

Read More

Blog

Enzoic and OneLogin Partner to Prevent Cyber Attacks Caused By...

The collaboration will see Enzoic’s credentials screening service integrated into OneLogin’s SmartFactor Authentication product.

Read More