POST /search.
Supported search types
| Type value | Typical input |
|---|---|
Pseudonym | john_doe |
Email Address | target@example.com |
Domain Name | example.com |
Cryptocurrency | Wallet address |
IP Address | 8.8.8.8 or IPv6 |
These values must match the OpenAPI enum exactly.
Request shape
Options reference
| Field | Type | Notes |
|---|---|---|
leakedresults | string[] | Allowed values: Hudson Rock, Leak Check, Snusbase, Breach Base, Breach VIP, Leak Osint |
modules | uuid[] | Restrict execution to selected module IDs |
bypass_cache | boolean | Force a fresh execution |
include_breached_accounts | boolean | Include breached account dataset |
include_registered_accounts | boolean | Include registered account dataset |
registered_accounts_only | boolean | Supported only for Email Address |
Module selection behavior (options.modules)
Use options.modules when you want to restrict execution to a known set of modules.
- Every module ID must exist
- Every module ID must be listed and currently available
- Every module ID must be compatible with the selected
type
- If
options.modulesis omitted or empty, Osintly runs the default module set for that search type - If
options.modulescontains one or more IDs, execution is limited to that set
400 with an explicit validation error.
ID and pagination parameters
id(path): search UUIDsource(path): leak provider source code/namepage(query): leak source page number, minimum1
Common errors
400 Validation error
400 Validation error
Request shape or field values are invalid. Check enum values and data types.
401 Unauthorized
401 Unauthorized
429 Rate limit exceeded
429 Rate limit exceeded
Respect retry headers and retry after the reset window.
503 Dispatch unavailable
503 Dispatch unavailable