Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.osint.ly/llms.txt

Use this file to discover all available pages before exploring further.

Radar is Osintly’s breach intelligence surface. It helps you quickly discover publicly disclosed breaches, understand what was exposed, and decide what to do next.

Fast breach feed

Scan recent breach events with severity, size, dates, and short summaries.

Actionable detail pages

Open one breach to get a clear incident view, exposed data types, and context.

Practical next steps

Get clear actions if you may be affected, plus preventive guidance.

Where to use Radar

Browse Radar without signing in to see indexed breach events and open individual breach pages.

What you can do on the Radar feed

At /radar, each breach card includes the most useful triage signals:
  • breach name and title
  • affected domain (when available)
  • severity label
  • exposed record count
  • breach date and indexed date
  • short readable summary
You can then narrow the list quickly:
Focus on medium, high, or critical incidents to prioritize triage.
Filter by breach size (All, 1M+, 100M+) to focus on mass-exposure events.

What you get on a breach detail page

Open any breach at /radar/[name] to get a cleaner incident view:
  1. Core incident facts: title, organization, severity, exposed records, and key dates.
  2. Exposed data classes: what types of data were compromised (emails, names, passwords, phone numbers, etc.).
  3. Readable breach narrative: a cleaned, easier-to-read incident explanation.
  4. Reference links: source and disclosure links when available.
Radar is built for readability: the goal is to understand impact fast without digging through raw, HTML-heavy breach text.

AI-enhanced context

Some breaches include extra AI-generated analysis to speed up decision-making:
  • risk score (0-10) with urgency label
  • structured impact analysis (users, business, sectors, geography)
  • practical response steps if you may be affected
  • preventive guidance for future protection
  • short FAQ for non-specialist users
  • quick classification tags (industry, attack vector, data type, severity factors)