Scan keywords or a domain for breach data and create a stored DarkRecon result.
scan_id you will use for follow-up retrieval.
keywords: send one or more search terms such as emails, phone numbers, usernames, IPs, passwords, car plates, social IDs, or composite strings.domain: send a single domain to enumerate breached emails and scan the discovered addresses automatically.discovered_emails immediately in the POST /scan response.scan_id is the durable identifier for the stored scan.status can be success, no_results, or no_queries.total_breaches is the number of matched breach sources.POST /scan; retrieve them with GET /scan/{scan_id}.422: request validation failed, including a missing X-API-Key header or malformed request structure.403: the API key could not be validated.502: the upstream breach-data provider returned an error.API key for authentication. Create keys via the admin dashboard.
Send exactly one of keywords or domain.
List of search terms — emails, phone numbers, usernames, IPs, passwords, car plates, social account IDs, or composite queries. Provide this OR domain, not both.
["user@example.com"]Domain name to enumerate emails from and scan. Provide this OR keywords, not both.
"example.com"
Scan completed
Initial acknowledgement returned by POST /scan. Use scan_id with GET /scan/{scan_id} to retrieve full records.
Unique identifier for retrieving scan results via GET /scan/{scan_id}
Scan result status
success, no_results, no_queries Number of breach databases found
x >= 0Emails discovered from domain enumeration (only present when domain was provided)
Additional context (e.g. when no keywords were provided)