Skip to main content
Defendis API lets you integrate external threat signals into your product and security workflows to automate monitoring and enrichment. Use this API to:

Search for leaks

Query data leak signals for approved identifiers (domains, BINs, etc).

Manage Watchlists

Create and manage watchlists that define what you monitor.

Exposure Analysis

Analyse your external exposure and track ransomware activity.

Base URL and versioning

  • Base URL: https://api.defendis.ai
  • Version prefix: /api/v1
Example endpoint: https://api.defendis.ai/api/v1/watchlists

Authentication

All /api/v1/* endpoints require an API key:
Authorization: Bearer <api_key>

Start here

Getting Started

Make your first request and learn integration patterns.

Authentication

API keys, authorization scope, and security best practices.

Endpoints

Guidance on which endpoint family to use, with OpenAPI reference.

Errors

Error model, retry behavior, and troubleshooting.

Deployment

Availability, versioning policy, and change management.

Downloads

  • Download the Postman file
  • Import the OpenAPI spec URL: https://api.defendis.ai/openapi.json