DeepFindMe API Platform

Powerful OSINT and digital investigation tools available through a secure REST API

All Systems Operational

API Overview

DeepFindMe provides a comprehensive suite of OSINT (Open-Source Intelligence) and digital analysis tools accessible through RESTful API endpoints. Our API enables developers, security researchers, and analysts to incorporate powerful image analysis, geolocation, and data extraction capabilities into their applications.

All endpoints follow standard REST principles and return data in JSON format.
Access token generation and management will soon be available through the user dashboard.

Base URL

https://deepfind.me/api

Authentication Required

All endpoints require an API key or auth token for access.

Rate Limited

25 requests per minute per IP address with burst allowance.

Username Search
POST
Checks if a username exists across 50+ platforms including social media, gaming, professional networks, coding repositories, and content sharing sites.
/username-search

Parameters

NameTypeRequiredDescription
usernamestringYesThe username to search for.

Example Response

[
  {
    "platform": "GitHub",
    "status": "exists",
    "url": "https://github.com/username"
  },
  {
    "platform": "LinkedIn",
    "status": "available",
    "url": null
  },
  {
    "platform": "YouTube",
    "status": "exists",
    "url": "https://www.youtube.com/@username"
  },
  // ... results for 45+ additional platforms
]
Profile Analyzer
GET
Performs advanced OSINT analysis on a username across hundreds of social platforms, forums, and websites to identify all associated online accounts.
/analyzer/{username}

Parameters

NameTypeRequiredDescription
usernamepath parameterYesThe username to analyze across platforms.

Example Response

{
  "sites": [
    {
      "id": "YouTube User_username",
      "status": "found",
      "site_name": "YouTube User",
      "http_status": 200,
      "error_message": null,
      "site_url_user": "https://www.youtube.com/@username",
      "username_claimed": "username"
    },
    {
      "id": "Twitter_username",
      "status": "found",
      "site_name": "Twitter",
      "http_status": 200,
      "error_message": null,
      "site_url_user": "https://twitter.com/username",
      "username_claimed": "username"
    },
    {
      "id": "GitHub_username",
      "status": "found", 
      "site_name": "GitHub",
      "http_status": 200,
      "error_message": null,
      "site_url_user": "https://github.com/username",
      "username_claimed": "username"
    }
    // ... additional profiles found
  ],
  "summary": {
    "profiles_found": 42,
    "total_sites_checked": 350
  },
  "username_queried": "username"
}
IP Geolocation Lookup
GET
Looks up geographical and network information for a given IP address, including country, city, ISP details, and coordinates.
/geolocation/{ip_address}

Parameters

NameTypeRequiredDescription
ipstringYesThe IP address to look up (IPv4 or IPv6).

Example Response

{
  "status": "success",
  "country": "United States",
  "countryCode": "US",
  "region": "CA",
  "regionName": "California",
  "city": "Los Angeles",
  "zip": "90001",
  "lat": 34.0522,
  "lon": -118.2437,
  "timezone": "America/Los_Angeles",
  "isp": "Example ISP",
  "org": "Example Organization",
  "as": "AS12345 Example Network",
  "query": "203.0.113.45"
}
Satellite Street View Search
POST
Upload an image to analyze its content and attempt to determine the location. The AI uses the image's content for analysis, so results may not always be accurate. Rate limit: 15 requests per hour.
/image-location

Parameters

NameTypeRequiredDescription
filefileYesThe image file to analyze.

Example Response

{Estimated coordinates: 44.2760° N, 21.8880° E Nearest city: Pancevo, Serbia}
Domain WHOIS Lookup
POST
Enter a domain name below to retrieve its WHOIS information. This includes details about the domain registrar, registration and expiration dates, name servers, and registrant contact information.
/whois

Parameters

NameTypeRequiredDescription
domainstringYesThe domain name to look up.

Example Response

{
    "domain": "www.google.com",
    "whois_data": {
        "lastUpdateOfWhoisDatabase": "2025-05-14T00:34:46Z <<<",
        "notice": "The expiration date displayed in this record is the date the",
        "termsOfUse": "You are not authorized to access or query our Whois",
        "byTheFollowingTermsOfUse": "You agree that you may use this Data only",
        "to": "(1) allow, enable, or otherwise support the transmission of mass"
    }
}
Email Validator
GET
Check if an email address has been exposed in known data breaches. This tool provides detailed information about any breaches where the email was found, including breach dates, affected data types, and breach descriptions.
/email-validator/{email}

Parameters

NameTypeRequiredDescription
emailstringYesThe email address to check for breaches.

Example Response

[
    {
    "Name": "ExampleBreach1",
    "Title": "Example Breach One",
    "Domain": "example1.com",
    "BreachDate": "2023-01-01",
    "AddedDate": "2023-01-15T00:00:00Z",
    "ModifiedDate": "2023-01-15T00:00:00Z",
    "PwnCount": 1000000,
    "Description": "Example breach description for the first breach...",
    "LogoPath": "https://example.com/breach-logo1.png",
    "DataClasses": [
      "Email addresses",
      "Passwords",
      "Usernames"
    ],
    "IsVerified": true,
    "IsFabricated": false,
    "IsSensitive": false,
    "IsRetired": false,
    "IsSpamList": false,
    "IsMalware": false,
    "IsSubscriptionFree": false,
    "IsStealerLog": false
  },
  {
    "Name": "ExampleBreach2",
    "Title": "Example Breach Two",
    "Domain": "example2.com",
    "BreachDate": "2022-06-15",
    "AddedDate": "2022-07-01T00:00:00Z",
    "ModifiedDate": "2022-07-01T00:00:00Z",
    "PwnCount": 500000,
    "Description": "Example breach description for the second breach...",
    "LogoPath": "https://example.com/breach-logo2.png",
    "DataClasses": [
      "Email addresses",
      "IP addresses",
      "Phone numbers"
    ],
    "IsVerified": true,
    "IsFabricated": false,
    "IsSensitive": true,
    "IsRetired": false,
    "IsSpamList": false,
    "IsMalware": false,
    "IsSubscriptionFree": false,
    "IsStealerLog": false
  },
    //...additional breach info found
]
Email Existence Check
GET
Quickly check if an email address exists in any known data breaches. This endpoint provides a simple boolean response indicating whether the email has been found in any breaches.
/exists/{email}

Parameters

NameTypeRequiredDescription
emailstringYesThe email address to check for existence in breaches.

Example Response

{
    "exists": true
}
Metadata Extractor
POST
Upload a file to extract its metadata. Supports images, videos, audio files, and documents. Maximum file size limit is 10MB.
/metadata-extractor

Parameters

NameTypeRequiredDescription
filefileYesThe file to extract metadata from. Supported formats: images, videos, audio files, and documents.

Example Response

{
      "SourceFile": "/app/uploads/example_file.pdf",
      "errors": [],
      "ExifToolVersion": 13.26,
      "FileName": "example_file.pdf",
      "Directory": "/app/uploads",
      "FileSize": "93 kB",
      "FileModifyDate": {
          "_ctor": "ExifDateTime",
          "year": 2025,
          "month": 5,
          "day": 14,
          "hour": 0,
          "minute": 54,
          "second": 30,
          "tzoffsetMinutes": 0,
          "rawValue": "2025:05:14 00:54:30Z",
          "zoneName": "UTC",
          "inferredZone": false
      },
      "FileAccessDate": {
          "_ctor": "ExifDateTime",
          "year": 2025,
          "month": 5,
          "day": 14,
          "hour": 0,
          "minute": 54,
          "second": 30,
          "tzoffsetMinutes": 0,
          "rawValue": "2025:05:14 00:54:30Z",
          "zoneName": "UTC",
          "inferredZone": false
      },
      "FileInodeChangeDate": {
          "_ctor": "ExifDateTime",
          "year": 2025,
          "month": 5,
          "day": 14,
          "hour": 0,
          "minute": 54,
          "second": 30,
          "tzoffsetMinutes": 0,
          "rawValue": "2025:05:14 00:54:30Z",
          "zoneName": "UTC",
          "inferredZone": false
      },
      "FilePermissions": "-rw-r--r--",
      "FileType": "PDF",
      "FileTypeExtension": "pdf",
      "MIMEType": "application/pdf",
      "PDFVersion": 1.4,
      "Linearized": "No",
      "PageCount": 2,
      "Producer": "Example PDF Producer",
      "CreateDate": {
          "_ctor": "ExifDateTime",
          "year": 2025,
          "month": 5,
          "day": 12,
          "hour": 5,
          "minute": 2,
          "second": 58,
          "tzoffsetMinutes": -420,
          "rawValue": "2025:05:12 05:02:58-07:00",
          "zoneName": "UTC-7",
          "inferredZone": false
      },
      "ModifyDate": {
          "_ctor": "ExifDateTime",
          "year": 2025,
          "month": 5,
          "day": 12,
          "hour": 5,
          "minute": 2,
          "second": 58,
          "tzoffsetMinutes": -420,
          "rawValue": "2025:05:12 05:02:58-07:00",
          "zoneName": "UTC-7",
          "inferredZone": false
      },
      "warnings": []
}
AI Image Detection
POST
Upload an image to analyze whether it was likely generated by Artificial Intelligence. The tool provides a score indicating the likelihood of AI generation, with 1 being definitely real and 5 being highly likely AI-generated. Maximum file size is 5MB. Supported formats: JPG, PNG, WebP. Rate limit: 10 analyzes per 6 hours.
/ai-image-detection/analyze

Parameters

NameTypeRequiredDescription
imagefileYesThe image file to analyze. Supported formats: JPG, PNG, WebP. Maximum size: 5MB.

Example Response

{
      "aiScore": 2,
      "explanation": "The image appears to be a typical photograph with natural lighting and realistic details in the background and subject, suggesting it is likely real."
}
DNS Lookup
POST
Enter a domain name to fetch DNS records including A, AAAA, MX, NS, TXT, and SOA records. This tool provides comprehensive DNS information for any domain.
/dns-lookup

Parameters

NameTypeRequiredDescription
domainstringYesThe domain name to look up DNS records for (e.g., example.com).

Example Response

{
      "records": [
        {
          "recordType": "A",
          "value": "93.184.216.34"
        },
        {
          "recordType": "AAAA",
          "value": "2606:2800:220:1:248:1893:25c8:1946"
        },
        {
          "recordType": "MX",
          "value": "{"exchange":"mail.example.com","priority":10}"
        },
        {
          "recordType": "NS",
          "value": "ns1.example.com"
        },
        {
          "recordType": "TXT",
          "value": "["v=spf1 include:_spf.example.com ~all"]"
        },
        {
          "recordType": "SOA",
          "value": "{"nsname":"ns1.example.com","hostmaster":"hostmaster.example.com","serial":2025010101,"refresh":7200,"retry":3600,"expire":1209600,"minttl":3600}"
        }
      ]
}
Subdomain Finder
GET
Enter a domain to discover its active subdomains. The tool scans for subdomain patterns and returns a list of discovered subdomains. Supports two scanning modes: 'top200' for the most common subdomain patterns, and 'full' for an extensive search across thousands of possible subdomains.
/subdomains

Parameters

NameTypeRequiredDescription
domainstringYesThe domain name to scan for subdomains (e.g., example.com).
modestringYesScanning mode. Options: 'top200' for common patterns, 'full' for extensive search across thousands of possibilities.

Example Response

{
      "domain": "example.com",
      "subdomains": [
        "www.example.com",
        "mail.example.com",
        "ftp.example.com",
        "webmail.example.com",
        "smtp.example.com",
        "pop.example.com",
        "imap.example.com",
        "cpanel.example.com",
        "whm.example.com",
        "ns1.example.com",
        "ns2.example.com",
        "autodiscover.example.com",
        "autoconfig.example.com",
        "test.example.com",
        "blog.example.com",
        "dev.example.com",
        "www2.example.com",
        "pop3.example.com",
        "forum.example.com",
        "admin.example.com"
      ],
      "mode": "top200"
}
Dark Web Link Checker
POST
Validate .onion domains and check if they exist in our database of 18,000+ known services. The tool verifies both the format and existence of onion addresses, supporting both V2 and V3 onion domains.
/dark-web-link

Parameters

NameTypeRequiredDescription
urlstringYesThe .onion URL to validate and check (e.g., example.onion).

Example Response

{
      "status": "Found in Database",
      "url": "example.onion",
      "version": "v3 (Modern)",
      "versionInfo": "This is a modern V3 onion address (56 characters), which offers improved security and privacy.",
      "lastChecked": "2025-05-14T01:10:55.045Z",
      "inDatabase": true,
      "isValid": true
}
Data Breach Scanner - Email Check
POST
Check if your email has been exposed in known public data breaches. The tool searches through a comprehensive database of verified data breaches and provides detailed information about any matches found.
/data-breach-scanner/check-email

Parameters

NameTypeRequiredDescription
emailstringYesThe email address to check for exposure in data breaches.

Example Response

{
      "isBreached": true,
      "breaches": [
        {
          "Name": "ExampleBreach1",
          "Title": "Example Breach One",
          "Domain": "example1.com",
          "BreachDate": "2023-01-01",
          "AddedDate": "2023-01-15T00:00:00Z",
          "ModifiedDate": "2023-01-15T00:00:00Z",
          "PwnCount": 1000000,
          "Description": "Example breach description with details about the incident...",
          "LogoPath": "https://example.com/breach-logo1.png",
          "DataClasses": [
            "Email addresses",
            "Passwords",
            "Usernames"
          ],
          "IsVerified": true,
          "IsFabricated": false,
          "IsSensitive": false,
          "IsRetired": false,
          "IsSpamList": false,
          "IsMalware": false,
          "IsSubscriptionFree": false,
          "IsStealerLog": false
        }
        //...additional breach info found
    ]
}
Data Breach Scanner - Password Check
POST
Check if your password has been exposed in known public data breaches. The tool searches through a comprehensive database of verified data breaches and provides information about how many times the password has been exposed.
/data-breach-scanner/check-password

Parameters

NameTypeRequiredDescription
passwordstringYesThe password to check for exposure in data breaches.

Example Response

{
      "isPwned": true,
      "pwnCount": 19028039
}
File Encryptor Tool
POST
Securely encrypt or decrypt files (PDF, DOC, Images). The tool provides end-to-end encryption for your files, ensuring your data remains private. Supports both encryption and decryption operations.
/file-encryptor

Parameters

NameTypeRequiredDescription
operationstringYesThe operation to perform. Options: 'encrypt' to encrypt a file, 'decrypt' to decrypt a previously encrypted file.
filefileYesThe file to encrypt or decrypt. Supported formats: PDF, DOC, Images.

Example Response

{
      // Encryption response
      file-encryptor?operation=encrypt

      base64 encoded image
}
  
{     
      // Decryption response
      file-encryptor?operation=decrypt

      base64 decoded image (original) 
}
Steganography Tool - Encode
POST
Hide secret messages within images using steganography techniques. The tool embeds your message into the image in a way that is not visible to the naked eye. The original image remains visually unchanged while containing your hidden message. Supports optional password protection for additional security.
/steganography/encode

Parameters

NameTypeRequiredDescription
imagefileYesThe image file to hide the message in. Supported formats: JPG, PNG, BMP. Maximum size: 10MB.
messagestringYesThe secret message to hide within the image.
passwordstringNoOptional password to encrypt the hidden message for additional security.

Example Response

{
      "image": "base64_encoded_image_with_hidden_message"
}
Steganography Tool - Decode
POST
Extract hidden messages from images that were previously encoded using the steganography tool. The tool can reveal secret messages that were hidden within images using steganography techniques. If the message was encrypted with a password during encoding, the same password must be provided for successful decoding.
/steganography/decode

Parameters

NameTypeRequiredDescription
imagefileYesThe image file containing the hidden message. Supported formats: JPG, PNG, BMP. Maximum size: 10MB.
passwordstringNoOptional password if the message was encrypted during encoding.

Example Response

{
      "message": "Example_Message"
}
QR Code Decoder
POST
Upload a QR code image to instantly decode and reveal its destination URL. The tool supports valid QR code format and provides the final destination URL that the QR code points to.
/qr-code-decoder

Parameters

NameTypeRequiredDescription
qrfileYesThe QR code image file to decode. Supported formats: JPG, PNG, GIF. Maximum size: 5MB.

Example Response

{
      "url": "final_destination_url"
}

Note: All API operations are logged and monitored for security purposes. Uploaded files are processed securely and not stored permanently.

For more information or support, please contact support@deepfind.me

License

This work is licensed under a Creative Commons Attribution 4.0 International License.

In other words, you're welcome to use the public API to build other services, but you must identify DeepFind.Me as the source of the data.

Clear and visible attribution with a link to deepfind.me should be present anywhere data from the service is used.

It doesn't have to be overt, but the interface in which DeepFind.Me data is represented should clearly attribute the source per the Creative Commons Attribution 4.0 International License.