DeepFindMe API Platform
Powerful OSINT and digital investigation tools available through a secure REST API
API Overview
DeepFindMe provides a comprehensive suite of OSINT (Open-Source Intelligence) and digital analysis tools accessible through RESTful API endpoints. Our API enables developers, security researchers, and analysts to incorporate powerful image analysis, geolocation, and data extraction capabilities into their applications.
All endpoints follow standard REST principles and return data in JSON format.To create or manage your API keys, please login to your account.
Base URL
https://deepfind.me/api
Authentication Required
All endpoints require an API key or auth token for access.
Rate Limited
25 requests per minute per IP address with burst allowance.
/username-search
Parameters
Name | Type | Required | Description |
---|---|---|---|
username | string | Yes | The username to search for. |
Example Response
[
{
"platform": "GitHub",
"status": "exists",
"url": "https://github.com/username"
},
{
"platform": "LinkedIn",
"status": "available",
"url": null
},
{
"platform": "YouTube",
"status": "exists",
"url": "https://www.youtube.com/@username"
},
// ... results for 45+ additional platforms
]
/analyzer/{username}
Parameters
Name | Type | Required | Description |
---|---|---|---|
username | path parameter | Yes | The username to analyze across platforms. |
Example Response
{
"sites": [
{
"id": "YouTube User_username",
"status": "found",
"site_name": "YouTube User",
"http_status": 200,
"error_message": null,
"site_url_user": "https://www.youtube.com/@username",
"username_claimed": "username"
},
{
"id": "Twitter_username",
"status": "found",
"site_name": "Twitter",
"http_status": 200,
"error_message": null,
"site_url_user": "https://twitter.com/username",
"username_claimed": "username"
},
{
"id": "GitHub_username",
"status": "found",
"site_name": "GitHub",
"http_status": 200,
"error_message": null,
"site_url_user": "https://github.com/username",
"username_claimed": "username"
}
// ... additional profiles found
],
"summary": {
"profiles_found": 42,
"total_sites_checked": 350
},
"username_queried": "username"
}
/geolocation/{ip_address}
Parameters
Name | Type | Required | Description |
---|---|---|---|
ip | string | Yes | The IP address to look up (IPv4 or IPv6). |
Example Response
{
"status": "success",
"country": "United States",
"countryCode": "US",
"region": "CA",
"regionName": "California",
"city": "Los Angeles",
"zip": "90001",
"lat": 34.0522,
"lon": -118.2437,
"timezone": "America/Los_Angeles",
"isp": "Example ISP",
"org": "Example Organization",
"as": "AS12345 Example Network",
"query": "203.0.113.45"
}
/image-location
Parameters
Name | Type | Required | Description |
---|---|---|---|
file | file | Yes | The image file to analyze. |
Example Response
{Estimated coordinates: 44.2760° N, 21.8880° E Nearest city: Pancevo, Serbia}
/whois
Parameters
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to look up. |
Example Response
{
"domain": "www.google.com",
"whois_data": {
"lastUpdateOfWhoisDatabase": "2025-05-14T00:34:46Z <<<",
"notice": "The expiration date displayed in this record is the date the",
"termsOfUse": "You are not authorized to access or query our Whois",
"byTheFollowingTermsOfUse": "You agree that you may use this Data only",
"to": "(1) allow, enable, or otherwise support the transmission of mass"
}
}
/email-validator/{email}
Parameters
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for breaches. |
Example Response
[
{
"Name": "ExampleBreach1",
"Title": "Example Breach One",
"Domain": "example1.com",
"BreachDate": "2023-01-01",
"AddedDate": "2023-01-15T00:00:00Z",
"ModifiedDate": "2023-01-15T00:00:00Z",
"PwnCount": 1000000,
"Description": "Example breach description for the first breach...",
"LogoPath": "https://example.com/breach-logo1.png",
"DataClasses": [
"Email addresses",
"Passwords",
"Usernames"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": false,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
},
{
"Name": "ExampleBreach2",
"Title": "Example Breach Two",
"Domain": "example2.com",
"BreachDate": "2022-06-15",
"AddedDate": "2022-07-01T00:00:00Z",
"ModifiedDate": "2022-07-01T00:00:00Z",
"PwnCount": 500000,
"Description": "Example breach description for the second breach...",
"LogoPath": "https://example.com/breach-logo2.png",
"DataClasses": [
"Email addresses",
"IP addresses",
"Phone numbers"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": true,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
},
//...additional breach info found
]
/exists/{email}
Parameters
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for existence in breaches. |
Example Response
{
"exists": true
}
/metadata-extractor
Parameters
Name | Type | Required | Description |
---|---|---|---|
file | file | Yes | The file to extract metadata from. Supported formats: images, videos, audio files, and documents. |
Example Response
{
"SourceFile": "/app/uploads/example_file.pdf",
"errors": [],
"ExifToolVersion": 13.26,
"FileName": "example_file.pdf",
"Directory": "/app/uploads",
"FileSize": "93 kB",
"FileModifyDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FileAccessDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FileInodeChangeDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FilePermissions": "-rw-r--r--",
"FileType": "PDF",
"FileTypeExtension": "pdf",
"MIMEType": "application/pdf",
"PDFVersion": 1.4,
"Linearized": "No",
"PageCount": 2,
"Producer": "Example PDF Producer",
"CreateDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 12,
"hour": 5,
"minute": 2,
"second": 58,
"tzoffsetMinutes": -420,
"rawValue": "2025:05:12 05:02:58-07:00",
"zoneName": "UTC-7",
"inferredZone": false
},
"ModifyDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 12,
"hour": 5,
"minute": 2,
"second": 58,
"tzoffsetMinutes": -420,
"rawValue": "2025:05:12 05:02:58-07:00",
"zoneName": "UTC-7",
"inferredZone": false
},
"warnings": []
}
/ai-image-detection/analyze
Parameters
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file to analyze. Supported formats: JPG, PNG, WebP. Maximum size: 5MB. |
Example Response
{
"aiScore": 2,
"explanation": "The image appears to be a typical photograph with natural lighting and realistic details in the background and subject, suggesting it is likely real."
}
/dns-lookup
Parameters
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to look up DNS records for (e.g., example.com). |
Example Response
{
"records": [
{
"recordType": "A",
"value": "93.184.216.34"
},
{
"recordType": "AAAA",
"value": "2606:2800:220:1:248:1893:25c8:1946"
},
{
"recordType": "MX",
"value": "{"exchange":"mail.example.com","priority":10}"
},
{
"recordType": "NS",
"value": "ns1.example.com"
},
{
"recordType": "TXT",
"value": "["v=spf1 include:_spf.example.com ~all"]"
},
{
"recordType": "SOA",
"value": "{"nsname":"ns1.example.com","hostmaster":"hostmaster.example.com","serial":2025010101,"refresh":7200,"retry":3600,"expire":1209600,"minttl":3600}"
}
]
}
/subdomains
Parameters
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to scan for subdomains (e.g., example.com). |
mode | string | Yes | Scanning mode. Options: 'top200' for common patterns, 'full' for extensive search across thousands of possibilities. |
Example Response
{
"domain": "example.com",
"subdomains": [
"www.example.com",
"mail.example.com",
"ftp.example.com",
"webmail.example.com",
"smtp.example.com",
"pop.example.com",
"imap.example.com",
"cpanel.example.com",
"whm.example.com",
"ns1.example.com",
"ns2.example.com",
"autodiscover.example.com",
"autoconfig.example.com",
"test.example.com",
"blog.example.com",
"dev.example.com",
"www2.example.com",
"pop3.example.com",
"forum.example.com",
"admin.example.com"
],
"mode": "top200"
}
/dark-web-link
Parameters
Name | Type | Required | Description |
---|---|---|---|
url | string | Yes | The .onion URL to validate and check (e.g., example.onion). |
Example Response
{
"status": "Found in Database",
"url": "example.onion",
"version": "v3 (Modern)",
"versionInfo": "This is a modern V3 onion address (56 characters), which offers improved security and privacy.",
"lastChecked": "2025-05-14T01:10:55.045Z",
"inDatabase": true,
"isValid": true
}
/data-breach-scanner/check-email
Parameters
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for exposure in data breaches. |
Example Response
{
"isBreached": true,
"breaches": [
{
"Name": "ExampleBreach1",
"Title": "Example Breach One",
"Domain": "example1.com",
"BreachDate": "2023-01-01",
"AddedDate": "2023-01-15T00:00:00Z",
"ModifiedDate": "2023-01-15T00:00:00Z",
"PwnCount": 1000000,
"Description": "Example breach description with details about the incident...",
"LogoPath": "https://example.com/breach-logo1.png",
"DataClasses": [
"Email addresses",
"Passwords",
"Usernames"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": false,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
}
//...additional breach info found
]
}
/data-breach-scanner/check-password
Parameters
Name | Type | Required | Description |
---|---|---|---|
password | string | Yes | The password to check for exposure in data breaches. |
Example Response
{
"isPwned": true,
"pwnCount": 19028039
}
/file-encryptor
Parameters
Name | Type | Required | Description |
---|---|---|---|
operation | string | Yes | The operation to perform. Options: 'encrypt' to encrypt a file, 'decrypt' to decrypt a previously encrypted file. |
file | file | Yes | The file to encrypt or decrypt. Supported formats: PDF, DOC, Images. |
Example Response
{
// Encryption response
file-encryptor?operation=encrypt
base64 encoded image
}
{
// Decryption response
file-encryptor?operation=decrypt
base64 decoded image (original)
}
/steganography/encode
Parameters
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file to hide the message in. Supported formats: JPG, PNG, BMP. Maximum size: 10MB. |
message | string | Yes | The secret message to hide within the image. |
password | string | No | Optional password to encrypt the hidden message for additional security. |
Example Response
{
"image": "base64_encoded_image_with_hidden_message"
}
/steganography/decode
Parameters
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file containing the hidden message. Supported formats: JPG, PNG, BMP. Maximum size: 10MB. |
password | string | No | Optional password if the message was encrypted during encoding. |
Example Response
{
"message": "Example_Message"
}
/qr-code-decoder
Parameters
Name | Type | Required | Description |
---|---|---|---|
qr | file | Yes | The QR code image file to decode. Supported formats: JPG, PNG, GIF. Maximum size: 5MB. |
Example Response
{
"url": "final_destination_url"
}
Note: All API operations are logged and monitored for security purposes. Uploaded files are processed securely and not stored permanently.
For more information or support, please contact support@deepfind.me
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
In other words, you're welcome to use the public API to build other services, but you must identify DeepFind.Me as the source of the data.
Clear and visible attribution with a link to deepfind.me should be present anywhere data from the service is used.
It doesn't have to be overt, but the interface in which DeepFind.Me data is represented should clearly attribute the source per the Creative Commons Attribution 4.0 International License.