Powerful OSINT and digital investigation tools available through a secure REST API
DeepFindMe provides a comprehensive suite of OSINT (Open-Source Intelligence) and digital analysis tools accessible through RESTful API endpoints. Our API enables developers, security researchers, and analysts to incorporate powerful image analysis, geolocation, and data extraction capabilities into their applications.
All endpoints follow standard REST principles and return data in JSON format.
Access token generation and management will soon be available through the user dashboard.
https://deepfind.me/api
All endpoints require an API key or auth token for access.
25 requests per minute per IP address with burst allowance.
/username-search
Name | Type | Required | Description |
---|---|---|---|
username | string | Yes | The username to search for. |
[
{
"platform": "GitHub",
"status": "exists",
"url": "https://github.com/username"
},
{
"platform": "LinkedIn",
"status": "available",
"url": null
},
{
"platform": "YouTube",
"status": "exists",
"url": "https://www.youtube.com/@username"
},
// ... results for 45+ additional platforms
]
/analyzer/{username}
Name | Type | Required | Description |
---|---|---|---|
username | path parameter | Yes | The username to analyze across platforms. |
{
"sites": [
{
"id": "YouTube User_username",
"status": "found",
"site_name": "YouTube User",
"http_status": 200,
"error_message": null,
"site_url_user": "https://www.youtube.com/@username",
"username_claimed": "username"
},
{
"id": "Twitter_username",
"status": "found",
"site_name": "Twitter",
"http_status": 200,
"error_message": null,
"site_url_user": "https://twitter.com/username",
"username_claimed": "username"
},
{
"id": "GitHub_username",
"status": "found",
"site_name": "GitHub",
"http_status": 200,
"error_message": null,
"site_url_user": "https://github.com/username",
"username_claimed": "username"
}
// ... additional profiles found
],
"summary": {
"profiles_found": 42,
"total_sites_checked": 350
},
"username_queried": "username"
}
/geolocation/{ip_address}
Name | Type | Required | Description |
---|---|---|---|
ip | string | Yes | The IP address to look up (IPv4 or IPv6). |
{
"status": "success",
"country": "United States",
"countryCode": "US",
"region": "CA",
"regionName": "California",
"city": "Los Angeles",
"zip": "90001",
"lat": 34.0522,
"lon": -118.2437,
"timezone": "America/Los_Angeles",
"isp": "Example ISP",
"org": "Example Organization",
"as": "AS12345 Example Network",
"query": "203.0.113.45"
}
/image-location
Name | Type | Required | Description |
---|---|---|---|
file | file | Yes | The image file to analyze. |
{Estimated coordinates: 44.2760° N, 21.8880° E Nearest city: Pancevo, Serbia}
/whois
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to look up. |
{
"domain": "www.google.com",
"whois_data": {
"lastUpdateOfWhoisDatabase": "2025-05-14T00:34:46Z <<<",
"notice": "The expiration date displayed in this record is the date the",
"termsOfUse": "You are not authorized to access or query our Whois",
"byTheFollowingTermsOfUse": "You agree that you may use this Data only",
"to": "(1) allow, enable, or otherwise support the transmission of mass"
}
}
/email-validator/{email}
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for breaches. |
[
{
"Name": "ExampleBreach1",
"Title": "Example Breach One",
"Domain": "example1.com",
"BreachDate": "2023-01-01",
"AddedDate": "2023-01-15T00:00:00Z",
"ModifiedDate": "2023-01-15T00:00:00Z",
"PwnCount": 1000000,
"Description": "Example breach description for the first breach...",
"LogoPath": "https://example.com/breach-logo1.png",
"DataClasses": [
"Email addresses",
"Passwords",
"Usernames"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": false,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
},
{
"Name": "ExampleBreach2",
"Title": "Example Breach Two",
"Domain": "example2.com",
"BreachDate": "2022-06-15",
"AddedDate": "2022-07-01T00:00:00Z",
"ModifiedDate": "2022-07-01T00:00:00Z",
"PwnCount": 500000,
"Description": "Example breach description for the second breach...",
"LogoPath": "https://example.com/breach-logo2.png",
"DataClasses": [
"Email addresses",
"IP addresses",
"Phone numbers"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": true,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
},
//...additional breach info found
]
/exists/{email}
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for existence in breaches. |
{
"exists": true
}
/metadata-extractor
Name | Type | Required | Description |
---|---|---|---|
file | file | Yes | The file to extract metadata from. Supported formats: images, videos, audio files, and documents. |
{
"SourceFile": "/app/uploads/example_file.pdf",
"errors": [],
"ExifToolVersion": 13.26,
"FileName": "example_file.pdf",
"Directory": "/app/uploads",
"FileSize": "93 kB",
"FileModifyDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FileAccessDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FileInodeChangeDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 14,
"hour": 0,
"minute": 54,
"second": 30,
"tzoffsetMinutes": 0,
"rawValue": "2025:05:14 00:54:30Z",
"zoneName": "UTC",
"inferredZone": false
},
"FilePermissions": "-rw-r--r--",
"FileType": "PDF",
"FileTypeExtension": "pdf",
"MIMEType": "application/pdf",
"PDFVersion": 1.4,
"Linearized": "No",
"PageCount": 2,
"Producer": "Example PDF Producer",
"CreateDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 12,
"hour": 5,
"minute": 2,
"second": 58,
"tzoffsetMinutes": -420,
"rawValue": "2025:05:12 05:02:58-07:00",
"zoneName": "UTC-7",
"inferredZone": false
},
"ModifyDate": {
"_ctor": "ExifDateTime",
"year": 2025,
"month": 5,
"day": 12,
"hour": 5,
"minute": 2,
"second": 58,
"tzoffsetMinutes": -420,
"rawValue": "2025:05:12 05:02:58-07:00",
"zoneName": "UTC-7",
"inferredZone": false
},
"warnings": []
}
/ai-image-detection/analyze
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file to analyze. Supported formats: JPG, PNG, WebP. Maximum size: 5MB. |
{
"aiScore": 2,
"explanation": "The image appears to be a typical photograph with natural lighting and realistic details in the background and subject, suggesting it is likely real."
}
/dns-lookup
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to look up DNS records for (e.g., example.com). |
{
"records": [
{
"recordType": "A",
"value": "93.184.216.34"
},
{
"recordType": "AAAA",
"value": "2606:2800:220:1:248:1893:25c8:1946"
},
{
"recordType": "MX",
"value": "{"exchange":"mail.example.com","priority":10}"
},
{
"recordType": "NS",
"value": "ns1.example.com"
},
{
"recordType": "TXT",
"value": "["v=spf1 include:_spf.example.com ~all"]"
},
{
"recordType": "SOA",
"value": "{"nsname":"ns1.example.com","hostmaster":"hostmaster.example.com","serial":2025010101,"refresh":7200,"retry":3600,"expire":1209600,"minttl":3600}"
}
]
}
/subdomains
Name | Type | Required | Description |
---|---|---|---|
domain | string | Yes | The domain name to scan for subdomains (e.g., example.com). |
mode | string | Yes | Scanning mode. Options: 'top200' for common patterns, 'full' for extensive search across thousands of possibilities. |
{
"domain": "example.com",
"subdomains": [
"www.example.com",
"mail.example.com",
"ftp.example.com",
"webmail.example.com",
"smtp.example.com",
"pop.example.com",
"imap.example.com",
"cpanel.example.com",
"whm.example.com",
"ns1.example.com",
"ns2.example.com",
"autodiscover.example.com",
"autoconfig.example.com",
"test.example.com",
"blog.example.com",
"dev.example.com",
"www2.example.com",
"pop3.example.com",
"forum.example.com",
"admin.example.com"
],
"mode": "top200"
}
/dark-web-link
Name | Type | Required | Description |
---|---|---|---|
url | string | Yes | The .onion URL to validate and check (e.g., example.onion). |
{
"status": "Found in Database",
"url": "example.onion",
"version": "v3 (Modern)",
"versionInfo": "This is a modern V3 onion address (56 characters), which offers improved security and privacy.",
"lastChecked": "2025-05-14T01:10:55.045Z",
"inDatabase": true,
"isValid": true
}
/data-breach-scanner/check-email
Name | Type | Required | Description |
---|---|---|---|
string | Yes | The email address to check for exposure in data breaches. |
{
"isBreached": true,
"breaches": [
{
"Name": "ExampleBreach1",
"Title": "Example Breach One",
"Domain": "example1.com",
"BreachDate": "2023-01-01",
"AddedDate": "2023-01-15T00:00:00Z",
"ModifiedDate": "2023-01-15T00:00:00Z",
"PwnCount": 1000000,
"Description": "Example breach description with details about the incident...",
"LogoPath": "https://example.com/breach-logo1.png",
"DataClasses": [
"Email addresses",
"Passwords",
"Usernames"
],
"IsVerified": true,
"IsFabricated": false,
"IsSensitive": false,
"IsRetired": false,
"IsSpamList": false,
"IsMalware": false,
"IsSubscriptionFree": false,
"IsStealerLog": false
}
//...additional breach info found
]
}
/data-breach-scanner/check-password
Name | Type | Required | Description |
---|---|---|---|
password | string | Yes | The password to check for exposure in data breaches. |
{
"isPwned": true,
"pwnCount": 19028039
}
/file-encryptor
Name | Type | Required | Description |
---|---|---|---|
operation | string | Yes | The operation to perform. Options: 'encrypt' to encrypt a file, 'decrypt' to decrypt a previously encrypted file. |
file | file | Yes | The file to encrypt or decrypt. Supported formats: PDF, DOC, Images. |
{
// Encryption response
file-encryptor?operation=encrypt
base64 encoded image
}
{
// Decryption response
file-encryptor?operation=decrypt
base64 decoded image (original)
}
/steganography/encode
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file to hide the message in. Supported formats: JPG, PNG, BMP. Maximum size: 10MB. |
message | string | Yes | The secret message to hide within the image. |
password | string | No | Optional password to encrypt the hidden message for additional security. |
{
"image": "base64_encoded_image_with_hidden_message"
}
/steganography/decode
Name | Type | Required | Description |
---|---|---|---|
image | file | Yes | The image file containing the hidden message. Supported formats: JPG, PNG, BMP. Maximum size: 10MB. |
password | string | No | Optional password if the message was encrypted during encoding. |
{
"message": "Example_Message"
}
/qr-code-decoder
Name | Type | Required | Description |
---|---|---|---|
qr | file | Yes | The QR code image file to decode. Supported formats: JPG, PNG, GIF. Maximum size: 5MB. |
{
"url": "final_destination_url"
}
Note: All API operations are logged and monitored for security purposes. Uploaded files are processed securely and not stored permanently.
For more information or support, please contact support@deepfind.me
This work is licensed under a Creative Commons Attribution 4.0 International License.
In other words, you're welcome to use the public API to build other services, but you must identify DeepFind.Me as the source of the data.
Clear and visible attribution with a link to deepfind.me should be present anywhere data from the service is used.
It doesn't have to be overt, but the interface in which DeepFind.Me data is represented should clearly attribute the source per the Creative Commons Attribution 4.0 International License.