MyID Password Breach Data 

Protection Against Breached Passwords for Service Providers

We maintain the world’s largest actively managed password breach database, containing over 10 billion breached credentials, including compromised clear text passwords.

Protection against account takeover and reputational damage. 

Access our data by API for simple integration into your existing applications, or a local copy of the data for full control.

Password Database API

With millions of compromised usernames and passwords appearing on the dark web every day, it is important service providers use up to date and comprehensive information to protect themselves. Our database holds a wealth of information about compromised credentials that is maintained by our dedicated team of ethical hackers, this valuable intelligence is accessible to you through our API enabling it to be easily integrated into your systems.

It’s crucial to ensure that user passwords remain uncompromised while adhering to best practices outlined in NIST SP800-63-B. This includes comparing passwords against known breaches. By checking whether a password has appeared in an online data breach, you can be confident that you're utilising the most comprehensive and reliable data available.

If you operate your own servers and infrastructure as a service provider, you can now access our up-to-date database through two delivery options:

Database API

  • Intercede hold the data which your service can access via a simple API
  • Align with NIST SP800-63-B and best security practise by checking against known compromised credentials
  • Best for those who want to keep password data outside of their systems.

Local Copy of Database

  • Download a copy of the password breach database into your own environment
  • Receive daily updates
  • Align with NIST SP800-63-B by checking against known breaches
  • Best for those who want full control of the data within their own infrastructure.

Stay Ahead of Password Breaches with Our Powerful API

Our Password Breach Database API delivers real-time, comprehensive breach data sourced from trusted and publicly disclosed incidents. We go beyond just reporting breach names and dates; we provide in-depth insights, including password hashing algorithms, plaintext credential recovery rates, total affected accounts, breach verification status, and data origins. 
Fully compliant with legal and ethical standards, our API empowers your security measures with the context you need to safeguard your operations. 

Request detailed breach intelligence today and strengthen your defence against credential compromise.

Cybercriminals are constantly finding new ways to exploit weak credentials, so it's crucial to have strong defences. 
Our enhanced cybersecurity measures do more than merely detect breaches; they include focused domain monitoring, password decryption, and pattern analysis to pre-empt the latest threats.

Domain Prioritisation

For a premium service, we can take your cybersecurity a step further by prioritising the search for compromised credentials linked to your enterprise domain. Likewise, we can focus password hash cracking efforts specifically on your domain.

Password Intelligence

Cybercriminals use algorithms and logic rules to uncover password patterns, and so do we. 

Our expert team analyses password structures to identify those that are not yet breached but do remain vulnerable due to predictable patterns. ​ Through password stemming the main central characters of a password can be identified, and easily predicted passwords can be highlighted, such as ILoveRunning2024 changing to ILoveRunning2025.  This can provide a level of protection beyond a simple hash comparison and helps to keep you ahead of the hackers.  

Password Hashing

Compromised passwords aren’t always stored in plain text. Our team of ethical hackers possess the expertise in password hashing methods and the techniques used to crack them— just as bad actors do on the dark web. 

Once we successfully decrypt a password, we add it to our breach database to enhance your security.  Employing the same techniques hackers do helps to maximise your security.

Want to know more?

If you want to find out more, simply click the button below to contact us.

contact us