Choose Your Shield

Stay informed, stay safe. Compare our intelligence tiers and unlock full insights, monitoring, and API access.

We now accept cryptocurrencies as a payment method

Individual Privacy-conscious
$4.99/mo
Search Requests10 / day
API Requests✗ No API
Monitoring Limits5 fields
(Emails/Pass)
Data VisibilityPixelated
Investigator OSINT professionals
$19.99/mo
Search Requests100 / day
API Requests100 / day
Monitoring15 fields
Data VisibilityPixelated
Popular
Professional Full raw data access
$49.99/mo
Search Requests300 / day
API Requests2,000 / day
Monitoring30 fields
Data Visibility
Pixelated
+ $100/mo Unlock
Ransomware Search
ALL Datasets Search
Export (CSV/JSON)
Private Raw Links
AI ReportsLimited
Cybersecurity Agency SecOps & Analysts
$399/mo
Search Requests3,000 / day
API Requests20,000 / day
Monitoring+ 100 Fields
Data VisibilityData (Clear)
Domain Management
Up to 5 Domains
(Pixelated)
AI Reports
30 reports / mo
+ $100/mo Add-on
OSINT Panel Demo

Ransomware & ALL Datasets Search

Export & Private Raw Links

Enterprise / Gov Max Scale & Compliance
$2/employee /mo
or Custom
Requests (Web/API)Unlimited
Data VisibilityData (Clear)
Bulk Data Access
Domain MgmtUnlimited
(Full Unlock)
AI Reports
Unlimited
OSINT Panel
Full Access

Feature Glossary

Included Not included Pixelated = Masked Data
i

Data Visibility

Indicates whether the returned data is shown in full or pixelated. "Pixelated" means that sensitive parts of the content are masked to limit the exposure of personal information.

i

Ransomware Leaks Search

A pioneering feature introduced by our team to the market: it allows searching for information inside ransomware leaks (including PDF documents, databases, emails, etc.). For more technical details, read our academic paper: [https://doi.org/10.3390/electronics14214327](https://doi.org/10.3390/electronics14214327)

i

Domain Overview

A custom-built dashboard where you can view the complete exposure of a domain across all types of leaks: infostealers, breaches, ULP, combo lists, and ransomware leaks. Manage alerts for employees and seamlessly integrate them via API.

i

Private Raw Links

Grants the ability to request leaks in their original, unprocessed raw format (obtained directly from breach.house) so your team can parse and process the data internally.

ALL Dataset Leaks Search

Unified global search: From a single endpoint, you can query all our data sources simultaneously. Instead of making separate requests, you can search across Ransomware, Traditional Breaches, ULP, and Infostealers all at once with a single API call.

i

Bulk Data Access

Advanced API capability: After performing a standard search query, you can retrieve the entirety of the associated data from our database by appending the /complete endpoint to your request.

Frequently Asked Questions

Q: What does "Demo" mean for the OSINT Automation Panel?

The Demo provides restricted access to our advanced Darkeye.io panel. It offers a lightweight, high-level overview of the capabilities without going fully in-depth or exposing raw sensitive data. It’s perfect to evaluate the tool before committing to an Enterprise plan.

Q: What are "Limited" AI Reports?

"Limited" means you get access to the same AI-generated intelligence reports as higher tiers, but the information is capped (pixelated/masked). It gives you a surface-level analysis of the threat landscape without revealing complete raw indicators.

Q: How do the "+ $100 Add-on" and "Unlock" fees work?

Certain features in the Professional and Cybersecurity Agency plans have optional upgrades. For example, if your plan includes pixelated data, you can pay an extra $100/month on top of your base subscription price to "Unlock" unpixelated clear data. Similarly, buying extra AI report quotas is handled as a monthly add-on fee added to your standard billing cycle.

Have specific requirements or need a custom product?

Talk to our engineering team