From individual researchers to enterprise security teams. Choose the plan that fits your mission.
Individual intelligence access.
Team-based tactical operations.
State-level infrastructure.
Ultimate access. No limits.
Detailed feature breakdown across all tiers
| Features | Analyst | OperativePOPULAR | Sovereign | God |
|---|---|---|---|---|
Resolutions Per Day Number of identity lookups you can perform daily | 100/day | 60/hour | 150/hour | Unlimited |
Historical Data Access Access to archived and historical records | Full | Deep | Deep + Archive | Deep + Archive |
Breach Data Access Access to compromised credential databases | Full | Full | Full + Raw | Full + Raw |
Stealer Log Intelligence Access to infostealer malware data | ||||
Full Stealer Log Database Complete unrestricted access to the entire stealer log database | ||||
API Access Programmatic access via REST API | ||||
Whitelisted IPs Number of IP addresses allowed for API access | 0 | 3 | 10 | Unlimited |
Bulk Search Search multiple identifiers at once | ||||
Export Reports Download results as CSV/PDF | ||||
Custom Integrations SIEM, SOAR, and custom webhook integrations | ||||
Support Level Level of customer support provided | Standard | Priority | 24/7 Dedicated | 24/7 Dedicated |
SLA Guarantee 99.9% uptime guarantee with credits | ||||
Dedicated Account Manager Personal point of contact for your account |
Enhanced Privacy
Pay anonymously with 50+ cryptocurrencies. Processed securely through NOWPayments.
Instant Activation
Quick and easy payment with all major credit and debit cards. Secure checkout via Stripe.
Everything you need to know about our plans
Get full access to the stealer log database, unlimited resolutions, dedicated support, and custom integrations for your organization.