# Email Intelligence

## Email Intelligence

<mark style="color:green;">`POST`</mark> `{{Base URL}}/intelligence/complete-profile-check`

#### Headers

| Name                                            | Type   | Description   |
| ----------------------------------------------- | ------ | ------------- |
| Authorization<mark style="color:red;">\*</mark> | String | Token 1626342 |

#### Request Body

| Name                                    | Type   | Description                                        |
| --------------------------------------- | ------ | -------------------------------------------------- |
| email<mark style="color:red;">\*</mark> | String | This should be an email. Ex: <testemail@email.com> |

{% tabs %}
{% tab title="200: OK Exact response" %}

```json
{
    "code": "00",
    "message": "Successful",
    "status": true,
    "data": {
        "id": 14,
        "request_text": {
           "email": "email@gmail.com"
        },
        "request_file": "https://idradar-bucket.s3.amazonaws.com/prod-static/checks/profile-checks/request_a1d4b7b2-156c-4c7e-b563-j3n.json",
        "response_file": "https://idradar-bucket.s3.amazonaws.com/prod-static/checks/profile-checks/response_dedfdd52-f222-4dd7-8570-232.json",
        "created_at": "2022-11-26T00:17:21.282972+01:00",
        "updated_at": "2022-11-26T00:17:22.144358+01:00"
    }
}
```

{% endtab %}

{% tab title="200: OK Content in response" %}

```javascript
{
    "status": true,
    "response_code": "00",
    "message": "Successful",
    "data": {
        "basic": {
            "smtp-status": "ok",
            "domain-error": false,
            "verified": true,
            "is-freemail": true,
            "is-disposable": false,
            "valid": true,
            "is-catch-all": false,
            "is-deferred": false,
            "provider": "gmail.com",
            "domain": "gmail.com",
            "smtp-response": "250 2.1.5 OK oz43-20020a1709077dab00b0072ac7a2726esi1583583ejc.474 - gsmtp",
            "syntax-error": false,
            "email": "user@gmail.com",
            "is-personal": true
        },
        "other": {
            "email": "user@gmail.com",
            "reputation": "high",
            "suspicious": false,
            "references": 5,
            "details": {
                "blacklisted": false,
                "malicious_activity": false,
                "malicious_activity_recent": false,
                "credentials_leaked": true,
                "credentials_leaked_recent": false,
                "data_breach": true,
                "first_seen": "05/24/2019",
                "last_seen": "10/03/2020",
                "domain_exists": true,
                "domain_reputation": "n/a",
                "new_domain": false,
                "days_since_domain_creation": 9824,
                "suspicious_tld": false,
                "spam": false,
                "free_provider": true,
                "disposable": false,
                "deliverable": true,
                "accept_all": false,
                "valid_mx": true,
                "primary_mx": "gmail-smtp-in.l.google.com",
                "spoofable": true,
                "spf_strict": true,
                "dmarc_enforced": false,
                "profiles": [
                    "twitter",
                    "gravatar"
                ]
            }
        },
        "domain_info": {
            "domain_name": "GMAIL.COM",
            "registry_domain_id": "4667231_DOMAIN_COM-VRSN",
            "registrar_whois_server": "whois.markmonitor.com",
            "registrar_url": "http",
            "updated_date": "2021-07-11T09",
            "creation_date": "1995-08-13T04",
            "registry_expiry_date": "2022-08-12T04",
            "registrar": "MarkMonitor Inc.",
            "registrar_iana_id": "292",
            "registrar_abuse_contact_email": "abusecomplaints@markmonitor.com",
            "registrar_abuse_contact_phone": "+1.2086851750",
            "domain_status": "serverUpdateProhibited https",
            "name_server": "NS4.GOOGLE.COM",
            "dnssec": "unsigned",
            "url_of_the_icann_whois_inaccuracy_complaint_form": "https",
            "last_update_of_whois_database": "2022-07-07T08"
        },
        "breaches": [
            {
                "Name": "Appen",
                "Title": "Appen",
                "Domain": "appen.com",
                "BreachDate": "2020-06-22",
                "AddedDate": "2020-07-30T07:00:21Z",
                "ModifiedDate": "2020-07-30T07:00:21Z",
                "PwnCount": 5888405,
                "Description": "In June 2020, the AI training data company <a href=\"https://www.bleepingcomputer.com/news/security/hacker-leaks-386-million-user-records-from-18-companies-for-free/\" target=\"_blank\" rel=\"noopener\">Appen suffered a data breach</a> exposing the details of almost 5.9 million users which were subsequently sold online. Included in the breach were names, email addresses and passwords stored as bcrypt hashes. Some records also contained phone numbers, employers and IP addresses. The data was provided to HIBP by <a href=\"https://dehashed.com/\" target=\"_blank\" rel=\"noopener\">dehashed.com</a>.",
                "LogoPath": "https://haveibeenpwned.com/Content/Images/PwnedLogos/Appen.png",
                "DataClasses": [
                    "Email addresses",
                    "Employers",
                    "IP addresses",
                    "Names",
                    "Passwords",
                    "Phone numbers"
                ],
                "IsVerified": true,
                "IsFabricated": false,
                "IsSensitive": false,
                "IsRetired": false,
                "IsSpamList": false,
                "IsMalware": false
            },
            {
                "Name": "Canva",
                "Title": "Canva",
                "Domain": "canva.com",
                "BreachDate": "2019-05-24",
                "AddedDate": "2019-08-09T14:24:01Z",
                "ModifiedDate": "2019-08-09T14:24:01Z",
                "PwnCount": 137272116,
                "Description": "In May 2019, the graphic design tool website <a href=\"https://support.canva.com/contact/customer-support/may-24-security-incident-faqs/\" target=\"_blank\" rel=\"noopener\">Canva suffered a data breach</a> that impacted 137 million subscribers. The exposed data included email addresses, usernames, names, cities of residence and passwords stored as bcrypt hashes for users not using social logins. The data was provided to HIBP by a source who requested it be attributed to \"JimScott.Sec@protonmail.com\".",
                "LogoPath": "https://haveibeenpwned.com/Content/Images/PwnedLogos/Canva.png",
                "DataClasses": [
                    "Email addresses",
                    "Geographic locations",
                    "Names",
                    "Passwords",
                    "Usernames"
                ],
                "IsVerified": true,
                "IsFabricated": false,
                "IsSensitive": false,
                "IsRetired": false,
                "IsSpamList": false,
                "IsMalware": false
            },
            {
                "Name": "Gravatar",
                "Title": "Gravatar",
                "Domain": "gravatar.com",
                "BreachDate": "2020-10-03",
                "AddedDate": "2021-12-05T22:45:58Z",
                "ModifiedDate": "2021-12-08T01:47:02Z",
                "PwnCount": 113990759,
                "Description": "In October 2020, <a href=\"https://www.bleepingcomputer.com/news/security/online-avatar-service-gravatar-allows-mass-collection-of-user-info/\" target=\"_blank\" rel=\"noopener\">a security researcher published a technique for scraping large volumes of data from Gravatar, the service for providing globally unique avatars </a>. 167 million names, usernames and MD5 hashes of email addresses used to reference users' avatars were subsequently scraped and distributed within the hacking community. 114 million of the MD5 hashes were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data. Following the impacted email addresses being searchable in HIBP, <a href=\"https://en.gravatar.com/support/data-privacy\" target=\"_blank\" rel=\"noopener\">Gravatar release an FAQ detailing the incident</a>.",
                "LogoPath": "https://haveibeenpwned.com/Content/Images/PwnedLogos/Gravatar.png",
                "DataClasses": [
                    "Email addresses",
                    "Names",
                    "Usernames"
                ],
                "IsVerified": true,
                "IsFabricated": false,
                "IsSensitive": false,
                "IsRetired": false,
                "IsSpamList": false,
                "IsMalware": false
            }
        ],
        "identitypass_verification": {
            "status": false,
            "response_code": "05",
            "message": "Endpoint has been disable or inactive...please contact administrator"
        },
        "kyc": {},
        "instagram": {
            "active": true,
            "data": {}
        },
        "pinterest": {
            "active": true,
            "data": {}
        },
        "twitter": {
            "active": true,
            "data": {}
        },
        "gravatar": {
            "active": true,
            "data": {
                "entry": [
                    {
                        "id": "117899327",
                        "hash": "dc37423cea1ea33099a1667a2bc4550f",
                        "requestHash": "dc37423cea1ea33099a1667a2bc4550f",
                        "profileUrl": "http://gravatar.com/rugipo",
                        "preferredUsername": "rugipo",
                        "thumbnailUrl": "https://secure.gravatar.com/avatar/dc37423cea1ea33099a1667a2bc4550f",
                        "photos": [
                            {
                                "value": "https://secure.gravatar.com/avatar/dc37423cea1ea33099a1667a2bc4550f",
                                "type": "thumbnail"
                            }
                        ],
                        "name": {
                            "givenName": "Name",
                            "familyName": "Surname",
                            "formatted": "Full Name"
                        },
                        "displayName": "codeAdept",
                        "urls": []
                    }
                ]
            }
        },
        "github": {
            "active": false,
            "data": {}
        },
        "discord": {
            "active": true,
            "data": {}
        },
        "ebay": {
            "active": false,
            "data": {}
        },
        "linkedin": {
            "active": true,
            "data": {}
        }
    }
}
```

{% endtab %}
{% endtabs %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://developer.myidentitypass.com/radar/email-intelligence.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
