The information in this document applies to version 6.9.13 of Syhunt Breach.
Differences between Breach Hunt Methods
Hunt Method | CLI name | Dark | Deep | Surface | Incident Records |
Dark Web Scan Plus (Default) | darkplus | ![]() | ![]() | ![]() | ![]() |
Dark Web Scan Plus - No Subdomains | darknosub | ![]() | ![]() | ![]() | ![]() |
Dark Web Scan | dark | ![]() | ![]() | ![]() | ![]() |
Dark'N'Deep Web Scan | darkndeep | ![]() | ![]() | ![]() | ![]() |
Deep Web Scan | deep | ![]() | ![]() | ![]() | ![]() |
Surface Web Scan | surface | ![]() | ![]() | ![]() | ![]() |
Deep-Only | deeponly | ![]() | ![]() | ![]() | ![]() |
Dark-Only | darkonly | ![]() | ![]() | ![]() | ![]() |
Dark Web Scan Paranoid (Experimental) | darknoid | ![]() | ![]() | ![]() | ![]() |

For additional product documentation, visit syhunt.com/docs