๐ Base URLs
Use the appropriate environment for development, testing, or production workloads:| Environment | Base URL | Purpose |
|---|---|---|
| Sandbox | https://sandboxapi.dataspike.io | Safe testing environment for local development, QA, and simulated verifications. |
| Production | https://api.dataspike.io | Live environment for real identity checks, AML screenings, and compliance operations. |
๐ Authentication
All API requests must be authenticated using your environment-specific API key. You can generate and manage keys from the Dashboard โ API section:๐ https://dash.dataspike.io/api Keys for Sandbox and Production are not interchangeable.
Required headers
Content-Typemust always beapplication/jsonds-api-tokenauthenticates your request- Missing or invalid tokens return
401 Unauthorized
๐ก Making requests
The API uses standard HTTP methods:| Method | Purpose |
|---|---|
| GET | Retrieve resources |
| POST | Create new resources or submit verification data |
| PUT / PATCH | Update existing resources |
| DELETE | Remove or deactivate resources |
Example request
๐ Webhooks
Use webhooks to receive real-time notifications when key events occur โ such as completed verifications, AML matches, or KYT address alerts. Configure webhooks under:Dashboard โ API โ Webhooks Each environment (Sandbox & Production) has its own webhook configuration and delivery logs. Common webhook event types include:
AML ScreeningDocver CheckDeepfake Video Analysis
๐งฑ Core API Domains
ApplicantsPersistent identity records that link all workflows โ verifications, AML checks, KYT crypto analysis, deepfake signals, and behavioral risk events. Verification
Document checks, biometric matching, liveness detection, and selfie-to-ID comparison. Works for both applicant-linked flows and fully stateless sessions. Deepfake Analysis
Detection of AI-generated or manipulated identity media across images, uploaded videos, and real-time video streams โ including WebRTC, LiveKit, Google Meet, and other streaming platforms. AML Screening
Global sanctions, watchlist, PEP, and adverse-media checks with automated scoring and continuous monitoring. KYT (Crypto Risk Intelligence)
Risk evaluation for blockchain addresses and transactions: sanctions exposure, wallet behavior analysis, clustering heuristics, and counterparty intelligence. Document Intelligence
AI models for document classification, structured data extraction, and fraud pattern detection. Webhooks
Real-time events for verifications, AML matches, KYT alerts, deepfake outcomes, and applicant updates.