cloud-checkAPI Integration

The FourYourSafety API provides programmatic access to Twitter/X intelligence data tracked by the FYS browser extension. All endpoints return JSON and are available under:

https://fouryoursafety.fun/api/
circle-info

Authentication

  • API Key required in request headers:

Authorization header
Authorization: Bearer YOUR_API_KEY
  • Keys are tied to usage credits.

  • Unauthenticated requests will return 401 Unauthorized.


Endpoints

Get Deleted Tweets

Retrieve a list of deleted tweets from a given user.

Endpoint

Query Parameters

  • user (string, required) – Twitter username

  • limit (int, optional, default: 20) – Number of tweets to fetch

Example Request

Example Response for deleted tweets fetching (fictitious information)


Get Contract Addresses

Fetch contract addresses mentioned in tweets from a user.

Endpoint

Query Parameters

  • user (string, required)

  • limit (int, optional)

Example Request

Example Response for CA tweets (fictitious information)


Get First Followers

List the earliest followers of a new account.

Endpoint

Query Parameters

  • user (string, required)

  • page (int, optional) – For pagination

Example Request

Example Response for first followers (fictitious information)


Get Profile Changes

Track bio and username history.

Endpoint

Query Parameters

  • user (string, required)

Example Request

Example Response for bio changes (fictitious information)


Get Key Followers

Identify notable accounts in a user’s follower network.

Instantly find out if any notable figures in CT are following the project you're eyeballing, this usually gives you a clear indication of alpha or not. See reputable traders following? Then you're most likely on the right track.

Endpoint

Query Parameters

  • user (string, required)

Example Request

Example Response for key followers (fictitious information)


Error Codes

  • 200 OK – Successful request

  • 400 Bad Request – Invalid query parameters

  • 401 Unauthorized – Missing or invalid API key

  • 404 Not Found – Resource not found

  • 429 Too Many Requests – Rate limit exceeded

  • 500 Internal Server Error – Unexpected server error


Rate Limits

  • Free Tier: 100 requests / day

  • Pro Tier: 10,000 requests / day

  • Exceeding limits returns 429 Too Many Requests


Example Workflow

1

Fetch deleted tweets for a project account

Use the deleted-tweets endpoint to retrieve tweets that were removed.

2

Cross-check if any contract addresses were mentioned

Use the contract-addresses endpoint to find on-chain addresses mentioned in those tweets.

3

Analyze first followers of the same account

Use the first-followers endpoint to inspect early followers for patterns or suspicious accounts.

4

Monitor profile changes over time

Use the profile-changes endpoint to track bio and username history that might indicate rebrands or impersonation.

5

Rank key followers to determine insider clusters

Use the key-followers endpoint to identify notable accounts and cluster insiders or influential followers.

This workflow allows traders to detect suspicious patterns and researchers to archive data systematically.

Last updated