Somewhere on the dark web right now, there is almost certainly a database containing your email address. Statistically, if you’ve used the internet for more than five years, your credentials have appeared in at least one breach — and likely several.

The question isn’t whether your data is out there. It’s what’s in those files, and what you can do about it.

TL;DR

  • Most people’s email addresses appear in multiple data breaches — checking takes 30 seconds
  • You don’t need Tor or dark web access to find your leaked data; free tools do it for you
  • Have I Been Pwned, DeHashed, and Mozilla Monitor cover the vast majority of known breaches
  • Google’s dark web monitoring shut down in January 2026 — if you relied on it, switch now
  • Finding your data is step one; the article ends with exactly what to do next

Why You Should Check Right Now

In 2025 alone, over 4.17 billion compromised credential records were collected from infostealer logs and breach marketplaces. That number doesn’t represent unique people — many records appear multiple times, sold and resold across forums. But it illustrates the sheer scale of the market for stolen identity data.

Have I Been Pwned (HIBP) — the most widely used free breach database — currently holds over 12 billion records from 929 breached sites. In November 2025, it added a single new dataset called ALIEN TXTBASE containing 2 billion email addresses and 1.3 billion unique passwords. One dataset. Two billion people.

You are probably in there. Let’s find out.


How Your Data Gets There: The Pipeline

Before checking, it helps to understand how stolen data travels. It’s not as dramatic as movies suggest.

Step 1 — The Breach A company you have an account with gets hacked. Their database — containing usernames, email addresses, passwords, and sometimes more — gets copied. This happens thousands of times per year, to companies of every size.

Step 2 — The Underground Forum The attacker (or whoever bought the raw data) posts it to a private hacking forum, sometimes as a “proof” of the breach, sometimes for sale. At this stage the data might only reach a few hundred people.

Step 3 — The Marketplace The data gets bundled into larger “combolists” — massive text files containing millions of email/password pairs — and sold on dark web marketplaces. Prices are surprisingly low: a list of 10 million credentials might sell for $50.

Step 4 — The Aggregators Services that monitor breach data (both legitimate and criminal) collect these dumps. On the criminal side, infostealer logs — malware that records passwords directly from browsers — flow into Telegram channels and private shops constantly. On the legitimate side, researchers like Troy Hunt (HIBP founder) collect and index the same data to alert victims.

Step 5 — Your Inbox (or Someone Else’s) Either you get notified by a monitoring service, or an attacker uses your credentials in a credential stuffing attack — trying your leaked username/password combination on hundreds of other websites automatically.

The pipeline from breach to active exploitation can take as little as 48 hours.


What Data Typically Leaks

Not all breaches are equal. Here’s what’s commonly found in leaked databases:

Data TypeHow CommonRisk Level
Email addressNearly universalMedium — used for phishing
Hashed passwordVery commonHigh — often crackable
Plaintext passwordLess common, still widespreadCritical
Full nameCommonMedium
Phone numberCommonHigh — SIM swap attacks
Physical addressModerateHigh — doxxing, fraud
Date of birthModerateHigh — identity theft
Credit card dataLess commonCritical
Social security / national IDRare but existsCritical

The worst scenario isn’t someone reading your address — it’s credential reuse. If you used the same password on the breached site as on your email or banking account, that one breach creates a chain reaction.


The Tools: How to Actually Check

Forget opening Tor. These tools do the hard work — they’ve already indexed the dark web data so you don’t have to.

Free Tools (Start Here)


1. Have I Been Pwned — haveibeenpwned.com

The gold standard. Created by security researcher Troy Hunt and trusted by governments and enterprises worldwide.

What it checks: 929 breached sites, 12+ billion records. Also checks if your password (hashed, not sent in plaintext) has appeared in any breach.

How to use:

  1. Go to haveibeenpwned.com
  2. Enter your email address
  3. Results show every known breach your email appeared in, with dates and what data was exposed
  4. Check passwords separately at haveibeenpwned.com/Passwords

Pro tip: Check every email address you’ve ever used — old accounts from ten years ago appear in breaches too.


2. Mozilla Monitor — monitor.mozilla.org

Built on HIBP data but with a cleaner interface and free ongoing monitoring. Mozilla emails you when your address appears in a new breach.

What it checks: Same underlying data as HIBP, with added monitoring and actionable steps for each breach.

How to use: Sign up with your email, and Mozilla sends alerts automatically. No manual checking required.

Note: Google shut down its competing dark web report service in January 2026. If you relied on Google One’s dark web monitoring, switch to Mozilla Monitor — it’s free and covers the same ground.


3. BreachDirectory — breachdirectory.org

A free database focused on password lookups. Useful for checking whether a specific password has appeared in public breaches.

What it checks: Large corpus of breach data with password hash and plaintext matching.

How to use: Enter email, username, or password hash to check for exposure. More technically oriented than HIBP but free.


Freemium Tools (More Depth)


4. DeHashed — dehashed.com

One of the most comprehensive breach databases available to individuals. The free tier shows you that your data appeared; paid plans show the full records.

What it checks: Massive breach corpus including many databases not indexed by HIBP. Supports searching by email, username, IP address, name, phone number, and even physical address.

How to use:

  1. Go to dehashed.com
  2. Enter your email — free results show breach names and dates
  3. Paid plans ($6–$25/month) reveal full records including what data was exposed

Best for: People who want to see exactly what a potential attacker would find when searching for them.


5. Intelligence X — intelx.io

A powerful dark web and open-source intelligence search engine. Indexes data from Tor, I2P, paste sites, and breach databases.

What it checks: Dark web forums, Tor hidden services, data dumps, paste sites (Pastebin etc.), and more. Regularly updated.

How to use: Free searches are limited (3 per day). The interface shows you raw results from indexed sources — more technical than HIBP but far more comprehensive.

Free tier: Sufficient for a one-time personal check. Paid plans for ongoing monitoring or bulk searches.


Professional / Enterprise Tools


6. Flare — flare.io

The closest thing to actually having a researcher monitor the dark web on your behalf. Flare continuously crawls thousands of Telegram channels, Tor forums, paste sites, and cybercrime marketplaces.

What it checks: Real-time infostealer logs (malware-harvested passwords, session cookies), ransomware leak sites, dark web forums, Telegram criminal channels, and traditional breach databases.

Why it matters: Infostealer logs are different from breach databases. When malware infects a computer, it harvests passwords directly from browsers and sends them to a central server — this data appears in Telegram channels and private shops within hours, before it ever reaches HIBP. Flare catches this early.

Best for: IT teams and security professionals monitoring corporate credentials. Free trial available; paid plans scale with organization size.


7. Breachsense — breachsense.com

Similar positioning to Flare — continuous monitoring of breach databases, infostealer logs, and dark web sources with API access for automation.

Best for: Developers or security teams who want to integrate breach monitoring into existing tools.


Step-by-Step: What to Do When You Find Your Data

Finding your data in a breach list is alarming, but it doesn’t mean you’ve been hacked already. Here’s the response playbook:

Step 1 — Don’t panic, triage first

Look at what was exposed. An email address alone is low risk. A plaintext password from 2019 is medium risk if you stopped using that password. A password you still use today is critical.

Step 2 — Change the affected password immediately

Go to the breached site and change the password. Use a password manager (Bitwarden, 1Password) to generate a random 20+ character password you don’t have to remember.

Step 3 — Check for reuse

Think about which other sites use the same password. Change all of them. This is the most important step — attackers rely on people reusing passwords.

Step 4 — Enable two-factor authentication (2FA)

Even if your password is stolen, 2FA stops the attacker from logging in. Use an authenticator app (like Ente Auth or Aegis) rather than SMS-based 2FA when possible — SMS can be intercepted via SIM swap.

Step 5 — Check your email for suspicious logins

Most email providers (Gmail, Outlook) show recent login history. Look for unfamiliar locations or devices. If you find one, change your password and revoke active sessions immediately.

Step 6 — Monitor for identity theft

If the breach included your name, date of birth, address, or national ID number, monitor your credit reports for new accounts you didn’t open. In many countries you can place a free credit freeze that blocks new accounts without your explicit approval.


Setting Up Ongoing Monitoring

Checking once isn’t enough — new breaches happen constantly. Set up automatic monitoring with at least one free tool:

  1. Mozilla Monitor — free email alerts when your address appears in a new breach
  2. HIBP notification — subscribe at haveibeenpwned.com/NotifyMe
  3. DeHashed alerts — paid but sends real-time notifications for any new match

For organizations monitoring employee credentials, Flare or Breachsense provide real-time Telegram and dark web monitoring that catches infostealer-harvested credentials before they’re exploited.


A Note on Tor and Manual Dark Web Searches

The idea of manually browsing the dark web to find your own data sounds logical, but in practice it’s unworkable. Marketplace URLs change constantly, most require invitations or cryptocurrency deposits to access, load times are measured in minutes, and the data you’re looking for is fragmented across thousands of private channels.

The tools in this article have already done that crawling and indexing. You get the results in seconds. Manual dark web searching made sense for researchers five years ago; today it’s redundant for personal breach checking.

Use the tools. Save yourself an afternoon.



Sources