Skip to main content

Breach search platforms

The following platforms provide access to breach databases and infostealer intelligence for identifying compromised credentials.
PlatformDatabaseURLAccess
DeHashed17+ billion recordshttps://dehashed.comFreemium
SnusbaseRecent breacheshttps://snusbase.comPaid
LeakCheckReal-time searchhttps://leakcheck.ioFreemium
Intelligence XDark web + breacheshttps://intelx.ioFreemium
h8mailLocal breach searchhttps://github.com/khast3x/h8mailFree
Hudson RockInfostealer intelligencehttps://www.hudsonrock.com/threat-intelligence-cybercrime-toolsFree
h8mail is well-suited for bulk searches against locally downloaded breach datasets, avoiding rate limits imposed by online services.

Quick search with h8mail

Run a mass search against a list of target email addresses or usernames combined with a local breach data folder.
# h8mail - mass search
h8mail -t targets.txt -bc local_breach_folder/ --power-all
Breach data contains personal information about individuals who did not consent to its distribution. Use these tools strictly within legal boundaries and for legitimate investigative purposes such as incident response, threat intelligence, or authorized security assessments.

Build docs developers (and LLMs) love