How do you find this information?
Our service "Leaked User Information" actively and continuously searches for new leaks both automatically and manually in:
Dumped and leaked texts (pastebins)
Protected forums on the dark web and clear web.
Encrypted invisible networks (I2P)
Web directories
Databases for leaked data
Cloud sharing services (Mega/Cloud drive)
Related Articles
I've received an email about leaked information, but there's no information about the source.
Sometimes, certain pieces of information can be identified as leaked (exposed) without the original source being available. Unfortunately, we're unable to investigate this further. As the recipient of this information, what you can do is, if the ...
I want to add or change my information.
To add or update information related to your company, you need to create a ticket with our support team. You can create a ticket here or by clicking the "submit a ticket" button at the bottom of this page.
Why are you monitoring my information?
Safestate collaborates with a number of different partners where you as a customer can take advantage of our proactive cyber security services. This includes that we monitor whether your data has been exposed. We search with a keyword, which can be ...
If my information is exposed, what should I do?
If the tool identifies exposed data, you are advised to replace this data as quickly as possible so that no one can exploit it. It's the same principle as if someone steal the key to your home. Then of course you want to change the lock as quickly as ...
How should I interpret the results of password monitoring?
The report is interpreted as follows: Headline: Indicates from which source the information is exposed, e.g. Dropbox. If it says "Dark Web Password Database," it means that the information is exposed but the original source cannot be verified. Source ...