About LeakTrace

What is LeakTrace?
LeakTrace is an exposure intelligence platform that monitors breach databases and other data sources to identify when an organization's credentials have been compromised. It provides structured reporting and actionable intelligence for businesses in Canada and the United States.
What is exposure intelligence?
Exposure intelligence is the practice of continuously monitoring external data sources to identify when an organization's credentials, domains, or other digital assets appear in breach databases or threat actor channels. It transforms raw breach data into structured, actionable findings.
Who is LeakTrace designed for?
LeakTrace serves businesses of all sizes across Canada and the United States, from small and mid-sized companies to enterprises. It is also available to individuals who want to understand their personal credential exposure.
What regions does LeakTrace operate in?
LeakTrace operates in Canada and the United States. Reporting and compliance guidance are tailored to the regulatory frameworks applicable in each region, including PIPEDA and state-level breach notification laws.

About Scope

What is Scope?
Scope is LeakTrace's instant credential scan. It checks a domain or email address against monitored breach databases and returns a structured exposure assessment within seconds.
How does Scope work?
Scope queries multiple breach intelligence sources using the domain or email address you provide. It cross-references the results, deduplicates findings, and returns a categorized summary of any credential exposures detected.
What data sources does Scope scan?
Scope scans a range of breach databases, paste sites, and other monitored data sources where compromised credentials are known to surface. Sources are continuously updated as new breach datasets become available.
How long does a Scope scan take?
A Scope scan typically completes within seconds. Results are delivered immediately in-browser, with the option to generate a detailed PDF report.
What is included in a Scope report?
A Scope report includes identified breach events, exposed data types, a risk assessment, and recommended remediation steps. The executive summary PDF, called Brief, provides a formatted document suitable for stakeholder review.

Security & Privacy

Is my data safe with LeakTrace?
LeakTrace processes scan inputs over encrypted connections and does not retain raw credential data after analysis. The platform is designed with data minimization principles and access controls appropriate for handling sensitive exposure intelligence.
Does LeakTrace store my credentials?
No. LeakTrace does not store, cache, or log the credentials it identifies during a scan. The platform returns exposure metadata and breach context without retaining the underlying credential values.
How does LeakTrace handle personal information?
LeakTrace collects only the information necessary to perform scans and deliver reports. Personal information handling is governed by the platform's privacy policy and aligns with applicable Canadian and U.S. privacy legislation.

About Credential Exposure

What is credential exposure?
Credential exposure occurs when usernames, passwords, or authentication tokens appear in breach databases or other data sources accessible to threat actors. It typically results from third-party service breaches rather than a direct compromise of your own systems.
How do credentials end up on the dark web?
Credentials reach the dark web through third-party data breaches, infostealer malware that harvests saved browser passwords, phishing campaigns, and misconfigured repositories or cloud storage. These datasets accumulate and are redistributed over time.
What should I do if my credentials are exposed?
Change the compromised password immediately, along with any other accounts where the same password was reused. Enable multi-factor authentication on all critical accounts and review access logs for signs of unauthorized activity.
How often should I check for credential exposure?
Credential exposure should be monitored continuously. New breaches are disclosed regularly, and credentials from older incidents continue to surface as datasets are combined and redistributed across threat actor channels.

Getting Started

How do I run my first scan?
Navigate to the business or individual scan page and enter your corporate domain or email address. Scope will return results within seconds, and you can generate a detailed Brief report from the results.
Do I need an account to use LeakTrace?
You can run an initial Scope scan without creating an account. An account is required to access full reports, historical scan data, and ongoing monitoring features.
How much does LeakTrace cost?
LeakTrace offers a free initial scan with tiered pricing for full reports and continuous monitoring. Visit the pricing page for current plan details and feature comparisons.

See What's Exposed

Run a free domain scan and get an immediate exposure assessment for your organization.

Scan Your Domain Free