What Continuous Monitoring watches

Categories monitored, sources covered, and what is out of scope.

Last updated 2026-05-11 Monitoring

Monitoring runs continuously across all categories that apply to your domain and team email addresses.

Monitored categories

  • Credential exposure — passwords, hashes, and session tokens found in breach corpora.
  • Ransomware leaks — files and data appearing on ransomware-group leak sites.
  • Paste sites — credentials and corporate data on paste boards.
  • Domain impersonation — newly registered lookalike domains targeting your brand.
  • Public code repositories — secrets, API keys, and credentials inadvertently committed to public Git.

What we do not monitor

  • The contents of your private mailbox, files, or systems. Monitoring is external-only.
  • Phone numbers and physical addresses (unless they appear in a breach context tied to your domain).
  • Social media activity.

Customize what you receive

You can pause individual categories from the Settings page on your dashboard. See Tune your monitoring alerts.

Did this answer your question? If not, the AI assistant in the bottom-right can help, or email [email protected].