Email Address
Detected in monitored breach repositories and criminal-targeting sources. The most common entry point for credential-based targeting.
Password
Exposed passwords linked to your accounts are detected in compromised credential databases — often before you are notified of a breach.
Login Credentials
Username and password combinations associated with your accounts, as they appear in breach repositories and credential lists.
Two-Factor Authentication Tokens
2FA recovery codes exposed in breach data. Recovery codes are frequently targeted when primary credentials are already compromised.
IP Address
Network address exposure or association with suspicious activity in monitored criminal-targeting sources.
Cryptocurrency Wallet Address
Wallet credential exposure in breach repositories. Wallet addresses linked to real identity are increasingly present in targeting data.
Subscription & Membership Data
Account data from subscription services and membership platforms, as detected in breach repositories.
Phishing Targeting Alerts
Active phishing campaigns targeting your email address or known accounts, identified through monitored criminal-targeting sources.
Full Name
Detected in criminal-targeting sources. Full name combined with one or two other identifiers is sufficient to build a targeting profile.
Date of Birth
Detected in monitored breach repositories. Date of birth is routinely used in identity verification and fraud facilitation.
Phone Number
Detected in criminal-targeting sources. Phone numbers are used in SIM-swap attacks and direct social engineering campaigns.
Physical Address
Detected in monitored criminal-targeting sources. Physical address is frequently aggregated alongside financial and identity data.
Social Insurance Number (SIN)
Canadian SIN detected in fraud-related repositories. SIN exposure is a direct enabler of government benefit fraud and identity theft.
Social Security Number (SSN)
US SSN detected in breach databases. SSN is the primary identifier used in US identity fraud and financial account takeover.
Driver's Licence Number
Detected in monitored sources. Driver's licence data is used in identity verification fraud and physical credential forgery.
Passport Number
Detected in criminal-targeting repositories. Passport data enables both travel fraud and high-value identity impersonation.
Tax Identification Number (TIN)
Detected in fraud-related and breach sources. TIN exposure is directly linked to fraudulent tax filings and financial account access.
Employment History
Detected in monitored criminal-targeting sources. Employment data is used in spear-phishing and business email compromise targeting.
Security Questions & Answers
Detected in breach data tied to your accounts. Security question answers are used to bypass account recovery and reset protections.
Credit Card Number
Detected in criminal-targeting sources. Card data is typically actionable within hours of a breach — well before most notifications are issued.
Bank Account Number
Detected in breach repositories. Bank account data combined with routing numbers enables direct unauthorized transfers.
Routing Number
Detected in criminal-targeting sources. Routing numbers are used alongside account numbers to execute fraudulent transfers and payments.
Payment Card PINs
Detected in breach databases. PIN exposure is a high-risk indicator — it enables physical card fraud independently of card number theft.
Financial Transaction History
Detected in criminal-targeting repositories. Transaction records are used to map spending patterns and identify high-value targets.
Loan Application Monitoring
Detected when your identifying information appears in connection with fraudulent loan or line-of-credit applications.
Medical Records
Detected in breach repositories. Medical data is used in insurance fraud, prescription fraud, and targeted extortion.
Health Insurance Information
Detected in criminal-targeting sources. Health insurance details are used to submit fraudulent claims and access prescription networks.
Government Benefits Information
Detected in monitored breach repositories. Government benefits data enables direct fraud against benefit programs and tax authorities.
Vehicle Identification Number (VIN)
Detected in criminal-targeting sources. VIN data is used in insurance fraud and title theft.