Pricing

The Exposure Exists.
The Report Confirms It.

Individual forensic reports delivered at the point of payment. Business assessments scoped and confirmed within one business day.

30% lower annually
Business
Business Protection

A forensic assessment of what attackers already know about your domain, infrastructure, and team. Scoped to your organisation before any work begins.

Scoped to your organisation.
Pricing reflects organisation size, domain complexity, and monitoring scope. Confirmed in writing within one business day of your assessment request.
Request an Assessment

Response within one business day

Domain & infrastructure exposure audit
Employee credential exposure report
Business monitoring dashboard
Breach & threat intelligence alerts
Public record monitoring for business filings
Dedicated account intelligence support
AES-256 Encrypted
PIPEDA & CCPA Aligned
Data Stays in North America
No Data Sold. Ever.
Monitoring Scope

What Attackers Look For.
What LeakTrace Finds.

The individual monitoring scope covers every personal data category commonly found in compromised credential databases and breach repositories — mapped to how that data is actually used in targeting and fraud.

Digital & Online
Email Address
Detected in monitored breach repositories and criminal-targeting sources. The most common entry point for credential-based targeting.
Password
Exposed passwords linked to your accounts are detected in compromised credential databases — often before you are notified of a breach.
Login Credentials
Username and password combinations associated with your accounts, as they appear in breach repositories and credential lists.
Two-Factor Authentication Tokens
2FA recovery codes exposed in breach data. Recovery codes are frequently targeted when primary credentials are already compromised.
IP Address
Network address exposure or association with suspicious activity in monitored criminal-targeting sources.
Cryptocurrency Wallet Address
Wallet credential exposure in breach repositories. Wallet addresses linked to real identity are increasingly present in targeting data.
Subscription & Membership Data
Account data from subscription services and membership platforms, as detected in breach repositories.
Phishing Targeting Alerts
Active phishing campaigns targeting your email address or known accounts, identified through monitored criminal-targeting sources.
Identity & Personal Data
Full Name
Detected in criminal-targeting sources. Full name combined with one or two other identifiers is sufficient to build a targeting profile.
Date of Birth
Detected in monitored breach repositories. Date of birth is routinely used in identity verification and fraud facilitation.
Phone Number
Detected in criminal-targeting sources. Phone numbers are used in SIM-swap attacks and direct social engineering campaigns.
Physical Address
Detected in monitored criminal-targeting sources. Physical address is frequently aggregated alongside financial and identity data.
Social Insurance Number (SIN)
Canadian SIN detected in fraud-related repositories. SIN exposure is a direct enabler of government benefit fraud and identity theft.
Social Security Number (SSN)
US SSN detected in breach databases. SSN is the primary identifier used in US identity fraud and financial account takeover.
Driver's Licence Number
Detected in monitored sources. Driver's licence data is used in identity verification fraud and physical credential forgery.
Passport Number
Detected in criminal-targeting repositories. Passport data enables both travel fraud and high-value identity impersonation.
Tax Identification Number (TIN)
Detected in fraud-related and breach sources. TIN exposure is directly linked to fraudulent tax filings and financial account access.
Employment History
Detected in monitored criminal-targeting sources. Employment data is used in spear-phishing and business email compromise targeting.
Security Questions & Answers
Detected in breach data tied to your accounts. Security question answers are used to bypass account recovery and reset protections.
Financial & Fraud
Credit Card Number
Detected in criminal-targeting sources. Card data is typically actionable within hours of a breach — well before most notifications are issued.
Bank Account Number
Detected in breach repositories. Bank account data combined with routing numbers enables direct unauthorized transfers.
Routing Number
Detected in criminal-targeting sources. Routing numbers are used alongside account numbers to execute fraudulent transfers and payments.
Payment Card PINs
Detected in breach databases. PIN exposure is a high-risk indicator — it enables physical card fraud independently of card number theft.
Financial Transaction History
Detected in criminal-targeting repositories. Transaction records are used to map spending patterns and identify high-value targets.
Loan Application Monitoring
Detected when your identifying information appears in connection with fraudulent loan or line-of-credit applications.
Sensitive Information
Medical Records
Detected in breach repositories. Medical data is used in insurance fraud, prescription fraud, and targeted extortion.
Health Insurance Information
Detected in criminal-targeting sources. Health insurance details are used to submit fraudulent claims and access prescription networks.
Government Benefits Information
Detected in monitored breach repositories. Government benefits data enables direct fraud against benefit programs and tax authorities.
Vehicle Identification Number (VIN)
Detected in criminal-targeting sources. VIN data is used in insurance fraud and title theft.
Get Started

Your Exposure Profile
Already Exists.

It was assembled without your knowledge and it is accessible right now. The report tells you what is in it.

Individual scan takes 30 seconds  ·  Business response within one business day

Human-Verified Intelligence
AES-256 Encrypted
PIPEDA & CCPA Aligned
No Data Sold. Ever.