Valtik Studios
Back to blog
ConsumerinfoUpdated 2026-03-2012 min

How to Check if Your Data Is on the Dark Web: The Actually-Useful Guide

Skip the $30/month "dark web scan" services. HIBP, Mozilla Monitor, DeHashed, data broker searches, Google dorking. Class-by-class response for each type of exposure (email + password, phone, home address, full identity, medical). Credit freeze, IP PIN, phone number hardening. The realistic ongoing-hygiene program that works.

Phillip (Tre) Bucchi headshot
Phillip (Tre) Bucchi·Founder, Valtik Studios. Penetration Tester

Founder of Valtik Studios. Penetration tester. Based in Connecticut, serving US mid-market.

# How to check if your data is on the dark web: the actually-useful guide

Every breach spawns a wave of scary press coverage followed by the same advice — "change your password and enable 2FA." That advice is fine but it's the last step. The first step is knowing what's already out there about you. Because once your email, password, phone number, or address leaks, it doesn't come back. It just circulates. Forever.

This post walks through exactly how to check what's exposed about you, using real tools that work, not the scammy "dark web scan" services that bundle identity monitoring subscriptions. And what to actually do about each class of exposure.

What the "dark web" actually is (and isn't)

"Dark web" as used in marketing copy means "criminal forums and markets where breach data gets traded." In practice that's a mix of:

  • Criminal forums. BreachForums (multiple generations), XSS, Exploit.in, various successors after each law enforcement takedown.
  • Telegram and Signal channels. Large chunks of breach data traded on Telegram and Signal channels since 2022.
  • Paste sites. Pastebin, DPaste, various replacements. Breach dumps and credential lists.
  • Tor hidden services. Ransomware leak sites, markets that survive public-web takedowns.
  • Public web. Breach data is also commonly re-published on the regular internet via compilation dumps, data breach news sites, and GitHub repos.

"Dark web monitoring" products that charge $10-30/month usually just index a subset of publicly-indexed breach data. Most of what they check is already free.

Tool 1: Have I Been Pwned (HIBP)

The canonical breach-checking service. Run by Troy Hunt since 2013. Free. Ethical. Does not share your search query with third parties.

Go to: https://haveibeenpwned.com/

What to do:

  1. Enter every email address you've ever used for important accounts (primary, work, old, abandoned).
  2. For any breach listed, note the breach source and year.
  3. Sign up for notification service at the same site to get alerted when your email appears in new breaches.

What it tells you: which known public breaches contain your email. If your email is in a password-dump breach (LinkedIn 2012, Adobe 2013, etc.), the password hash is out there, and it has likely been cracked.

Limitations: HIBP only indexes public breaches that have been obtained and verified. Many breach collections are private. Credential-stuffing lists trade on criminal forums without ever being published.

Also check separately

  • https://haveibeenpwned.com/Passwords lets you check if a specific password hash is in the breach corpus. Useful for password reviews. The service hashes your password client-side; only a hash prefix is sent to the server.
  • Pwned Passwords is also the backend for many password managers (1Password, Bitwarden) to flag compromised passwords automatically.

Tool 2: Mozilla Monitor (formerly Firefox Monitor)

Built on HIBP data. Free. Also checks publicly exposed data broker listings and can coordinate opt-outs.

Go to: https://monitor.mozilla.org/

What it adds: the paid tier includes data-broker opt-out assistance (US-only). The free tier covers breach monitoring.

Tool 3: Leak-Lookup / DeHashed (paid research tools)

For researchers and professionals, DeHashed (https://dehashed.com) and Leak-Lookup (https://leak-lookup.com) index far more breach data than HIBP, including many private dumps.

  • Pro-grade subscriptions run $5-30/month.
  • Let you search by email, username, password, phone, IP, name, or domain.
  • Return actual record content where indexed (cleartext password if in breach, address, phone, etc.).
  • Useful for pentesters doing OSINT for engagements.

Not for regular consumer use. But worth knowing that this tier of tooling exists and that skilled attackers already use it.

Before checking the dark web, check what's on the public web. Data brokers aggregate breach data with public records and publish it searchable.

  • Spokeo (https://spokeo.com). Search your name + state. Will show age, address, phone, email, relatives, property records.
  • BeenVerified, Intelius, Whitepages, MyLife, Radaris. Same model, different brands. Each has your profile with variations.
  • Google yourself with quotes. "your name" + "your city" surfaces what's publicly indexed.

For most people, the public web exposes more than the dark web does. Every data broker opt-out you complete reduces doxxing risk.

Tool 5: Telegram Search (if you know what you're doing)

Breach data commonly trades on Telegram channels. Many channels are public and searchable.

  • Proceed with caution. Some channels distribute malware alongside breach data.
  • Use a sandboxed / non-primary device. Not your daily phone.
  • Search Telegram directly or use Telegram-search tools like Tgstat (https://tgstat.com) and Cybersecurity-focused OSINT tools.

What you'd search: your email, your phone, your name. See what shows up.

Tool 6: Google Dorking

Specific queries for finding your exposed data on the public web:

  • "your@email.com" in quotes. Reveals forum posts, GitHub commits, leaked files.
  • site:pastebin.com "your@email.com"
  • site:github.com "your@email.com"
  • "your full name" OR "yourusername" filetype:sql for SQL dumps.
  • "your name" + "home address" + "phone number" for aggregator data.

You'll be surprised how much your own past exposure surfaces with five minutes of Google dorking.

Tool 7: Check your phone number

Phone numbers are breached less commonly than emails (more businesses collect email than phone), but leaked phone numbers are high-value for SIM-swap attackers and scam callers.

  • HIBP also indexes phone numbers for some breaches (search by phone).
  • Data broker sites (Whitepages, Spokeo) expose phone numbers.
  • Google the number in quotes to see where it shows up.

What to do for each class of exposure

If your email + password is in a breach dump

  1. Change that password everywhere you reused it.
  2. Verify no credential reuse. If you used the same password on 5 sites, change all 5.
  3. Enable MFA on accounts where you used that password.
  4. Consider that email as "burned" for new signups involving sensitive services. Create a new one.
  5. Move forward with a password manager. Every password unique. All generated.

If your phone number is exposed

  1. Move MFA off SMS where possible. Prefer app-based (Google Authenticator, Authy) or hardware key (YubiKey).
  2. Contact your carrier and enable a PIN/password on your account (prevents SIM-swap).
  3. Add a Google Voice number as your "public" number for less-sensitive signups; keep your carrier number private.

If your home address is on data brokers

  1. Opt out of the top 30 data brokers manually (free, slow) or use DeleteMe/Kanary/Optery (paid, faster).
  2. Stop using your real address for non-essential signups. Use a PO box or UPS mailbox address for subscriptions, deliveries from unfamiliar vendors, etc.
  3. Request privacy from property records where possible (varies by state).

If your full name + DOB + SSN is in a breach

You are in the "assume identity theft is ongoing" tier.

  1. Freeze your credit at all three bureaus (Experian, Equifax, TransUnion). Free. Prevents new credit lines.
  2. Enable IRS Identity Protection PIN to prevent tax-return fraud.
  3. Monitor financial accounts aggressively. Set up transaction alerts.
  4. Consider identity theft protection service (mixed opinions on value, but monitoring is automated).

If your medical records are in a breach

  • Obtain a copy of your medical record from your provider.
  • Monitor your insurance EOB statements for unfamiliar services or claims.
  • Report any insurance fraud to your insurer immediately.
  • There is no equivalent to a credit freeze for medical records. Monitoring is the main recourse.

What to do ongoing

  1. Subscribe to HIBP notifications. Free. Emails you when your address appears in new breaches.
  2. Use a password manager. Bitwarden (free), 1Password, or Dashlane. Every password unique. Autofill reduces phishing risk because the manager only fills on the right domain.
  3. Use aliases for email signups. Services like Apple Hide My Email, SimpleLogin, Firefox Relay create throwaway forwarding addresses.
  4. Review data broker exposure quarterly. Keep your opt-outs current. Data brokers add you back over time.
  5. Audit app permissions on your phone. Revoke location, contacts, photos access for apps that don't need it.
  6. Freeze your credit by default. Thaw it only when applying for new credit. Takes two clicks online.
  7. Enable MFA on everything important. Email first, banking second, everything else follows.

What to ignore

  • "Dark web scan" ads from consumer products. Usually bundled with identity theft insurance subscriptions. Most of what they check is already available free via HIBP.
  • Phone calls claiming your data has been breached. These are scams. Don't give info, don't transfer money, hang up.
  • Lifelock-style services as primary defense. They monitor; they don't prevent. Credit freeze does more for less.

The honest baseline

Assume everything you've ever put online that wasn't end-to-end encrypted is either already in a breach or will be in one eventually. Data broker sites aggregate public records, breach data, voter rolls, real estate records, and marketing data into comprehensive profiles of everyone in the US.

Your defense is not preventing exposure. It's minimizing reuse and making each individual exposure less damaging.

Valtik can help if you're being actively targeted

Most consumers don't need professional help. If you're a public figure, a business owner with public-facing exposure, or a specific target (journalist, abuse victim, political organizer), a threat model that goes beyond "check HIBP" is worth doing professionally.

Valtik offers personal OSINT assessments and opsec reviews for individuals at elevated risk. If a public exposure has already resulted in harassment, doxxing, or physical risk, reach out.

Sources

  1. Have I Been Pwned
  2. Mozilla Monitor
  3. FTC IdentityTheft.gov
  4. Annual Credit Report. Federal credit freeze resources
  5. IRS IP PIN Opt-In
privacyopsecbreach monitoringhave i been pwnedidentity theftconsumer securitycredit freezedark web

Want us to check your Consumer setup?

Our scanner detects this exact misconfiguration. plus dozens more across 38 platforms. Free website check available, no commitment required.

Get new research in your inbox
No spam. No newsletter filler. Only new posts as they publish.