Leaksify Alternatives

    Leaksify is described as 'is the best known site for checking if your email address, website, username or any account associated with it, has been hacked'. There are more than 10 alternatives to Leaksify for Online / Web-based, Android and Windows. The best alternative is Have I been pwned?, which is both free and Open Source. Other great apps like Leaksify are Firefox Monitor (Free, Open Source), Have I Been Sold? (Free), LeakCheck (Freemium) and Snusbase (Paid).

    This page was last updated Jan 23, 2020

    1. Website repository that checks what sites your email address was used on were compromised.
    2. Firefox Monitor arms you with tools to keep your personal information safe. Find out what hackers already know about you and learn how to stay a step ahead of them.


    3. Have I Been Sold? is a free service which lets you check our database of purchased emails and see if someone sold your contact information.
    4. Data breach search engine, low price starting from $10/mo, one mailbox for free, unlimited API, 7B+ entries.
    5. The industry leading database lookup. We pride ourselves in being faster than all of our competitors, wile maintaining a very large selection of private databases.
      show more


      • Online
      Check if your account credentials have been leaked.

      Discontinued

      LeakBase has officially announced that the project has been discontinued: https://twitter.com/LeakbasePW/status/936882205091028992

    6. DeHashed is the largest & fastest data breach search engine. You can search for IP address, email, username, name, phone, VIN, address, and more! We have true wild card, dork usage, and we offer a real search engine experience! It's also free!.
    7. Get an overview where your account was leaked. Check if your information already is in the hand of hackers. It’s your data – your deserve to know!.
      show more
    8. Why so many accounts are hacked so easily every day and even by people that aren't very skilled hackers?
      show more
    9. The use of stolen passwords is now the most common vector of cyberattacks. If some of your users credentials have been compromised, you want to know it as soon as possible.
      No screenshots yet
    Showing 10 of 14 alternatives