leakcheck.net Open in urlscan Pro
2a06:98c1:3121::c  Public Scan

Submitted URL: http://leakcheck.net/
Effective URL: https://leakcheck.net/
Submission: On October 01 via manual from DE — Scanned from NL

Form analysis 4 forms found in the DOM

Name: searchPOST

<form name="search" class="d-flex justify-content-center text-center" method="POST">
  <div class="col col-md-7" style="margin-bottom:2.5em;">
    <div class="input-group mb-3">
      <input type="text" name="data" class="form-control" placeholder="E-mail or username" aria-label="E-mail or username" aria-describedby="button-search" required="">
      <button class="btn btn-outline-secondary" type="submit" id="button-search">Search</button>
    </div>
    <span style="color:white;"><i class="fas fa-check-circle" style="color: #3ab8ff"></i> We do not keep logs of your searches. Data transferred through TLS protocol and cannot be intercepted.</span>
  </div>
</form>

<form id="login" class="login-form">
  <input type="text" name="username" class="default-input" placeholder="Username" required="">
  <input type="password" name="password" class="default-input" placeholder="Password" required="">
  <input type="hidden" name="q" value="9821a550">
  <!-- <input type="hidden" name="t" value=""> -->
  <div class="h-captcha" data-theme="dark" data-callback="onSubmitlogin" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='09r1ecbj6ne']" style="display: none;"><iframe
      src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&amp;id=09r1ecbj6ne&amp;host=leakcheck.net&amp;sentry=true&amp;reportapi=https%3A%2F%2Faccounts.hcaptcha.com&amp;recaptchacompat=true&amp;custom=false&amp;hl=en&amp;tplinks=on&amp;sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&amp;theme=dark&amp;size=invisible"
      title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="09r1ecbj6ne" data-hcaptcha-response="" style="display: none;"></iframe><textarea
      id="g-recaptcha-response-09r1ecbj6ne" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-09r1ecbj6ne" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
    class="h-captcha btn btn-success" data-callback="onSubmitlogin" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="09r1ecbj6ne"><span>Login</span></button>
  <script>
    function onSubmitlogin() {
      document.getElementById("login").submit();
    }
  </script>
  <button class="restore-link" data-dismiss="modal" data-toggle="modal" data-target="#restoreModal">Forgot password?</button>
</form>

<form id="register" class="login-form">
  <input type="text" name="username" class="default-input" placeholder="Username" required="">
  <input type="email" name="email" class="default-input" placeholder="Email" required="">
  <input type="password" name="password" class="default-input" placeholder="Password" required="">
  <input type="password" name="repeat" class="default-input" placeholder="Repeat password" required="">
  <input type="checkbox" id="terms-lb" required="">
  <label for="terms-lb">Agree with the Terms of Service</label>
  <div class="h-captcha" data-theme="dark" data-callback="onSubmitregister" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='13hsn45bgk4c']" style="display: none;"><iframe
      src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&amp;id=13hsn45bgk4c&amp;host=leakcheck.net&amp;sentry=true&amp;reportapi=https%3A%2F%2Faccounts.hcaptcha.com&amp;recaptchacompat=true&amp;custom=false&amp;hl=en&amp;tplinks=on&amp;sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&amp;theme=dark&amp;size=invisible"
      title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="13hsn45bgk4c" data-hcaptcha-response="" style="display: none;"></iframe><textarea
      id="g-recaptcha-response-13hsn45bgk4c" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-13hsn45bgk4c" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
    class="h-captcha btn btn-success" data-callback="onSubmitregister" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="13hsn45bgk4c"><span>Register</span></button>
  <script>
    function onSubmitregister() {
      document.getElementById("register").submit();
    }
  </script>
</form>

<form id="restore" class="login-form">
  <input type="text" name="email" class="default-input" placeholder="E-mail or Username" required="">
  <div class="h-captcha" data-theme="dark" data-callback="onSubmitrestore" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='2gq7ricl839g']" style="display: none;"><iframe
      src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&amp;id=2gq7ricl839g&amp;host=leakcheck.net&amp;sentry=true&amp;reportapi=https%3A%2F%2Faccounts.hcaptcha.com&amp;recaptchacompat=true&amp;custom=false&amp;hl=en&amp;tplinks=on&amp;sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&amp;theme=dark&amp;size=invisible"
      title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="2gq7ricl839g" data-hcaptcha-response="" style="display: none;"></iframe><textarea
      id="g-recaptcha-response-2gq7ricl839g" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-2gq7ricl839g" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
    class="h-captcha btn btn-primary" data-callback="onSubmitrestore" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="2gq7ricl839g"><span>Restore</span></button>
  <script>
    function onSubmitrestore() {
      document.getElementById("restore").submit();
    }
  </script>
</form>

Text Content

LEAKCHECK
 * Home
 * Plans
 * Features
 * Databases
 * API
 * FAQ
 * Terms of Service

Русский English


SIGN UP FOR FREE AND MAKE SURE YOUR CREDENTIALS HAVEN'T BEEN COMPROMISED


PROTECTING THE DIGITAL IDENTITY OF PEOPLE AND COMPANIES FOR 4 YEARS.

Search
We do not keep logs of your searches. Data transferred through TLS protocol and
cannot be intercepted.
Register Sign in


PLANS


BASIC PLAN

2.99$ / DAY

 * 15 e-mail lookups

Choose this


MONTHLY PLAN

9.99$ / MO

 * 200 e-mails, usernames / day

   --------------------------------------------------------------------------------

 * 15 keywords / day

Choose this
Recommended


LIFETIME PLAN

24.99$ / LIFETIME

 * 400 e-mails, usernames / day

   --------------------------------------------------------------------------------

 * 30 keywords / day

Choose this
Best Plan


ENTERPRISE

FROM 100$ / EVERY 3 MONTHS

 * any lookups

   --------------------------------------------------------------------------------

 * Reverse search by password and corporate domain

   --------------------------------------------------------------------------------

 * Bulk check

   --------------------------------------------------------------------------------

   

   --------------------------------------------------------------------------------

 * OPTIONAL Accept recurring payments, provide invoices

   --------------------------------------------------------------------------------

 * OPTIONAL Dedicated support, help with development & integration into own
   projects, corporate environment

Choose this


OUR OPPORTUNITIES


 * API
   
   Access for developers on any subscription.


 * TELEGRAM BOT
   
   Big database right in your pocket.


 * INSTANT SEARCH
   
   Make a query and get results in a second.


 * BIG DATABASE
   
   You don't need to search for data all over the Internet, we already have
   everything.


 * NEW ENTRIES NOTIFICATION
   
   Find out vulnerable information before someone else does.


 * BULK CHECK
   
   Load a list of 100.000 lines and get result for each.


 * MANY SEARCH OPTIONS
   
   Search by e-mail, username, keyword, corporate domain name or password.


 * PROVIDING SERVICES FOR A LONG TIME
   
   Service has been protecting your data for 4 years.


 * TRUSTED BY THOUSANDS
   
   Service are used by many people and global companies.


USE CASES


PROTECTING YOURSELF

This is the main purpose of LeakCheck. Find out if your data has been
compromised as a result of any breach.


PREVENTING PASSWORD REUSE

According to the results of a survey conducted in 2018 by Google, 65% of users
on the Internet use the same passwords for most (or even all) their accounts.
With our corporate API you can check whether a password was previously used even
before user registered on your website.


RECOVERING OLD PASSWORDS

Sometimes we forget our credentials and want to get them back. In some cases our
service can figure this out.


USERS MONITORING

Get notified about compromised passwords of your users and force to change them
before something bad is happened.


BUSINESS MONITORING

When it comes to corporate security, a leaked password of at least one of the
employees may have tragic consequences for the entire company. We provide
several domain monitoring options at once - both manual in your account and
automatic with the API or our special solution.


CONTACTS

 * Discord Channel
   
   @LeakCheck

 * Support in Telegram
   
   @lc_cs

 * Email
   
   the@leakcheck.net

List of official domains: leakcheck.net, leakcheck.io, leakcheck.appspot.com

This site is protected by hCaptcha and its Privacy Policy and Terms of Service
apply.

© 2018-2022 LeakCheck Security Services, Ltd. All rights reserved. Services are
provided by registered company with number 12101959
2 Thomas More St, London, United Kingdom, E1W 1WY



SEARCH RESULTS

×
0 entries found from 0 known sources
Only sources are displayed. Register to see detailed information.
To remove your data, submit a request to removal@leakcheck.net

Source Last breach

Close

DATABASES

×
 * Databases
 * Updates


It's possible to get this table as JSON through API. Use &type=databases while
sending request.
This table provides a list of indexed leaks that appear as a source when you
make a search. Some databases may be missing here and display as "unknown" in
case we do not have the leak file. We collect data exclusively from public
sources.
Show 102550100 entries
Search:

E-mail addresses usernames Database Tags Breach date
148575640000webhost.com2015-0378078817655110123RF.com2020-021594775017.media2016-027477001xbet.com3071430396360icons.com2013-105047903DSISO.com2015-084277704m.net2015-113521804Metin.org1912090500px.com2017-11736946507k7k.com2011-01

Showing 1 to 10 of 784 entries
 * Previous
 * 1
 * 2
 * 3
 * 4
 * 5
 * …
 * 79
 * Next



TAGS

Unverified breach / Doesn't seem to be a real leak
Breach doesn't contain passwords
Compilation of various leaks as one breach

It's possible to get these updates as JSON through API. Use &type=updates while
sending request.

2022-09-30

ADDED NEW ENTRIES: 115.1K



5.4K emails, 6.3K usernames from GoGames.me update 6.8K emails, 6.8K usernames
from iMesh.com update 1.4K emails, 1.4K usernames from R2Games.com update 11K
emails, 10.7K usernames from Tunngle.net update 2.2K emails, 3.6K usernames from
8Tracks.com update 50.8K emails from NexusMods.com update 1.1K emails from
Aptoide.com update 812 emails from AnimeGame.me update 759 emails from
Heatgames.me update 804 emails from HiAPK.com update 2.6K emails from Disqus.com
update 310 emails from xSplit update 336 emails, 341 usernames from Nulled.io
update 498 emails, 504 usernames from forums.freegame2017.com update




2022-09-25

ADDED NEW ENTRIES: 3.1M



225 emails from Aptoide.com update 1.6K emails from AnimeGame.me update 16.9K
emails from Heatgames.me update 1.1K emails, 1.2K usernames from
forums.freegame2017.com update 2.5K emails, 2.8K usernames from Nulled.io update
228 emails from TechnicPack.net update 4.9K emails, 6K usernames from GoGames.me
update 325 emails from Alora.io update 22.2K emails from NexusMods.com update
15.8K emails, 15.1K usernames from Tunngle.net update 14.9K emails, 15.2K
usernames from R2Games.com update 40.8K emails, 41.1K usernames from iMesh.com
update 2.8M emails from Stealer Logs update 7.8K emails, 1.6K usernames from
HiAPK.com update




2022-09-23

ADDED NEW ENTRIES: 196.7K



124 emails from Hongfire.com update 7.8K emails, 8.1K usernames from R2Games.com
update 52.8K emails, 53.2K usernames from EyeEm.com update 1.6K emails from
AnimeGame.me update 777 emails from Heatgames.me update 27.5K emails, 27.4K
usernames from iMesh.com update 4K emails, 5.1K usernames from GoGames.me update
964 emails, 1K usernames from forums.freegame2017.com update 4.8K emails, 1K
usernames from HiAPK.com update




2022-09-20

ADDED NEW ENTRIES: 98.7K



3.4K emails, 3.4K usernames from StockX.com update 345 emails, 429 usernames
from Cfire.mail.ru update 2.6K emails, 2.5K usernames from BlankMediaGames.com
update 42.9K emails, 42.4K usernames from R2Games.com update 379 emails from
HiAPK.com update




2022-09-18

ADDED NEW ENTRIES: 88.6K



29.2K emails from AnimalJam.com update 473 emails, 460 usernames from
WiiHacks.com update 1.9K emails, 1.6K usernames from TGBUS.com update 549 emails
from Heatgames.me update 13.7K emails from Jobandtalent.com update 20.4K emails,
20.2K usernames from R2Games.com update




TOP 10 PASSWORDS

×
No stats for this database

Close
Close

LOGIN

×

LOG IN VIA SOCIAL NETWORK

 * 
   
 * 
 * 
 * 
 * 


Login Forgot password?
Close

REGISTER

×
Log in via social network
Agree with the Terms of Service

Register
Close

RESTORE

×

Restore
Close

SIGN IN VIA TELEGRAM

×
Auth

The desktop / mobile version of Telegram will be opened, you have to press START
and follow the instructions.

--------------------------------------------------------------------------------

OR

--------------------------------------------------------------------------------

send a command /start to our bot (@LeakCheckBot) manually
Close
FAQ
How does the private lookup function work?
Before sending a request, your client (browser) computes a SHA256 hash of your
mail, truncates it to 24 characters, then sends to the server.
It guarantees "secure and private" lookup: if we have an email, you will see the
results. If not - you can be sure that nothing new will be saved.
It's not possible to "dehash" a hash, you can only compare it with the initial
value.

How to check this?
See what exactly is being sent. Open developer panel (F12), go to Network
section then see the request body. 'check' parameter will contain only hash of
your mail.


This feature works for e-mails only.

What is a search by keyword?
It's an e-mail address search that checks for a user or 'keyword' in an e-mail
address.
e.g. If you do a keyword search for 'example' the response will be
'example@example.com:12345' and any other results with 'example' at the
beginning.
More over, you can add '@' to your query and get entries that explicitly contain
only 'example'.

How long does it take for my plan upgrade to become active?
Usually, the upgrade is done automatically and takes effect instantly. But, if
you purchased a plan using cryptocurrency, the payment processing can sometimes
take several hours to complete, usually sooner.

How many entries does your database contain and where did they come from?
We have one of the largest known databases with more than 7B leaked entries.
When hackers discover a vulnerability on a website, they exploit that
vulnerability to access private data stored by the website. They steal the
accessed data, decrypt it and publish on various platforms and forums. We
thoroughly search and monitor all such publications and add the findings to our
common list.

What's the difference between you and similar free services?
1. Free services display only the source of the leak. We provide a full list of
viewable breached passwords.
2. Free services generally only offer the option to lookup by e-mail. We offer
that option as well as 'search by keyword' and 'search by username' for more
robust or more specific results.
3. We react quickly to new leaks and promptly add them to our database. Maybe,
hackers already got your password. Don't find out about it too late.
4. Very accommodating conditions for developers. Our API is limited to 3
requests/second and your plan limits.

Why are the passwords in my search results hidden?
This is a limitation on free accounts. An upgraded plan is required to fully
access all of the breached data.

Why should I trust you?
We have been providing our services for 4 years and are officially registered in
Great Britain. That can be confirmed by the companies registry.

How to cancel my subscription?
You can cancel your subscription by accessing our billing portal. If you
purchased a plan with cryptocurrencies, it will end automatically with no
charges.

Still have questions?
Contact us.

E-Mail
Telegram (@lc_cs)

Close
Public API
You can get key and read detailed description of the API in the panel.
Public API - a simple and lightweight way to integrate LeakCheck into own
projects or corporate environment with minimum of work and money.

--------------------------------------------------------------------------------

Accepted data

Type Sample Notes E-mail example@example.com E-mail by hash
31c5543c1734d25c7206f5fd SHA256, truncated to 24 characters Username example
min. 3 characters

--------------------------------------------------------------------------------

How to use?

Request

https://leakcheck.net/api/public?key=YOUR_KEY&check=example@example.com

Response

{
    "success":true,
    "found":3,
    "sources":[
        {
            "name":"Evony.com",
            "date":"2016-07"
        },
        {
            "name":"I-Dressup.com",
            "date":"2016-08"
        },
        {
            "name":"Zynga.com",
            "date":"2019-09"
        }
    ]
}
			



--------------------------------------------------------------------------------

Price and conditions

• If API is used in commercial projects (or projects where you share results
with third parties) you have to add a link to LeakCheck (referral links can be
also used)

• Allowed RPS: 1, exceeding this limit will cause HTTP 429 error


Close
Terms of Service
Updated on 28 January, 2022

TERMS OF USE

1. General Terms and Provisions
1.1. Site - a website(s) available on the Internet at the addresses:
leakcheck.net, leakcheck.io;
1.2. User - an individual acting in personal capacity or as a representative of
a legal entity, visiting the Sites or using the Service both in full or their
individual functions, on an onerous or gratuitous basis;
1.3. Administration is the operator and / or owner of the Site, a legal entity
LeakCheck Security Services, Ltd. duly registered under the laws of the United
Kingdom. (No. 12101959) or his successor, as well as persons duly authorized to
represent interests on its behalf;
1.4. Telegram is a messaging service available through official applications for
Android and iOS, software for Windows, macOS and Linux operating systems and web
interfaces available at: https://telegram.org/dl/webz and
https://telegram.org/dl/webk;
1.5. Bot is an Administration’s application publicly available to users through
Telegram and managed using HTTPS requests to the Bot API provided by Telegram
Messengers Inc.;
1.6. Leak - an incident where data was inadvertently exposed in a computerized
system, due to insufficient access controls, security or other actions caused by
negligence or malintention of the third-parties.
1.7. Service - a Site and a Bot within the meaning of this Section, furnishing,
upon the User's request, information (data) from publicly available sources
about the Leaks that have occurred on third party web resources or services.
Service aggregates Leaks and helps people to assess whether their personal data
has been exposed and where.
1.8. Account - an account of the Site User, which is necessary to access the use
of the Service on an onerous basis and is created by him independently by
creating a username, password and specifying a valid email address on the Site
or using the Bot;
1.9. Terms of Use - a license agreement between the Administration and the User
for the use of the Service.
1.10. Plan - the license fee for using the Service, describing applicable terms,
settlement of the license fees and restrictions established by the
Administration.
1.11. These Terms of Use establish and govern:
• the relationship between the Users and the Administration;
• the rights and obligations of Users, as well as methods, restrictions and
prohibitions when using the Service and information obtained through it;
• the rights and obligations of the Administration as well as in relation to the
enforcement of the Terms of Use;
• financial considerations, in particular settlement of the license fees for
using the Service.
1.12. The Administration offers the User to use the Service on the following
terms. In accordance with the Terms of Use, the Administration grants the User
the right to use the Service solely for personal use on the basis of a
revocable, gratuitous or in consideration of a license fee, if the User opted
for a paid Plan, a non-exclusive, perpetual and worldwide license.
1.13. By using the Service or its individual functions, the User agrees to
comply with these Terms of Use, as well as other terms indicated in the Service
interface, in full and without any reservations or exclusions.
1.14. If the User disagrees with the content of these Terms of Use, both in full
and in part, the User is not entitled to use the Service and is obliged to
immediately stop using it.
1.15. The User agrees to comply with all applicable laws and regulations and
assumes liability for compliance with any applicable local laws when using the
Service. The User is solely liable to third parties for his actions related to
the use of the Service, including if such actions lead to a violation of the
rights and legitimate interests of third parties, as well as for compliance with
the law when using the Service.
1.16. Only the User who reached the age of legal capacity established by
applicable law has the right to independently create an Account and use the
Service. If the User has not reached the specified age, as well as in cases
provided for by applicable law, the use of the Service is allowed only with the
consent of parents or other legal representatives.
1.17. The Service provides, through its own search engine, access to a database
containing information obtained from open sources of information about common,
published facts of user data leaks or those that are in public domain. The Site
and Bot aggregate and index this information from publicly available information
sources.
1.18. By acceding to these Terms, the User is aware and agrees that the
Administration is not liable for the dissemination of information received
through the Service about the facts of user data leaks that occurred as a result
of actions or inaction of third parties.
1.19. The User is aware that the Administration does not have the authority,
contractual obligations or obligations arising by virtue of the law to delete or
in any other way restrict access to the information displayed in the search
results of the Site or in the Bot's response to the User's requests. The
Administration may erase the information displayed in search results of the
Services upon receipt of the relevant User’s request. Users seeking to erase
information from third-party web resources or services or to redress for damages
should apply directly to third parties with a relevant claim.
1.20. All currently existing functions of the Site or Bots, as well as any
improvements of them and / or the addition of new ones, is the subject of these
Terms of Use.

2. Disclaimer
2.1. The Administration continuously checks and updates the information
available through the Service. The Administration does not guarantee that some
information may not be outdated or irrelevant. For these reasons, the
information available through the Service is provided "as is", and the
Administration is not liable for the relevance, accuracy and / or completeness
of the information displayed, and does not assume any liability.
2.2. The Administration does not bear any liability for the compliance of the
Service with the goals or expectations of the User. The Administration does not
guarantee the uninterrupted and continuous operation of the Service. At its sole
discretion, the Administration may carry out technical or improvement work,
including regular maintenance work that may cause temporary full or partial
unavailability of the Services. For these reasons, access to the Services is
provided "as is" and "as available".
2.3. The Administration does not guarantee, and nothing in these Terms should be
considered as declarations or representations regarding the accuracy or quality
of the information provided, the possibility of its use for any other purpose
other than for personal purpose, household or non-commercial use.
2.4. The Administration retains the right to make modifications or additions to
the information displayed in the search results of the Site or in the Bot's
response to the User's request.
2.5. The User assumes all risks associated with the use of the Service and the
information obtained through it. In particular, the User is solely responsible
for the security and confidentiality of the Account and security measures chosen
by him. The User is solely responsible for all actions (as well as their
consequences) committed through or in connection with the use of the Service
under his Account. At the same time, all actions within or using the Service
under the User's Account are presumed to have been performed by the User
himself/herself, except for cases when the User has duly notified the
Administration of unauthorized access to the Service using his/her Account
and/or any violation of the confidentiality of his means of access to Account
(including email, password).

3. Amendments
3.1. The administration has the right to amend the Terms of Use without prior
notice to the User. The current version of these Terms of Use is available at
https://leakcheck.io. The new version of the Terms of Use, as well as any
modifications and additions regarding the Service as a whole, and the Site or
Bot separately, come into effect from the moment it is made publicly available
at the address indicated above in this paragraph, unless otherwise provided by
the new version of the Terms.
3.2. If the Administration has made any amendments to these Terms, with which
the User does not agree, he/she is obliged to stop using the Service. Otherwise,
by continuing to use the Service, the User accedes to the new version of the
Terms, that is, agrees with the amendments adopted by the new version of these
Terms of Use.

4. Privacy Policy
4.1. The Administration respects the right to privacy and protection of personal
data of all Users. These Terms of Use contain general provisions regarding the
processing of various user data. All collected and processed data about the User
are requisite to perform these Terms of Use and pursue the legitimate interest
of the Administration in the context of furnishing the User with access to the
Services on an onerous basis.
4.2. The Administration does not collect the data requested for leak check and
does not store them on its servers.
4.3. The User has the right to use an alternative authorization method chosen by
him from the options offered in the authorization form, including using the
accounts of third parties services or web resources. By choosing an alternative
authorization method, the User agrees that Administration may receive data about
the User from third party information resources. The User is obliged to
independently ensure the security of access to a third-party resource and
control confidentiality of his/her credentials.

5. Restrictions and limitations
5.1. All Accounts / Plans are intended solely for the User and his/her personal,
non-commercial use and are not allowed to be leased, subleased, sold, assigned
or otherwise transferred to third parties.
5.2. The User is solely responsible for applying necessary security measures for
the Account and the confidentiality of data required for authorization and
authentication on the Site.
5.3. The User has no right to use the Service to carry out activities:
• recognized as illegal pursuant to effective and applicable law;
• threatening any violation of the rights and legitimate interests of other
individuals, especially those causing harm to their life, health and property;
5.4. It is prohibited to use the Service to violate the security or integrity of
any technical network, computer or communication system, software or computing
device, including by:
• Use of malicious software or any other means that can damage, disrupt or gain
access to any computer system, program or data, including any viruses, malware,
spyware, adware, in particular Trojan or worms.
• Unauthorized access, in particular by using the Account data of another
individual; without his explicit permission, including attempts to search,
research or test the vulnerabilities of the Account or violation of any security
measures used by the User of the Account in order to obtain such access.
5.5. In addition to the restrictions mentioned above, it is prohibited to use
the Service for the purpose of:
• disclosure of personal data, private information and other types of
information protected by law about third parties;
• collecting or attempting to collect third party personal data or private
information without their knowledge or consent;
• interfering with the operation of the Service or obstructing other Users using
the Service;
• violation of intellectual property or other proprietary rights;
• transferring your account, API key or other related data to third parties;
• providing (publishing) information obtained through the Service on third-party
forums, web resources, pages on social networks, in chat rooms of messaging
services, or through its own or third-party APIs;
• selling, leasing, providing in any other way for a fee access to the Services
or ensuring the receipt or use of the Services by third parties;
• facilitating, assisting, organizing or instigating any action aimed at
violating the restrictions and prohibitions imposed by these Terms;
• otherwise violate the norms of the applicable law, as well as the norms of
international law.
5.6. The API has the following restrictions on use:
• The API is for personal, non-commercial use only and is limited to 3 (three)
requests per second;
• The bulk check feature is limited to 100,000 lines per file and 500,000 lines
per day.
5.7. The content and structure of the Service are copyrighted. The reproduction
of such content or structure, in particular the use of texts, excerpts of text,
illustrations or design, requires express prior permission.
5.8. The Administration retains the right to unilaterally determine the severity
of each violation and immediately take the following actions, including but not
limited to: suspension or termination of access to the Service with or without
notice in case of any violation of these Terms of Use. Any violations may also
result in the immediate suspension or termination of the Account, as well as the
subsequent deletion of the Account.
5.9. Ignoring notifications or messages from the Administration requiring a
response from the User may lead to the suspension or termination of the access
to the Service.
5.10. Deleted Accounts cannot be reactivated or restored.
5.11. Nothing contained in this Policy shall be construed as limiting the
actions of the Administration or its choice of remedies against any prohibited
actions.
5.12. The Administration may, at its sole discretion, deny access to the Service
by any User and change the criteria for the eligibility of the Users at any
time, including but not limited to if the User does not comply with these Terms
of Use.

6. Plans
6.1. The Service may, at the discretion of the Administration, in a limited
manner provide information about Leaks free of charge.
6.2. The right to use the Service free of charge may be limited, suspended or
terminated at any time unilaterally without prior notice.
6.3. The User has the right to use the Service on an onerous basis in accordance
with the Plans established by the Administration. To exercise such right, the
User needs:
1. create an Account (register) by entering his/her login (a unique symbol
designation for the User's Account), email address and password to access the
Account, or log in using accounts created on third party resources choosing from
the options offered in the authorization form;
2. perform implicit actions, namely, select the Plan and confirm your choice by
clicking the "Select Plan" button or by sending a corresponding request through
the Bot;
3. pay the Plan by choosing the payment method from the options offered in the
form of payment of the Plans on the Sites and confirm your agreement with the
payment terms.
6.5. The Administration retains the right to suspend or restrict the User's
access to the Service, including at any time at its sole discretion to delete
the User's Account data if the User has violated the provisions of section 5 of
these Terms of Use.
6.6. The Administration retains the right to establish any rules and
restrictions (technical, legal, organizational or other) on the use of the
Service as a whole, or any of its functions, can change them at its own
discretion, without prior notice to the Users. In particular, the Administration
has the right to prohibit the use of certain logins, as well as establish
requirements for the login and password (length, allowed characters, case,
etc.). These rules and restrictions may vary across different categories of
Users.
6.7. The functions of the Service available under various Plans, their volume or
limitations, may be changed unilaterally at the discretion of the Administration
without any mandatory prior notice.
6.8. The actual amounts of payments for the Plans are indicated on the Site or
can be provided by the Bot at the request of the User. The Administration sets
the following Plans:
• Basic Plan - allows Users to perform a limited number of requests (15 requests
per day) search for information about the facts of user data leak only by e-mail
address. Daily payment.
• Monthly Plan - allows Users to perform a limited number of requests to search
for information about the facts of user data leak by e-mail address, phone
numbers (200 requests per day) and keywords (15 requests per day). Payment is
monthly.
• Lifetime Plan - allows Users to perform a limited number of requests search
for information about the facts of user data leak according to the same criteria
as Monthly Plan, but with the following restrictions on the number of requests:
by email address, phone numbers (400 requests per day) and key words (30 queries
per day). One-off payment.
• Enterprise - allows Users to perform unlimited search for information about
the facts of user data leakage by e-mail address, phone numbers, keywords,
password and domain names.
6.9. In order to comply with these Terms of Use with the User, the
Administration has the right to instruct a third-party payment provider to
collect and process payments from Users on its behalf and in its interests.
6.10. The term for granting Users with access to the Service starts upon receipt
of the payment until the expiration of the period specified in the description
of the Plan. The User agrees that he/she may also be invoiced up to his current
balance at any time in order to verify the accuracy of his Account information.
The Administration retains the right to deny access to the Service, including
limiting the extent of the Service's functions, at any time at its sole
discretion, in case of non-payment, delay in payment or inability to charge
money from the User when invoicing.
6.11. Access to the Plans provided and paid for in the form of a subscription.
The User is considered aware that he/she will be billed on a regular basis, and
the fee will be charged automatically using the payment system of the
Administration or payment systems of third-party providers using the payment
method chosen by the User when invoicing.
6.12. If the Plan does not provide for subscription-based settlement of the
licence fee, then after the receipt of payment, access to the Services is
provided in the amount and for the period specified in the description of the
Plan selected by the User. To extend the period of access to the Services, the
User shall, after the expiration of the initial period, make a payment in the
amount specified in the description of the Plan of his choice. Access to the
Services is granted upon the receipt of payment for the term estimated in days,
months or years and specified in the effective description of the Plan selected
by the User.

7. Refund policy
7.1. Since the use of the Services and access to them is intangible and
irrevocable in nature, the Administration does not make refunds after the
receipt of payment for Plans.
7.2. Refunds are not made for unexpired period of access or unspent number of
Leaks requests or, when the User changes the Plan.
7.3. If the User changes the Plan or refuses to use the Services further, the
provision of access to the previously paid Plan continues until the expiration
of the pre-paid billing period.

--------------------------------------------------------------------------------

PRIVACY POLICY

1. General Provisions
1.1. This Policy covers how User data is collected and used. The Administration
does not collect personal data of Users through the Service, unless otherwise is
expressly stated in this Privacy Policy.
1.2. The purpose of this Policy is to ensure adequate protection of information
about Users, including their personal data, from unauthorized access and
disclosure.
1.3. The collection, storage, distribution and protection of information about
Users are governed by this Policy, other official documents of the
Administration and the effective legislation of the United Kingdom.
1.4. The Administration has the right to make changes to this Policy. When
making changes to the Policy, the Administration notifies the Users about this
by posting a new version of the Policy at https://leakcheck.io.
1.5. By using the Service, the User agrees with the terms of this Policy and the
processing of personal data in the manner prescribed by this Policy, as well as
with the processing of personal data by third parties acting on behalf of the
Administration in its legitimate interests.
1.6. If the User disagrees with the terms of this Policy, the User must
immediately stop using the Service.
1.7. In addition to the definitions and notions established by the Terms of Use,
and in the same sense used in this Privacy Policy, the following are
additionally established:
1.7.1 Registered User - the User who created the Account;
1.7.2 User data - technical data, as well as Account data necessary for the User
to use the Services on an onerous basis and provide him with access to them, and
do not contain information that allows the identification of an individual;
1.7.3 Payment data - personal data of the Registered User, necessary to provide
access and use of the Service on a reimbursable basis.

2. Collection, storage and use of data
2.1. User data collected from each User includes:
2.1.1. When authorizing on the Site:
• username, email address and encrypted password (when creating an Account) or a
public OpenID identifier containing only an email address and ID (when using
alternative means of authorization);
• Date and time of registration and last access to the Service;
• Information about the transition from another resource;
• Site Language;
• Google Analytics data.
2.1.2. When paying for the Plans, the following Payment Data is collected:
• the email address specified by the User during registration;
• First name, last name;
• billing address.
2.1.3. When sending requests or contacting the Administration by e-mail:
• E-mail address;
• name;
• other information included in the text of the request or appeal.
2.2. The above information received from the User is necessary to perform:
2.2.1. The Terms of Use between the Administration and the User, including but
not limited to:
• sending informational messages related to the performance of the Terms of Use
and this Policy (about changes in the specified documents, the amount of
payments for the Plans, about the events of the User's authorization in the
Account, responses to the User's requests, etc.);
• providing access to the Services on an onerous basis and making payments for
the Plans to obtain such access, including using the payment systems of a
third-party provider;
• ensuring that the User complies with Section 5 of the Terms of Use.
2.2.2. purposes arising from the legitimate interests of the Administration:
• transfer data to third parties on behalf of the Administration for processing
on its behalf and providing services on our behalf or, partner organizations
that provide support and help improve the operation of the Services;
• respond to inquiries and requests from Users, their legal representatives and
government agencies;
• provide technical support to Users when they use the Services.
2.3. The Administration does not collect or process data of bank cards or
accounts of Users. Information about bank cards is collected by the payment
system of a third-party service provider specified in clause 4.3. of this
Policy.
2.4. To confirm the payment of Plans, the Administration has access through the
payment system of a third-party service provider to information about the
payment status that does not contain bank card data.
2.5. The collected data can be changed at the request of the User if they are
inaccurate or irrelevant after his identification.
2.6. The Administration protects the data provided by the User with reasonable
and sufficient security measures against loss or theft, as well as against
unauthorized access, disclosure, copying, use or modification.
2.7. When searching for leaks without creating an Account by e-mail address
entered by the User in the search form of the Site or in the Bot's request, the
specified data is not stored anywhere, their backup copies are not created, etc.
Before sending a request on the side of the User's web browser, the SHA256 hash
from the entered email address is calculated, truncated to 24 characters, and
after that the calculated hash is sent to the server. When creating an Account,
the function of checking leaks by email address by creating a SHA256 hash from
the entered email address is available when the User selects the relevant option
in the Account or sends a relevant request to the Bot.
2.8. The Administration does not store on its servers or those ensuring the
operation of the Service, the data specified in the paragraph above entered in
the verification form on the Sites or in the Bot's request text. When the User
uses the Service, the Administration does not collect or access the requested
email addresses, phone numbers, keywords, passwords and domain names requested
for verification.
2.9. User and Payment data are stored and processed until the processing goals
are achieved, that is, until the User stops using the Service and requests the
deletion of User data. User and Payment data may also be erased in connection
with the termination of the Account on the grounds provided for in clause 5.16
of the Terms of Use. Some personal data may be processed after the termination
of the use of the Service, to the extent required by applicable law.
2.10. User and Payment data may be disclosed by virtue of the law or at the
inquiries of law enforcement agencies or at the court orders, including to
protect the rights of third parties during legal proceedings, administrative
procedures, operational search or investigative measures; to protect the rights
and interests of other Users; to protect the life and vital interests of other
individuals; to ensure the proper level of security of the Service and User
data; as well as in order to protect the intellectual property rights, as well
as other rights and legitimate interests of the Administration.
2.11. The operator takes technical, organizational and legal measures in order
to ensure the protection of the User's personal data from unauthorized or
accidental access to them, destruction, modification, blocking, copying,
distribution, as well as from other illegal actions.
2.12. The storage of information about Users is carried out in secure databases,
access to which is limited to third parties.
2.13. The Administration does not sell, does not transfer any data about Users
for a consideration and does not provide access to persons not affiliated with
or not in contractual relations with the Administration.

3. Right to access, erasure and restriction of data processing
3.1. Whereas the sources of the collection of information about leaks available
using the Service do not allow to determine, directly or indirectly, an
individual (article 4 (1) General Data Protection Regulation of the European
Union 2016/679), the Administration cannot provide information about the set of
data in accordance with Art. 15 of the General Data Protection Regulation of the
European Union.
3.2. Registered Users have the right to withdraw their consent to receive
informational messages, notifications about authorization and authentication
events on the Sites and about the expiration of the period paid for the Plan,
sent to their e-mail address specified by them when creating an Account or via
Bot messages. To withdraw consent to receive e-mail or the Bot messages, the
User shall perform actions confirming the refusal to receive such messages.
3.3. For e-mail messages, such actions will be considered:
• a change in the Account settings, or;
• sending a relevant request to the Administration through email, or;
• referring to a special link with anchor text “unsubscribe” or any similar one
in any of the informational messages, or;
• any other actions expressly stated in the text of informational email
messages;
3.3.1. For messages from the Bot, such actions will be considered sending a
corresponding request to the Bot.
3.4. Registered Users have the right to demand from the Administration
rectification of his personal data, restriction of its processing or erasure in
the event, including if the personal data is incomplete, outdated, inaccurate,
unlawfully obtained or no longer deemed necessary for the initially stated
purpose of processing, as well as take measures provided for by law to protect
their rights.
3.5. Erasure (deletion) and processing restriction of all collected User data is
carried out within 24 hours upon the receipt of the relevant request. A request
for erasure (deletion) of User data necessary to perform the Terms of Use
amounts to refusal to further use of the Service on an onerous basis and perform
the Terms of Use.
3.6. Registered Users have the right to receive information regarding the
processing of their personal data, including:
• confirmation of the fact of processing personal data by the Administration;
• legal basis and purposes of personal data processing;
• the purposes and methods of processing personal data used by the
Administration;
• the identity, contact details of the Administration, information about
individuals or entities (except for employees of the Administration) who have
access to or receive personal data or to whom personal data may be disclosed on
the basis of an agreement with the Administration or on the basis of the law;
• the processed personal data relating to the User, the source of their receipt,
unless another procedure for submitting such data is provided for by federal
law;
• term or condition of processing personal data, including term or condition of
their storage;
• the procedure for the User to exercise the rights provided for by applicable
law;
• information about the carried out or intended cross-border data transfer;
• designation or first name, surname, patronymic or middle name (if any) and
address of the person who processes personal data on behalf of the
Administration, if the processing is entrusted or will be entrusted to such a
person;
• other information provided by applicable law.
3.7. The User is entitled to address any personal data protection issues to the
Data Protection Authority of his residence.

4. Third party service providers
4.1. The Administration transfers User data to some of the third-party service
providers in accordance with the terms of agreements restricting the use and the
processing of the User data. In some cases, these service providers may need
access to User data in order to provide services related to the Administration's
performance of its obligations under the Terms of Use and this Policy. Such
service providers are allowed to use User data only to process data or provide
services on behalf of the Administration within the framework of contractual
obligations to protect the security and confidentiality of the processed User
data. In some cases, these service providers may disclose User Data to
governmental authorities due to the requirements of applicable law.
4.2. The Sites use hCaptcha from Intuition Machines, Inc. (350 Alabama St, San
Francisco, CA 94110 USA) to prevent automatic requests to the Sites. hCaptcha is
a service that protects web pages from spam and request abuse. The
Administration uses hCaptcha to protect input forms. When using hCaptcha,
Intuition Machines, Inc. uses data to determine if the User is human. What data
Intuition Machines, Inc. collects and for what they are used, you can read here
and its Terms of Use here.
4.3. For processing of payments for the Plans, a third-party provider’s payment
system is used - Stripe, Inc. The third-party provider, acting in the interests
of the Administration, collects and processes Payment data, as well as bank card
data and other financial data necessary to execute and process license fees for
the right to use the Service. When paying for Plans using cards of Mastercard or
Visa payment systems, the Administration transfers to Stripe Inc. email address
and the User transfers Payment Data to Stripe Inc. and Administration. The
Administration does not receive and does not have access to card or bank data,
as well as to the data that Stripe, Inc. uses to execute and process payments,
except for the data specified in clause 2.3 of this Policy. You can read Stripe,
Inc. Privacy Policy here.

5. Links to web resources and services of third parties
The Services may contain or provide the ability to follow links to unrelated
third-party web resources and services. These web resources and services may
operate independently of the Administration and / or may have their own terms of
use, policies and privacy notices, which the Administration strongly recommends
to review. After referring to such web resources or services, the Administration
no longer has any control on the processing of any data that is transferred to
the unrelated third party, since the behavior of such parties is beyond its
control. Therefore, the Administration does not assume any responsibility for
the processing of any such data by unrelated third parties. In addition, the
Administration is not responsible for the information posted and / or damage
caused as a result of actions on any web resources and services that can be
accessed by referring to the link available through the Services or using
information obtained during the use of the Services and that are not owned or
controlled by the Administration or are not bound by this Policy.

--------------------------------------------------------------------------------

CONTACT DETAILS

If you would like to contact us with any question related to Terms of Use or
Privacy Policy, you can send a request to Leakcheck Security Services Ltd., 2
Thomas More St, London, UK, E1W 1WY.

You can also send an email to the@leakcheck.net

Close