leakcheck.net
Open in
urlscan Pro
2a06:98c1:3121::c
Public Scan
Submitted URL: http://leakcheck.net/
Effective URL: https://leakcheck.net/
Submission: On October 01 via manual from DE — Scanned from NL
Effective URL: https://leakcheck.net/
Submission: On October 01 via manual from DE — Scanned from NL
Form analysis
4 forms found in the DOMName: search — POST
<form name="search" class="d-flex justify-content-center text-center" method="POST">
<div class="col col-md-7" style="margin-bottom:2.5em;">
<div class="input-group mb-3">
<input type="text" name="data" class="form-control" placeholder="E-mail or username" aria-label="E-mail or username" aria-describedby="button-search" required="">
<button class="btn btn-outline-secondary" type="submit" id="button-search">Search</button>
</div>
<span style="color:white;"><i class="fas fa-check-circle" style="color: #3ab8ff"></i> We do not keep logs of your searches. Data transferred through TLS protocol and cannot be intercepted.</span>
</div>
</form>
<form id="login" class="login-form">
<input type="text" name="username" class="default-input" placeholder="Username" required="">
<input type="password" name="password" class="default-input" placeholder="Password" required="">
<input type="hidden" name="q" value="9821a550">
<!-- <input type="hidden" name="t" value=""> -->
<div class="h-captcha" data-theme="dark" data-callback="onSubmitlogin" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='09r1ecbj6ne']" style="display: none;"><iframe
src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&id=09r1ecbj6ne&host=leakcheck.net&sentry=true&reportapi=https%3A%2F%2Faccounts.hcaptcha.com&recaptchacompat=true&custom=false&hl=en&tplinks=on&sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&theme=dark&size=invisible"
title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="09r1ecbj6ne" data-hcaptcha-response="" style="display: none;"></iframe><textarea
id="g-recaptcha-response-09r1ecbj6ne" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-09r1ecbj6ne" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
class="h-captcha btn btn-success" data-callback="onSubmitlogin" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="09r1ecbj6ne"><span>Login</span></button>
<script>
function onSubmitlogin() {
document.getElementById("login").submit();
}
</script>
<button class="restore-link" data-dismiss="modal" data-toggle="modal" data-target="#restoreModal">Forgot password?</button>
</form>
<form id="register" class="login-form">
<input type="text" name="username" class="default-input" placeholder="Username" required="">
<input type="email" name="email" class="default-input" placeholder="Email" required="">
<input type="password" name="password" class="default-input" placeholder="Password" required="">
<input type="password" name="repeat" class="default-input" placeholder="Repeat password" required="">
<input type="checkbox" id="terms-lb" required="">
<label for="terms-lb">Agree with the Terms of Service</label>
<div class="h-captcha" data-theme="dark" data-callback="onSubmitregister" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='13hsn45bgk4c']" style="display: none;"><iframe
src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&id=13hsn45bgk4c&host=leakcheck.net&sentry=true&reportapi=https%3A%2F%2Faccounts.hcaptcha.com&recaptchacompat=true&custom=false&hl=en&tplinks=on&sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&theme=dark&size=invisible"
title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="13hsn45bgk4c" data-hcaptcha-response="" style="display: none;"></iframe><textarea
id="g-recaptcha-response-13hsn45bgk4c" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-13hsn45bgk4c" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
class="h-captcha btn btn-success" data-callback="onSubmitregister" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="13hsn45bgk4c"><span>Register</span></button>
<script>
function onSubmitregister() {
document.getElementById("register").submit();
}
</script>
</form>
<form id="restore" class="login-form">
<input type="text" name="email" class="default-input" placeholder="E-mail or Username" required="">
<div class="h-captcha" data-theme="dark" data-callback="onSubmitrestore" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-source-id="button[data-hcaptcha-widget-id='2gq7ricl839g']" style="display: none;"><iframe
src="https://newassets.hcaptcha.com/captcha/v1/1f7dc62/static/hcaptcha.html#frame=checkbox&id=2gq7ricl839g&host=leakcheck.net&sentry=true&reportapi=https%3A%2F%2Faccounts.hcaptcha.com&recaptchacompat=true&custom=false&hl=en&tplinks=on&sitekey=2c9fea50-9ec8-4067-8d5c-01e2f56d020b&theme=dark&size=invisible"
title="widget containing checkbox for hCaptcha security challenge" tabindex="0" frameborder="0" scrolling="no" aria-hidden="true" data-hcaptcha-widget-id="2gq7ricl839g" data-hcaptcha-response="" style="display: none;"></iframe><textarea
id="g-recaptcha-response-2gq7ricl839g" name="g-recaptcha-response" style="display: none;"></textarea><textarea id="h-captcha-response-2gq7ricl839g" name="h-captcha-response" style="display: none;"></textarea></div><button data-theme="dark"
class="h-captcha btn btn-primary" data-callback="onSubmitrestore" data-sitekey="2c9fea50-9ec8-4067-8d5c-01e2f56d020b" data-hcaptcha-widget-id="2gq7ricl839g"><span>Restore</span></button>
<script>
function onSubmitrestore() {
document.getElementById("restore").submit();
}
</script>
</form>
Text Content
LEAKCHECK * Home * Plans * Features * Databases * API * FAQ * Terms of Service Русский English SIGN UP FOR FREE AND MAKE SURE YOUR CREDENTIALS HAVEN'T BEEN COMPROMISED PROTECTING THE DIGITAL IDENTITY OF PEOPLE AND COMPANIES FOR 4 YEARS. Search We do not keep logs of your searches. Data transferred through TLS protocol and cannot be intercepted. Register Sign in PLANS BASIC PLAN 2.99$ / DAY * 15 e-mail lookups Choose this MONTHLY PLAN 9.99$ / MO * 200 e-mails, usernames / day -------------------------------------------------------------------------------- * 15 keywords / day Choose this Recommended LIFETIME PLAN 24.99$ / LIFETIME * 400 e-mails, usernames / day -------------------------------------------------------------------------------- * 30 keywords / day Choose this Best Plan ENTERPRISE FROM 100$ / EVERY 3 MONTHS * any lookups -------------------------------------------------------------------------------- * Reverse search by password and corporate domain -------------------------------------------------------------------------------- * Bulk check -------------------------------------------------------------------------------- -------------------------------------------------------------------------------- * OPTIONAL Accept recurring payments, provide invoices -------------------------------------------------------------------------------- * OPTIONAL Dedicated support, help with development & integration into own projects, corporate environment Choose this OUR OPPORTUNITIES * API Access for developers on any subscription. * TELEGRAM BOT Big database right in your pocket. * INSTANT SEARCH Make a query and get results in a second. * BIG DATABASE You don't need to search for data all over the Internet, we already have everything. * NEW ENTRIES NOTIFICATION Find out vulnerable information before someone else does. * BULK CHECK Load a list of 100.000 lines and get result for each. * MANY SEARCH OPTIONS Search by e-mail, username, keyword, corporate domain name or password. * PROVIDING SERVICES FOR A LONG TIME Service has been protecting your data for 4 years. * TRUSTED BY THOUSANDS Service are used by many people and global companies. USE CASES PROTECTING YOURSELF This is the main purpose of LeakCheck. Find out if your data has been compromised as a result of any breach. PREVENTING PASSWORD REUSE According to the results of a survey conducted in 2018 by Google, 65% of users on the Internet use the same passwords for most (or even all) their accounts. With our corporate API you can check whether a password was previously used even before user registered on your website. RECOVERING OLD PASSWORDS Sometimes we forget our credentials and want to get them back. In some cases our service can figure this out. USERS MONITORING Get notified about compromised passwords of your users and force to change them before something bad is happened. BUSINESS MONITORING When it comes to corporate security, a leaked password of at least one of the employees may have tragic consequences for the entire company. We provide several domain monitoring options at once - both manual in your account and automatic with the API or our special solution. CONTACTS * Discord Channel @LeakCheck * Support in Telegram @lc_cs * Email the@leakcheck.net List of official domains: leakcheck.net, leakcheck.io, leakcheck.appspot.com This site is protected by hCaptcha and its Privacy Policy and Terms of Service apply. © 2018-2022 LeakCheck Security Services, Ltd. All rights reserved. Services are provided by registered company with number 12101959 2 Thomas More St, London, United Kingdom, E1W 1WY SEARCH RESULTS × 0 entries found from 0 known sources Only sources are displayed. Register to see detailed information. To remove your data, submit a request to removal@leakcheck.net Source Last breach Close DATABASES × * Databases * Updates It's possible to get this table as JSON through API. Use &type=databases while sending request. This table provides a list of indexed leaks that appear as a source when you make a search. Some databases may be missing here and display as "unknown" in case we do not have the leak file. We collect data exclusively from public sources. Show 102550100 entries Search: E-mail addresses usernames Database Tags Breach date 148575640000webhost.com2015-0378078817655110123RF.com2020-021594775017.media2016-027477001xbet.com3071430396360icons.com2013-105047903DSISO.com2015-084277704m.net2015-113521804Metin.org1912090500px.com2017-11736946507k7k.com2011-01 Showing 1 to 10 of 784 entries * Previous * 1 * 2 * 3 * 4 * 5 * … * 79 * Next TAGS Unverified breach / Doesn't seem to be a real leak Breach doesn't contain passwords Compilation of various leaks as one breach It's possible to get these updates as JSON through API. Use &type=updates while sending request. 2022-09-30 ADDED NEW ENTRIES: 115.1K 5.4K emails, 6.3K usernames from GoGames.me update 6.8K emails, 6.8K usernames from iMesh.com update 1.4K emails, 1.4K usernames from R2Games.com update 11K emails, 10.7K usernames from Tunngle.net update 2.2K emails, 3.6K usernames from 8Tracks.com update 50.8K emails from NexusMods.com update 1.1K emails from Aptoide.com update 812 emails from AnimeGame.me update 759 emails from Heatgames.me update 804 emails from HiAPK.com update 2.6K emails from Disqus.com update 310 emails from xSplit update 336 emails, 341 usernames from Nulled.io update 498 emails, 504 usernames from forums.freegame2017.com update 2022-09-25 ADDED NEW ENTRIES: 3.1M 225 emails from Aptoide.com update 1.6K emails from AnimeGame.me update 16.9K emails from Heatgames.me update 1.1K emails, 1.2K usernames from forums.freegame2017.com update 2.5K emails, 2.8K usernames from Nulled.io update 228 emails from TechnicPack.net update 4.9K emails, 6K usernames from GoGames.me update 325 emails from Alora.io update 22.2K emails from NexusMods.com update 15.8K emails, 15.1K usernames from Tunngle.net update 14.9K emails, 15.2K usernames from R2Games.com update 40.8K emails, 41.1K usernames from iMesh.com update 2.8M emails from Stealer Logs update 7.8K emails, 1.6K usernames from HiAPK.com update 2022-09-23 ADDED NEW ENTRIES: 196.7K 124 emails from Hongfire.com update 7.8K emails, 8.1K usernames from R2Games.com update 52.8K emails, 53.2K usernames from EyeEm.com update 1.6K emails from AnimeGame.me update 777 emails from Heatgames.me update 27.5K emails, 27.4K usernames from iMesh.com update 4K emails, 5.1K usernames from GoGames.me update 964 emails, 1K usernames from forums.freegame2017.com update 4.8K emails, 1K usernames from HiAPK.com update 2022-09-20 ADDED NEW ENTRIES: 98.7K 3.4K emails, 3.4K usernames from StockX.com update 345 emails, 429 usernames from Cfire.mail.ru update 2.6K emails, 2.5K usernames from BlankMediaGames.com update 42.9K emails, 42.4K usernames from R2Games.com update 379 emails from HiAPK.com update 2022-09-18 ADDED NEW ENTRIES: 88.6K 29.2K emails from AnimalJam.com update 473 emails, 460 usernames from WiiHacks.com update 1.9K emails, 1.6K usernames from TGBUS.com update 549 emails from Heatgames.me update 13.7K emails from Jobandtalent.com update 20.4K emails, 20.2K usernames from R2Games.com update TOP 10 PASSWORDS × No stats for this database Close Close LOGIN × LOG IN VIA SOCIAL NETWORK * * * * * Login Forgot password? Close REGISTER × Log in via social network Agree with the Terms of Service Register Close RESTORE × Restore Close SIGN IN VIA TELEGRAM × Auth The desktop / mobile version of Telegram will be opened, you have to press START and follow the instructions. -------------------------------------------------------------------------------- OR -------------------------------------------------------------------------------- send a command /start to our bot (@LeakCheckBot) manually Close FAQ How does the private lookup function work? Before sending a request, your client (browser) computes a SHA256 hash of your mail, truncates it to 24 characters, then sends to the server. It guarantees "secure and private" lookup: if we have an email, you will see the results. If not - you can be sure that nothing new will be saved. It's not possible to "dehash" a hash, you can only compare it with the initial value. How to check this? See what exactly is being sent. Open developer panel (F12), go to Network section then see the request body. 'check' parameter will contain only hash of your mail. This feature works for e-mails only. What is a search by keyword? It's an e-mail address search that checks for a user or 'keyword' in an e-mail address. e.g. If you do a keyword search for 'example' the response will be 'example@example.com:12345' and any other results with 'example' at the beginning. More over, you can add '@' to your query and get entries that explicitly contain only 'example'. How long does it take for my plan upgrade to become active? Usually, the upgrade is done automatically and takes effect instantly. But, if you purchased a plan using cryptocurrency, the payment processing can sometimes take several hours to complete, usually sooner. How many entries does your database contain and where did they come from? We have one of the largest known databases with more than 7B leaked entries. When hackers discover a vulnerability on a website, they exploit that vulnerability to access private data stored by the website. They steal the accessed data, decrypt it and publish on various platforms and forums. We thoroughly search and monitor all such publications and add the findings to our common list. What's the difference between you and similar free services? 1. Free services display only the source of the leak. We provide a full list of viewable breached passwords. 2. Free services generally only offer the option to lookup by e-mail. We offer that option as well as 'search by keyword' and 'search by username' for more robust or more specific results. 3. We react quickly to new leaks and promptly add them to our database. Maybe, hackers already got your password. Don't find out about it too late. 4. Very accommodating conditions for developers. Our API is limited to 3 requests/second and your plan limits. Why are the passwords in my search results hidden? This is a limitation on free accounts. An upgraded plan is required to fully access all of the breached data. Why should I trust you? We have been providing our services for 4 years and are officially registered in Great Britain. That can be confirmed by the companies registry. How to cancel my subscription? You can cancel your subscription by accessing our billing portal. If you purchased a plan with cryptocurrencies, it will end automatically with no charges. Still have questions? Contact us. E-Mail Telegram (@lc_cs) Close Public API You can get key and read detailed description of the API in the panel. Public API - a simple and lightweight way to integrate LeakCheck into own projects or corporate environment with minimum of work and money. -------------------------------------------------------------------------------- Accepted data Type Sample Notes E-mail example@example.com E-mail by hash 31c5543c1734d25c7206f5fd SHA256, truncated to 24 characters Username example min. 3 characters -------------------------------------------------------------------------------- How to use? Request https://leakcheck.net/api/public?key=YOUR_KEY&check=example@example.com Response { "success":true, "found":3, "sources":[ { "name":"Evony.com", "date":"2016-07" }, { "name":"I-Dressup.com", "date":"2016-08" }, { "name":"Zynga.com", "date":"2019-09" } ] } -------------------------------------------------------------------------------- Price and conditions • If API is used in commercial projects (or projects where you share results with third parties) you have to add a link to LeakCheck (referral links can be also used) • Allowed RPS: 1, exceeding this limit will cause HTTP 429 error Close Terms of Service Updated on 28 January, 2022 TERMS OF USE 1. General Terms and Provisions 1.1. Site - a website(s) available on the Internet at the addresses: leakcheck.net, leakcheck.io; 1.2. User - an individual acting in personal capacity or as a representative of a legal entity, visiting the Sites or using the Service both in full or their individual functions, on an onerous or gratuitous basis; 1.3. Administration is the operator and / or owner of the Site, a legal entity LeakCheck Security Services, Ltd. duly registered under the laws of the United Kingdom. (No. 12101959) or his successor, as well as persons duly authorized to represent interests on its behalf; 1.4. Telegram is a messaging service available through official applications for Android and iOS, software for Windows, macOS and Linux operating systems and web interfaces available at: https://telegram.org/dl/webz and https://telegram.org/dl/webk; 1.5. Bot is an Administration’s application publicly available to users through Telegram and managed using HTTPS requests to the Bot API provided by Telegram Messengers Inc.; 1.6. Leak - an incident where data was inadvertently exposed in a computerized system, due to insufficient access controls, security or other actions caused by negligence or malintention of the third-parties. 1.7. Service - a Site and a Bot within the meaning of this Section, furnishing, upon the User's request, information (data) from publicly available sources about the Leaks that have occurred on third party web resources or services. Service aggregates Leaks and helps people to assess whether their personal data has been exposed and where. 1.8. Account - an account of the Site User, which is necessary to access the use of the Service on an onerous basis and is created by him independently by creating a username, password and specifying a valid email address on the Site or using the Bot; 1.9. Terms of Use - a license agreement between the Administration and the User for the use of the Service. 1.10. Plan - the license fee for using the Service, describing applicable terms, settlement of the license fees and restrictions established by the Administration. 1.11. These Terms of Use establish and govern: • the relationship between the Users and the Administration; • the rights and obligations of Users, as well as methods, restrictions and prohibitions when using the Service and information obtained through it; • the rights and obligations of the Administration as well as in relation to the enforcement of the Terms of Use; • financial considerations, in particular settlement of the license fees for using the Service. 1.12. The Administration offers the User to use the Service on the following terms. In accordance with the Terms of Use, the Administration grants the User the right to use the Service solely for personal use on the basis of a revocable, gratuitous or in consideration of a license fee, if the User opted for a paid Plan, a non-exclusive, perpetual and worldwide license. 1.13. By using the Service or its individual functions, the User agrees to comply with these Terms of Use, as well as other terms indicated in the Service interface, in full and without any reservations or exclusions. 1.14. If the User disagrees with the content of these Terms of Use, both in full and in part, the User is not entitled to use the Service and is obliged to immediately stop using it. 1.15. The User agrees to comply with all applicable laws and regulations and assumes liability for compliance with any applicable local laws when using the Service. The User is solely liable to third parties for his actions related to the use of the Service, including if such actions lead to a violation of the rights and legitimate interests of third parties, as well as for compliance with the law when using the Service. 1.16. Only the User who reached the age of legal capacity established by applicable law has the right to independently create an Account and use the Service. If the User has not reached the specified age, as well as in cases provided for by applicable law, the use of the Service is allowed only with the consent of parents or other legal representatives. 1.17. The Service provides, through its own search engine, access to a database containing information obtained from open sources of information about common, published facts of user data leaks or those that are in public domain. The Site and Bot aggregate and index this information from publicly available information sources. 1.18. By acceding to these Terms, the User is aware and agrees that the Administration is not liable for the dissemination of information received through the Service about the facts of user data leaks that occurred as a result of actions or inaction of third parties. 1.19. The User is aware that the Administration does not have the authority, contractual obligations or obligations arising by virtue of the law to delete or in any other way restrict access to the information displayed in the search results of the Site or in the Bot's response to the User's requests. The Administration may erase the information displayed in search results of the Services upon receipt of the relevant User’s request. Users seeking to erase information from third-party web resources or services or to redress for damages should apply directly to third parties with a relevant claim. 1.20. All currently existing functions of the Site or Bots, as well as any improvements of them and / or the addition of new ones, is the subject of these Terms of Use. 2. Disclaimer 2.1. The Administration continuously checks and updates the information available through the Service. The Administration does not guarantee that some information may not be outdated or irrelevant. For these reasons, the information available through the Service is provided "as is", and the Administration is not liable for the relevance, accuracy and / or completeness of the information displayed, and does not assume any liability. 2.2. The Administration does not bear any liability for the compliance of the Service with the goals or expectations of the User. The Administration does not guarantee the uninterrupted and continuous operation of the Service. At its sole discretion, the Administration may carry out technical or improvement work, including regular maintenance work that may cause temporary full or partial unavailability of the Services. For these reasons, access to the Services is provided "as is" and "as available". 2.3. The Administration does not guarantee, and nothing in these Terms should be considered as declarations or representations regarding the accuracy or quality of the information provided, the possibility of its use for any other purpose other than for personal purpose, household or non-commercial use. 2.4. The Administration retains the right to make modifications or additions to the information displayed in the search results of the Site or in the Bot's response to the User's request. 2.5. The User assumes all risks associated with the use of the Service and the information obtained through it. In particular, the User is solely responsible for the security and confidentiality of the Account and security measures chosen by him. The User is solely responsible for all actions (as well as their consequences) committed through or in connection with the use of the Service under his Account. At the same time, all actions within or using the Service under the User's Account are presumed to have been performed by the User himself/herself, except for cases when the User has duly notified the Administration of unauthorized access to the Service using his/her Account and/or any violation of the confidentiality of his means of access to Account (including email, password). 3. Amendments 3.1. The administration has the right to amend the Terms of Use without prior notice to the User. The current version of these Terms of Use is available at https://leakcheck.io. The new version of the Terms of Use, as well as any modifications and additions regarding the Service as a whole, and the Site or Bot separately, come into effect from the moment it is made publicly available at the address indicated above in this paragraph, unless otherwise provided by the new version of the Terms. 3.2. If the Administration has made any amendments to these Terms, with which the User does not agree, he/she is obliged to stop using the Service. Otherwise, by continuing to use the Service, the User accedes to the new version of the Terms, that is, agrees with the amendments adopted by the new version of these Terms of Use. 4. Privacy Policy 4.1. The Administration respects the right to privacy and protection of personal data of all Users. These Terms of Use contain general provisions regarding the processing of various user data. All collected and processed data about the User are requisite to perform these Terms of Use and pursue the legitimate interest of the Administration in the context of furnishing the User with access to the Services on an onerous basis. 4.2. The Administration does not collect the data requested for leak check and does not store them on its servers. 4.3. The User has the right to use an alternative authorization method chosen by him from the options offered in the authorization form, including using the accounts of third parties services or web resources. By choosing an alternative authorization method, the User agrees that Administration may receive data about the User from third party information resources. The User is obliged to independently ensure the security of access to a third-party resource and control confidentiality of his/her credentials. 5. Restrictions and limitations 5.1. All Accounts / Plans are intended solely for the User and his/her personal, non-commercial use and are not allowed to be leased, subleased, sold, assigned or otherwise transferred to third parties. 5.2. The User is solely responsible for applying necessary security measures for the Account and the confidentiality of data required for authorization and authentication on the Site. 5.3. The User has no right to use the Service to carry out activities: • recognized as illegal pursuant to effective and applicable law; • threatening any violation of the rights and legitimate interests of other individuals, especially those causing harm to their life, health and property; 5.4. It is prohibited to use the Service to violate the security or integrity of any technical network, computer or communication system, software or computing device, including by: • Use of malicious software or any other means that can damage, disrupt or gain access to any computer system, program or data, including any viruses, malware, spyware, adware, in particular Trojan or worms. • Unauthorized access, in particular by using the Account data of another individual; without his explicit permission, including attempts to search, research or test the vulnerabilities of the Account or violation of any security measures used by the User of the Account in order to obtain such access. 5.5. In addition to the restrictions mentioned above, it is prohibited to use the Service for the purpose of: • disclosure of personal data, private information and other types of information protected by law about third parties; • collecting or attempting to collect third party personal data or private information without their knowledge or consent; • interfering with the operation of the Service or obstructing other Users using the Service; • violation of intellectual property or other proprietary rights; • transferring your account, API key or other related data to third parties; • providing (publishing) information obtained through the Service on third-party forums, web resources, pages on social networks, in chat rooms of messaging services, or through its own or third-party APIs; • selling, leasing, providing in any other way for a fee access to the Services or ensuring the receipt or use of the Services by third parties; • facilitating, assisting, organizing or instigating any action aimed at violating the restrictions and prohibitions imposed by these Terms; • otherwise violate the norms of the applicable law, as well as the norms of international law. 5.6. The API has the following restrictions on use: • The API is for personal, non-commercial use only and is limited to 3 (three) requests per second; • The bulk check feature is limited to 100,000 lines per file and 500,000 lines per day. 5.7. The content and structure of the Service are copyrighted. The reproduction of such content or structure, in particular the use of texts, excerpts of text, illustrations or design, requires express prior permission. 5.8. The Administration retains the right to unilaterally determine the severity of each violation and immediately take the following actions, including but not limited to: suspension or termination of access to the Service with or without notice in case of any violation of these Terms of Use. Any violations may also result in the immediate suspension or termination of the Account, as well as the subsequent deletion of the Account. 5.9. Ignoring notifications or messages from the Administration requiring a response from the User may lead to the suspension or termination of the access to the Service. 5.10. Deleted Accounts cannot be reactivated or restored. 5.11. Nothing contained in this Policy shall be construed as limiting the actions of the Administration or its choice of remedies against any prohibited actions. 5.12. The Administration may, at its sole discretion, deny access to the Service by any User and change the criteria for the eligibility of the Users at any time, including but not limited to if the User does not comply with these Terms of Use. 6. Plans 6.1. The Service may, at the discretion of the Administration, in a limited manner provide information about Leaks free of charge. 6.2. The right to use the Service free of charge may be limited, suspended or terminated at any time unilaterally without prior notice. 6.3. The User has the right to use the Service on an onerous basis in accordance with the Plans established by the Administration. To exercise such right, the User needs: 1. create an Account (register) by entering his/her login (a unique symbol designation for the User's Account), email address and password to access the Account, or log in using accounts created on third party resources choosing from the options offered in the authorization form; 2. perform implicit actions, namely, select the Plan and confirm your choice by clicking the "Select Plan" button or by sending a corresponding request through the Bot; 3. pay the Plan by choosing the payment method from the options offered in the form of payment of the Plans on the Sites and confirm your agreement with the payment terms. 6.5. The Administration retains the right to suspend or restrict the User's access to the Service, including at any time at its sole discretion to delete the User's Account data if the User has violated the provisions of section 5 of these Terms of Use. 6.6. The Administration retains the right to establish any rules and restrictions (technical, legal, organizational or other) on the use of the Service as a whole, or any of its functions, can change them at its own discretion, without prior notice to the Users. In particular, the Administration has the right to prohibit the use of certain logins, as well as establish requirements for the login and password (length, allowed characters, case, etc.). These rules and restrictions may vary across different categories of Users. 6.7. The functions of the Service available under various Plans, their volume or limitations, may be changed unilaterally at the discretion of the Administration without any mandatory prior notice. 6.8. The actual amounts of payments for the Plans are indicated on the Site or can be provided by the Bot at the request of the User. The Administration sets the following Plans: • Basic Plan - allows Users to perform a limited number of requests (15 requests per day) search for information about the facts of user data leak only by e-mail address. Daily payment. • Monthly Plan - allows Users to perform a limited number of requests to search for information about the facts of user data leak by e-mail address, phone numbers (200 requests per day) and keywords (15 requests per day). Payment is monthly. • Lifetime Plan - allows Users to perform a limited number of requests search for information about the facts of user data leak according to the same criteria as Monthly Plan, but with the following restrictions on the number of requests: by email address, phone numbers (400 requests per day) and key words (30 queries per day). One-off payment. • Enterprise - allows Users to perform unlimited search for information about the facts of user data leakage by e-mail address, phone numbers, keywords, password and domain names. 6.9. In order to comply with these Terms of Use with the User, the Administration has the right to instruct a third-party payment provider to collect and process payments from Users on its behalf and in its interests. 6.10. The term for granting Users with access to the Service starts upon receipt of the payment until the expiration of the period specified in the description of the Plan. The User agrees that he/she may also be invoiced up to his current balance at any time in order to verify the accuracy of his Account information. The Administration retains the right to deny access to the Service, including limiting the extent of the Service's functions, at any time at its sole discretion, in case of non-payment, delay in payment or inability to charge money from the User when invoicing. 6.11. Access to the Plans provided and paid for in the form of a subscription. The User is considered aware that he/she will be billed on a regular basis, and the fee will be charged automatically using the payment system of the Administration or payment systems of third-party providers using the payment method chosen by the User when invoicing. 6.12. If the Plan does not provide for subscription-based settlement of the licence fee, then after the receipt of payment, access to the Services is provided in the amount and for the period specified in the description of the Plan selected by the User. To extend the period of access to the Services, the User shall, after the expiration of the initial period, make a payment in the amount specified in the description of the Plan of his choice. Access to the Services is granted upon the receipt of payment for the term estimated in days, months or years and specified in the effective description of the Plan selected by the User. 7. Refund policy 7.1. Since the use of the Services and access to them is intangible and irrevocable in nature, the Administration does not make refunds after the receipt of payment for Plans. 7.2. Refunds are not made for unexpired period of access or unspent number of Leaks requests or, when the User changes the Plan. 7.3. If the User changes the Plan or refuses to use the Services further, the provision of access to the previously paid Plan continues until the expiration of the pre-paid billing period. -------------------------------------------------------------------------------- PRIVACY POLICY 1. General Provisions 1.1. This Policy covers how User data is collected and used. The Administration does not collect personal data of Users through the Service, unless otherwise is expressly stated in this Privacy Policy. 1.2. The purpose of this Policy is to ensure adequate protection of information about Users, including their personal data, from unauthorized access and disclosure. 1.3. The collection, storage, distribution and protection of information about Users are governed by this Policy, other official documents of the Administration and the effective legislation of the United Kingdom. 1.4. The Administration has the right to make changes to this Policy. When making changes to the Policy, the Administration notifies the Users about this by posting a new version of the Policy at https://leakcheck.io. 1.5. By using the Service, the User agrees with the terms of this Policy and the processing of personal data in the manner prescribed by this Policy, as well as with the processing of personal data by third parties acting on behalf of the Administration in its legitimate interests. 1.6. If the User disagrees with the terms of this Policy, the User must immediately stop using the Service. 1.7. In addition to the definitions and notions established by the Terms of Use, and in the same sense used in this Privacy Policy, the following are additionally established: 1.7.1 Registered User - the User who created the Account; 1.7.2 User data - technical data, as well as Account data necessary for the User to use the Services on an onerous basis and provide him with access to them, and do not contain information that allows the identification of an individual; 1.7.3 Payment data - personal data of the Registered User, necessary to provide access and use of the Service on a reimbursable basis. 2. Collection, storage and use of data 2.1. User data collected from each User includes: 2.1.1. When authorizing on the Site: • username, email address and encrypted password (when creating an Account) or a public OpenID identifier containing only an email address and ID (when using alternative means of authorization); • Date and time of registration and last access to the Service; • Information about the transition from another resource; • Site Language; • Google Analytics data. 2.1.2. When paying for the Plans, the following Payment Data is collected: • the email address specified by the User during registration; • First name, last name; • billing address. 2.1.3. When sending requests or contacting the Administration by e-mail: • E-mail address; • name; • other information included in the text of the request or appeal. 2.2. The above information received from the User is necessary to perform: 2.2.1. The Terms of Use between the Administration and the User, including but not limited to: • sending informational messages related to the performance of the Terms of Use and this Policy (about changes in the specified documents, the amount of payments for the Plans, about the events of the User's authorization in the Account, responses to the User's requests, etc.); • providing access to the Services on an onerous basis and making payments for the Plans to obtain such access, including using the payment systems of a third-party provider; • ensuring that the User complies with Section 5 of the Terms of Use. 2.2.2. purposes arising from the legitimate interests of the Administration: • transfer data to third parties on behalf of the Administration for processing on its behalf and providing services on our behalf or, partner organizations that provide support and help improve the operation of the Services; • respond to inquiries and requests from Users, their legal representatives and government agencies; • provide technical support to Users when they use the Services. 2.3. The Administration does not collect or process data of bank cards or accounts of Users. Information about bank cards is collected by the payment system of a third-party service provider specified in clause 4.3. of this Policy. 2.4. To confirm the payment of Plans, the Administration has access through the payment system of a third-party service provider to information about the payment status that does not contain bank card data. 2.5. The collected data can be changed at the request of the User if they are inaccurate or irrelevant after his identification. 2.6. The Administration protects the data provided by the User with reasonable and sufficient security measures against loss or theft, as well as against unauthorized access, disclosure, copying, use or modification. 2.7. When searching for leaks without creating an Account by e-mail address entered by the User in the search form of the Site or in the Bot's request, the specified data is not stored anywhere, their backup copies are not created, etc. Before sending a request on the side of the User's web browser, the SHA256 hash from the entered email address is calculated, truncated to 24 characters, and after that the calculated hash is sent to the server. When creating an Account, the function of checking leaks by email address by creating a SHA256 hash from the entered email address is available when the User selects the relevant option in the Account or sends a relevant request to the Bot. 2.8. The Administration does not store on its servers or those ensuring the operation of the Service, the data specified in the paragraph above entered in the verification form on the Sites or in the Bot's request text. When the User uses the Service, the Administration does not collect or access the requested email addresses, phone numbers, keywords, passwords and domain names requested for verification. 2.9. User and Payment data are stored and processed until the processing goals are achieved, that is, until the User stops using the Service and requests the deletion of User data. User and Payment data may also be erased in connection with the termination of the Account on the grounds provided for in clause 5.16 of the Terms of Use. Some personal data may be processed after the termination of the use of the Service, to the extent required by applicable law. 2.10. User and Payment data may be disclosed by virtue of the law or at the inquiries of law enforcement agencies or at the court orders, including to protect the rights of third parties during legal proceedings, administrative procedures, operational search or investigative measures; to protect the rights and interests of other Users; to protect the life and vital interests of other individuals; to ensure the proper level of security of the Service and User data; as well as in order to protect the intellectual property rights, as well as other rights and legitimate interests of the Administration. 2.11. The operator takes technical, organizational and legal measures in order to ensure the protection of the User's personal data from unauthorized or accidental access to them, destruction, modification, blocking, copying, distribution, as well as from other illegal actions. 2.12. The storage of information about Users is carried out in secure databases, access to which is limited to third parties. 2.13. The Administration does not sell, does not transfer any data about Users for a consideration and does not provide access to persons not affiliated with or not in contractual relations with the Administration. 3. Right to access, erasure and restriction of data processing 3.1. Whereas the sources of the collection of information about leaks available using the Service do not allow to determine, directly or indirectly, an individual (article 4 (1) General Data Protection Regulation of the European Union 2016/679), the Administration cannot provide information about the set of data in accordance with Art. 15 of the General Data Protection Regulation of the European Union. 3.2. Registered Users have the right to withdraw their consent to receive informational messages, notifications about authorization and authentication events on the Sites and about the expiration of the period paid for the Plan, sent to their e-mail address specified by them when creating an Account or via Bot messages. To withdraw consent to receive e-mail or the Bot messages, the User shall perform actions confirming the refusal to receive such messages. 3.3. For e-mail messages, such actions will be considered: • a change in the Account settings, or; • sending a relevant request to the Administration through email, or; • referring to a special link with anchor text “unsubscribe” or any similar one in any of the informational messages, or; • any other actions expressly stated in the text of informational email messages; 3.3.1. For messages from the Bot, such actions will be considered sending a corresponding request to the Bot. 3.4. Registered Users have the right to demand from the Administration rectification of his personal data, restriction of its processing or erasure in the event, including if the personal data is incomplete, outdated, inaccurate, unlawfully obtained or no longer deemed necessary for the initially stated purpose of processing, as well as take measures provided for by law to protect their rights. 3.5. Erasure (deletion) and processing restriction of all collected User data is carried out within 24 hours upon the receipt of the relevant request. A request for erasure (deletion) of User data necessary to perform the Terms of Use amounts to refusal to further use of the Service on an onerous basis and perform the Terms of Use. 3.6. Registered Users have the right to receive information regarding the processing of their personal data, including: • confirmation of the fact of processing personal data by the Administration; • legal basis and purposes of personal data processing; • the purposes and methods of processing personal data used by the Administration; • the identity, contact details of the Administration, information about individuals or entities (except for employees of the Administration) who have access to or receive personal data or to whom personal data may be disclosed on the basis of an agreement with the Administration or on the basis of the law; • the processed personal data relating to the User, the source of their receipt, unless another procedure for submitting such data is provided for by federal law; • term or condition of processing personal data, including term or condition of their storage; • the procedure for the User to exercise the rights provided for by applicable law; • information about the carried out or intended cross-border data transfer; • designation or first name, surname, patronymic or middle name (if any) and address of the person who processes personal data on behalf of the Administration, if the processing is entrusted or will be entrusted to such a person; • other information provided by applicable law. 3.7. The User is entitled to address any personal data protection issues to the Data Protection Authority of his residence. 4. Third party service providers 4.1. The Administration transfers User data to some of the third-party service providers in accordance with the terms of agreements restricting the use and the processing of the User data. In some cases, these service providers may need access to User data in order to provide services related to the Administration's performance of its obligations under the Terms of Use and this Policy. Such service providers are allowed to use User data only to process data or provide services on behalf of the Administration within the framework of contractual obligations to protect the security and confidentiality of the processed User data. In some cases, these service providers may disclose User Data to governmental authorities due to the requirements of applicable law. 4.2. The Sites use hCaptcha from Intuition Machines, Inc. (350 Alabama St, San Francisco, CA 94110 USA) to prevent automatic requests to the Sites. hCaptcha is a service that protects web pages from spam and request abuse. The Administration uses hCaptcha to protect input forms. When using hCaptcha, Intuition Machines, Inc. uses data to determine if the User is human. What data Intuition Machines, Inc. collects and for what they are used, you can read here and its Terms of Use here. 4.3. For processing of payments for the Plans, a third-party provider’s payment system is used - Stripe, Inc. The third-party provider, acting in the interests of the Administration, collects and processes Payment data, as well as bank card data and other financial data necessary to execute and process license fees for the right to use the Service. When paying for Plans using cards of Mastercard or Visa payment systems, the Administration transfers to Stripe Inc. email address and the User transfers Payment Data to Stripe Inc. and Administration. The Administration does not receive and does not have access to card or bank data, as well as to the data that Stripe, Inc. uses to execute and process payments, except for the data specified in clause 2.3 of this Policy. You can read Stripe, Inc. Privacy Policy here. 5. Links to web resources and services of third parties The Services may contain or provide the ability to follow links to unrelated third-party web resources and services. These web resources and services may operate independently of the Administration and / or may have their own terms of use, policies and privacy notices, which the Administration strongly recommends to review. After referring to such web resources or services, the Administration no longer has any control on the processing of any data that is transferred to the unrelated third party, since the behavior of such parties is beyond its control. Therefore, the Administration does not assume any responsibility for the processing of any such data by unrelated third parties. In addition, the Administration is not responsible for the information posted and / or damage caused as a result of actions on any web resources and services that can be accessed by referring to the link available through the Services or using information obtained during the use of the Services and that are not owned or controlled by the Administration or are not bound by this Policy. -------------------------------------------------------------------------------- CONTACT DETAILS If you would like to contact us with any question related to Terms of Use or Privacy Policy, you can send a request to Leakcheck Security Services Ltd., 2 Thomas More St, London, UK, E1W 1WY. You can also send an email to the@leakcheck.net Close