Skip to content

Instant visibility into underground credential leaks

Search over 421B+ plain text credentials collected from malware logs, combolists, database breaches and dark-web dumps, and get alerted before attackers act.

Start free in 1 click
or sign up with
· no credit card

421B+ records

Millisecond lookup

Real-time alerts

Unlimited searches

API access included

Pay by card or crypto

No hidden fees

LeakRadar search dashboard

Key Features

Built for threat hunters and defenders

Get the fastest, clearest view into malware-harvested leaks.

Plain-text Credentials

Passwords exactly as stolen - no hashes, no redaction.

Email Search

Find every leak containing your email address in one click.

Domain Search

Instantly retrieve every leak where your company domain appears.

Advanced Filters

Search by url, url_host, url_domain, url_tld, username, password, is_email, email_domain, email_host or email_tld.

421B+ Records - Millisecond Lookup

Query over 421B+ plain text credentials in a fraction of a second.

API Ready

Integrate LeakRadar into your SOC through a straightforward REST API.

LeakRadar in Action

See how LeakRadar works

Watch our tutorial to learn how to use LeakRadar effectively and get the most out of your subscription.

Pricing Plans

Choose the plan that fits

Instant access, same-day upgrades, cancel anytime.

Unlock equals number of plain-text records you can reveal per day across all searches. Searches are free and unlimited.

We accept all major credit cards and cryptocurrencies.
Cancel anytime, with no fees or questions.

Livesynced 0s ago

The platform's pulse, in real time

These numbers come straight from our indexing pipeline. They refresh every couple of minutes.

421,017,083,868 credentials indexed
credentials indexed
Ingestion (last 24h)

4,416,923,610

credentials this week

2,464

new leak files this week

99,848

total leak files

1,042,259

credentials per minute
Recent ingestion
FileCredentialsWhen

10M_stripchat_com_Live_Adult_Entertainment_Platform_UsersDB_…

Combolist

10,002,086

52m ago

Data.com Salesforce 231k.xlsx

Combolist

26

57m ago

vcarrd.com.sql

Combolist

2,172

59m ago

SPAIN 01.csv

Combolist

11,888

1h ago

optic2000.com.zip

Database

203,375

1h ago

mix data 1 not clean by stradu.txt

Combolist

8,095,059

3h ago
Auto-refreshed every ~2 min

FAQ

Frequently asked questions

Browse through these FAQs to find answers to commonly asked questions.

Person browsing leak results on laptop

Where does the data come from?

We index leaks exclusively from public forums and Telegram channels. We never buy data, never alter it, and we avoid any involvement in creating, reselling, or trafficking stolen material.

Searching for credentials tied to your own email, domain or organization is legal everywhere we know of. It's the standard use case for security teams, IT admins and individuals checking their own exposure.

For searches involving third parties (pentesters, bug bounty hunters, threat intel researchers, MSP and MSSP teams), legality depends on your jurisdiction and your contractual scope. We require every user to confirm legitimate use at sign-up, and we don't grant access for malicious purposes. If you're unsure whether your specific use case is allowed, check with your legal counsel.

We also offer free lifetime access to verified law enforcement and military teams.

Yes. If your credentials appear in our database and you want them removed, send a removal request to **privacy@leakradar.io** (or via the contact page) with proof of ownership. We process verified requests within a few working days and remove matching records from search results. This is your right under GDPR Article 17.

Note: removing your records from our index doesn't erase the underlying leak from the internet. The data is already public on multiple forums and channels. It just means it won't show up in LeakRadar searches anymore.

We process credit card payments with Stripe and support 100+ cryptocurrencies through NowPayments.

Unlocking a leak means spending one credit to reveal any usernames or passwords in clear text. Your plan grants you a daily credit quota that renews every 24 hours, so pick the tier that matches your usage.

Yes. Each subscription tier unlocks a fixed number of leaks per day. The counter resets every 24 hours.

LeakRadar supports three search modes. All modes query the same underlying leak database.

- **Email Search** - Query a single address (e.g. alice@example.com) and instantly see every leak containing it.
- **Domain Search** - Map exposure for a whole domain. Results are automatically categorised into:
- Employees - `email_domain = acme.com AND url_domain = acme.com`
- Third-party accounts - `email_domain = acme.com AND url_domain != acme.com`
- Customers - `url_domain = acme.com AND email_domain != acme.com`

- **Advanced Search** - Combine multiple criteria with boolean operators, wildcards and field filters. You can filter on any of the following fields:
`url, url_host, url_domain, url_tld, url_scheme, url_port, username, password, email_host, email_domain, email_tld`

Absolutely. Our REST API is available for both personal and commercial projects - see the docs at https://docs.leakradar.io.

For Python developers we also offer an official wrapper: install it with **pip install leakradar** or check the source on GitHub: https://github.com/LeakRadar/leakradar-wrapper.

Rate limits are 30 req/s for all plans, except for Mass Check endpoints (1 req/s) and Advanced Search endpoints (5 req/s).

No. We only store the timestamp when a leak was indexed, so the date shown is the ingestion date, not the actual breach date.

Ready to try LeakRadar?

Run your first leak search in seconds - no credit card required.

Start free in 1 click
or sign up with
· no credit card
Blog

Latest articles & tutorials

Fresh insights on breach-hunting, malware and threat intel.