Confirm exactly which breach exposed you

    A 'data breach' on its own isn't always a crisis — but it tells you exactly which credentials and personal details are now circulating. The first job is to stop guessing and find out what's actually out there.

    What to look up

      • Every email address you use (including aliases and old addresses)
      • Phone numbers — a growing number of breaches expose mobile numbers
      • Reused passwords — one leaked password can unlock dozens of accounts

    Why this matters

    Credential-stuffing attacks use exactly these dumps to log into your other accounts. The faster you know what's out, the faster you can change the right things.

    If your password manager has a built-in breach scanner (1Password Watchtower, Bitwarden Reports, Proton Pass Monitor, Apple Passwords), run it now too — it cross-checks every saved password.

    More from Identity Recovery

    No image

    Stop the next breach from hurting you

    Set up monitoring and unique credentials so future breaches don't cascade.

    No image

    Document the impersonation before reporting

    Build the evidence pack you'll need for police, banks and credit bureaus.

    No image

    Rotate breached passwords and re-secure those accounts

    Change passwords on every breached service plus anywhere you reused them.