DeHashed

DeHashed

DeHashed is an OSINT tool for searching emails, usernames, passwords, domains, IP addresses, and phone numbers that have been leaked in data breaches. It allows users to check if their information has been exposed online.
DeHashed image
security privacy passwords leaks breaches osint threat-intelligence

DeHashed: OSINT Tool for Breach Data Search

Discover if your personal info has been leaked in data breaches with DeHashed, an OSINT tool searching emails, usernames, passwords and more.

What is DeHashed?

DeHashed is an online threat intelligence tool used to check if personal information like emails, usernames, passwords, domains, IP addresses, or phone numbers have been compromised in data breaches and exposed online. It has one of the largest databases of leaked databases, with over 19 billion records collected from thousands of breaches.

Users can enter any email address, username, password, domain, IP address or phone number into the DeHashed search bar to instantly see if that information has ever appeared in an online data leak or breach. The tool will display all the leaks, paste sites or breach sites where that information was found, along with specific details of each breach like source, type, and date.

DeHashed provides various search types like Email Search, Username Search, Password Search, Domain Search, IP Address Search and Phone Number search. Users also get access to a personal monitored assets page where they can add their own personal accounts or assets to monitor them and be alerted if these appear in any future breaches.

Other key capabilities include real-time data breach monitoring, API access, historical breach data going back over a decade, and data enrichment tools to pivot from breached information to associated accounts or assets that may reveal additional exposures.

Overall, DeHashed helps individuals and businesses discover if and where their information has been compromised online so they can take action to avoid further misuse or fraud.

DeHashed Features

Features

  1. Search leaked databases for email addresses, usernames, passwords, IP addresses, domains, phone numbers
  2. View breach details like date, origin, severity, and number of accounts leaked
  3. Monitor accounts and assets to get alerts on new leaks and compromises
  4. Analyze account hygiene and recommend steps to improve security
  5. Integrate with other security tools through API

Pricing

  • Freemium
  • Subscription-Based

Pros

Comprehensive database of leaked credentials and accounts

Easy to search for compromised accounts

Monitoring helps secure accounts proactively

Detailed breach information and impact analysis

API enables automation and workflows

Cons

Does not prevent credential stuffing or abuse of leaked data

Monitoring limited to known breaches in database

Requires manual steps to secure compromised accounts

Does not confirm if leaked credentials are valid/in use

API has usage limits for free tier


The Best DeHashed Alternatives

Top Security & Privacy and Password Management and other similar apps like DeHashed


Have I been pwned? icon

Have I been pwned?

Have I been pwned? is a website created by security expert Troy Hunt in 2013 after a series of major data breaches resulted in millions of user account details being leaked online. The purpose of the site is to allow internet users to check if their personal data has been...
Have I been pwned? image
Intelligence X icon

Intelligence X

Intelligence Squared (also known as Intelligence X or IQ2) is an independent, non-partisan debate forum organization that hosts Oxford-style debates focused on current affairs and cultural issues. The debates feature prominent guest speakers arguing for and against motions such as "Ban Fast Food Advertising" or "The Catholic Church is a...
Intelligence X image
Snusbase icon

Snusbase

Snusbase is a cloud-based customer relationship management (CRM) platform optimized for small and medium-sized businesses. It enables teams to organize contacts, track communications history, manage tasks and appointments, capture leads, and gain insights through reports and dashboards.Key features of Snusbase CRM include:Contact Management - Store all contact details including emails,...
Snusbase image
LeakBase icon

LeakBase

LeakBase is a database that contains email addresses and passwords that have been obtained from data breaches and illegal hacking activities. The database can be searched to see if your email address and any associated passwords have been compromised in a data breach.The database contains information on billions of email...
We Leak Info icon

We Leak Info

We Leak Info is a website that has compiled and published personal information on individuals without their consent. This includes full names, addresses, phone numbers, email addresses, IP addresses, and other sensitive details.While the site claims to promote transparency, publishing private information without permission is unethical and in many places...
GhostProject.fr icon

GhostProject.fr

GhostProject.fr is a free, open-source project management and collaboration platform designed for agile teams. It provides a variety of features to help plan, organize, and track projects more effectively.With GhostProject.fr, teams can create projects and break them down into manageable tasks or user stories. Robust task management features allow you...
GhostProject.fr image
Leakwatch icon

Leakwatch

Leakwatch is an open source database monitoring and auditing tool designed to help prevent confidential and sensitive data loss by enabling early detection of unauthorized data access and transfers. It works by continuously analyzing SQL traffic between database servers and applications to identify suspicious queries and user activities that could...
Leakwatch image
BreachNet icon

BreachNet

BreachNet is an open-source network mapping and scanning tool developed as an alternative to Nmap. It provides much of the same functionality as Nmap for discovering hosts, open ports, services, and potential vulnerabilities on a network.Key features of BreachNet include:Host discovery - it can ping sweep a network to find...
LeakCheck icon

LeakCheck

LeakCheck is an open-source memory leak detection library for C/C++ applications. It helps developers identify and fix memory leaks during development, avoiding difficult-to-diagnose issues later on.Integrating LeakCheck only requires linking the library during compilation. From there, it automatically intercepts common memory allocation functions like malloc and new to track allocations....
LeakCheck image
LeakedSource icon

LeakedSource

LeakedSource was a website founded in late 2015 that aggregated and allowed searchable access to data from major data leaks and breaches. The service compiled databases of leaked or stolen usernames, passwords, email addresses and other personal information that had been made public after hacks and security compromises of popular...
Mozilla Monitor icon

Mozilla Monitor

Mozilla Monitor is a free online service offered by Mozilla that allows internet users to check if their email addresses or passwords have been included in known data breaches. Users can sign up to receive email notifications in the event that their personal data appears in data breaches in the...
Mozilla Monitor image
DBRadar icon

DBRadar

DBRadar is an open source database performance monitoring and query analysis platform. It allows DBAs, developers and operations teams to gain deep visibility into database workloads across on-prem, hybrid, and cloud environments.Key capabilities and benefits of DBRadar include:Real-time monitoring of wait events, database metrics, query response times, and more to...
DBRadar image
Profil3r icon

Profil3r

Profil3r is an open source reconnaissance and profiling framework used to aid web penetration testers and security researchers. It automates the process of information gathering during assessments of web applications, networks, computers and individuals.Some key features of Profil3r include:Automated domain, network and personnel profilingIdentifies version numbers of web technologies for...
Profil3r image
Hacked Leaks Checker icon

Hacked Leaks Checker

Hacked Leaks Checker is a free online service that lets you check if your personal data has been compromised in a data breach. The website searches through databases containing information on major data breaches and alerts you if your email address, phone number, or other personal details are included in...
Hacked Leaks Checker image
Secureito icon

Secureito

Secureito is a comprehensive data security and governance platform designed to help organizations discover, classify, protect, and manage sensitive data across cloud, on-premises, and hybrid environments. Some key features of Secureito include:Automatic data discovery and classification using AI and machine learning. Secureito scans an organization's entire infrastructure to find sensitive...
Secureito image
BreachNet.pw icon

BreachNet.pw

BreachNet.pw is an online service that monitors data breaches and notifies users if their personal information is compromised. It works by maintaining a database of emails and passwords that have been leaked in data breaches from various websites and online services.Users can enter their email addresses or passwords on BreachNet.pw...
LeakCheck.cc icon

LeakCheck.cc

LeakCheck.cc is an open-source memory leak detection library for C++ applications. It allows developers to easily integrate leak checking into their C++ code base with minimal effort.LeakCheck.cc tracks all allocations made in the program using custom overloads of the new and delete operators. At any time, developers can dump a...
LeakCheck.cc image
LeakCorp icon

LeakCorp

LeakCorp is an advanced data loss prevention and insider threat management platform. It leverages artificial intelligence and machine learning to monitor corporate communications and employee activity across email, chat/IM, web traffic, file transfers, and more.Key features of LeakCorp include:Real-time monitoring of all employee computer and internet activityNatural language processing and...
LeakCorp image
LEAKED.SITE icon

LEAKED.SITE

LEAKED.SITE is a website that hosts and shares private, sensitive, or illegally obtained data and files without the consent of those affected. This includes things like hacked databases, leaked emails, passwords, or personal photos that were shared without permission.While the site may claim to operate within legal limits, it facilitates...
Enzoic icon

Enzoic

Enzoic is a comprehensive password security platform designed to protect companies from data breaches originating from weak, reused, or compromised passwords. It integrates with major business systems like Active Directory, VPNs, and cloud apps to analyze passwords in real-time and take intelligent action when risky passwords are detected.Key features of...
Enzoic image
Leaksify icon

Leaksify

Leaksify is an open-source password leak monitoring service launched in 2021. It allows users to check if their online accounts and credentials have been compromised in known data breaches and exposed password lists. Users can enter an email address when signing up for Leaksify, and it will automatically search public...
Surfshark One icon

Surfshark One

Surfshark One is an all-in-one cybersecurity and online privacy solution created by VPN provider Surfshark. It bundles together several of Surfshark's services, including its VPN, antivirus software, alert system, and privacy tools, into one subscription plan aimed at individual consumers.The VPN component provides encrypted connections to hide users' online activity...
Surfshark One image
Hacksy icon

Hacksy

Hacksy is an open-source customer relationship management (CRM) platform designed as an alternative to HubSpot CRM. It provides many of the same features as HubSpot but is free and open-source.Some of the key features Hacksy offers include:Contact Management - Organize all your contacts and leads in one place. Track contact...
Hacksy image