Dark Web Monitoring - Open Beta
Dark Web Monitoring helps you discover if your employees’ email addresses have been exposed in data breaches. When you run a scan, we check each email address against a database of over 600 million compromised accounts from thousands of known breaches.
Why this matters
When a website or service gets hacked, stolen credentials often end up on the dark web where criminals buy and sell them. If employees reuse passwords between personal and work accounts and those passwords were exposed, your organization is at risk.
Key benefits
- Find compromised accounts fast — Identify which employees have appeared in data breaches
- Scan everyone at once — Check your entire organization with one click
- Know what’s at risk — See exactly what types of information were exposed
- Scan anytime — Run scans whenever you need them
How it works
We partner with Have I Been Pwned (HIBP), a trusted breach database, to check your organization’s email addresses.
⚠️Important: Scans happen only when you click the scan button. There’s no automatic scanning. We recommend running a full scan of your organization monthly.
The simple 3‑step process
-
You initiate a scan
-
Click Scan All Users to check everyone
-
Or click the scan icon next to an individual user

-
-
We check the database
- Each email is securely checked against 600+ million compromised accounts
- Thousands of known breaches are searched

-
You get clear results
- See which users were found in breaches
- View exactly what data was exposed

Getting started
Your first scan
Option 1: Scan everyone (recommended)
-
Click Scan All Users on the Dark Web Monitoring page

-
Wait while all users are checked (typically a few minutes)
-
Review the summary showing:
- Total users checked
- How many were found in breaches
- How many are clean
Option 2: Scan individual users
-
Find the user in the list
-
Click the Scan Button

-
View their individual results

Understanding your dashboard
Summary
- Total Users: Everyone in your organization
- Scanned: Users who have been checked
- Not Scanned: Users who haven’t been checked yet
- Breached: Users found in one or more data breaches
User table shows
- Name and email
- Status: Whether they’ve been scanned
- Risk level: High, Medium, or Low
- Breach count: How many breaches affected them
- Latest breach: Most recent breach
- Last scan: When they were last checked
Helpful tabs
1) Monitoring
-
See all users and their breach status
-
Run scans
-
View summary statistics

2) Known Breaches
-
Browse all breaches in the database

-
Learn what happened

3) Breach Types
- Understand different types of exposed data
- See which data types are most dangerous
- Learn what each type means for security
