How to Check if Your Data Is on the Dark Web (Free Tools + Step-by-Step Guide)
Find out if your email, passwords, or phone number have been leaked to the dark web. Step-by-step guide using Have I Been Pwned, Google Dark Web Report, Firefox Monitor, and Apple password monitoring.

How to Check if Your Data Is on the Dark Web
Most people assume their personal data is safe until they get a breach notification. But by then, your email, passwords, and phone number may have been circulating on the dark web for weeks or months.
The good news: you do not have to wait. Several free tools let you proactively check whether your information has been compromised. This guide walks you through each one, step by step.
What Is the Dark Web and Why Your Data Might Be There
The dark web is a part of the internet that is not indexed by search engines. You need special software like Tor to access it. While it has legitimate uses, it is also where stolen databases are bought and sold.
When a company gets hacked, the stolen data often ends up on dark web marketplaces. This includes:
- Email addresses and passwords from breached services
- Phone numbers tied to social media or banking accounts
- Credit card numbers and financial information
- Government IDs and Social Security numbers
Even if you have never visited the dark web, your data could be there because a company you signed up for got breached.
Free Tools to Check Your Data
Here are the most reliable tools, all free to use:
| Tool | What It Checks | Cost |
|---|---|---|
| Have I Been Pwned | Email, phone, passwords | Free |
| Google Dark Web Report | Email, name, phone, address, SSN | Free (Google account required) |
| Firefox Monitor | Email addresses | Free |
| Apple Password Monitoring | Saved passwords in iCloud Keychain | Free (Apple devices) |
Step by Step: How to Use Each Tool
1. Have I Been Pwned (haveibeenpwned.com)
This is the gold standard. Created by security researcher Troy Hunt, it tracks over 800 breaches and 14 billion compromised accounts.
To check your email:
- Go to haveibeenpwned.com
- Enter your email address in the search box
- Click "pwned?"
- Review the list of breaches that include your email
To check your password:
- Go to haveibeenpwned.com/Passwords
- Enter a password you use (the site uses a secure k-anonymity model, so your full password is never sent to the server)
- If it says "This password has been seen X times before," stop using it immediately
To get future alerts:
- Click "Notify me" at the top of the page
- Enter your email address
- You will receive an email the moment your address appears in a new breach
2. Google Dark Web Report
Google now offers dark web monitoring for all Google account holders.
How to access it:
- Go to myaccount.google.com
- Navigate to "Security" in the left menu
- Scroll to "Dark web report" and click "Get started"
- Choose what information to monitor (email, phone, name, address)
- Review the results
Google scans dark web forums and marketplaces and alerts you if your monitored information appears. It checks more data types than most free tools.
3. Firefox Monitor (monitor.mozilla.org)
Mozilla's tool pulls data from Have I Been Pwned but presents it with actionable recommendations.
How to use it:
- Go to monitor.mozilla.org
- Enter your email address
- Click "Check for Breaches"
- Review the breaches and follow the suggested actions
Bonus: Sign up for an account to monitor multiple email addresses and get automatic alerts.
4. Apple Password Monitoring
If you use an iPhone, iPad, or Mac, Apple checks your saved passwords against known breach databases automatically.
On iPhone or iPad:
- Open Settings
- Tap "Passwords"
- Tap "Security Recommendations"
- Review any passwords flagged as "compromised" or "reused"
On Mac:
- Open System Settings
- Click "Passwords"
- Look for the "Security Recommendations" section
Apple checks your stored passwords against a continuously updated list of leaked credentials, using cryptographic techniques that keep your actual passwords private.
What to Do if Your Data Is Found
If any of these tools flag your information, take these steps immediately:
If your email was in a breach:
- Change the password on the breached service
- Change the password on any other service where you used the same one
- Enable two-factor authentication (2FA)
- Watch for phishing emails that use your leaked information
If your password was exposed:
- Stop using that password everywhere
- Use a password manager to generate unique passwords for every account
- Prioritize changing passwords for email, banking, and social media accounts
If your phone number was leaked:
- Be extra cautious about unexpected calls and texts
- Do not click links in SMS messages from unknown senders
- Contact your carrier about SIM swap protection
- Consider using a separate number for sensitive accounts
If financial information was exposed:
- Contact your bank or card issuer immediately
- Set up transaction alerts for all accounts
- Consider a credit freeze (in the US: Equifax, Experian, TransUnion)
- Monitor your credit report regularly
Prevention: Stop Leaking Data in the First Place
Checking for breaches is reactive. Here is how to be proactive:
Use strong, unique passwords. A password manager handles this for you. One breach should never compromise your other accounts.
Enable 2FA everywhere. Even if your password leaks, 2FA keeps your account safe.
Minimize your digital footprint. The fewer places that have your data, the less there is to leak. Unsubscribe from services you no longer use and delete old accounts.
Share sensitive information through encrypted channels. When you need to send someone a password, account number, or personal document, do not drop it into iMessage or email where it lives forever. Use a service like LOCK.PUB to create an encrypted, password-protected memo that expires automatically. That way, even if the recipient's account gets breached later, your sensitive data is already gone.
Make This a Regular Habit
Do not check once and forget about it. Set a quarterly reminder to:
- Run your email through Have I Been Pwned
- Review Google's Dark Web Report
- Check Apple's Security Recommendations for flagged passwords
- Update any passwords that appear in new breaches
- Review what services have your personal information
Data breaches happen constantly. The difference between being a victim and staying ahead of the threat is simply knowing where to look. Start with the tools above, take action on anything that comes up, and use LOCK.PUB whenever you need to share sensitive information securely.
Keywords
You might also like
How to Create a Digital Emergency Contact Card (ICE Card) That Could Save Your Life
If you're unconscious after an accident, first responders need your emergency contacts, blood type, and medication list — fast. Here's how to create a digital ICE card they can actually find.
Digital Emergency Binder — How to Build an Online Document Folder Your Family Can Access When It Matters
Insurance policies, bank accounts, utility logins — learn how to organize your critical documents into a digital emergency binder your family can actually find and use in a crisis.
How to Share Legal Documents Securely with Your Lawyer
Learn safe methods for sharing contracts, court filings, NDAs, and sensitive legal documents with attorneys and other parties without compromising confidentiality.
Create your password-protected link now
Create password-protected links, secret memos, and encrypted chats for free.
Get Started Free