UnderDir Banner
Home » resources » LeakPeek
LeakPeek Logo
Online
Verified: 2025-07-05

LeakPeek

LeakPeek is a Tor-only breach intelligence platform that allows users to check emails and identities against verified data leaks while prioritizing anonymity and privacy.

Age
March 2024
Uptime
93%
Security
8.8
Listings
N/A
Vendors
N/A
Users
N/A

Info About LeakPeek

LeakPeek is a Tor-only breach search and leak aggregation platform designed to help users determine whether emails, usernames, or identities have appeared in known data breaches. The service aggregates verified breach datasets and allows unregistered users to perform basic email lookups, while registered users gain deeper access to curated dumps and extended search options.

The platform focuses on breach legitimacy, applying verification steps such as structural analysis, cross-referencing public disclosures, and comparison against existing breach databases. LeakPeek does not log search queries and operates without tracking cookies, emphasizing operational privacy. Advanced access is gated behind invite-based registration using PGP authentication, eliminating the need for passwords or email accounts.

Features & Security

Check Email breach lookup
Check Username and surname search
Check Curated breach datasets
Check Tor-only access
Check PGP-based login system
Check Premium dump access
Check Tor-only service access
Check No search query logging
Check PGP authentication only
Check No tracking cookies
Check Encrypted connections
Check Minimal data retention

FAQ F.A.Q.

What is LeakPeek? v
LeakPeek is a Tor-only platform that allows users to check whether emails or identities appear in verified data breaches.
Are searches logged? v
No, search queries are not logged. Only minimal backend logs related to system stability are maintained.
What can unregistered users do? v
Unregistered users can check whether an email address appears in any known breach without viewing details.
What does premium access provide? v
Premium users can access detailed breach data, including passwords, hashes, and extended identity fields.
How is breach data verified? v
Breaches are reviewed for structure, authenticity, public confirmation, and duplication before inclusion.
Why is LeakPeek only on Tor? v
Tor provides resilience and anonymity that would not be feasible on the clearnet for this type of service.

User Reviews

Submit Your Experience

Captcha
No reviews yet. Be the first to review LeakPeek!