Pricing

Transparent Pricing.
No Contracts. No Surprises.

One scan covers more ground than most enterprise tools. At a fraction of the cost.

One-Time Assessments
Most Popular
Business
Business Domain Audit

5 sector-specific forensic PDF reports built from breach databases with billions of leaked records, dark web indices, paste sites, and infrastructure intelligence. Risk score and action plan. Real-time compile, delivered in minutes.

$697
one-time forensic assessment
Order Audit
5 forensic PDF reports
Sector-specific compliance mapping
Billions of leaked records monitored
Risk score + action plan
Real-time compile, minutes to deliver
Continuous Monitoring
Monthly Monitoring
$297
per month
Daily rescans
Instant breach alerts
Risk trend tracking
Monthly PDF report
Save $1,067
Yearly Monitoring
$2,497
per year
Everything in monthly
Equivalent to $208/mo
Priority support
Guided Remediation
Standard
$1,499
DNS, email authentication, credential response, and security hardening.
Extended
$2,499
Full infrastructure remediation, port closure, code cleanup, compliance documentation, and 30-day follow-up.
Done-For-You Website
Multi-page secure business website
Five custom-branded pages, schema markup, sitemap, cookie consent, mobile-responsive. Built on hardened infrastructure with TLS 1.3 + breach monitoring included for 12 months.
After 12 months: $49/mo for AI chatbot + continued hosting + monitoring (optional).
$2,997
one-time
Request Build
Tier 2 — Partner Program
For accounting firms, law firms, insurance brokers, and MSPs
Starting at $499/month. White-label intelligence under your brand.
Apply for Partner Access
Tier 3 — Enterprise API
For fintechs, insurers, and government agencies
Starting at $2,000/month. Programmatic access to the intelligence engine.
View API Documentation
AES-256 Encrypted
PIPEDA & CCPA Aligned
Data Stays in North America
No Data Sold. Ever.
Monitoring Scope

What Attackers Look For.
What LeakTrace Finds.

The individual monitoring scope covers every personal data category commonly found in compromised credential databases and breach repositories — mapped to how that data is actually used in targeting and fraud.

Digital & Online
Email Address
Detected in monitored breach repositories and criminal-targeting sources. The most common entry point for credential-based targeting.
Password
Exposed passwords linked to your accounts are detected in compromised credential databases — often before you are notified of a breach.
Login Credentials
Username and password combinations associated with your accounts, as they appear in breach repositories and credential lists.
Two-Factor Authentication Tokens
2FA recovery codes exposed in breach data. Recovery codes are frequently targeted when primary credentials are already compromised.
IP Address
Network address exposure or association with suspicious activity in monitored criminal-targeting sources.
Cryptocurrency Wallet Address
Wallet credential exposure in breach repositories. Wallet addresses linked to real identity are increasingly present in targeting data.
Subscription & Membership Data
Account data from subscription services and membership platforms, as detected in breach repositories.
Phishing Targeting Alerts
Active phishing campaigns targeting your email address or known accounts, identified through monitored criminal-targeting sources.
Identity & Personal Data
Full Name
Detected in criminal-targeting sources. Full name combined with one or two other identifiers is sufficient to build a targeting profile.
Date of Birth
Detected in monitored breach repositories. Date of birth is routinely used in identity verification and fraud facilitation.
Phone Number
Detected in criminal-targeting sources. Phone numbers are used in SIM-swap attacks and direct social engineering campaigns.
Physical Address
Detected in monitored criminal-targeting sources. Physical address is frequently aggregated alongside financial and identity data.
Social Insurance Number (SIN)
Canadian SIN detected in fraud-related repositories. SIN exposure is a direct enabler of government benefit fraud and identity theft.
Social Security Number (SSN)
US SSN detected in breach databases. SSN is the primary identifier used in US identity fraud and financial account takeover.
Driver's License Number
Detected in monitored sources. Driver's license data is used in identity verification fraud and physical credential forgery.
Passport Number
Detected in criminal-targeting repositories. Passport data enables both travel fraud and high-value identity impersonation.
Tax Identification Number (TIN)
Detected in fraud-related and breach sources. TIN exposure is directly linked to fraudulent tax filings and financial account access.
Employment History
Detected in monitored criminal-targeting sources. Employment data is used in spear-phishing and business email compromise targeting.
Security Questions & Answers
Detected in breach data tied to your accounts. Security question answers are used to bypass account recovery and reset protections.
Financial & Fraud
Credit Card Number
Detected in criminal-targeting sources. Card data is typically actionable within hours of a breach — well before most notifications are issued.
Bank Account Number
Detected in breach repositories. Bank account data combined with routing numbers enables direct unauthorized transfers.
Routing Number
Detected in criminal-targeting sources. Routing numbers are used alongside account numbers to execute fraudulent transfers and payments.
Payment Card PINs
Detected in breach databases. PIN exposure is a high-risk indicator — it enables physical card fraud independently of card number theft.
Financial Transaction History
Detected in criminal-targeting repositories. Transaction records are used to map spending patterns and identify high-value targets.
Loan Application Monitoring
Detected when your identifying information appears in connection with fraudulent loan or line-of-credit applications.
Sensitive Information
Medical Records
Detected in breach repositories. Medical data is used in insurance fraud, prescription fraud, and targeted extortion.
Health Insurance Information
Detected in criminal-targeting sources. Health insurance details are used to submit fraudulent claims and access prescription networks.
Government Benefits Information
Detected in monitored breach repositories. Government benefits data enables direct fraud against benefit programs and tax authorities.
Vehicle Identification Number (VIN)
Detected in criminal-targeting sources. VIN data is used in insurance fraud and title theft.
FAQ

Frequently Asked Questions

Five forensic PDF reports (Master, Infrastructure, Credential, Executive, and Statutory), generated from 28 intelligence modules and 52 monitored sources. Includes a 0-100 risk score with band classification and a prioritized remediation action plan.
Free scanners check one or two public databases. LeakTrace queries the same intelligence sources cybercriminals use — breach databases with billions of leaked records, dark web indices, paste sites, infrastructure scanners, DNS records, and regulatory registries. The result is a forensic-grade report, not a pass/fail indicator.
Reports compile in real time on your audit dashboard the moment payment goes through. Most are delivered within minutes — the scan runs automatically, and PDF generation is fully automated.
Yes. If you are unsatisfied with your report, contact us within 14 days for a full refund. No questions asked. See our refund policy for full details.
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Data resides in North American infrastructure. We never sell, share, or monetize customer data. See our security standards page for technical details.
Yes. LeakTrace serves both Canadian and US businesses. Pricing is the same in both CAD and USD. Reports automatically adapt to your jurisdiction's regulatory framework.
Get Started

Your Exposure Profile
Already Exists.

It was assembled without your knowledge and it is accessible right now. The report tells you what is in it.

Individual scan takes 30 seconds  ·  Business response within one business day

Human-Verified Intelligence
AES-256 Encrypted
PIPEDA & CCPA Aligned
No Data Sold. Ever.