Frequently asked questions

Here are some questions you may be asking yourself about our services.

Where does HackCheck get all of this data?

arrow-icon

At HackCheck, we search and monitor multiple publicly available sources where data breaches are commonly published. When new data is posted on these sources, our team quickly collects the contents of the breach, parses through it to ensure relevance, and then imports it into our secure database.

Does HackCheck keep any logs?

arrow-icon

At HackCheck, we understand the importance of privacy and strive to keep the information we log as minimal as possible. We only collect and store the data necessary to maintain and improve the quality of our services. Our detailed logging policy can be found in our Privacy Policy, which outlines the types of data we collect, how we use it, and how we protect your privacy.

How is HackCheck different?

arrow-icon

What makes HackCheck distinct is its commitment to providing a user-friendly experience for both individuals and developers. Our platform strikes a balance, ensuring that users can easily access and navigate our services while developers can seamlessly integrate HackCheck into their applications through our versatile APIs. One of our standout features is our continuous effort to maintain one of the largest and most up-to-date collections of data breaches. We actively grow and update our breach database, ensuring users have access to comprehensive breach information to stay ahead of emerging security threats. But HackCheck goes beyond being just a search engine. We provide additional features such as asset and domain monitoring, enabling proactive protection of digital assets. Moreover, our platform supports bulk searching and data exporting, streamlining your workflow and simplifying the management and security of your information. In summary, HackCheck stands out as a versatile cybersecurity solution, catering to a broad spectrum of user needs.

How can I access HackCheck?

arrow-icon

Accessing our search engine is available for free when registering. With a complimentary account, you will gain access to essential information, including result counts and data source references. For those seeking more comprehensive details and capabilities, we offer premium subscription plans that can be purchased to unlock enhanced features and insights.

How can I get my data remove?

arrow-icon

If you have identified your data within our data breach collection and wish to initiate its removal, kindly reach out to us via email at [email protected], specifying your request for data removal. We kindly request that your removal request be submitted from the same email address associated with the data you wish to have removed. If the information is accurate we will promptly proceed to eliminate your data from our database, ensuring your privacy and security are safeguarded.

What payment methods can I use?

arrow-icon

To enhance your payment experience, we provide a range of convenient options. You may securely pay with your credit or debit card through Stripe. Alternatively, we accept popular digital currencies including Bitcoin (BTC), Ethereum (ETH), USD Coin (USDC), Bitcoin Cash (BCH), Litecoin (LTC), Tether (USDT), Dogecoin (DOGE), Dai, and Matic, ensuring flexibility and choice in your payment process.

I am a law enforcement entity / government official, how can I work with you?

arrow-icon

If you represent a law enforcement entity or government agency and wish to collaborate with us, we invite you to get in touch with us at [email protected]. Our core expertise lies in data analysis, and we are committed to supporting your efforts in a meaningful way. Furthermore, in our commitment to assisting your endeavors, we may also provide any relevant information that can be of assistance.

How do we prevent misusage?

arrow-icon

We're dedicated to ensure the responsible and ethical use of our database search engine, we have implemented robust measures to prevent misuse. We tackle web scraping by employing techniques such as rate limiting, which restricts the number of requests from a single source within a specific time frame. Additionally, we utilize API rate limiting, which sets predefined limits on the number of API requests allowed per API key within a given timeframe. Breaching these limits results in temporary access restrictions, ensuring fair access for all users. API IP authorization further enhances our security by allowing only authorized IP addresses to access our API, effectively safeguarding against unauthorized access attempts. These combined methods create a secure and reliable experience for our users.

I have more questions!

arrow-icon

If you have any further questions about our service, please don't hesitate to contact us at [email protected]. We will be happy to assist you.


Copyright 2023 Hackcheck.io. All rights reserved.