Dark Web Mention Scanner

Multi-source exposure scanner. Checks 6 dark web search engines, breach databases, and paste archives via bookmarklet scraping. Aggregates results into a unified threat exposure report.

🔧 Step 1: Install the Scraper Button [hide]

Drag the red button below to your bookmarks bar.

Your bookmarks bar is the strip of buttons at the top of your browser. If you don't see it, press Ctrl+Shift+B (Windows) or Cmd+Shift+B (Mac).

🔍 Max Intel Scraper bm v1

What this does: Once installed, click it on any of the 6 scanner sites to scrape the exposure data shown on the page and send it back here.

🔎 Step 2: Enter Email or Username
❓ How the Dark Web Mention Scanner Works

Your email and username are powerful selectors for finding exposure across the dark web, breach databases, and paste archives. This tool automates checking 6 different sources and merges results into a unified threat exposure report.

Which sites does this scan?

HaveIBeenPwned (breach history), IntelX (dark web archive), Ahmia.fi (Tor .onion search), BreachDirectory (breach database), LeakCheck (credential exposure), and Dehashed (aggregated breach search). Each contributes different data points for maximum coverage.

Is this legal to use?

Yes. All sources queried are publicly accessible, legal OSINT platforms used by security researchers, penetration testers, and organizations to check their own exposure. You should only scan emails and usernames that belong to you or that you have authorization to investigate.

Does this access the dark web directly?

No. All 6 sites are accessed via the clearnet (normal internet). Ahmia.fi indexes Tor .onion sites but is itself a clearnet website. IntelX archives dark web content but serves it over HTTPS. No Tor browser is needed.

What data does it collect?

Breach names and dates, exposed data types (passwords, hashes, IPs, etc.), paste archive mentions, dark web forum/marketplace references, .onion site mentions, and result counts per source. Everything is scraped from publicly visible page content.