Submit a data breach
Are you a security researcher who discovered a breach dataset? Help protect millions of people by submitting it to DataLeakz. We store only hashed data — raw credentials are never retained.
What we accept
Verified breach datasets containing email addresses, passwords, or phone numbers from real security incidents. We verify every submission before ingestion.
What we don't accept
Unverified or fabricated data, data from active attacks still in progress, or datasets you don't have legitimate access to as a security researcher.
Breach submission form
Fill in what you know. You don't need to have every field — partial information is fine. We'll follow up if we need anything else.
When you upload a dataset, we parse it locally, hash every email and password with SHA1, store only the hashes, and permanently delete the raw file. We never expose raw credentials to anyone.
Submission received
Thank you for helping protect users. Our team will review your submission within 48 hours. If you provided a contact, we'll be in touch.
What happens after you submit
Your submission goes through a review and ingestion pipeline before any data is used.
Our team verifies the dataset is real, checks it against known breaches, and confirms the data types present.
Every email is SHA1 hashed before storage. Passwords are hashed. Raw data is deleted immediately after processing.
The breach appears in search results. Affected users who search their email will see they were impacted.
If you provided contact details and want credit, we'll acknowledge your contribution in the breach entry.
Prefer to submit encrypted?
If you want end-to-end encryption, email the dataset encrypted with our PGP key to security@dataleakz.com
Generate and upload your PGP key at keys.openpgp.org