Choose the Right Plan for You

Free

For personal use

0 €/mo
  • Advanced search features
  • Unlimited searches
  • E-mail support
  • Pro Content Is MaskedLimited

Professional

For individuals

149,99 €/mo
  • Advanced search features
  • Unlimited searches
  • Unlimited downloads
  • Priority e-mail support
  • Access to InfoTrace
  • Full Access to Pro ContentUnmasked

Business

For larger organizations

Custom/mo
  • All Professional features
  • API Access
  • Custom integrations

InfoTrace

InfoTrace is an alternative user interface to InfoTrail, built on the same data set but designed to process and visualize information differently.

Reverse Lookup Tool

The Reverse Lookup feature allows you to uncover compromised user accounts linked to a specific website or service (URL). Instead of searching manually through stealer logs or breach archives, this tool automates the process—returning all exposed accounts tied to a given domain. Built on InfoTrail's extensive data index, this tool is essential for cybersecurity professionals, investigators, and researchers seeking to identify breaches and exposed credentials across platforms.

The screenshot displays a lookup result for BreachForums, a well-known cybercriminal forum notorious for leaking stolen databases and breached credentials.

Key Benefits:

  • Instantly find all breached accounts associated with a URL
  • Saves time by eliminating manual data analysis
  • Powered by large-scale stealer log and breach data indexing
Reverse Lookup Tool screenshot

Search across various selector types:

  • E-mail address
  • Domain
  • URL
  • IPv4, IPv6, CIDR
  • Phone Number
  • Bitcoin address
  • Ethereum address
  • MAC address
  • Credit Card Number
  • Social Security Number
  • IBAN

Search by Selectors

InfoTrail lets you search across various selector types to find data across multiple data sources.

Data Categories:

  • Stealer Logs - data collected by malware that steals browser-stored passwords and system info
  • Leaked Databases - compromised user data exposed from hacked websites or services
  • Combolists - curated lists of email:password combinations
  • URL:LOG:PASS files - text files containing service URLs, usernames (logins), and passwords

Inline Viewing of Files

View various file types, including leaked data, PDFs, Word documents, and images, directly on the site—securely and without leaving the platform.

  • Preview documents before downloading
  • Secure document viewing without external applications
  • Support for multiple file formats
Inline document viewer screenshot
Search statistics visualization screenshot

Inline Search Statistics

Get real-time insights from your searches, including file types, document counts, timestamps, and more—all displayed directly within the interface.

  • Visualize data distribution across sources
  • Identify temporal patterns with timeline graphs