Pricing

Transparent Pricing.
No Contracts. No Surprises.

One scan covers more ground than most enterprise tools. At a fraction of the cost.

One-Time Assessments
Most Popular
Business
Business Domain Audit

5 sector-specific forensic PDF reports built from breach databases with billions of leaked records, dark web indices, paste sites, and infrastructure intelligence. Risk score and action plan. Real-time compile, delivered in minutes.

$697
one-time forensic assessment
Order Audit
5 forensic PDF reports
Sector-specific compliance mapping
Billions of leaked records monitored
Risk score + action plan
Real-time compile, minutes to deliver
Includes Shadow — read-only mailbox forensics (learn more)
14-day Full Monitoring trial — daily scans, alerts, weekly digests
Persistent BEC monitoring after the trial — no expiry
Included with every audit — no expiry
Persistent BEC monitoring is part of the LeakTrace audit standard. Daily checks for forwarding rules, financial-keyword filters, and risky sign-ins — the textbook attacker patterns the FBI logs $2.95B in losses to every year. Continues indefinitely until you revoke our access.
Full Monitoring
Monthly Monitoring
$297
per month
Daily EASM + full Shadow scans (all 9 modules)
Instant breach + change alerts
Weekly all-clear summaries
Quarterly forensic audit refresh (4×/yr)
Alert tuning & quiet hours
Save $1,067
Yearly Monitoring
$2,497
per year
Everything in monthly
Quarterly audits alone retail at $2,788/yr
Equivalent to $208/mo
Priority support
Guided Remediation
Standard
$1,499
DNS, email authentication, credential response, and security hardening.
Extended
$2,499
Full infrastructure remediation, port closure, code cleanup, compliance documentation, and 30-day follow-up.
Done-For-You Website
Multi-page secure business website
Five custom-branded pages, schema markup, sitemap, cookie consent, mobile-responsive. Built on hardened infrastructure with TLS 1.3 + breach monitoring included for 12 months.
After 12 months: $49/mo for AI chatbot + continued hosting + monitoring (optional).
$2,997
one-time
Request Build
Tier 2 — Partner Program
For accounting firms, law firms, insurance brokers, and MSPs
Starting at $499/month. White-label intelligence under your brand.
Apply for Partner Access
Tier 3 — Enterprise API
For fintechs, insurers, and government agencies
Starting at $2,000/month. Programmatic access to the intelligence engine.
View API Documentation
AES-256 Encrypted
PIPEDA & CCPA Aligned
Data Stays in North America
No Data Sold. Ever.
Monitoring Scope

What Attackers Look For.
What LeakTrace Finds.

The individual monitoring scope covers every personal data category commonly found in compromised credential databases and breach repositories — mapped to how that data is actually used in targeting and fraud.

Digital & Online
Email Address
Detected in monitored breach repositories and criminal-targeting sources. The most common entry point for credential-based targeting.
Password
Exposed passwords linked to your accounts are detected in compromised credential databases — often before you are notified of a breach.
Login Credentials
Username and password combinations associated with your accounts, as they appear in breach repositories and credential lists.
Two-Factor Authentication Tokens
2FA recovery codes exposed in breach data. Recovery codes are frequently targeted when primary credentials are already compromised.
IP Address
Network address exposure or association with suspicious activity in monitored criminal-targeting sources.
Cryptocurrency Wallet Address
Wallet credential exposure in breach repositories. Wallet addresses linked to real identity are increasingly present in targeting data.
Subscription & Membership Data
Account data from subscription services and membership platforms, as detected in breach repositories.
Phishing Targeting Alerts
Active phishing campaigns targeting your email address or known accounts, identified through monitored criminal-targeting sources.
Identity & Personal Data
Full Name
Detected in criminal-targeting sources. Full name combined with one or two other identifiers is sufficient to build a targeting profile.
Date of Birth
Detected in monitored breach repositories. Date of birth is routinely used in identity verification and fraud facilitation.
Phone Number
Detected in criminal-targeting sources. Phone numbers are used in SIM-swap attacks and direct social engineering campaigns.
Physical Address
Detected in monitored criminal-targeting sources. Physical address is frequently aggregated alongside financial and identity data.
Social Insurance Number (SIN)
Canadian SIN detected in fraud-related repositories. SIN exposure is a direct enabler of government benefit fraud and identity theft.
Social Security Number (SSN)
US SSN detected in breach databases. SSN is the primary identifier used in US identity fraud and financial account takeover.
Driver's License Number
Detected in monitored sources. Driver's license data is used in identity verification fraud and physical credential forgery.
Passport Number
Detected in criminal-targeting repositories. Passport data enables both travel fraud and high-value identity impersonation.
Tax Identification Number (TIN)
Detected in fraud-related and breach sources. TIN exposure is directly linked to fraudulent tax filings and financial account access.
Employment History
Detected in monitored criminal-targeting sources. Employment data is used in spear-phishing and business email compromise targeting.
Security Questions & Answers
Detected in breach data tied to your accounts. Security question answers are used to bypass account recovery and reset protections.
Financial & Fraud
Credit Card Number
Detected in criminal-targeting sources. Card data is typically actionable within hours of a breach — well before most notifications are issued.
Bank Account Number
Detected in breach repositories. Bank account data combined with routing numbers enables direct unauthorized transfers.
Routing Number
Detected in criminal-targeting sources. Routing numbers are used alongside account numbers to execute fraudulent transfers and payments.
Payment Card PINs
Detected in breach databases. PIN exposure is a high-risk indicator — it enables physical card fraud independently of card number theft.
Financial Transaction History
Detected in criminal-targeting repositories. Transaction records are used to map spending patterns and identify high-value targets.
Loan Application Monitoring
Detected when your identifying information appears in connection with fraudulent loan or line-of-credit applications.
Sensitive Information
Medical Records
Detected in breach repositories. Medical data is used in insurance fraud, prescription fraud, and targeted extortion.
Health Insurance Information
Detected in criminal-targeting sources. Health insurance details are used to submit fraudulent claims and access prescription networks.
Government Benefits Information
Detected in monitored breach repositories. Government benefits data enables direct fraud against benefit programs and tax authorities.
Vehicle Identification Number (VIN)
Detected in criminal-targeting sources. VIN data is used in insurance fraud and title theft.
FAQ

Frequently Asked Questions

Five forensic PDF reports (Master, Infrastructure, Credential, Executive, and Statutory), generated from 28 intelligence modules and 52 monitored sources. Includes a 0-100 risk score with band classification and a prioritized remediation action plan. You also get a 14-day Full Monitoring trial on top — daily EASM and Shadow scans, weekly digests, alert tuning. After the trial, persistent BEC monitoring continues with no expiry.
No automatic billing transition. At day 14, your subscription transitions to persistent BEC monitoring. We continue watching daily for forwarding rules, financial-keyword filters, and risky sign-ins (the textbook BEC patterns). EASM scans, the rest of Shadow, weekly digests, and alert preferences pause until you subscribe to Full Monitoring at $297/mo or $2,497/yr. Your monitoring dashboard URL stays active either way.
Indefinitely. As long as you've completed the $697 audit and haven't revoked our read-only OAuth consent, BEC monitoring runs daily with no expiry. We email you the moment any BEC pattern surfaces — new mail-forwarding rules, inbox filters on financial keywords (invoice, wire, payment), or risky sign-in events. The FBI logs $2.95B in reported BEC losses every year, and it's the #1 internet crime category 10 years running — we treat it as part of the LeakTrace audit standard, not an add-on.
Daily EASM scans (DNS drift, breach feeds, infrastructure changes, ransomware leak-site mentions), the six non-BEC Shadow modules (OAuth grants, conditional access, MFA enrollment, devices, auth methods, session lifetime, directory access), weekly all-clear summary emails, alert preferences and quiet hours, and a fresh forensic audit every 90 days ($2,788/yr in audits alone). The annual plan saves $1,067 vs monthly.
Free scanners check one or two public databases. LeakTrace queries the same intelligence sources cybercriminals use — breach databases with billions of leaked records, dark web indices, paste sites, infrastructure scanners, DNS records, and regulatory registries. The result is a forensic-grade report, not a pass/fail indicator.
Reports compile in real time on your audit dashboard the moment payment goes through. Most are delivered within minutes — the scan runs automatically, and PDF generation is fully automated.
Yes. If you are unsatisfied with your report, contact us within 14 days for a full refund. No questions asked. See our refund policy for full details.
All data is encrypted at rest (AES-256) and in transit (TLS 1.3). Data resides in North American infrastructure. We never sell, share, or monetize customer data. See our security standards page for technical details.
Yes. LeakTrace serves both Canadian and US businesses. Pricing is the same in both CAD and USD. Reports automatically adapt to your jurisdiction's regulatory framework.
Get Started

Your Exposure Profile
Already Exists.

It was assembled without your knowledge and it is accessible right now. The report tells you what is in it.

Individual scan takes 30 seconds  ·  Business response within one business day

Human-Verified Intelligence
AES-256 Encrypted
PIPEDA & CCPA Aligned
No Data Sold. Ever.