Free Exposure Check
Has your personal data been leaked?
Over 14 billion records have been exposed in known data breaches. Check your email against these databases in seconds — free, private, and no account required.
Surface-level breach and exposure scanner
Australian Data Removal collects the information in this form to perform an exposure check and provide results. Your input is processed in real time and not retained after the scan completes. Do not upload or provide identity documents, passwords, TFNs, Medicare numbers, passport numbers, driver licence numbers, bank details, login credentials, full dates of birth, or full residential street addresses. How we handle your information is described in our Privacy Policy.
Small Business Owners: The Privacy Exemption Is Being Removed
From December 2026, the small business exemption under the Privacy Act will be removed. All 2.5 million Australian small businesses will be required to comply with the Australian Privacy Principles. If your business email appears in a breach, you may face new obligations. Talk to our team about compliance readiness.
Free Premium Data Removal Guide
VALUED AT $75Every scan includes our self-guided data removal guide — normally $75. Step-by-step instructions, template opt-out letters, OAIC complaint walkthrough, and a full Australian data broker directory. Yours free, because knowing is only half of it.
ausdataremoval.com.au
Under ConstructionWe're building a free resource hub where Australians can find everything in one place — complaint forms, regulator phone numbers, opt-out templates, data broker directories, and step-by-step guides. No sign-ups, no paywalls. One destination for every form, every number, and every tool you need to take back control of your personal information. Services are already live — the resource library is growing every week.
Australian Data Removal — ABN 86 921 751 764 — 1300 504 079
Services
Take Action on Your Exposure
Found breaches? Take action now. From self-service guides to full professional removal — all priced in AUD, all handled by our Australian team.
DIY Removal Guide
Step-by-step guide with template letters, OAIC complaint forms, and legal references. Included with every scan from ausdataremoval.com.au.
- Template opt-out letters
- OAIC complaint walkthrough
- Data broker directory
- Legal reference guide
- Australian legal context
Deep Intelligence Report
AI-powered deep analysis using Sonar Reasoning Pro. Comprehensive breach report with severity ratings and personalised remediation.
- AI breach analysis
- Severity risk matrix
- Personalised next steps
- Australian legal context
Exposure Audit
Professional audit covering up to 5 people. Full breach analysis, dark web checks, and data broker assessment. Delivered in 5 business days.
- Up to 5 people checked
- Dark web deep scan
- Data broker audit
- Full PDF report
- Remediation plan
Full Removal
We handle everything. OAIC correspondence, suppression requests, and verification of removal from identified sources. Up to 60 days.
- Full removal service
- OAIC correspondence
- Suppression requests
- Removal verification
- 60-day completion
Personal Guardian
Year-round privacy coverage. Continuous breach checks, automated removal requests, quarterly reports, and a dedicated privacy officer.
- Ongoing breach checks
- Automated removals
- Quarterly exposure reports
- Dedicated privacy officer
- Priority response
Advanced Investigation
Deep investigation into specific exposures. Dark web analysis, threat actor research, and forensic-grade reporting for legal proceedings.
- Deep dark web analysis
- Threat actor identification
- Forensic-grade report
- Legal proceeding ready
- Law enforcement liaison
Developer API Access
Integrate breach checking into your own platform. RESTful API, versioned endpoints, webhook support.
Executive Shield / Strategic Anchor
Bespoke privacy engagement for executives, high-net-worth individuals, and organisations. Full-spectrum exposure reduction, dedicated team, custom scope.
How It Works
Enter Your Email
Type in the email address you want to check. We search it against databases containing over 14 billion leaked records. Takes seconds.
See What Was Exposed
Find out which breaches your data appeared in, what types of information were leaked, and how serious the exposure is.
Take Action
Get a clear risk rating and specific next steps. If you need help reducing your exposure, our Australian team can assist.
Your Data. Your Rules. Full Stop.
We built this scanner to find breaches, not create new ones. Here is exactly what happens with your data — no fine print, no corporate waffle.
What We Do
- Process your scan input in real time against breach databases
- Return results to your browser — then immediately discard your input
- Use AI (Anthropic, Perplexity) to analyse breach severity — inputs not used for training
- Process payments through Stripe — we never see or store card details
- Operate under the Australian Privacy Act 1988 (APP 1-13)
- Respond to data access and erasure requests within 30 days
What We Never Do
- Store your email, phone number, or name after a scan completes
- Collect passwords, TFNs, Medicare numbers, or identity documents
- Sell, share, or trade your data with anyone — ever
- Use your scan data for marketing, profiling, or retargeting
- Retain chat conversations on our servers — Hugo chats exist only in your browser
- Overclaim dark web coverage — we check known public breach databases, not everything
Where Your Data Goes
You Enter Email
Typed into your browser. Sent to our server via HTTPS.
We Query HIBP
Your email is checked against Have I Been Pwned. HIBP does not log queries for paid API keys.
Results Returned
Breach data sent back to your browser. Your input is discarded from memory.
Nothing Stored
No database entry. No log. No cookie. The transaction is complete.
Your Rights
- Access — request all data we hold about you (APP 12)
- Correction — request we fix any inaccurate data (APP 13)
- Erasure — request we delete your data
- Complaint — lodge with us first, then OAIC if unsatisfied
Third-Party Services
- HIBP — breach data lookup (haveibeenpwned.com)
- Anthropic — AI analysis (not trained on your data)
- Perplexity — deep intelligence reports
- Stripe — payment processing (PCI DSS Level 1)
- Vercel — hosting (SOC 2 Type 2 compliant)
Kill Switch
Want everything gone? Click the button below or chat with Hugo. We will confirm deletion within 5 business days. Since we don't store scan data, there may be nothing to delete — and we'll tell you that honestly.
Or email hello@ausdataremoval.com.au
We'd rather lose a customer than their trust.
If you find anything on this site that doesn't match what we say here, call us on it. 1300 504 079. hello@ausdataremoval.com.au. Or just click Hugo.We'll fix it the same day.
Embed This Scanner
Add the Dark Web Exposure Check to your own website with a single line of code. The widget is fully responsive and self-contained.
<iframe src="https://darkwebscanner.com/embed" width="100%" height="600" style="border:none;border-radius:8px;" title="Dark Web Exposure Check"></iframe>Attribution: Powered by Australian Data Removal / Dark Web Scanner
For Organisations
Put This Scanner on Your Website
License the Dark Web Scanner as a white-label widget for your organisation. Offer your clients a branded privacy tool under your own domain.
Community
Free
Sponsored embed
- Iframe embed with ADR branding
- HIBP breach check included
- Hosted on darkwebscanner.com
Licensed
$500 - $2,500/mo
White-label scanner
- Your branding, your colours
- Custom domain hosting
- Scan analytics dashboard
- Lead capture integration
Enterprise
$5,000+/mo
Full platform + premium domain
- Everything in Licensed
- Premium .au domain included
- API access for internal systems
- Data sovereignty compliance
- Dedicated account manager
Premium Australian Privacy Domains Available
Enterprise clients can host their branded scanner on a premium privacy domain. Available domains include data sovereignty, privacy, exposure reduction, and cybersecurity keyword domains across .com.au, .au, and .com TLDs.
Financial Services
CPS 234 compliance
Legal Firms
Client confidentiality
Aged Care
Vulnerable persons
Government
Data sovereignty