Back to Signup

Terms of Service

Plain-language rules for using Breach Reaper without making it weird.

Effective: April 2026
Version 2.5

1. Welcome to Breach Reaper

Thanks for using Breach Reaper. We provide exposure intelligence so people can understand risk, verify their own security, and support authorized research.

Plain English: Use the site for your own accounts, your own organization, or work you are allowed to do.

2. How You Can Use the Service

Breach Reaper provides access to historical breach intelligence for educational, personal security, and authorized research purposes. You agree to use this information ethically and only where you have permission.

You may not:

  • Use the data to harass, threaten, expose, or harm individuals.
  • Search for, investigate, or publish information about accounts you are not authorized to assess.
  • Use results to access accounts, bypass controls, commit fraud, or pressure another person.
  • Resell, redistribute, scrape, automate, or bulk-query the service without written permission.
  • Attempt to disrupt our services or infrastructure.
  • Misrepresent yourself or your organization.
Plain English:If you use Breach Reaper on somebody else's data, you are responsible for having permission. We can limit, suspend, or terminate access if use looks abusive.

3. Subscriptions and Payments

Paid tiers provide additional capabilities. Subscriptions are billed monthly and can be canceled from your account dashboard.

Because the service provides immediate access to digital intelligence, we generally do not offer refunds once a search has been performed. If you have a billing issue, reach out. We're human and we'll do our best to help.

Plain English: You pay for what you use. Cancel anytime. If you have a real problem, talk to us before disputing.

4. Your Privacy

We do not sell your personal data to third parties. Search results are processed for delivery and are not meant to become a permanent public profile inside Breach Reaper. We may keep limited operational records, such as account, billing, quota, abuse-prevention, and security logs, where needed to run the service and enforce these terms.

Plain English: We try to keep lookup content short-lived, but we still keep the boring account and safety records needed to operate.