Skip to content

VIP Emails

VIP Emails monitoring allows you to protect security of private accounts used by important individuals related to your organisation, for example, C-level executives. This functionality allows you to monitor whether their private email account was included in a breach, even if it's not located at one of your monitored domains (ie. because they use Gmail, Protonmail or similar provider), while maintaining confidentality (only the owner of the monitored email account will receive the full details) and transparency (you'll still be notified when breach happens).

For now, all pricing plans include possibility to add 2 VIP Emails for monitoring. If you wish to monitor more VIP Emails, please contact us.

Adding new VIP Email

Adding new monitored VIP Email is easy. Just click the appropriate section in the sidebar, then click the Add Email button.
HackedList.io Portal: VIP Emails

Enter the email address, accept our Terms of Service and click Add VIP Email.

HackedList.io Portal: VIP Emails / add new email

This will initiate the verification process, as described below. Request has to be confirmed by the user affected.

HackedList.io Portal: VIP Emails / not confirmed

Verification process

Verification email will be delivered to the address you specified. This is done in order to protect the privacy of the user - email may be monitored only with the user's consent.

HackedList.io Portal: VIP Emails / confirmation email

Once the user clicks the link, monitoring starts. You'll be able to see whether or not we've detected any breaches related to the email address you specified:

HackedList.io Portal: VIP Emails / confirmation email

Responding to breach

If our systems detect that user's email address appeared in any breach (even the one's you don't see in the Breaches section, because they don't happen on any of your monitored domains), we'll immediately notify both you and the user affected.

However, we'll only send the full details to the user, because it might contain confidential data.

If you wish to investigate the breach further, you'll have to do so in cooperation with the affected user. We might provide you with help and further details only if the user consents to this.

Should you have any question about the process, please contact us.