Quickstart

Go from sign-up to your first detected leak in five minutes.

This quickstart gets you from zero to your first detected credential leak in about five minutes. The full walkthrough, including team management and custom monitors, is covered in the onboarding guide.

Before you start

You need:

  • A professional email address (free email providers like Gmail or Outlook are not accepted on paid plans)
  • Access to the DNS records of one of your domains (to verify ownership)
  • A modern browser (Chrome, Firefox, Safari, Edge, all current versions)

Step 1. Create your account

Go to app.stealed.io/sign-up and create your account using email + password or one of the SSO providers (Google, Microsoft).

Sign-in page with email field and SSO providers

Step 2. Create your organization

After authentication, you are prompted to create an organization. Choose:

  • A display name: appears in the UI and emails (e.g. "Acme Corp")
  • A slug: used in URLs and API paths, lowercase with hyphens (e.g. acme-corp)
  • A plan: start on Free to try the platform; Pro and Enterprise unlock multi-channel alerting and higher retention

Organization onboarding flow during sign-up

Step 3. Add your first domain

From the left sidebar, open Settings → Domains and click Add domain.

Enter your root domain (e.g. acme.com). Stealed will automatically watch all subdomains under it (portal.acme.com, api.acme.com, etc.).

Domain management page where you add and watch a root domain

Step 4. Verify domain ownership

Stealed displays a TXT record you must add to your domain's DNS zone:

_stealed-verification.acme.com    TXT    "stealed-verify=abc123def456..."

Add the record on your DNS provider (Cloudflare, OVH, Route 53, Google Domains all expose a TXT record creation flow). Stealed re-checks the record every few minutes and verifies your domain automatically once it propagates.

Verification can take up to one hour depending on your DNS provider's TTL.

Domain verification panel showing the TXT record name and value to copy

Step 5. Explore your first results

Once your domain is verified, Stealed starts checking incoming leaks against it in real time. Within a few hours you typically have your first matches if your domain has any history of credential leaks (most public-facing domains do).

Open Internal Insight from the sidebar to see compromised credentials linked to your domain. Each row shows the email, the masked password, the site the credential belonged to, and the detection date.

Detected leaks table with usernames, masked passwords, target sites and timestamps

If you want to be notified when new leaks are detected, the next step is configuring a monitor and a notification channel. See Create a monitor.

Next steps

On this page