Data Leak Test
DLP Validation and Testing


Your public IP address is:; more info

Updated Feb 14, 2020


SSL is: off ; more info

Mega Test


GET Test

Upload Test

Email Test

Industry Info

Session Info

About DLT

Data Loss (DLP) Email Self Test

Email/ SMTP should be detected by all Data Security tools for both Endpoint and Network based tools more info.

"Email" send an email though your corporate mail client to SMTP email traffic should be seen at the Data Security network layer and the Data Security Endpoint should detect data in the mail client. If the email is successfully received you will get a response email within a few minutes.

Test Email

How to test email for Data Loss (DLP)

1) Open your corporate mail client
2) Send an email to:
3) Add the test data into the email body or attachment or both
4) Send the Email
5) Immediately will reply if the email was successful
     a. if the email was successful, the data you sent was leaked
     b. if you did not receive a reply, your data was not leaked

Send it an email and it will reply if the email was successful. If no reply then the email was blocked, be sure to check your spam folder for the reply...

Use your mail client to test!


Frequently Asked Questions

1) What just happened?

    If you received a reply message to your email then your data was able to be leaked out of your organization. The data successfully left your possession.

2) Where did my data go?

    Your data was sent to mail servers using the email method and the result was sent back to you in the form of a reply. The data you submit is not kept by *

3) How do I protect my Data assets from leakage?

    A network based data security tool or an Endpoint based data security tool should be able to stop leaks that use the File Upload method.

4) What internet technologies commonly use the email/ SMTP method to get data?  

  • Email mistakes (extremely common)

  • Data theft



Email Method is the primary cause of large data leaks due to end user mistakes.

The email Method should be detected by all Data Security tools for data in the BODY as well as ATTACHMENTS for both Endpoint and Network based solutions.

If the Data Security product worked the email would have been blocked and no reply will be received. If a reply is received then the data was successfully leaked to the world.


*Email submissions are deleted upon arrival

Donate to help build free tools: donations help to pay the bills

Need help understanding how to protect your data? Please contact us and we will guide you.




Have data security questions? Want expert advice? Just want to say hello or give suggestions?

Please use the form to instantly message our team.

IGNITE Cyber Security