Before you commit · Apr 2026

Did they have a dating-app account? Find out in 60 seconds.

Cross-check an email against 28+ dating-app breach corpora — Ashley Madison, Adult Friend Finder, Zoosk, OkCupid, Plenty of Fish, eHarmony, MeetMindful, and more. Historical evidence. No scraping. No screenshots.

Free preview · no signup

Check your own email, or one someone consented to share. We hash the input — we don't store raw addresses.

  • HIBP-verified
  • No scraping
  • GDPR & CCPA compliant
  • Not a consumer report
Report · TL-0481

Dating-app footprint

4 signals detected

92%
  • Ashley Madison2015 · affair
  • Adult Friend Finder2016 · adult
  • Zoosk2020 · mainstream
  • MeetMindful2021 · mainstream

Historical evidence of past accounts — not proof of current activity. Signals are probabilistic. Not a consumer report.

Built on consented, public-data sources

Have I Been PwnedGravatarTwilio LookupHunter.ioTinEyeOpenCorporatesJudyrecords
Dating-app footprint

The question you came here to answer. Answered honestly.

We surface three kinds of dating-platform evidence a browser tab couldn't easily get you:

  • 01Breach-based signals. If an email appeared in a public dating-app leak (Ashley Madison, Adult Friend Finder, MeetMindful, Zoosk, OkCupid, POF, eHarmony…) we surface it, with year and source.
  • 02Public profile probes. A handful of dating sites still expose public profile pages — we probe them the same way a browser would.
  • 03Photo matches. Upload a picture — we reverse-search it across the public web, including indexed dating-profile pages.

Honest caveat: Tinder, Hinge, and Bumble don't expose public profiles — so we don't claim to. We surface what public data actually says. Anyone promising more is scraping, lying, or both.

Dating-app footprint

4 signals

Historical presence detected in public breach data. This is evidence of a past account, not a live one.

  • Ashley Madison2015 · affair
  • Adult Friend Finder2016 · adult
  • Zoosk2020 · mainstream
  • MeetMindful2021 · mainstream

Public profile probes · 7 sites

POF · matchBadoo · matchOkCupid · noMeetMe · no
Coverage includes: Ashley Madison · Adult Friend Finder · MeetMindful · Zoosk · OkCupid · Plenty of Fish · eHarmony · Match.com · SugarBook · Fling · Badoo · MeetMe · Tagged and more.

4.8 / 5 from 2,400+ reports run since private beta.

Ran my partner's email at 11pm and it came back clean. Best $29 I've ever spent on peace of mind.

Jordan M.

Seattle · Aug 2026

Breach data from 2016. A conversation I needed to have but was too scared to start. This gave me the facts.

Priya S.

Austin · Sep 2026

I almost bought a sketchy scraper site. Glad I found TrustLens instead — the reports actually make sense.

Daniel K.

Chicago · Oct 2026

How it works

Three honest steps.
Zero creepware.

  1. 01

    Attest your intent

    Confirm the search is about yourself, someone who consented, or public information only. We log it.

  2. 02

    Enter an identifier

    Email, username, or a profile photo. We hash it before storing — we don't keep raw PII.

  3. 03

    Read the signals

    A probabilistic footprint across ~40 sources — labelled with confidence, never stated as fact.

What you get

Signals from sources that actually allow it.

Core

Email presence scan

We check 12+ auth-aware endpoints (account-exists, password-reset) and breach databases to map where an identifier has accounts — without ever logging in.

Paid

Username fingerprint

A public URL probe across ~40 mainstream platforms. No content scraping — just profile existence.

Paid

Reverse image

Find where a profile photo already lives on the web, via TinEye + Vision API.

Paid

Public records

WHOIS, business filings, court records.

Consent mode

The anti-stalker feature nobody else ships.

Send a signed transparency link. Your partner (or candidate, or roommate) signs in with their own account, picks what to share, and delivers a verified self-report. You see what they choose to show you. Nothing more.

Request a transparency link Recipient controls what fields are shared.

From: Alex

"Hey — I'm using TrustLens to set some trust baselines before we go exclusive. Can you sign the transparency link when you get a sec? You pick what to share."

trustlensiq.com/c/ax9f2b →
Expires in 7 days End-to-end signed
Simple, kind pricing

Start with one report. Go further if you need to.

Single report

$29one-time

One identifier, full signal depth. No subscription.

  • 1 email / username / image scan
  • Full probabilistic report
  • Download PDF
  • Results retained 30 days
Run my report
Most popular

Clarity

$14.99/ month

Unlimited reports + weekly monitoring alerts. Cancel anytime.

  • Unlimited reports
  • Weekly monitoring alerts
  • Consent-mode links
  • Priority queue
  • Cancel anytime
Start monthly

Clarity Annual

$99/ year

45% off. For the due-diligence regulars.

  • Everything in Clarity
  • 5 consent links / mo
  • Bulk export
  • Cancel anytime
Save 45%
Straight answers

Questions people ask before signing up.

Is this legal?

Yes. We only use consented inputs and public APIs. We never scrape, impersonate, or bypass authentication. Every search requires an attestation that you're searching yourself, someone who consented, or public information.

Can I find out if my partner has been on a dating app?

For dating apps with public traces — often yes, probabilistically. We cross-reference the email against public breach datasets that include Ashley Madison, Adult Friend Finder, MeetMindful, Zoosk, OkCupid, Plenty of Fish, eHarmony, and 20+ others. We probe public profile URLs on sites that still have them (POF, AFF, Badoo, MeetMe, Tagged). And we reverse-search uploaded photos for matches on indexed dating pages.

What about Tinder, Hinge, and Bumble specifically?

Those three don't expose public profiles — so we don't claim to detect them. Any tool promising a live Tinder check is scraping, which violates terms of service and exposes you to liability. We'd rather ship an honest signal than a lawsuit.

Will the person I search know?

No for standard reports. The Consent-Mode Transparency Link is the opposite: the other person opts in, chooses what to share, and signs the report themselves.

Is this a background check?

No. TrustLens is not a consumer reporting agency. Reports cannot be used for employment, credit, tenancy, insurance, or any FCRA-covered purpose.

What do you do with my data?

We hash search inputs before storing — we don't keep raw emails or phone numbers. Results auto-expire after 30 days. You can delete your account any time.

Clarity in 60 seconds. Peace of mind for longer.

One identifier. Sixty seconds. A full probabilistic footprint report for $29 — no subscription.