About Dohrnii
Named after the immortal jellyfish, Turritopsis dohrnii
Our Mission
Dohrnii is a free, open-source security awareness tool designed to help individuals and organizations understand their exposure in data breaches. In an era where data breaches are increasingly common, we believe everyone should have access to tools that help them protect their digital identity.
Why "Dohrnii"?
The Turritopsis dohrnii, commonly known as the "immortal jellyfish," is a species of small jellyfish that can revert to its juvenile polyp stage after reaching maturity—essentially making it biologically immortal.
Just as this jellyfish represents resilience and renewal, Dohrnii aims to help you understand past security incidents so you can renew your digital security practices and build a more resilient online presence.
How It Works
When you enter an email address, Dohrnii queries multiple reputable security research databases simultaneously:
- XposedOrNot - Comprehensive breach analytics and risk scoring
- LeakCheck - Public breach database with exposed field information
- Have I Been Pwned - Password exposure checking via k-anonymity
- Ahmia.fi - Security research index for comprehensive coverage
Results are aggregated, deduplicated, and presented in a unified report with risk assessment and recommended actions.
Privacy First
We take your privacy seriously:
- We never store your email address
- All searches are processed in real-time
- No personal data is logged or retained
- Results are cached only as anonymized hashes
- We use minimal cookies for essential functionality
For more details, please review our Privacy Policy.
Open Source
Dohrnii is built with transparency in mind. The entire codebase is available for review, and we welcome contributions from the security community. Our goal is to provide a trustworthy tool that security-conscious users can verify for themselves.
About Our Data Sources
We aggregate data from established security research organizations that collect and index breach information for protective purposes. These sources are used by security professionals, researchers, and individuals worldwide to understand their exposure and improve their security practices. All data is sourced from publicly available breach notification services.
Disclaimer
Dohrnii is provided for educational and personal security awareness purposes only. The information provided should be used to improve your own security practices. We do not guarantee the completeness or accuracy of breach data, as we aggregate information from third-party sources. Always use strong, unique passwords and enable two-factor authentication regardless of breach status.