FRONTLINEPRIVACY
Threat

Address exposure

Most address leaks start with a property record, voter roll, or court appearance — then get scraped, copied, and sold by data brokers.

Run a free scan. No signup.

What this is

Address exposure is the underlying problem behind doxxing, swatting, stalking, and family targeting. Your home address is on broker pages because somewhere upstream, your address is in a public record. Brokers scrape from public records, commercial data feeds, and each other. Once your address is in the pipeline, it spreads fast.

The biggest sources, in rough order:

  1. Property records (county recorders publish deed transfers and tax data online)
  2. Voter rolls (public to candidates, parties, and certain researchers; downstream into commercial brokers)
  3. Court filings (civil suits, divorce, traffic — many list addresses in the body)
  4. DMV records — the federal Driver's Privacy Protection Act limits what state DMVs can hand out. State rules vary on top.
  5. Commercial data sales (utilities, credit reports, retailers — leaked, breached, or sold)

Why first responders catch this more

The job often comes with an enhanced legal protection — state-level address-confidentiality elections, plus a broker-removal statute (Daniel's Law in NJ) if you're lucky enough to live in one of the dozen-or-so states that have one. The broker pipeline doesn't honor those protections by default.

Cops, judges, and firefighters who think they're shielded because they filed the state election are often surprised when a broker pulls their old address — scraped from a property record before the election was ever filed.

What we sweep that prevents the chain

We file opt-outs across 200+ broker sites and re-check every two weeks. The state-level shields close the agency disclosure path going forward. We close the way brokers re-publish data the agency just sealed.

For specific exposure sources, see the sub-pages: property records, voter rolls, court appearance.