What Strangers Know About Your Home
A Homeowner’s Guide to Personal Security Exposure
Introduction
You lock your doors. You set your alarm. You think you’re secure.
But here’s what you don’t realize: A complete stranger can learn more about you, your family, and your home in 30 minutes using free public websites than most people know about themselves.
Your address is public. Your phone number is searchable. Your family members are listed online. Your home’s value, property details, and ownership history are available. Crime statistics for your neighborhood are published. Your personal information has likely been exposed in data breaches. Photos of your home are on Google Street View.
An attacker doesn’t need to hack anything. They don’t need special tools. They just need to know where to look.
This article shows you exactly what information is publicly available about you and your home—and what you should do about it. By the end, you’ll understand your personal security exposure and how to reduce it.
Why This Matters for Homeowners
Consider a real scenario: A burglar is planning a break-in. Before they ever approach your home, they research you online. They find:
- Your address — Listed on public records websites, reverse phone lookups, and property databases.
- Your family members — Names, ages, and photos on social media and public records.
- Your work schedule — Inferred from your social media posts (“Just landed in Miami for a week!”).
- Your home’s value — Public property records show your home is worth $500,000+ (worth targeting).
- Your security setup — You’ve posted photos of your new Ring doorbell and smart lock on social media.
- Crime in your area — They check local crime statistics and discover your neighborhood has low police response times (good for them).
- Your vacation plans — You posted on Facebook that you’ll be gone for two weeks in July.
Each piece of information is a clue. Together, they paint a complete picture of your vulnerability.
A professional security assessment starts here. By understanding what information about you is public, you can take steps to reduce your exposure.
The Tools (All Free, All Public)
The following websites are completely free and require no special access. They’re used by security researchers, investigators, and yes, criminals. You should know what they reveal about you.
1. HaveIBeenPwned.com — Personal Data Breach Lookup
What it shows:
Every data breach that includes your email address or personal information.
Why it matters:
If your email or personal data has been exposed in a breach, attackers have your information. They can use it for phishing, identity theft, or social engineering. You need to know if you’ve been compromised.
How to use it:
- Go to https://haveibeenpwned.com
- Enter your email address
- Click “Search”
- Review the results
What to look for:
- Breach count — How many breaches include your email? Even one is concerning.
- Breach details — Which companies were breached? When? What data was exposed?
- Data exposed — Does the breach include just your email, or also passwords, phone numbers, addresses, or financial information?
- Breach recency — Are the breaches old (5+ years) or recent? Recent breaches are more concerning.
Example finding:
Your email appears in 7 data breaches: LinkedIn (2021), Yahoo (2014), Equifax (2017), Adobe (2013), Target (2013), Facebook (2019), and Marriott (2018). This indicates your email has been exposed multiple times over the years.
What this means:
Your email is known to attackers. You’re at higher risk for phishing, credential stuffing attacks, and social engineering.
Action:
- Change your password immediately, especially if you’ve reused it across services.
- Enable two-factor authentication on critical accounts (email, banking, social media).
- Monitor your credit reports for fraud.
- Use a password manager to generate unique passwords for each service.
2. ThatsThem.com — Reverse Phone & Address Lookup
What it shows:
Your name, address, phone number, email addresses, age, relatives, and other personal information—all linked together.
Why it matters:
This is what a stranger sees when they search for you. It reveals your address, family members, and contact information. This information can be used for targeted attacks, social engineering, or worse.
How to use it:
- Go to https://thatsthem.com
- Enter your phone number, email, or name
- Click “Search”
- Review what appears
What to look for:
- Your address — Is your current address listed? Old addresses?
- Your phone number — Is it publicly associated with your name?
- Your email addresses — Are all your email addresses listed?
- Family members — Are your spouse, children, or relatives listed?
- Age and DOB — Is your age or date of birth publicly available?
- Relatives section — Can someone easily identify your family members?
Example finding:
A search for your phone number reveals your full name, current address, age (47), and lists your spouse and two adult children with their phone numbers and addresses.
What this means:
A stranger can easily identify you, find your home address, and locate your family members. This information can be used for targeted burglary, social engineering, or worse.
Action:
- Request removal from ThatsThem.com (they have an opt-out process).
- Do the same for other people search sites (Spokeo, Whitepages, BeenVerified, etc.).
- Consider using a PO Box or mail forwarding service instead of your home address for public records.
- Limit what you share on social media about your family.
3. Google Maps Street View — Visual Reconnaissance
What it shows:
Photographs of your home’s exterior, your driveway, your front door, your vehicles, and your neighborhood.
Why it matters:
An attacker can see your home before they ever visit it. They can identify entry points, security cameras, alarm system signs, and neighborhood patterns. They can see what vehicles you own and where you park them.
How to use it:
- Go to https://maps.google.com
- Search for your address
- Click the Street View icon (camera icon)
- Review the photographs
What to look for:
- Entry points — How many doors and windows are visible from the street?
- Security measures — Are there visible security cameras, alarm system signs, or motion-sensor lights?
- Vehicles — What vehicles are in your driveway? Are they expensive? Are they always there?
- Landscaping — Are there bushes or trees that could hide an intruder?
- Neighborhood — Are there other homes nearby? How busy is the street?
- Lighting — Is the area well-lit at night?
Example finding:
Street View shows your home has a large front window with no curtains, a side gate with no lock, and a driveway with two expensive vehicles. The neighborhood is quiet with few streetlights.
What this means:
An attacker can see that your home is vulnerable, has valuable items (vehicles), and is in a quiet area with low visibility.
Action:
- Request removal of your home from Street View (Google allows this).
- Install visible security cameras and alarm system signs.
- Add curtains or blinds to front windows.
- Improve outdoor lighting.
- Secure gates and side entrances.
- Park vehicles in a garage if possible.
4. Zillow / Realtor.com — Property Information
What it shows:
Your home’s value, square footage, number of bedrooms/bathrooms, lot size, property history, and sale prices.
Why it matters:
This information reveals the value of your home and what’s inside. It tells an attacker whether your home is worth targeting and what security measures you might have.
How to use it:
- Go to https://www.zillow.com or https://www.realtor.com
- Search for your address
- Review the property details
What to look for:
- Estimated home value — What does your home sell for? Is it a high-value target?
- Property details — How many bedrooms, bathrooms, square footage? This indicates what’s inside.
- Lot size — Is your property large? Does it have privacy or is it exposed?
- Property history — When was it built? When was it last sold? Has it changed hands frequently?
- Tax records — What are your property taxes? This can indicate home value.
Example finding:
Your home is listed as a $750,000 property with 4 bedrooms, 3 bathrooms, and a swimming pool. It was last sold 2 years ago.
What this means:
Your home is a high-value target. An attacker knows it’s worth breaking into.
Action:
- Request removal from Zillow and Realtor.com if possible (limited options).
- Don’t post photos of expensive items (jewelry, art, electronics) on social media.
- Invest in security measures appropriate to your home’s value.
- Consider a safe or security deposit box for valuables.
5. County Property Records — Ownership & Tax Information
What it shows:
Your name as the property owner, your mailing address, property tax amount, and sometimes your phone number or email.
Why it matters:
This confirms your ownership and provides additional contact information. It can be used to verify your identity for social engineering or to target you for scams.
How to use it:
- Go to your county’s assessor or property records website
- Search for your address
- Review the ownership and tax information
What to look for:
- Owner name — Is your name listed? Spouse’s name?
- Mailing address — Is it your home address or a different address?
- Phone number / Email — Are your contact details listed?
- Property tax — What are you paying in taxes? (Indicates home value)
- Ownership history — When did you buy? From whom?
Example finding:
Your name is listed as the owner, your home address is the mailing address, and your phone number is publicly listed.
What this means:
A stranger can confirm you own the home and has your contact information.
Action:
- Use a PO Box or mail forwarding service as your mailing address instead of your home address.
- Request removal of your phone number from county records (varies by county).
- Consider a trust or LLC for property ownership to obscure your personal name (consult a lawyer).
6. Crime Statistics Websites — Neighborhood Safety Data
What it shows:
Crime rates, types of crimes, and incident locations in your neighborhood.
Why it matters:
This tells an attacker whether your neighborhood is safe or dangerous, whether police are responsive, and what types of crimes are common. It also tells you whether you’re in a high-crime area.
How to use it:
- Go to https://www.neighborhoodscout.com or your local police department’s crime statistics page
- Search for your address or neighborhood
- Review the crime statistics
What to look for:
- Crime rate — Is your neighborhood above or below average for your city?
- Types of crimes — What crimes are most common? Burglary? Theft? Violent crime?
- Incident locations — Are crimes concentrated near your home or spread throughout the neighborhood?
- Trend — Is crime increasing or decreasing?
- Police response time — How quickly do police respond to calls?
Example finding:
Your neighborhood has a burglary rate 40% higher than the city average. Most burglaries occur between 9 AM and 3 PM (when homes are empty). Police response time is 12 minutes.
What this means:
Your neighborhood is a target for burglars. They know police response is slow enough to complete a break-in.
Action:
- Invest in security measures (cameras, alarm system, reinforced doors/windows).
- Vary your routine so burglars can’t predict when you’re home.
- Get to know your neighbors and watch out for each other.
- Report suspicious activity to police.
- Consider a security system with professional monitoring.
7. Social Media — Behavioral Intelligence
What it shows:
Your routines, travel plans, family information, and personal habits—all posted publicly.
Why it matters:
Social media reveals when you’re home, when you’re away, where you go, and what you own. An attacker can use this to plan a break-in.
How to use it:
- Search for yourself on Facebook, Instagram, Twitter, LinkedIn
- Review what you’ve posted publicly
- Review what your family members have posted about you
What to look for:
- Location tags — Are you tagging your location at home, work, or vacation?
- Travel posts — Are you announcing that you’ll be away?
- Photos of valuables — Are you posting photos of jewelry, electronics, or art?
- Home photos — Are you posting interior photos that reveal what’s inside?
- Routine posts — Do your posts reveal a predictable routine?
- Family information — Are you posting information about your spouse or children?
Example finding:
You posted “Just landed in Miami! Two weeks of sun and relaxation!” with a photo of the beach. Your home is empty and an attacker knows it.
What this means:
An attacker knows your home is empty for two weeks.
Action:
- Don’t post about travel until after you return.
- Don’t post location tags from your home.
- Don’t post photos of valuables.
- Limit who can see your posts (friends only, not public).
- Ask family members to do the same.
- Consider a house sitter or asking a neighbor to check on your home while you’re away.
8. LinkedIn — Professional Information
What it shows:
Your job title, employer, work location, and professional network.
Why it matters:
This reveals your work schedule and location. An attacker can use this to determine when your home is empty.
How to use it:
- Go to https://www.linkedin.com
- Search for yourself
- Review your profile
What to look for:
- Job title and employer — Where do you work? How far is it from home?
- Work location — Is it a fixed location or do you work remotely?
- Connections — Do your connections reveal your routine?
- Endorsements — What skills are you known for? (Can indicate what you have at home)
Example finding:
Your LinkedIn profile shows you work as a software engineer at a tech company downtown, 45 minutes from your home. Your work hours are 9-5.
What this means:
An attacker knows you’re away from home 9-5 on weekdays.
Action:
- Limit your LinkedIn profile to connections only.
- Don’t post your work location or hours.
- Consider using a different name or nickname on LinkedIn if possible.
Putting It Together: A Personal Security Exposure Assessment
Now that you understand the tools, let’s walk through a complete personal security exposure assessment. This should take 20-30 minutes.
Step 1: Check Your Data Breach Exposure (HaveIBeenPwned)
- Go to https://haveibeenpwned.com
- Enter your primary email address
- Document any breaches
- Repeat for any other email addresses you use
Questions to ask: How many breaches include your email? What data was exposed (email only, or passwords, phone, address)? Are the breaches recent or old?
Step 2: Check Your Personal Information Exposure (ThatsThem)
- Go to https://thatsthem.com
- Search for your phone number
- Document what appears
- Repeat with your email address and full name
Questions to ask: Is your address listed? Are your family members listed? Is your phone number associated with your name? How much personal information is publicly available?
Step 3: Check Your Home’s Visual Exposure (Google Maps)
- Go to https://maps.google.com
- Search for your address
- Click Street View
- Review the photographs
Questions to ask: What can you see from the street? Are security measures visible? Are there entry points visible? What vehicles are in your driveway?
Step 4: Check Your Home’s Value (Zillow)
- Go to https://www.zillow.com
- Search for your address
- Document the estimated value and property details
Questions to ask: How much is your home worth? Is it a high-value target? What property details are listed?
Step 5: Check County Records
- Go to your county assessor’s website
- Search for your address
- Document the ownership and tax information
Questions to ask: Is your name publicly listed as the owner? Is your contact information listed? Is your mailing address your home address?
Step 6: Check Crime Statistics
- Go to https://www.neighborhoodscout.com or your local police department website
- Search for your neighborhood
- Document the crime statistics
Questions to ask: Is your neighborhood above or below average for crime? What types of crimes are most common? What’s the police response time?
Step 7: Audit Your Social Media
- Search for yourself on Facebook, Instagram, Twitter, LinkedIn
- Review all public posts
- Document what information is publicly available
Questions to ask: What personal information have you posted publicly? Have you posted about travel plans or vacations? Have you posted photos of valuables? Have you tagged your location?
Step 8: Document Your Findings
Create a simple list:
| Exposure | Source | Severity | Action Required |
|---|---|---|---|
| Email in 5 data breaches | HaveIBeenPwned | High | Change passwords, enable 2FA |
| Address and phone listed on ThatsThem | ThatsThem | High | Request removal from people search sites |
| Home value $750K listed on Zillow | Zillow | Medium | Don’t post about valuables on social media |
| Neighborhood burglary rate 40% above average | CrimeReports | Medium | Improve home security measures |
| Posted vacation plans on Facebook | Social Media | High | Stop posting travel plans until after returning |
What Your Findings Mean
Green Flags (Low Exposure)
- Email not in any recent breaches
- Minimal personal information on people search sites
- Home value moderate, not a high-value target
- Neighborhood crime rate below average
- Social media posts are private or minimal personal information
What to do: Continue monitoring. Review this assessment annually.
Yellow Flags (Medium Exposure)
- Email in 1-2 older breaches (5+ years)
- Some personal information on people search sites, but limited
- Home value moderate, some security concerns
- Neighborhood crime rate average or slightly above
- Social media posts are mostly private, but some public posts
What to do: Take action on the items listed. Request removal from people search sites. Improve home security. Limit social media sharing.
Red Flags (High Exposure)
- Email in multiple recent breaches
- Extensive personal information on people search sites (address, phone, family members)
- Home is high-value target
- Neighborhood crime rate significantly above average
- Social media posts reveal travel plans, valuables, or routines
What to do: Take immediate action. This indicates significant vulnerability. You need professional help.
Action Steps You Can Take Today
Immediate (Today)
- Check HaveIBeenPwned — Know if your email has been breached
- Change passwords — For any accounts associated with breached emails
- Enable 2FA — On critical accounts (email, banking, social media)
- Review social media — Delete posts about travel, valuables, or routines
Short-term (This Week)
- Request removal from people search sites — ThatsThem, Spokeo, Whitepages, BeenVerified
- Audit Google Street View — Request removal of your home if concerned
- Review county records — Check what’s publicly listed about you
- Improve outdoor lighting — Add motion-sensor lights to entry points
- Install visible security measures — Cameras, alarm system signs
Medium-term (This Month)
- Upgrade door locks — Install deadbolts on all exterior doors
- Reinforce windows — Add window locks or security bars
- Install security system — Consider professional monitoring
- Secure valuables — Use a safe for jewelry, documents, electronics
- Get to know neighbors — Build a community watch network
Long-term (This Quarter)
- Consider a trust or LLC — For property ownership (consult a lawyer)
- Use PO Box for mail — Instead of home address on public records
- Vary your routine — Don’t establish predictable patterns
- Monitor credit — Check for fraud regularly
- Professional security assessment — Have an expert evaluate your home
When to Call a Professional
This DIY assessment is a great starting point. But there are situations where you need professional help:
Call a security professional if:
- You find extensive personal information publicly available
- Your neighborhood has high crime rates
- You’ve been targeted or experienced a break-in
- You’re a high-net-worth individual or public figure
- You have specific security concerns (stalking, harassment, threats)
- You want a comprehensive security assessment
A professional security assessment for your home includes:
- Physical security evaluation — Doors, windows, locks, entry points
- Alarm system design — Placement of sensors and cameras
- Lighting assessment — Outdoor lighting and visibility
- Landscaping review — Sight lines and hiding places
- Behavioral assessment — Routines, social media, and exposure
- Remediation plan — Prioritized security improvements
Concerned About Your Exposure?
If your security exposure assessment revealed concerning findings, you’re not alone. Most homeowners have some level of exposure. The good news is that it’s fixable.
At Silent Sentinel Consulting, we specialize in residential security. We can help you understand your exposure and develop a plan to reduce your risk.
Schedule a Home Security AssessmentWhat will you do with this information?
Your personal security exposure is real. Information about you, your family, and your home is publicly available. An attacker can learn everything they need to know about you without ever breaking the law.
But you’re not helpless. By understanding what information is public, you can take steps to reduce your exposure. You can request removal from people search sites. You can improve your home’s physical security. You can limit what you share on social media. You can vary your routine.
The question is: What will you do with this information?
Ready for a Professional Assessment?
You’ve now learned how to assess your own security exposure. If you’d like professional guidance on improving your home security, Silent Sentinel Consulting is here to help.
Contact Silent Sentinel ConsultingResources
- HaveIBeenPwned.com — Data Breach Lookup
- ThatsThem.com — People Search & Removal
- Google Maps Street View — Vis
- Zillow.com — Property Information
- NeighborhoodScout.com — Neighborhood Crime Data
- Your local police department website — Official crime reports and statistics

