Get the whois data for any IP address.
Enter a hashed password, and get back their cracked, plaintext equivilents.
Enter a plaintext password, and get back the cracked, leaked hashes they were derived from.
Check an email or username against large combolists.