Free DLP Test Data — Credit Cards, SSNs, PHI & More

Synthetic sensitive data for testing your DLP scanner. Luhn-valid card numbers, fake SSNs, HIPAA PHI records, API keys — safe to use, zero real PII.
Live Detection Demo

Click "Run Detection" on each tab to see how Strac identifies sensitive data in real time.

Hi John, CC: 4532015112830366, CVV: 456, Exp 12/28. SSN: 123-45-6789. Bank routing: 021000021 / Account: 987654321.
PDF patient_record_20240312.pdf — Page 1 of 3
Patient Name: John Michael Smith
Date of Birth: 01/15/1980
SSN: 123-45-6789
MRN: 789456123
Diagnosis: Type 2 Diabetes Mellitus (E11.9)
Medications: Metformin 1000mg, Lisinopril 10mg
Insurance ID: BC-987654321
OCR-powered detection — Strac reads PII embedded inside images (JPEG, PNG).
4532 0151 1283 0366
Card Holder
JOHN M SMITH
Expires
12/28
VISA

Sample Test Data

Luhn-valid card numbers, synthetic SSNs, and test credentials. Copy any value to your clipboard.

💳
Credit Cards (PCI DSS)
Luhn-valid
Visa 4532015112830366
Mastercard 5425233430109903
Amex 374251018720018
Discover 6011000991300009
CVV 456 / 123 / 7890
🪪
Social Security Numbers
Synthetic
SSN 1 123-45-6789
SSN 2 234-56-7890
SSN 3 345-67-8901
EIN 12-3456789
ITIN 912-34-5678
🏥
Protected Health Info (PHI)
HIPAA
Name John Michael Smith
DOB 01/15/1980
Diagnosis Type 2 Diabetes (E11.9)
MRN 789456123
Insurance BC-987654321
🔑
API Keys & Tokens
Test only
Stripe sk-test-4eC39HqLyjWDarjtT7zdp
AWS AKIA2EXAMPLE000000001
GitHub ghp_xyzABCD1234567890abcd
OpenAI sk-proj-tESTkeyABCDEFGH
Bearer eyJhbGciOiJIUzI1NiJ9.test
🏦
Bank Account Data
US routing
Routing 021000021
Account 123456789
IBAN GB29NWBK60161331926819
SWIFT CHASUS33XXX
Sort Code 60-16-13
👤
Personal Identifiers (PII)
GDPR / CCPA
Email john.smith@example.com
Phone +1 (555) 867-5309
Address 742 Evergreen Terrace, Springfield, IL 62701
Passport US-A12345678
DL D1234567 (IL)


Why Test With Strac

Most DLP tools miss sensitive data hiding in plain sight. Here's what sets Strac apart.

Only DLP on market
🖼️

Detects PII inside images

Strac uses OCR to find credit cards, SSNs, and PHI embedded inside JPEG, PNG, and screenshots — not just text. No other DLP tool does this.

📄

Deep document scanning

Scans inside PDFs, Word, Excel, and ZIP files for hidden sensitive data — not just filenames or metadata. Works on attachments in Slack, Gmail, and S3.

🎯

High accuracy, low noise

Custom ML models trained on PCI, HIPAA, and GDPR data. 99%+ detection accuracy with minimal false positives — not regex patterns that over-trigger.

Deploys in under 10 minutes

Agentless. Connect Slack, Gmail, Google Drive, GitHub, AWS S3, and 50+ more integrations in minutes — no endpoint agents, no complex proxies.


Frequently Asked Questions

Common questions about DLP testing, test data, and how Strac works.

DLP test data is synthetic sensitive information — fake credit card numbers, SSNs, PHI records, and API keys — specifically designed to trigger DLP detectors without exposing real data. It lets security teams verify that their DLP tool is scanning correctly, without putting actual customer data at risk. All data on this page is entirely fabricated and safe to use in any environment.
The standard approach: copy a test value (like a Luhn-valid credit card number or synthetic SSN from this page), paste it into the channel your DLP monitors — a Slack message, Gmail draft, Google Doc, or S3 file — and verify your tool flags it. For document DLP, upload one of the downloadable test files above. For image DLP, screenshot the credit card on this page and upload it. If your tool misses the image, Strac can fill that gap.
They are Luhn-valid — meaning they pass the checksum algorithm that card networks use to verify formatting — but they are not real cards and will be declined by any payment processor. This is intentional: DLP tools detect based on format pattern, not whether the card is active. Luhn-valid test numbers are the industry standard for DLP testing because they match exactly what a DLP detector looks for.
No. The downloadable files use SSNs with area codes in the 900–999 range, which the Social Security Administration has never assigned to any real person. The static values shown on this page (e.g. 123-45-6789) are universally recognized test patterns. Both are safe to use for DLP validation without any risk of matching a real individual's SSN.
At minimum: plain text, CSV, PDF, Word (.docx), and Excel (.xlsx). A comprehensive DLP tool should also handle ZIP archives (scanning contents), images (JPEG, PNG via OCR), and structured data in cloud storage like S3 or Snowflake. Most legacy DLP tools only scan plain text and miss sensitive data embedded in documents or images — which is where real breaches happen.
DLP testing maps directly to several compliance requirements: PCI DSS requires protecting cardholder data (credit card numbers, CVVs); HIPAA requires safeguarding PHI including patient names, MRNs, diagnoses, and insurance IDs; GDPR and CCPA cover PII like emails, phone numbers, and addresses; SOC 2 CC6.7 requires data transmission controls. The test files on this page cover all four categories.
Three things stand out: (1) Image detection — Strac is the only DLP that uses OCR to find sensitive data inside JPEG and PNG files, catching what every other tool misses. (2) Agentless deployment — no endpoint software to install; connect via API in under 10 minutes. (3) Remediation depth — beyond alerting, Strac can redact, mask, delete, or revoke access inline. It covers SaaS (Slack, Gmail, GitHub), cloud (AWS S3, Snowflake), GenAI tools (ChatGPT, Copilot), and endpoints in one platform.

DLP + DSPM

SaaS, Cloud, Gen AI