HomePII Info Scanner

PII Info Scanner

Scan text for PII such as ID numbers, phone numbers, emails and bank cards, with risk levels and position hints for log review and compliance checks

Input Text

Common PII Patterns

  • ID numbers: 18-digit resident ID format
  • Phone numbers: common 11-digit mobile numbers
  • Emails: standard mailbox with domain
  • Bank cards: common 13-19 digit cards
  • IP addresses: IPv4 and IPv6
  • License plates: standard civilian plates

Example Text

Zhang San 110101199001011234 Beijing
Phone: 13812345678
Email: user@example.com
Card: 6222021234567890123
IP: 192.168.1.1
Plate: 京A12345

Masking Notes

  • ID numbers: keep first 6 and last 4 digits
  • Phone numbers: keep first 3 and last 4 digits
  • Bank cards: keep first 4 and last 4 digits
  • Emails: keep first letter and domain
  • Others: show partial characters to reduce exposure

Compliance Tips

  • Follow data protection laws and avoid excessive collection
  • Encrypt sensitive data and enforce access controls
  • Scan logs and exports regularly for cleanup or masking
  • Implement data classification and audit processes


Documentation

About PII Info Scanner

This tool scans text for PII patterns with type selection, severity statistics, masked output display, and file import.

Key Features

  • Multi-type Detection: ID card, phone, email, bank card, IP, address, etc.
  • Risk Severity Summary: High/medium/low grouped counts.
  • Positioning: Line/column and type-specific descriptions.
  • Masked Display: Matched values are masked in results.
  • File Scan: Supports txt/csv/json/log input files.
  • Result Management: Remove item, clear, and sample loading.

Steps

  1. Paste text or upload a file.
  2. Select PII types to scan.
  3. Run scan and inspect summary/results.
  4. Fix issues and rescan.

Use Cases

  • Log sanitization and compliance checks.
  • Privacy review before data sharing.
  • Sensitive-data auditing in test datasets.

FAQ

Why do false positives happen?

Pattern matching may over-match edge cases; verify findings with context.

Is data uploaded externally?

Scanning runs locally in-browser, but you should still avoid pasting highly sensitive real production data.