Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations

Posted on July 28, 2025July 28, 2025 By CWS

A serious cybersecurity breach has uncovered the looking actions of customers visiting one of many web’s most infamous unlawful marketplaces. 

On Friday, July 18, cybersecurity agency UpGuard found an unprotected Elasticsearch database containing roughly 22 million data of internet requests, with 95% of visitors directed to leakzone[.]internet, a outstanding “leaking and cracking discussion board” that facilitates the distribution of hacking instruments, exploits, and compromised accounts. 

Key Takeaways1. 22 million data from the darkish internet discussion board Leakzone uncovered consumer IP addresses and places.2. 185,000 distinctive IPs compromised regardless of VPN/proxy use by guests accessing unlawful content material.3. Digital anonymity failed, doubtlessly enabling regulation enforcement to trace cybercriminals.

Every database entry contained important consumer data, together with IP addresses, geographic places, and web service supplier metadata, making a complete map of customer exercise to the underground cybercrime platform.

Exposes 22 Million Leakzone Data

The uncovered Elasticsearch database contained data spanning from June 25 to the time of discovery, capturing roughly a million requests per day with a median request measurement of two,862 bytes. 

The database schema revealed that 185,000 distinctive IP addresses accessed the platform throughout this three-week interval, considerably exceeding Leakzone’s registered consumer base of 109,000 accounts, in response to the UpGuard report.

This discrepancy signifies subtle privateness safety measures employed by customers, together with the usage of dynamic IP addresses and proxy servers.

Technical evaluation revealed that roughly 5% of requests (1,375,599 complete data from 3,983 IP addresses) have been routed by public proxies, recognized by database fields marked as “is_proxy” and “proxy_type” with values of “PUB”. 

Extra considerably, investigators recognized proof of in depth VPN utilization, significantly by Cogent Communications infrastructure, the place the third, fourth, and sixth most energetic IP addresses all belonged to this VPN service supplier. 

The visitors distribution sample urged these heavily-used IP addresses represented VPN exit nodes serving a number of customers slightly than particular person connections.

The leaked information presents extreme privateness implications for customers of the illicit discussion board, as IP addresses are categorized as Personally Identifiable Info (PII) beneath GDPR laws resulting from their functionality for cross-platform consumer identification. 

Geographic evaluation revealed international visitors distribution with notable exceptions, significantly the absence of direct connections from China, suggesting Chinese language customers route visitors by proxy servers in different international locations. 

Cloud service suppliers, together with Amazon, Microsoft, and Google, appeared prominently within the visitors logs, indicating customers leverage mainstream infrastructure for anonymization functions.

The breach highlights the vulnerability of customers searching for anonymity on unlawful platforms. Whereas 39% of IP addresses appeared solely as soon as within the logs, doubtlessly representing customers with out VPN safety, the focus of visitors by identifiable VPN companies creates new alternatives for surveillance. 

Significantly given latest regulation enforcement successes together with the arrest of the suspected administrator of the XSS[.]is Russian hacking discussion board.

Expertise quicker, extra correct phishing detection and enhanced safety for what you are promoting with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Addresses, Dark, Database, Exposes, Forum, Leak, Locations, Million, Users, Web, Zone

Post navigation

Previous Post: ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control
Next Post: Why It Needs a Modern Approach

Related Posts

New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Microsoft Investigating Teams and Exchange Online Services Disruption Impacting Users Cyber Security News
VMware Cloud Foundation 9.0 Released With Modern Workloads & AI Services Cyber Security News
Ransomware Operations Surge Following Qilin’s New Pattern of Attacks Cyber Security News
Sophos Intercept X for Windows Vulnerabilities Enable Arbitrary Code Execution Cyber Security News
Microsoft Teams New Meeting Join Bar Reminds You to Join Meeting On-time Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Respond to a Sextortion Threat
  • Senate Committee Advances Trump Nominee to Lead CISA
  • ToxicPanda Android Banking Malware Infected 4500+ Devices to Steal Banking Credentials
  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News