Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations

Posted on July 28, 2025July 28, 2025 By CWS

A serious cybersecurity breach has uncovered the looking actions of customers visiting one of many web’s most infamous unlawful marketplaces. 

On Friday, July 18, cybersecurity agency UpGuard found an unprotected Elasticsearch database containing roughly 22 million data of internet requests, with 95% of visitors directed to leakzone[.]internet, a outstanding “leaking and cracking discussion board” that facilitates the distribution of hacking instruments, exploits, and compromised accounts. 

Key Takeaways1. 22 million data from the darkish internet discussion board Leakzone uncovered consumer IP addresses and places.2. 185,000 distinctive IPs compromised regardless of VPN/proxy use by guests accessing unlawful content material.3. Digital anonymity failed, doubtlessly enabling regulation enforcement to trace cybercriminals.

Every database entry contained important consumer data, together with IP addresses, geographic places, and web service supplier metadata, making a complete map of customer exercise to the underground cybercrime platform.

Exposes 22 Million Leakzone Data

The uncovered Elasticsearch database contained data spanning from June 25 to the time of discovery, capturing roughly a million requests per day with a median request measurement of two,862 bytes. 

The database schema revealed that 185,000 distinctive IP addresses accessed the platform throughout this three-week interval, considerably exceeding Leakzone’s registered consumer base of 109,000 accounts, in response to the UpGuard report.

This discrepancy signifies subtle privateness safety measures employed by customers, together with the usage of dynamic IP addresses and proxy servers.

Technical evaluation revealed that roughly 5% of requests (1,375,599 complete data from 3,983 IP addresses) have been routed by public proxies, recognized by database fields marked as “is_proxy” and “proxy_type” with values of “PUB”. 

Extra considerably, investigators recognized proof of in depth VPN utilization, significantly by Cogent Communications infrastructure, the place the third, fourth, and sixth most energetic IP addresses all belonged to this VPN service supplier. 

The visitors distribution sample urged these heavily-used IP addresses represented VPN exit nodes serving a number of customers slightly than particular person connections.

The leaked information presents extreme privateness implications for customers of the illicit discussion board, as IP addresses are categorized as Personally Identifiable Info (PII) beneath GDPR laws resulting from their functionality for cross-platform consumer identification. 

Geographic evaluation revealed international visitors distribution with notable exceptions, significantly the absence of direct connections from China, suggesting Chinese language customers route visitors by proxy servers in different international locations. 

Cloud service suppliers, together with Amazon, Microsoft, and Google, appeared prominently within the visitors logs, indicating customers leverage mainstream infrastructure for anonymization functions.

The breach highlights the vulnerability of customers searching for anonymity on unlawful platforms. Whereas 39% of IP addresses appeared solely as soon as within the logs, doubtlessly representing customers with out VPN safety, the focus of visitors by identifiable VPN companies creates new alternatives for surveillance. 

Significantly given latest regulation enforcement successes together with the arrest of the suspected administrator of the XSS[.]is Russian hacking discussion board.

Expertise quicker, extra correct phishing detection and enhanced safety for what you are promoting with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Addresses, Dark, Database, Exposes, Forum, Leak, Locations, Million, Users, Web, Zone

Post navigation

Previous Post: ToolShell Exploit Chain Attacking SharePoint Servers to Gain Complete Control
Next Post: Why It Needs a Modern Approach

Related Posts

Hackers Using Dedicated Phishlet to Launch FIDO Authentication Downgrade Attacks Cyber Security News
Microsoft Exchange Online Service Down Cyber Security News
Multiple 0-days to Bypass BitLocker and Extract All Protected Data Cyber Security News
Kali Linux Unveils Two New Tools to Boost Wi-Fi Performance for Raspberry Pi Users Cyber Security News
Windows Docker Desktop Vulnerability Leads to Full Host Compromise Cyber Security News
New Zip Slip Vulnerability Allows Attackers to Manipulate ZIP Files During Decompression Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Choosing the Right Tool for Network Penetration Testing
  • FBI Warns of UNC6040 and UNC6395 Targeting Salesforce Platforms in Data Theft Attacks
  • EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections
  • New Malvertising Campaign Leverages GitHub Repository to Deliver Malware
  • Buterat Backdoor Attacking Enterprises to Establish Persistence and Control Endpoints

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News