Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Leak Zone Dark Web Forum Database Exposes 22 Million Users’ IP Addresses and Locations

Posted on July 28, 2025July 28, 2025 By CWS

A serious cybersecurity breach has uncovered the looking actions of customers visiting one of many web’s most infamous unlawful marketplaces. 

On Friday, July 18, cybersecurity agency UpGuard found an unprotected Elasticsearch database containing roughly 22 million data of internet requests, with 95% of visitors directed to leakzone[.]internet, a outstanding “leaking and cracking discussion board” that facilitates the distribution of hacking instruments, exploits, and compromised accounts. 

Key Takeaways1. 22 million data from the darkish internet discussion board Leakzone uncovered consumer IP addresses and places.2. 185,000 distinctive IPs compromised regardless of VPN/proxy use by guests accessing unlawful content material.3. Digital anonymity failed, doubtlessly enabling regulation enforcement to trace cybercriminals.

Every database entry contained important consumer data, together with IP addresses, geographic places, and web service supplier metadata, making a complete map of customer exercise to the underground cybercrime platform.

Exposes 22 Million Leakzone Data

The uncovered Elasticsearch database contained data spanning from June 25 to the time of discovery, capturing roughly a million requests per day with a median request measurement of two,862 bytes. 

The database schema revealed that 185,000 distinctive IP addresses accessed the platform throughout this three-week interval, considerably exceeding Leakzone’s registered consumer base of 109,000 accounts, in response to the UpGuard report.

This discrepancy signifies subtle privateness safety measures employed by customers, together with the usage of dynamic IP addresses and proxy servers.

Technical evaluation revealed that roughly 5% of requests (1,375,599 complete data from 3,983 IP addresses) have been routed by public proxies, recognized by database fields marked as “is_proxy” and “proxy_type” with values of “PUB”. 

Extra considerably, investigators recognized proof of in depth VPN utilization, significantly by Cogent Communications infrastructure, the place the third, fourth, and sixth most energetic IP addresses all belonged to this VPN service supplier. 

The visitors distribution sample urged these heavily-used IP addresses represented VPN exit nodes serving a number of customers slightly than particular person connections.

The leaked information presents extreme privateness implications for customers of the illicit discussion board, as IP addresses are categorized as Personally Identifiable Info (PII) beneath GDPR laws resulting from their functionality for cross-platform consumer identification. 

Geographic evaluation revealed international visitors distribution with notable exceptions, significantly the absence of direct connections from China, suggesting Chinese language customers route visitors by proxy servers in different international locations. 

Cloud service suppliers, together with Amazon, Microsoft, and Google, appeared prominently within the visitors logs, indicating customers leverage mainstream infrastructure for anonymization functions.

The breach highlights the vulnerability of customers searching for anonymity on unlawful platforms. Whereas 39% of IP addresses appeared solely as soon as within the logs, doubtlessly representing customers with out VPN safety, the focus of visitors by identifiable VPN companies creates new alternatives for surveillance. 

Significantly given latest regulation enforcement successes together with the arrest of the suspected administrator of the XSS[.]is Russian hacking discussion board.

Expertise quicker, extra correct phishing detection and enhanced safety for what you are promoting with real-time sandbox analysis-> Attempt ANY.RUN now

Cyber Security News Tags:Addresses, Dark, Database, Exposes, Forum, Leak, Locations, Million, Users, Web, Zone

Post navigation

Previous Post: BlackSuit Ransomware Group Transitioning to ‘Chaos’ Amid Leak Site Seizure
Next Post: Why It Needs a Modern Approach

Related Posts

SesameOp Leveraging OpenAI Assistants API for Stealthy Communication with C2 Servers Cyber Security News
Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
McLaren Health Care Data Breach Exposes 743,000 People Personal Information Cyber Security News
Malicious Prettier Extension on VSCode Marketplace Delivers Anivia Stealer Malware to Exfiltrate Login Credentials Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Google Warns Multiple Hacker Groups Are Exploiting React2Shell to Spread Malware
  • Empire 6.3.0 Launches With New Features for Red Teams and Penetration Testers
  • CISA Warns of Google Chromium 0-Day Vulnerability Exploited in Attacks
  • CISA Adds Actively Exploited Sierra Wireless Router Flaw Enabling RCE Attacks
  • Rust-Based Luca Stealer Spreads Across Linux and Windows Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark