About Dark Web Exposure

The Dark Web is a hidden universe contained within the “Deep Web”- a sub-layer of the Internet that is hidden from conventional search engines.

Beneath the surface web, the public form of the internet you use daily to check email or read news articles, beneath the Deep Web - government's and scientific databases and networks, exists this concealed territory - "Dark Web."

Host to anonymous, password-protected sites, the Dark Web is where criminal marketplaces thrive in the advertising and selling of weapons, drugs, and trafficked persons.

Search engines like Google, BING and Yahoo only search .04% of the indexed or “surface” Internet. The other 99.96% of the Web consists of databases, private academic and government networks, and the Dark Web.

The Dark Web is estimated at 550 times larger than the surface Web and growing. Because you can operate anonymously, the Dark Web holds a wealth of stolen data and illegal activity.

If you need more information or some detailed answers please go to our Frequently Asked Questions page.

DanTech Services with help of our partner Dark Web ID Agent is here to help our customers to detect problems early and get you protected.

Dark Web ID leverages a combination of human and artificial intelligence that scours botnets, criminal chat rooms, blogs, Websites and bulletin boards, Peer to Peer networks, forums, private networks, and other black-market sites 24/7, 365 days a year to identify stolen credentials and other personally identifiable information (PII). 

Your following business IT properties will be checked and taken care of:

Domain Monitoring

IP Address Monitoring

Compromised Credentials Information

Your Report's Glossary of Terms:

Compromise Type: Bot

The compromise of data is attributed to botnet activity.

Compromise Type: Data Dump

A consolidated collection of new and/or previously compromised credentials were made available for bulk consumption.

Compromise Type: Dox

The data was disclosed as a part of a Doxing effort. Doxing is the research, collection and broadcast of private or personally identifiable information (PII) about an individual or organization. Doxing may be carried out for various reasons, including extortion, coercion, inflicting harm, harassment, and online

Compromise Type: Keylogged / Phished

The compromise of data is attributed to entering into a phishing website or extracted through software designed to surreptitiously harvest personally identifiable information (PII)

Source Type: Asprox

The IP address has been identified as associated with the Asprox botnet, also known by its aliases
Badsrc and Aseljo, and is mostly involved in phishing scams and performing SQL injections into websites in order to spread malware

Source Type: C2 Server

The IP address has been identified as being associated with a Command-and-control (C2) Server. Command-and-control servers are used by attackers to maintain communications with compromised endpoints within a targeted network. These compromised endpoints collectively are referred to as a botnet. This is achieved through infecting endpoints with malware. Botnets are leveraged by attackers to conduct malicious activity (send spam, distribute malware, etc) without the knowledge of the system owner.

Compromise Type: Accidental Exposure

The compromise of data is attributed to an unintentional disclosure by non-malicious actors on a web page, social media, or peer-to-peer site.

Compromise Type: Breach

This data was compromised as part of a organization's data breach.

Compromise Type: Not Disclosed

The corresponding metadata associated with the collected information is currently insufficient to
accurately attribute to a specific compromise type.

Compromise Type: Tested

The data was legally tested to determine if it is live/active data.

Source Type: Chat Room

This data was discovered in a hidden Dark Web internet relay chatroom (IRC).

Source Type: Cutwail

The IP address has been identified as associated with the Cutwail botnet and is mostly involved in
sending spam e-mails. The bot is typically installed on infected machines by a Trojan component called Pushdo. It affects computers running Microsoft Windows.

Source Type: File Sharing

The IP address has been identified as associated with malicious file sharing activities.

Source Type: ID Theft Forum

This data was discovered being exchanged on a dark web forum or community associated with ID theft activities.

Subscribe to Our Newsletters

dzs xqQp WyjTdI h F doZ