What this tool is for
Use it to check a local breach intelligence dataset, search Tor-aware indexes for names or incident language, and generate monitoring packs tied to a target organization or domain.
Threat exposure and hidden-service recon
This upgraded workflow gives visitors a stronger path through local breach triage, onion-aware discovery, and target-based monitoring packs for ransomware, credentials, document leaks, and infrastructure exposure.
Use it to check a local breach intelligence dataset, search Tor-aware indexes for names or incident language, and generate monitoring packs tied to a target organization or domain.
Visitors get structured triage cards, severity-aware breach context, query packs for monitoring, and cleaner launch paths into onion-aware search engines.
Records and queries help prioritize follow-up work. They do not prove compromise on their own, and they should be validated within an authorized workflow.
Search the local breach intelligence set by domain, email, organization name, or threat keyword and get back severity, record type, source context, and recommended next action.
Launch organization names, domains, leak terms, and campaign phrases into onion-aware search engines from a cleaner workflow that works well for scoping and follow-up checks.
Generate a query pack tied to an organization, domain, or incident focus so visitors can move from one-off searches into a repeatable monitoring flow.
Your saved packs stay available here when you are signed in. Guests can still keep a browser-local list.
These queries come from the library and act as ready-made reconnaissance prompts for dark web leak surfaces, data dumps, and threat-actor exposure patterns.
site:ahmia.fi "cc_fullz" OR "carding" OR "cvv" 2025..2026
Fullz data includes card numbers, CVV, and owner info for immediate financial theft.
Attack scenario: An attacker purchases or finds leaked card lists to perform fraudulent online purchases.
Defensive guidance: Enforce 3D Secure and monitor for BIN-specific leaks.
site:ahmia.fi "index of" ".env" OR ".config" OR ".yml"
Environment files often contain hardcoded API keys and database root credentials.
Attack scenario: An attacker finds .env files on misconfigured Tor hidden services to hijack entire cloud infrastructures.
Defensive guidance: Never commit secrets to repositories; use secret managers like AWS Secrets Manager or HashiCorp Vault.
site:ahmia.fi "database_dump" OR "sql_dump" ext:sql
Direct SQL dumps provide the entire structure and content of a compromised database.
Attack scenario: An attacker downloads raw SQL files to gain full access to user tables and passwords.
Defensive guidance: Encrypt sensitive database columns at rest and secure all backup storage locations.
site:ahmia.fi "Aadhar" OR "SSN" OR "Passport" OR "National ID"
Leaked national IDs enable massive financial fraud and identity theft.
Attack scenario: An attacker gathers PII from dark web dumps to perform unauthorized banking transactions.
Defensive guidance: Enforce MFA for all citizen-facing services and monitor for bulk PII mentions on underground forums.
site:ahmia.fi "LockBit" "published data" OR "exfiltrated"
LockBit is a major threat actor; their leaks contain highly sensitive corporate secrets.
Attack scenario: An attacker searches for LockBit mirrors to download exfiltrated corporate files.
Defensive guidance: Monitor dark web mentions of your domain and use honey-files to detect unauthorized exfiltration.
site:ahmia.fi "ransomware" "leaked data" OR "victim list"
Victim data on Wall of Shame sites can lead to double extortion and brand ruin.
Attack scenario: An attacker monitors leak sites to find recent victims for secondary phishing or extortion.
Defensive guidance: Implement robust EDR/XDR solutions and maintain air-gapped backups to prevent ransomware success.
site:ahmia.fi ".gov" "db_dump" OR "internal_only"
Exposed government databases can compromise national security and citizen PII.
Attack scenario: An attacker searches for indexed .gov databases on Tor to exfiltrate sensitive agency records.
Defensive guidance: Restrict internal database access to VPNs and ensure no indexing is possible on Tor bridges.
site:ahmia.fi "index of" ".git/config" OR ".ssh"
Exposed .git folders allow attackers to reconstruct the entire source code and history.
Attack scenario: An attacker clones the repository from the exposed directory to find hidden vulnerabilities.
Defensive guidance: Disable directory listing and block access to the .git folder in the web server configuration.
site:ahmia.fi "email:password" OR "combo_list" "leaked"
Compilation of Many Breaches data enables automated credential stuffing attacks.
Attack scenario: An attacker downloads combo lists to spray passwords across banking and social media portals.
Defensive guidance: Implement rate limiting, CAPTCHA, and check passwords against known pwned databases.
site:ahmia.fi "confidential" OR "internal use only" ext:pdf
Confidential documents may contain strategic plans, mergers, or employee data.
Attack scenario: An attacker searches for exfiltrated PDFs to gain a competitive advantage or for doxxing.
Defensive guidance: Use Digital Rights Management for sensitive files and train employees on data handling.