Early warning system for digital risks

Do you know whether your company's stolen access data, internal documents or customer data are circulating on the Darknet? Our darknet search provides clarity. As part of your security audit, we identify indications of possible data leaks at an early stage - before they result in reputational damage or liability claims.

If necessary, we use our proven en-TASC technology: a specially developed tool for the targeted monitoring of forums, marketplaces and leak databases on the Darknet.

  1. What is checked?

    • conspicuous entries for domains, email addresses, IPs or user data
    • potential data leaks from previous attacks
    • indications of planned cyberattacks or fraudulent activities
    • technical metadata to assess the threat situation

    You will receive a well-founded threat report from us, including recommendations for action - individually tailored to your risk situation.

  2. Your advantages

    • early detection of data compromises (when using en-TASC)
    • recognize current threat situation
    • reduction of misuse and blackmail risks
    • direct response through concrete suggestions for action
    • optional: continuous monitoring with en-TASC

Better to react before it's too late

Use darknet monitoring as an early warning system - embedded in your security strategy. Recognize potential threats & reduce risks now !


The darknet is a hidden part of the internet that is not accessible via normal search engines. It is often used anonymously - including for illegal activities such as data trading.

OSINT stands for Open Source Intelligence, i.e. the collection and analysis of freely accessible information from publicly available sources - such as websites, forums, social media or databases. Darknet data can also be part of this if it can be accessed without the need for hacking or a password.

Onion websites are hidden websites that cannot be accessed via normal browsers or search engines. They are part of the darknet and enable largely anonymous access. Special tools are used to make such sites visible and specifically search for data leaks or security risks - e.g. adapted versions of Shodan, a search engine for hard-to-find online content.

We can use it to search the digital footprint on the darknet if required, but we do not fully integrate it. For continuous monitoring, we recommend the system as a stand-alone solution.

We usually deliver initial findings and assessments within a few hours or days. The final report follows after complete analysis.

We search leak databases, marketplaces and forums on the dark web as well as publicly accessible sources on the deep web - always in accordance with applicable data protection and compliance regulations.