Doxbin (darknet)

Page semi-protected
Source: Wikipedia, the free encyclopedia.

Doxbin
Type of site
Pastebin
Available inEnglish
RegistrationOptional
Users50,000
LaunchedMay 30, 2011; 12 years ago (2011-05-30)
Written inPHP

Doxbin was an

onion service. It was a pastebin primarily used by people posting personal data (often referred to as doxing
) of any person of interest.

Due to the illegal nature of much of the information it published (such as social security numbers, bank routing information, and credit card information, all in plain-text), it was one of many sites seized during Operation Onymous, a multinational police initiative, in November 2014.[1]

History

Doxbin was established by an individual known online as "nachash"

usernames, emails, and passwords, obtained through a variety of legal and illegal means.[2][1]

In November 2012, Doxbin's

Symantec, coordinated with Anonymous' Operation Vendetta.[1]

It first attracted attention in March 2014 when its then-owner hijacked a popular

Doxbin and several other hidden services were seized in November 2014 as part of the multinational police initiative Operation Onymous.

distributed denial of service attack (DDoS) or exploited mistakes in its PHP code.[8][9][11][12] However, the site could still be restored easily by setting up a new domain.[13]

See also

References

  1. ^ from the original on 2021-03-23. Retrieved 2020-11-06.
  2. ^ a b Howell O'Neill, Patrick (10 November 2014). "Dark Net hackers steal seized site back from the FBI". Daily Dot. Archived from the original on 17 November 2014. Retrieved 25 January 2015.
  3. ^ Howell O'Neill, Patrick (12 March 2014). "Deep Web hub hacked and shut down over child porn links". Daily Dot. Archived from the original on 2015-04-02. Retrieved 2015-01-25.
  4. ^ Mead, Derek (13 March 2014). "A Hacker Scrubbed Child-Porn Links from the Dark Web's Most Popular Site". Vice. Archived from the original on 11 October 2016. Retrieved 26 August 2017.
  5. ^ "Twitter Founders' Personal Information Released on Doxbin". Darkweb News. 12 June 2014. Archived from the original on 27 January 2015. Retrieved 27 January 2015.
  6. ^ Tarquin (June 12, 2014). "Twitter Founders' Personal Information Released on DOXBIN". Archived from the original on 27 January 2015. Retrieved 20 August 2015.
  7. ^ "Site Doxx'es Judge of Silk Road Case – Calls To "Swat" Her". DeepDotWeb. 13 October 2014. Archived from the original on 24 March 2015. Retrieved 25 January 2015.
  8. ^ a b Rauhauser, Neal (11 November 2014). "Doxbin's Nachash On Operation Onymous (P.1)". DeepDotWeb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  9. ^ a b Gallagher, Sean (9 November 2014). "Silk Road, other Tor "darknet" sites may have been "decloaked" through DDoS". Ars Technica. Archived from the original on 22 April 2017. Retrieved 14 June 2017.
  10. ^ O'Neill, Patrick Howell (17 November 2014). "Tor eyes crowdfunding campaign to upgrade its hidden services". Daily Dot. Archived from the original on 12 February 2015. Retrieved 25 January 2015.
  11. ^ Muadh, Zubair (12 November 2014). "Doxbin's Nachash On Operation Onymous (P.2)". Deepdotweb. Archived from the original on 28 January 2015. Retrieved 25 January 2015.
  12. ^ nachash [handle] (8 November 2014). "[tor-dev] yes hello, internet supervillain here". [tor-dev] mailing list archive. Archived from the original on 2015-02-04. Retrieved 2015-01-25.
  13. ^ "The darkweb's nihilistic vigilante sees the light". the Guardian. 2014-12-09. Archived from the original on 2021-03-23. Retrieved 2021-04-28.