Summary of coomer.su Dark Web and Threat Exposure Test
Provided "as is" without any warranty of any kind.
This test was made 173 days ago and may be outdated
Refresh Test
Date/Time:Oct 11th, 2025 07:49 GMT+0
Test Runtime:14 minutes
Source IP:190.115.31.47
Server Location:N/A, Belize
Domain Owner:Unknown
Executive Summary for coomer.su
- A total of 4 dark web incident(s) detected, containing 11 mention(s) of the domain. 3 ouf of 4 incident(s) originate from Malware Logs. Out of all detected Compromised Credentials, 1 are considered to be of Medium risk and 1 of Low risk. None are categorized to be of Critical or High risk. Mentions in Malware Logs represent the most common source of compromised information, accounting for 10 of the 11 detected domain mentions on the Dark Web. Show details.
- 3 total bucket(s) detected across 1 cloud storage service(s): Amazon S3 with 3 bucket(s). Show details.
- No potential phishing websites found. Show details.
- 43 potential cybersquatting domain(s) detected. Example domains: coomer.cz, coomer.is and coomer.st; additional cybersquatting domains are available in the detailed report. Show details.
- 10 potential typosquatting domain(s) detected. Example domains: ciomer.com, cooker.su and coomeer.com; additional typosquatting domains are available in the detailed report. Show details.
- 139 squatted social network account(s) detected across 6 social network(s). Most affected social networks include Reddit with 74 account(s) including @coomer2002 and @coomer2004, YouTube with 28 account(s) including @coomer2002 and @coomer2009 and GitHub with 24 account(s) including @coomermw and @ecoomer; full list is available in the detailed report. Show details.