Summary of pandora.com Dark Web and Threat Exposure Test
Provided "as is" without any warranty of any kind.
This test was made 72 days ago and may be outdated
Refresh Test
Date/Time:Jan 19th, 2026 15:07 GMT+0
Test Runtime:19 minutes
Source IP:199.116.164.229
Server Location:Oakland, United States
Domain Owner:Pandora Media LLC
Executive Summary for pandora.com
- A total of 401 dark web incident(s) detected, containing 7116 mention(s) of the domain. 334 ouf of 401 incident(s) originate from Compromised Databases. Out of all detected Compromised Credentials, 37 are considered to be of High risk. Mentions in Leaked Databases represent the most common source of compromised information, accounting for 6999 of the 7116 detected domain mentions on the Dark Web. Show details.
- 79 total bucket(s) detected across 7 cloud storage service(s), including 4 public bucket(s) and 2067 public file(s): Amazon S3 with 41 bucket(s), 1 public bucket(s) and 1000 public file(s), Azure Storage with 14 bucket(s) and Alibaba Cloud OSS with 2 bucket(s), and others. Show details.
- 6 potential phishing URL(s) detected. Example hostnames: pandora-ad.blogspot.com and pandora-media.blogspot.com; full list is available in the detailed report. Show details.
- 123 potential cybersquatting domain(s) detected. Example domains: pandosa.com, pandora-korea.com and pandora.re; additional cybersquatting domains are available in the detailed report. Show details.
- 35 potential typosquatting domain(s) detected. Example domains: pandoorra.com, panhdora.com and panfdora.com; additional typosquatting domains are available in the detailed report. Show details.
- 689 squatted social network account(s) detected across 9 social network(s). Most affected social networks include Reddit with 211 account(s) including @pandora2000 and @pandora_2000, YouTube with 207 account(s) including @pandora_2000 and @pandora2002 and GitHub with 101 account(s) including @pandora2000 and @pandora2001; full list is available in the detailed report. Show details.