Summary of vidoza.net Dark Web and Threat Exposure Test
Provided "as is" without any warranty of any kind.
This test was made 25 days ago and may be outdated
Refresh Test
Date/Time:Mar 9th, 2026 20:41 GMT+0
Test Runtime:9 minutes
Source IP:194.87.132.58
Server Location:Amsterdam, The Netherlands
Domain Owner:Unknown
Executive Summary for vidoza.net
- A total of 19 dark web incident(s) detected, containing 29 mention(s) of the domain. 11 ouf of 19 incident(s) originate from Compromised Databases. Out of all detected Compromised Credentials, 14 are considered to be of Medium risk and 8 of Low risk. None are categorized to be of Critical or High risk. Mentions in Malware Logs represent the most common source of compromised information, accounting for 18 of the 29 detected domain mentions on the Dark Web. Show details.
- 1 total bucket(s) detected across 1 cloud storage service(s): Google Cloud Storage with 1 bucket(s). Show details.
- 4 potential phishing URL(s) detected. Example hostnames: viboza.com and vidoza.co; full list is available in the detailed report. Show details.
- 7 potential cybersquatting domain(s) detected. Example domains: vidova.net, viloza.net and vidoza.bg; additional cybersquatting domains are available in the detailed report. Show details.
- 11 potential typosquatting domain(s) detected. Example domains: vioza.net, vidza.net and videoza.net; additional typosquatting domains are available in the detailed report. Show details.
- 6 squatted social network account(s) detected across 3 social network(s). Most affected social networks include YouTube with 2 account(s) including @vidozanet and @vidozar, GitHub with 2 account(s) including @vidoza1 and @vidoza2 and Reddit with 2 account(s) including @vidozas and @vidozac; full list is available in the detailed report. Show details.