Summary of www.opensignal.com Dark Web and Threat Exposure Test
Provided "as is" without any warranty of any kind.
This test was made 148 days ago and may be outdated
Refresh Test
Date/Time:Nov 6th, 2025 05:56 GMT+0
Test Runtime:10 minutes
Source IP:172.66.43.86
Server Location:Mount Hope, United States
Domain Owner:Unknown
Executive Summary for www.opensignal.com
- A total of 61 dark web incident(s) detected, containing 641 mention(s) of the domain. 51 ouf of 61 incident(s) originate from Compromised Databases. Out of all detected Compromised Credentials, 392 are considered to be of Medium risk and 23 of Low risk. None are categorized to be of Critical or High risk. Mentions in Leaked Databases represent the most common source of compromised information, accounting for 630 of the 641 detected domain mentions on the Dark Web. Show details.
- 4 total bucket(s) detected across 1 cloud storage service(s): Amazon S3 with 4 bucket(s). Show details.
- 1 potential phishing URL(s) detected. Example hostname: opensignal.mx. Show details.
- 11 potential cybersquatting domain(s) detected. Example domains: opensignal.click, pensignal.com and theopensignal.com; additional cybersquatting domains are available in the detailed report. Show details.
- No potential typosquatting domains found. Show details.
- 5 squatted social network account(s) detected across 4 social network(s). Most affected social networks include Reddit with 2 account(s) including @opensignal1 and @opensignal9, YouTube with 1 account(s) including @opensignalyt and GitHub with 1 account(s) including @opensignaltech; full list is available in the detailed report. Show details.