Get a list of dark web ransomware attacks mentioning your company, clients, or industry.
Enter one or more keywords to search for in victim names, ransomware group names, or descriptions. Separate multiple keywords with new lines, commas, or semicolons. The search is case-insensitive and matches if ANY keyword is found. Leave empty to retrieve all records based on other filters (country, dates) up to the maximum results limit.
Filter by country using ISO 2-letter country codes (e.g., US, GB, DE, FR, IT). Leave empty to include all countries.
Filter attacks discovered on or after this date. Format: YYYY-MM-DD (e.g., 2024-01-01)
Filter attacks discovered on or before this date. Format: YYYY-MM-DD (e.g., 2024-12-31)
Maximum number of records to return. Use lower values for faster execution and lower costs.
Results to deliver
400 creditsThis agent actively searches live listings — results may vary. You are only charged for what is delivered, up to this number.
Lagic Proxy
Pricing
Monitor dark web ransomware posts for mentions of specific companies, partners, or countries. Get details like the attacking group, discovery date, and links to the posts for threat intelligence and risk management.
This tool scans the data leak sites of known ransomware groups on the dark web for specific keywords. It's designed for cybersecurity professionals, threat intelligence analysts, corporate security teams, and Managed Service Providers (MSPs) who need to stay ahead of data breaches. Instead of manually and unsafely browsing the dark web, you can use this monitor to proactively check for mentions of your company, your clients, or your key suppliers. The results provide crucial context for incident response and risk assessment, including the name of the ransomware group behind the attack, a description of the victim, and the date the breach was discovered by security researchers. This provides an early warning system, helping you identify if your organization or a critical third-party partner has been compromised, often before a public announcement. Use the data to track the activities of specific threat agents, analyze attack patterns against certain countries, or conduct due diligence during mergers and acquisitions.
Enter the company names, domains, or other keywords you want to monitor into the 'Search Keywords' field.
Optionally, filter the search by a two-letter 'Country Code'.
Optionally, specify a date range for when the breach was discovered.
Set the maximum number of results you want to retrieve.
Run the tool to get a structured list of matching ransomware posts.
Download the data as a spreadsheet or JSON file.