Doxing which is short for “dropping dox” (“dox” being slang for documents), is the malicious practice of gathering and publicly releasing someone’s personal information, such as their home addresses, phone numbers, financial information, or other personal details, without the victim's consent.
Table of Contents
Doxing is when someone digs up personal information about a person, like their real name, address, or private messages, and shares it publicly without their consent. It’s often done to intimidate, shame, or put someone at risk.
The term started gaining attention back in the 1990s, when hackers would expose the identities of rivals who were hiding behind usernames. By revealing who they really were, these hackers could take away their anonymity and make them vulnerable to others, including the authorities.
Today, doxing is sadly a common tactic in online conflicts. It’s often used to target people for their beliefs or opinions, especially when those views clash with someone else’s agenda.
Doxers employ a range of tactics to compile personal information from publicly accessible or poorly protected sources:
Consistent usernames across platforms make it easy for attackers to connect online profiles and build a comprehensive picture of a target’s online activity.
If your Social Media accounts are public, anyone can find out information that you post on these accounts. This can include details like location tags, family or friend’s photos, job details and even something as simple as your pet’s name. This information can provide valuable clues that doxers can use to piece together personal profiles or even help doxers to answer security questions to hijack other accounts that you own.
Doxers can use several methods to discover a target’s IP address to approximate their location. They can then use social engineering techniques on the target’s internet service provider (ISP) to gain more information about the victim.
Attackers use software to collect and compile small data points from different sources, building an in-depth profile of their target from seemingly insignificant details.
By entering a phone number into lookup services, doxers can then associate that number to a name, address and possibly other sensitive information.
If a target owns a domain name their information will be stored within a registry. If the target hasn’t chosen to hide their data on the registry, doxers can use a simple WHOIS search that can reveal registered contact information such as name, phone number, addresses, email and other personal information.
Fake emails or messages can be used to trick targets into revealing private details like login credentials or contact information, which attackers will then use to further exploit their victim.
If a Doxer can get access to your network they can use packet sniffing to monitor and intercept specific data packets which can contain sensitive information like passwords, bank account details, credit card numbers and other information they might like to take.
Data brokers collect, analyze and sell or license consumer information to other companies generally for marketing purposes. These Data Brokers usually create a profile for an individual containing things like interests, hobbies, demographics and other data they can get access to.
They typically get information from public sources, third party companies, surveys and several other sources.
Unfortunately, this information can end up on the dark web and then can be utilized by doxers for a small fee.
Doxers typically seek out various types of personal information to build a complete profile on their target, often with harmful intent:
One of the most common data points doxers look for is a person’s home address. Access to this information allows them to escalate harassment or threats to a physical level, making the victim feel unsafe at home.
Phone numbers enable doxers to directly harass victims through calls or texts. They can also use reverse lookup services to uncover additional personal details or perform social engineering attacks by impersonating the target.
Email addresses are a gateway to further harassment, phishing attacks, and spam. With an email, doxers can attempt to hack into the target’s online accounts, often leading to further data leaks.
Knowing where someone works allows doxers to target their professional life, sometimes by contacting the victim's employer to spread false information. This type of harassment can damage reputations and even jeopardize employment.
Sensitive financial details like bank account information or credit card numbers are highly valuable to doxers. Access to financial data can lead to identity theft, unauthorized transactions, or blackmail.
With a Social Security Number or national ID, doxers can commit identity theft, open credit accounts in the victim’s name, or impersonate the victim to access other sensitive data, causing long-term financial and legal consequences.
The legality of doxing varies by jurisdiction. In some regions, laws explicitly prohibit doxing, while in others, it falls into a legal gray area. For example, the U.S. has laws against harassment and cyberstalking that can apply to doxing, but not all cases meet the legal criteria for prosecution. The European Union’s General Data Protection Regulation (GDPR) also protects individuals from having personal data exposed without consent, adding another layer of defense against doxing.
Ethically, doxing is widely condemned as a harmful invasion of privacy. While some individuals argue for transparency or “information freedom,” exposing another person’s information without their consent is generally seen as both dangerous and unethical.
If you discover that you’ve been doxed, immediate action is essential:
Request the removal of your information from any site where it’s been posted.
For cases involving threats or harassment, file a report with local law enforcement or cybercrime agencies.
Inform those close to you of the situation, especially if there’s potential for them to be targeted as well.
Check for any unusual activity on your accounts or credit report, as doxing can lead to identity theft or financial fraud.
In severe cases, consider reaching out to a cybersecurity expert for further assistance and guidance.
Doxing highlights how exposed personal or business information can quickly become a serious threat. When sensitive data is made public, it opens the door to harassment, identity theft, and even more advanced cyberattacks.
Trend Micro CREM (Cyber Risk Exposure Management), part of the Trend Vision One™ platform, helps organizations detect, assess, and reduce exposure risks before they’re exploited. With proactive, intelligence-driven insights, CREM identifies vulnerabilities — including those related to data leaks or misconfigurations — and strengthens your overall security posture.
Doxing is the act of exposing someone’s personal information online without their consent.
It means revealing private details about a person — like their name or address — to harm or intimidate them.
Yes, in many places. It can violate privacy laws and lead to legal consequences.