EcoVPN Help Centre
Dark Web Monitoring

Dark Web Monitoring

EcoVPN scans hidden networks and onion services to detect if any credentials, config fingerprints, or glyph references tied to your account have leaked. Monitoring logic operates across infrastructure metadata, not personal identifiers.

What Gets Scanned

  • Referral glyph hashes and deployment metadata
  • Email aliases and sponsor-facing contact headers
  • Tunnel endpoint IPs or reissued config flags
  • Onion-marked keyword dumps that match EcoVPN syntax

Scan Frequency

  • Tier 2+ accounts: Monthly passive scans via EcoVPN infrastructure
  • Tier 3 operators: Can request targeted onion sweeps
  • Urgent scans triggered when signal anomalies or fingerprint drift are detected

What Happens If You're Found

  • Your dashboard flags a Leak Alert
  • Tier 3 staff may revoke your current config and issue a replacement
  • You’ll be asked to revalidate your tunnel source and usage tags

How to Stay Hidden

  • Never post or share `.conf` files publicly, even truncated
  • Use randomised email aliases instead of institutional addresses
  • Avoid bot-reachable endpoints - consider dedicated IP or single-region tunnels
  • Review any infrastructure tied to your account for misconfigured DNS or public headers

“Your VPN config is unique. EcoVPN helps make sure it never leaks into unsafe places.”

Didn't find an answer?

Our team is just a ticket away and ready to answer your questions