module
LeakIX Search
| Disclosed | Created |
|---|---|
| N/A | Mar 9, 2026 |
Disclosed
N/A
Created
Mar 9, 2026
Description
This module uses the LeakIX API to search for exposed services and data leaks.
LeakIX is a search engine focused on indexing internet-exposed services and
leaked credentials/databases.
An API key is required (free at https://leakix.net).
Actions:
SEARCH - Query LeakIX with a search string and scope (leak or service).
Paginated, 20 results per page, max 500 pages (10000 results).
Free accounts have lower page limits.
HOST - Retrieve all known services and leaks for a given IP
DOMAIN - Retrieve all known services and leaks for a given domain
SUBDOMAINS - List known subdomains for a given domain
PLUGINS - List all available LeakIX scanner plugins
BULK - Stream all leak results via the bulk API (Pro only, leak scope only).
Use MAXRESULTS to limit the number of collected events.
Query examples:
+country:"France"
+port:3306 +country:"Germany"
plugin:HttpOpenProxy
+software.name:"nginx" +country:"US"
LeakIX is a search engine focused on indexing internet-exposed services and
leaked credentials/databases.
An API key is required (free at https://leakix.net).
Actions:
SEARCH - Query LeakIX with a search string and scope (leak or service).
Paginated, 20 results per page, max 500 pages (10000 results).
Free accounts have lower page limits.
HOST - Retrieve all known services and leaks for a given IP
DOMAIN - Retrieve all known services and leaks for a given domain
SUBDOMAINS - List known subdomains for a given domain
PLUGINS - List all available LeakIX scanner plugins
BULK - Stream all leak results via the bulk API (Pro only, leak scope only).
Use MAXRESULTS to limit the number of collected events.
Query examples:
+country:"France"
+port:3306 +country:"Germany"
plugin:HttpOpenProxy
+software.name:"nginx" +country:"US"
Authors
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.