Updated 5/17/2021

subscribe for updates

Subscribe for: News, announcements, new features, and updates from our creators at IGNITE Cyber Security

DLP Validation & Testing

Your public IP address is:; IP info : Session Info

DLP Help

SSL is: off ;  more info

DLP Auditor


GET Test

Upload Test

Email Test

FTP Testing

DLP Info


Data Loss Prevention (DLP) Post WebForm Data Self Test

Built by Engineers for Engineers

  This page is used to test data leakage out to the web using the POST method. Read below for more info.

---trusted partner test site---

Fight ransomware and phishing
 with our email fraud testing platform!

1) Select SSL OFF or SSL ON (currently off)

2) Insert data into the box below and then click "POST TEST" to attempt leakage

3) A results page will display any data leaked

 *Function: data is loaded into web server memory then displayed on the next page. The data is not retained when your session ends.

sample-data.csv     sample-data.pdf     sample-data.xls     Page

SSL is off ; it is much more challenging for Data Security tools to detect a leak over SSL.



How to use this page (3 min)

Data Security testing: use this site to test controls that trigger security functions

Enterprise DLP testing: visit this page from inside your enterprise to test for data leakage policy compliance.

Endpoint DLP testing: visit this page from any corporate computing device to test detection and prevention of Endpoint DLP solutions.

Cloud Data Theft testing: visit this page from your cloud database server to test the ability to leak test data -simulating mass data exfiltration or abnormal data behavior.

CASB: in full cloud proxy deployments this site can be used to test advanced CASB DLP capabilities.

The "POST" data leakage method should be detected by all network and endpoint based Data Security tools and is the most common way data is leaked through a browser. This is our most popular test.


POST is the most common method used to leak data over web pages. Social media sites, blogs, forums, web based email, as well as botnet/ back door, malware phone home, and data theft tools often use this method to "exfiltrate" or steal data.

POST is a method of upload from a web page form where the page variables (form data) are pushed up to the server. In this case when the "Submit" button is pushed the variables/ data are sent to the server to be used to build the content of the following page. If the Data Security product worked a block page will be displayed. If the page displays showing your data then the data was successfully leaked to the world.

*Data posted through the "POST" form is not collected or stored


---ads by google---

Donate to help build free tools: donations help to pay the bills

---ads by google---

Instant DLP help



Have data security questions? Want expert advice? Just want to say hello or give suggestions?

Please use the form to instantly email our team.

---ads by google---

---ads by google---


2021 IGNITE Cyber