Data Leak Test
DLP Validation and Testing


Your public IP address is:; more info

Updated Feb 14, 2020


SSL is: on ; more info

Mega Test


GET Test

Upload Test

Email Test

Industry Info

Session Info

About DLT

Data Loss Prevention (DLP) Web File Upload Self Test

Built by Engineers for Engineers

  Data leakage by file upload over HTTP and HTTPS should be detected by all Data Security tools for both Endpoint and Networks.

The file upload method is the primary cause of large data leaks. Web storage, web applications, web email, as well as botnet/ back door, malware phone home, and data theft tools often use this method to "exfiltrate" or steal data.
HTTP/S File Upload [4MB max] DLP testing lab console
® 2020 IGNITE Cyber

lab@dlt: Welcome to DLT, please upload a file to begin
lab@dlt: Cloud storage is currently empty
lab@dlt: Uploaded files will self delete 30 seconds after upload


  1. Select SSL OFF or SSL ON (currently on)
  2. Upload a DLP test File to test for leakage
  3. Download to test for inbound detection
    • Test data masking/ redaction
    • Validate partial leaks
  Results will be shown immediately. Data is stored on a web server then deleted automatically.

DLP OCR (scanning a picture of data) Testing Data:

10 Medical records pdf image MD5: 13CDA5DF91D91687C3946BE4F25C3CCA

10 SSN pdf image MD5: 92199BA314318EB5F6955E0DDF517A17

10 CCN jpg image MD5: B844F13202BD6DB98CCFB801743C4546

10 Sample Records BMP image MD5: 36C39A69B70C70079DEC4E7FD4A340FA

Sample Data

sample-data.csv MD5: 83E8A1CD6F792274B7C2BE289CC9206B   

sample-data.pdf  MD5: BB59FD6AA68EB86F8DB3DB131D6E73D9  

sample-data.xls  MD5: 1595B6546B2D3199B112C834C709F61D  

Sample Data Page



The File Upload Method should be detected by all Data Security tools over HTTP  and HTTPS (SSL) for both Endpoint and Network based solutions.

File Upload is a method of upload from a web page form where the file(s) are pushed up to the server from the client machine. In this case when the "Upload File" button is pushed the file is sent to the server to be stored. If the Data Security product worked a block page will be displayed. If the page displays a successful upload message then the data was successfully leaked to the world


All file submissions to this site are deleted automatically. Do not upload private data. This is a test site for data theft please use only test data. This site is not liable for the storage or security of any data that you upload.


Frequently Asked Questions

What just happened?

    If you see a successful upload message above then your data was able to be leaked out of your organization. The data successfully left your possession.

Where did my data go?

    Your data was sent to using the File Upload method and the results shown on the screen.

How do I protect my Data assets from leakage?

     A network based data security tool or an Endpoint based data security tool should be able to stop leaks that use the File Upload method.

What internet technologies commonly use the file upload method to get data?  

  • Email uploads of some web based email (usually SSL)

  • Social media commenting (usually SSL)

  • Chat applications

  • Email body of web based email (usually SSL)

  • Blogs, forums and message board

  • Flash based applications


Donate to help build free tools: donations help to pay the bills





Have data security questions? Want expert advice? Just want to say hello or give suggestions?

Please use the form to instantly message our team.

IGNITE Cyber Security