
August 18, 2025
What to look for in a business email service (and why it matters)
Key features to help you stay organized, write better emails, and keep your data secure.
Learn moreThe term doxing (sometimes spelled doxxing) is a term coined by hackers and is short for “dropping documents.” It can happen to anyone and may have lasting impacts on your personal and professional life. Learn what happens when someone is doxed and how to keep it from happening to you.
When someone is doxed, their personal or private information is released into the world. The motivation for doing such a thing could be personal revenge, political gain, as the result is almost always disastrous for the person whose information has been leaked. Doxing can reveal information like a home address or phone number, private pictures, social security numbers, private messages or emails, and information about a person’s family or job.
Stay safer online with one easy-to-use app1
1Microsoft 365 Personal or Family subscription required; app available as separate download
Some individuals may dox with the intent of exposing someone who has committed a crime or been involved in an unsavory situation. However, this sense of vigilantism can mean that people are wrongly doxed and suffer harm in the form of harassment and intimidation. News anchors, celebrities, political figures, and activists are frequent targets of doxing, as they are in the public eye and may stand to lose the most.
Most doxing happens online, with people gleaning information from social media, online forums and message boards. However, doxing can be analog as well—consider all the phone numbers written in bathroom stalls. Nearly all of those were written with the hope that the owner of the number would receive annoying, unsolicited calls.
Currently, there is no specific anti-doxing law. The legality of each incident is typically determined on an individual basis. It is generally legal to compile and publish information that is publicly available. This information can include arrest records, marriage certificates, divorce records and even traffic violations. Because this information is considered public domain, if someone gathers and publishes it, they’re not breaking any laws. Even though this is legal, it’s certainly unethical and is almost never performed with good intentions.
Doxing can be illegal, however, if the published information isn’t already public, like financial documents and birth certificates. When hackers are accessing this information, they are acting illegally. Doxers can be charged with harassment, stalking, identity theft, and incitement of violence. For example, during a recent political campaign, a popular singer endorsed a candidate on social media. Followers of the candidate’s opponent doxed the singer and posted her address online and invited others to burn down her house. In the United States, doxing a government employee is seen as a federal offense and falls under federal conspiracy laws.
Whether an act of doxing is considered legal or illegal, it is almost always carried out with the intent to intimidate, control, or blackmail others. Releasing personal or sensitive information can expose the victim to harassment, loss of employment, identity theft, and humiliation.
It can be surprising to learn how easy it can be for someone to locate your personal information. Consider your online activity as a series of clues. If someone is truly determined to hurt you, they can follow those clues and assemble a complete picture—learning where you live, where you work, and other identifying information.
There are many different methods that a hacker might use to collect information about a person or an organization.
Hackers obtain your IP address, which is linked to your physical address and then tricks your internet service provided into providing more information about you. This kind of tech support scam can yield a lot of personal information with a single phone call.
Hackers can collect lots of personal information from public social media profiles and activity on public forums. In many cases, this information can provide doxers with the answers to your security questions, which typically focus on personal details like the name of your first pet or the name of the street you grew up on. If your social media presence is outsized, this information may be readily available to those with malicious intentions, especially if you use the same username across multiple sites or forums.
Phishing emails are designed to trick the recipient into giving up sensitive information like an account number and password. They may appear to be from a credible source, like your bank, your credit card provider, or even Apple. These emails typically contain messaging that asks you to click a link or enter your account information to prevent your account from being closed. The ultimate goal in these instances may be identity theft or fraud, but the information gained from these emails can be used to dox someone as well.
If you own an internet domain name, anyone can run a WHOIS search and find basic information about you. This will typically contain your name and contact information, which can then be used as a starting point for a hacker to locate more information.
A data broker will collect information about people and sell that information for a profit. This information is gathered from public records, online search histories, loyalty cards that track your buying behavior, and other information from other brokers. Most data brokers sell this information to advertisers, but for a fee, these facts can be purchased off a people-search website. An individual who feels negatively towards another person might be tempted to pay this fee and wield this information with malice.
Much of your personal information can be readily available to a hacker who wants to look for it, but there are some steps you can take to protect yourself from being doxed.
Look at your internet footprint and learn what kind of information can be found out about you. Google yourself and carry out a reverse image search with your social media profile pictures to learn what’s already out there. Take a close look at the privacy settings on your social media accounts and read up on data breaches. If you have a professional website, make sure that information like your home address, cell number or personal email address are not present.
Additionally, take the time to talk to your kids about online safety. Younger people may be especially vulnerable to hacking attempts like malware and phishing and may put personal information without thinking about it. Explain why it’s important to be safe online so that you and your family do not have to worry about being doxed.
The powerful productivity apps and creativity tools in Microsoft 365 just got better. Work, play, and create better than ever before with the apps you love and Microsoft Copilot by your side.
Try for free