Bellingcat's Online Investigation Toolkit
  • About
  • Most Used
  • New Tools
  • ⚒️Categories
    • Maps & Satellites
      • Maps
      • Satellite Imagery
      • Street View
    • Geolocation
    • Image/Video
      • Reverse Image Search
      • Facial Recognition
      • Metadata
      • Misc
    • Social Media
      • Facebook
      • Instagram
      • Telegram
      • Tiktok
      • Twitter/X
      • Youtube
      • Other Platforms
      • Multiple Platforms
    • People
    • Websites
    • Companies & Finance
    • Conflict
    • Transport
    • Environment & Wildlife
    • Archiving
    • Data Organization & Analysis
  • 📖Resources
    • Guides & Handbooks
    • Education
    • Newsletters & Toolkits
    • Stay Safe
  • More
    • All Tools
      • 4plebs
      • 527 Explorer
      • About Maps and Satellites
      • ACLED
      • AllTrails
      • Apollo Mapping
      • Apple Maps
      • Archive.today
      • Atlos
      • Auto Archiver
      • AutoStitch
      • Azure AI Video Indexer
      • Baidu Maps
      • Bellingcat OpenStreetMap Search
      • Bing Maps
      • Blackbird
      • Blender
      • Bluesky Insights
      • BskyFollowFinder/Bluesky network analyzer
      • BskyThreadReader
      • Bulletpicker.com
      • CAT UXO
      • China-related resources
      • Chronotrains
      • CITES Trade Database
      • Companies House
      • Convert Geographic Units
      • Datawrapper
      • DeHashed
      • DiscordLeaks
      • Distill.io
      • DomainTools Whois Lookup
      • Earth Explorer
      • Earth Online
      • EDGAR Suite
      • EDGAR
      • Equasis
      • Etherscan
      • EU consolidated corporate registers
      • EU Sanctions Map
      • ExifTool
      • F4Map
      • FaceCheck.ID
      • FlightAware
      • Flightradar24
      • Forensically
      • Gaode Maps
      • GeoHints
      • Gephi
      • Ghunt
      • Global Fishing Watch Map
      • Global Forest Watch
      • Global Monitoring System - ECOSOLVE
      • Global Suppliers Online
      • Google Earth Engine
      • Google Earth Pro
      • Google Flood Hub
      • Google Lens
      • Google Maps
      • GovMap
      • GPSJam
      • Have I Been Pwned
      • Hitta.se
      • Hoaxy
      • Hugin
      • Hunchly
      • ICANN Lookup
      • ICIJ Offshore Leaks Database
      • ImportGenius
      • ImportYeti
      • Index Database
      • Instagram Location Search
      • Instant Data Scraper
      • Intelx.io
      • InVID
      • KartaView
      • Leak-Lookup
      • License Plate Maps
      • LittleSis
      • Liveuamap
      • Logseq
      • Lumen
      • Maigret
      • Maltego Graph
      • MapChecking
      • Mapillary
      • MapSwitcher
      • MarineTraffic
      • Merlin
      • Meta Content Library
      • MW Geofind
      • Name Variant Search
      • Namechk
      • NASA Firms
      • NASA Worldview
      • NeutrOSINT
      • North Data
      • Obsidian
      • OCCRP Aleph
      • Open Measures
      • Open Ownership
      • Open Source Munitions Portal
      • OpenCorporates
      • OpenSanctions
      • OpenSecrets
      • OrbTrack
      • Osint Tools Map
      • Overpass Turbo
      • PeakVisor
      • Picuki
      • PimEyes
      • Pinpoint
      • PixPlot
      • Planet Labs
      • QGIS
      • Quick geolocation search
      • Radar Interference Tracker
      • RAWGraphs
      • RootAbout
      • RuPEP
      • SanctionsExplorer
      • satellites.pro
      • Search by Image
      • Sentinel Hub Playground
      • ShadeMap
      • Shadow Finder
      • ShadowMap
      • Sherlock
      • Skopenow
      • SkyFi
      • Snap Map
      • Strava
      • Suncalc
      • Telegago
      • Telegram Group Joiner
      • Telegram Phone Number Checker
      • TelegramDB
      • Telemetrio
      • Telemetry
      • Telepathy
      • Tencent Maps
      • TGStat
      • The Information Laundromat
      • TinEye
      • TrueCaller
      • TruffleHog
      • Twitter Advanced Search
      • Twitter Location Search
      • Twitter Video Downloader
      • Umbra Space
      • UN Comtrade Database
      • UNOSAT Analyses
      • Uwazi
      • VesselFinder
      • Wayback Machine
      • Web Archives
      • What CMS
      • WhatsMyName
      • Who posted what?
      • Whoxy
      • Wikimapia
      • Wikipedia list of registers
      • WildEye
      • Wildlife Trade Portal
      • xIFr
      • Yandex Maps
      • Zotero
Powered by GitBook
On this page
  • URL
  • Description
  • Key Use Cases and Features:
  • When/Why a Researcher or Journalist Might Use DiscordLeaks:
  • What DiscordLeaks Shows
  • Search and Browsing
  • Cost
  • Level of difficulty
  • Requirements
  • Limitations
  • Ethical Considerations
  • Tool provider
  • Advertising Trackers

Was this helpful?

Edit on GitHub
Export as PDF
  1. More
  2. All Tools

DiscordLeaks

Search hundreds of thousands of messages leaked from 180+ white-supremacist / nazi discord servers.

Last updated 29 days ago

Was this helpful?

URL

Description

Unicorn Riot is a non-profit media organization in the United States. In the course of its reporting on hate groups and extremist networks, Unicorn Riot’s reporters have collected Discord and Rocket. Chat, and Skype chat logs—often by monitoring or infiltrating private servers—and made them publicly accessible for journalistic and research purposes. The “DiscordLeaks” web app allows the public to browse, search, and investigate these leaked chat logs, primarily focusing on far-right groups.

Purpose, Methodology, and Scope

Purpose and Scope: DiscordLeaks is an online database created by the media collective Unicorn Riot to publish leaked chat logs from private Discord servers used by white supremacists and far-right groups. (, ) Unicorn Riot’s mission is to expose the hidden organizing and communications of these groups as a form of public-interest journalism​().

Since the 2017 Charlottesville “Unite the Right” rally, Unicorn Riot has obtained hundreds of thousands of Discord messages from dozens of extremist servers and made them accessible to journalists and researchers​(). As of recent reports, the DiscordLeaks archive hosts millions of chat posts from over 80 Discord servers tied to racist and far-right activities (​​). This initiative is part of Unicorn Riot’s broader “Far-Right Investigations” project aimed at shining light on extremist networks while they believed they were speaking in private​(,​).

Methodology: Unicorn Riot journalists collected these chat logs in the course of investigating hate groups, often by infiltrating or monitoring private Discord servers with the help of anonymous sources. (​)

For example, on the eve of the Charlottesville rally (Aug 2017), an informant provided Unicorn Riot with access to Discord planning chats, which the journalists then downloaded as evidence of organized violence​(,​). The leaked Discord data is processed by Unicorn Riot’s team—personal information of targets of harassment is redacted for safety—and then uploaded in batches to the public DiscordLeaks web app​(). All software for the DiscordLeaks platform was developed by Unicorn Riot and volunteer engineers, enabling full-text search and cross-referencing across the leaked chats​(,​). The platform also hosts logs from other chat services (like Rocket. Chat and Skype) that Unicorn Riot obtained during related investigations​(). Unicorn Riot emphasizes that making these primary source materials public enhances understanding of far-right tactics while supporting data journalism efforts​(,​).

Limitations Acknowledged: Unicorn Riot notes that DiscordLeaks is not an exhaustive record of all extremist chatter, only what their team could access (). The archive is limited to the servers and time frames captured; some chats may be missing if servers were deleted or not fully logged​(). Content from the leaks is published “as-is” – Unicorn Riot does not alter messages beyond necessary redactions, so errors or misinformation by the original users remain in the logs​(). The DiscordLeaks site itself issues a disclaimer about external links, warning that Unicorn Riot hasn’t vetted any URLs inside the chats (which could be malicious), and advises readers to use caution and anonymity tools when browsing the leaked messages (). In terms of editorial limits, Unicorn Riot has stated they withhold or censor certain details to protect individuals targeted by hate (for instance, they removed identifying info of people whom extremists discussed harming)​().

Overall, Unicorn Riot presents DiscordLeaks as a research tool but cautions that it represents only a snapshot of specific communities and may contain unverified claims or propaganda posted by those users​ ().

Key Use Cases and Features:

  1. Browsing Leaked Chat Logs

    • Users can navigate individual servers, channels, or participants within the archive.

    • Logs span multiple platforms (Discord, Rocket. Chat, Skype), with Discord being the primary focus.

  2. Searching and Filtering

    • The site provides search capabilities for specific usernames, keywords, or phrases.

    • Basic and advanced search modes help narrow down results by date range or server.

  3. Investigation of Far-Right Networks

    • The logs often reveal organizational details, ideological discussions, and event planning.

    • Researchers and journalists can identify patterns and connections between groups or individuals.

  4. Public Access to Primary Source Material

    • Allows open scrutiny of communications that have historically been private.

    • Encourages transparency about hate-speech activities and extremist discourse.

When/Why a Researcher or Journalist Might Use DiscordLeaks:

  1. Documenting Extremist Organizing:

    • Example: A journalist investigating a local protest or rally might discover planning details in the leaked chat logs.

    • Outcome: Gaining insight into the coordination, participants, and strategies of hate or extremist groups.

  2. Tracking Cross-Platform Activities:

    • Example: A researcher might compare chat discussions on Discord with related user accounts on other social platforms.

    • Outcome: Revealing how certain narratives or calls to action propagate across platforms.

  3. Verifying Claims or Rumors:

    • Example: A public figure is rumored to have participated in a far-right server chat. A search might confirm or disprove it.

    • Outcome: Fact-checking direct quotes or involvement in extremist communications.

  4. Studying Group Dynamics and Radicalization:

    • Example: An academic researcher could analyze the text content of logs to see how extremist language evolves over time.

    • Outcome: Identifying shifts in rhetoric, recruitment strategies, or new ideological trends.

What DiscordLeaks Shows

  • Server and Channel Logs:

    • Usernames, messages, timestamps, and attachments (where applicable).

    • Topic-specific channels, such as organizing events, sharing propaganda, or casual conversation.

  • Cross-References of Activity:

    • The ability to track a specific user across multiple messages or servers.

    • Potential references to external resources, websites, or memes shared within the community.

  • Data from Other Platforms:

    • Beyond Discord, archives from Rocket. Chat or Skype channels are also available, depending on what Unicorn Riot reporters collected.

Search and Browsing

  • Basic Browsing:

    • Channels: Within a server, browse channels to view sequential chat logs.

    • Users: Go to https://discordleaks.unicornriot.ninja/discord/users and select a user to view their contributions.

  • Basic Search:

    • Navigate to https://discordleaks.unicornriot.ninja/discord/search.

    • Enter search terms.

    • Choose to search a single server or all servers.

  • Advanced Search:

    • Select “Advanced Search” to refine queries further.

    • Specify a server (optional).

    • Enter date parameters (optional).

    • Click the “Search” button to view filtered results.

Investigations and Research Using DiscordLeaks as a Source
  • Academic and Analytical Research: Scholars and extremism researchers have incorporated the DiscordLeaks dataset into their studies. A 2020 study on far-right online radicalization noted that researchers leveraged Unicorn Riot’s Discord data from 129 different Discord servers to compile narratives of “redpilling” (radicalization) in those communities​

Cost

Level of difficulty

  • Beginner-Friendly (Web Browser Usage)

    • Basic searching or browsing chat logs is straightforward; it requires only a browser.

  • Moderate for In-Depth Research

    • Large-scale text analysis, cross-referencing multiple users or servers, and systematic data collection may require more advanced skills.

Requirements

  • A modern web browser.

  • Stable internet connection.

Limitations

  • Partial Coverage: This is not a comprehensive archive of all Discord servers, or even all far-right servers. It only includes servers that Unicorn Riot’s team had access to.

  • Potential Data Gaps: Some servers or channels might have been deleted or not fully logged, leading to incomplete archives.

  • Relevance: The data can be most useful to those who already know the group, channel, or user they’re investigating.

  • Unverified Accuracy: Logs are presented as-is. Names, time stamps, or content may be incomplete or contain disinformation.

Ethical Considerations

  • Infiltration and Privacy: The content originates from private servers that were accessed through journalistic or infiltration methods. Though published publicly, it may include sensitive or personal information.

  • Content Sensitivity: Chat logs may contain hate speech, extremist rhetoric, or graphic content. Users should proceed with caution.

  • Legal and Ethical Use: Verify the context and consider potential legal implications if referencing this material in publications or research. Always handle personal data responsibly.

Tool provider

Advertising Trackers

Page maintainer

Martin Sona

Servers: Navigate to and select a server of interest.

Legal Evidence: The leaked Discord chats have been used in court proceedings against white supremacists. Notably, attorneys in the civil lawsuit (filed by victims of the Charlottesville violence) submitted Unicorn Riot’s Discord logs as evidence of planners’ intent​

(). Observers pointed out that discussions in the chats (e.g. about weapons and running over protesters) bolstered claims that the rally organizers conspired to commit violence (​). Prosecutors in the criminal case against the Charlottesville car attacker, as well as other civil suits, also reviewed the DiscordLeak logs for relevant communications​(). In these ways, Unicorn Riot’s published leaks have directly informed investigations and accountability efforts after far-right violence.

Investigative Journalism: Many news outlets have cited DiscordLeaks to expose extremist activities. For example, ProPublica tapped the Charlottesville Discord chat dump to report how white supremacists joked about vehicular attacks weeks before was killed; while doing so, ProPublica independently verified the identities of at least two users from the leak to confirm the authenticity of the conversations​

(,​ ). &#xNAN;HuffPost journalists used Unicorn Riot’s Discord chats to identify members of hate groups embedded in institutions – in 2019 HuffPost revealed 11 U.S. military service members as participants in’s Discord server, after cross-referencing the leaked messages (​, ​). Similarly, local reporters have used DiscordLeaks to link extremists to real-world actions; for instance, chat evidence from the leaks helped journalists document how members coordinated vandalism and propaganda campaigns nationwide​ (, ​).

(). The large corpus of leaked chats provides rich text for content analysis – for example, researchers have analyzed the language and memes in Identity Evropa’s Discord conversations to understand recruitment and group dynamics​(). Think tanks have also cited DiscordLeaks; for instance, the referenced Unicorn Riot’s Discord archive in discussions of how white supremacists communicate and plan online (​).

Investigative collectives like Bellingcat have directly mined the data to map networks: Bellingcat’s researchers reported that Unicorn Riot’s archive contained over 760,000 Discord messages (Feb 2017–Mar 2018) from far-right groups, which they analyzed to track how fascist activists attempted to influence police and community events (​).

, based in the United States, is a decentralized, educational non-profit media organization.

https://discordleaks.unicornriot.ninja/discord/server/
unicornriot.ninja
discordleaks.unicornriot.ninja
unicornriot.ninja
discordleaks.unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
github.com
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
unicornriot.ninja
github.com
github.com
github.com
discordleaks.unicornriot.ninja
unicornriot.ninja
github.com
https://discordleaks.unicornriot.ninja/discord/server/
Sines v. Kessler
unicornriot.ninja
cjr.org
cjr.org
Heather Heyer
osf.io
unicornriot.ninja
Hedayah extremism research center
hedayah.com
bellingcat.com
Unicorn Riot
propublica.org
propublica.org
vice.com
vice.com
Patriot Front
vice.com
vice.com
Identity Evropa