proxyearth.com

February 21, 2026

What proxyearth.com appears to be (and why people talk about it)

When people mention proxyearth.com, they’re usually referring to the same “ProxyEarth / Proxyearth” ecosystem that blew up in late 2025 for allegedly letting anyone type in an Indian mobile number and get back personal details. Multiple reports describe results that can include a person’s name, address, family-related fields, alternate numbers, and sometimes a map-style “location” readout, without clear consent or authentication.

One complication: the proxyearth.com domain itself isn’t consistently reachable. When I attempted to load it, it returned a 502 Bad Gateway error. That usually means the server is down, misconfigured, blocked, or behind infrastructure that’s failing at the moment.
So in practice, proxyearth.com may be a mirror, a redirect, an alternate entry point, or something that comes and goes. The coverage and investigations, though, point to the broader ProxyEarth/Proxyearth tool and its claims and impact.

What the tool is reported to show

The reporting is unusually consistent across outlets: the controversial part is not “operator/circle lookup” (which is fairly common), but highly specific identity and address-level information tied to a phone number. HackRead described it as exposing sensitive identifiers (including Aadhaar-related data in some cases) alongside location and other personal details.
India Today reported similar findings and framed it as a rogue service that can display personal details and sometimes “live location” with only a number.
SC Media summarized the situation as a site (and even a Telegram bot) that returns extensive personal data for Indian citizens using mobile numbers alone.

Separately, some “review” style posts claim the service is only a mobile prefix/circle/operator lookup tool and that “live tracking” is unrealistic. That might describe earlier versions, clones, or a watered-down interface, but it conflicts with the more serious investigative reporting that described real personal-data exposure.

Where the data would even come from

The big question is always: how could any site know this much from a number?

The most plausible explanation (and the one suggested implicitly by investigators) is repackaging of leaked or illegally sourced datasets, not magic “phone tracking.” India Today’s fact-check reporting described conversations that point toward bulk access to leaked data being treated like a commodity.
HackRead’s write-up framed it as a privacy and security issue rooted in exposed data, not legitimate telecom-grade GPS tracking.

Also, be careful with the “live location” idea. Several reports say the map-style location is not always accurate, and even when it looks convincing, you should treat it as unverified. A site can display a pin without actually having real-time device telemetry.

Why this is a big deal (beyond curiosity)

Even if you never visit proxyearth.com yourself, the concept matters because it normalizes something dangerous: turning a phone number into a full identity dossier.

That enables:

  • Targeted scams (the caller knows your address, relatives’ names, or other identifiers).
  • Stalking and harassment (especially if the site implies location).
  • Account takeover attempts (personal details make social engineering easier).
  • Reputational harm (data can be copied, reshared, and scraped).

Mainstream coverage in India described the situation as alarming specifically because it appears to connect everyday phone numbers to home and family details.

Safety and legality: what you should assume

From a user-safety standpoint, you should treat services like this as high-risk, whether they’re “real” or not.

  • If a site truly provides personal data without consent, that suggests unlawful sourcing or processing of data.
  • If it doesn’t provide real data, it may still be risky because it can be a trap for collecting numbers, pushing shady subscriptions, or driving phishing. ScamAdviser’s analysis leaned heavily on this second risk category and warned that using phone-tracking sites can expose you to scams and legal trouble.

There are also reputation/security vendors flagging related domains as low trust. Those scores aren’t legal judgments, but they’re useful as a “slow down and don’t share anything” signal.

What to do if you think your number is exposed

If you suspect your phone number is being used as a key to pull up personal details somewhere, focus on practical damage control:

  1. Harden your accounts that use SMS or calls for recovery

    • Move key accounts to authenticator-app based 2FA where possible.
    • Update recovery email/phone options and remove old numbers.
  2. Lock down telecom-related access

    • Ask your carrier about SIM swap protections or port-out PINs (terminology varies).
    • Monitor for sudden “no service” events, which can be a SIM swap warning sign.
  3. Reduce what attackers can match

    • Tighten social profiles that show birthday, address, family member names, or workplace.
    • Remove public posts that reveal address landmarks, building names, or routine.
  4. Be stricter about unknown calls

    • If someone calls and seems to know “proof” details (address, father’s name, etc.), treat it as a red flag, not proof of legitimacy.

Safer alternatives (legitimate use cases)

There are legitimate reasons people want to verify a phone number: spam prevention, lost-device recovery, family safety with consent.

For those, use tools that are designed to be legitimate and consent-based, such as:

  • Google Find My Device (Android) and Apple Find My (iOS) for your own devices and shared-family setups.
  • Your carrier’s official services for lost phone/SIM issues. ScamAdviser explicitly points users toward these kinds of legitimate options instead of sketchy “phone tracker” sites.

Key takeaways

  • proxyearth.com appears intermittently unavailable, but it’s widely associated with the ProxyEarth/Proxyearth controversy.
  • Reports say the tool can expose sensitive personal information linked to Indian phone numbers, sometimes including address-level details and location-style outputs.
  • The likely driver is leaked/abused datasets, not legitimate “live tracking.”
  • Whether it’s real or fake, interacting with these sites can create new risks (data collection, scams, legal exposure).
  • Best response is account security hardening, telecom protections, and consent-based tracking tools only.

FAQ

Is proxyearth.com the same as proxyearth.org or proxy.earth?

It’s hard to say reliably because proxyearth.com wasn’t reachable when tested, and the ecosystem has multiple similarly named domains floating around.
What’s consistent is the ProxyEarth/Proxyearth branding in reporting and the behavior described in investigations.

Does it really show “live location” from a phone number?

Treat that claim as unverified. Some coverage says the site sometimes displays a “live location” label, but other reporting suggests locations can be wrong, and the more believable explanation is data exposure rather than real-time GPS.

If a site shows my address from my number, what should I do first?

Start with account and telecom defenses: strengthen 2FA, secure recovery channels, and ask your carrier about SIM swap/port-out protections. Then tighten what’s publicly visible on social media so attackers can’t easily cross-match.

Is it safe to “just check” my own number?

Even checking can create risk: you may be giving the site your number, your IP, and a signal that the number is active and monitored. Risk analyses warn that these sites can be used for phishing or data collection even if their headline feature is exaggerated.

Where did the data come from?

Investigative reporting points toward leaked/bulk datasets and a gray market for personal data, not legitimate operator access.