Privacy concerns over popular ShowIP Firefox add-on

ShowIPA popular Firefox add-on appears to have started leaking private information about every website that users visit to a third-party server, including sensitive data which could identify individuals or reduce their security.

reader Rob Sanders alerted us to the activities of the recently updated ShowIP add-on for the Firefox browser.

According to the description on the Mozilla add-ons website, ShowIP is designed to “show the IP address(es) of the current page in the status bar. It also allows querying custom information services by IP (right click) and hostname (left click), like whois, netcraft, etc. Additionally you can copy the IP address to the clipboard.”

Currently over 170,000 people are said to be using ShowIP.

Sign up to our free newsletter.
Security news, advice, and tips.

What the add-on’s description doesn’t say is that since version 1.3 (released on April 19th 2012) it has also sent – unencrypted – the full URL of sites visited using HTTPS, and sites viewed in Private Browsing mode, to a site called

The user never realises that the data has been shared with a third-party, unless they use special tools to monitor what data is being sent from their computer.

SophosLabs researcher Xiaochuan Zhang examined the add-on, and observed the potential privacy breach in action. In the following example, he used Wireshark to view the network packets being sent and observed his request to visit a non-existent website “” being shared with

Wireshark results

The full URL of every webpage visited is sent to the Germany-based website, using unencrypted connections.

In addition, the add-on has no warning that sites you visit might be disclosed, no privacy policy small print explaining its behaviour, and no apparent way to opt-out of the data-sharing.

ShowIP settings

Sanders told Naked Security that the issue was reported on the add-on’s Google Code project page on 22nd April, but has received no response. Despite the alert, version 1.4 of the ShowIP add-on has since been released – and still exhibits the same behaviour.

Warning posted about privacy issue

Sanders said that he hoped the apparent privacy lapse was the case of naivety rather than a developer with more malicious intentions:

"I suspect it's the work of a very naive developer, but who knows nowadays. What bothers me most is how this code managed to get approved on the Mozilla Addons site (not once, but twice) and how it's still there 12 days later."

The website itself appears to be very new, having only been registered a month ago.


And who appears to have registered the domain? A Berlin-based link marketing firm.

Hats On Marketing firm


We have asked the developers of ShowIP to comment on the apparent privacy issue, and will update this article with any response we receive.

Update: Mozilla has rolled the version of ShowIP they make available on their add-on site back to 1.0. They say they are working with the developer on correcting the issue. Hopefully in future their review process will flag privacy issues like this one to prevent users’ data being potentially exposed.

Thanks to SophosLabs researcher Xiaochuan Zhang for his assistance with this article, and to Rob Sanders for the original tip.

Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and is the co-host of the popular "Smashing Security" podcast. Follow him on Twitter, Mastodon, Threads, Bluesky, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.