To request access this dataset you will need to login with an IMPACT account. Accounts are free. If you don't have one please register.


Hansa marketplace: Non-anonymized dataset
Carnegie Mellon University
Carnegie Mellon University
56 (lowest rank is 56)

Category & Restrictions

Cybercrime Infrastructure
cyber crime

Data is only for use by academic researchers, as evidenced by a .edu (or a known non-US academic domain) email address, and a .edu (or a known non-US academic domain) webpage describing your research and publications. You need to send a brief description of the project you want to use this data for. A faculty advisor must be making or endorsing the request.

Commercial uses are prohibited.


Non-anonymized data for the Hansa online anonymous marketplace (2015-2017)

"Non-anonymized database pertaining to the Hansa marketplace. This data was used in the paper "Measurement by Proxy:
On the Accuracy of Online Marketplace Measurements" (Cuevas et al., 2018). In this dataset, textual information (item name, description, or feedback text) and handles have *not* been anonymized and are thus available. We don't expect any private identifiers or other PII to be present in the data, which was collected from a publicly available website (Hansa marketplace) over slightly less than two years (2015-2017).

For less restricted usage terms, please consider the anonymized version, which is also available without any restrictions. This non-anonymized dataset should only be requested if your project MUST rely on full textual descriptions of items and/or feedback.

Additional Details

carnegie, mellon, anonymized, marketplace, hansa, dataset, hansa marketplace: non-anonymized dataset, 1499, 2015, carnegie mellon university, online, 2017, anonymous, feedback, textual, description, measurement, database, paper, cybercrime infrastructure, website, identifiers, measurements, expect, 2018, collected, restricted, infrastructure, private, don, text, terms, pii, descriptions, project, accuracy, usage, cuevas, item, pertaining, restrictions, cybercrime, items, rely, requested, proxy, version, publicly, al, handles