Tag IP leakage exploitation