Get all (nonsensitive) breached sites in HIBP

breached_sites(domain = NULL, verbose = TRUE, agent = NULL)

Arguments

domain

Search a specific domain

verbose

whether to message about http errors and re-tries

agent

agent to be used as header in calls, by default "HIBPwned R pkg". # nolint

Value

Data.frame containing breach details

Details

Note that the package uses memoise (https://github.com/r-lib/memoise) with no timeout argument so that results are cached inside an active R session.

Examples

breached_sites()
#> Name #> 1 000webhost #> 2 126 #> 3 17Media #> 4 17173 #> 5 2844Breaches #> 6 2fast4u #> 7 500px #> 8 7k7k #> 9 8fit #> 10 8tracks #> 11 Abandonia #> 12 AbuseWithUs #> 13 AcneOrg #> 14 Adapt #> 15 Adobe #> 16 AdultFriendFinder #> 17 AdultFanFiction #> 18 AerServ #> 19 AhaShare #> 20 AIType #> 21 Aipai #> 22 AKP #> 23 Ancestry #> 24 AndroidForums #> 25 Animoto #> 26 AntiPublic #> 27 Apollo #> 28 Appartoo #> 29 ArmyForceOnline #> 30 AshleyMadison #> 31 AstroPID #> 32 Aternos #> 33 AtlasQuantum #> 34 Autocentrum #> 35 Avast #> 36 B2BUSABusinesses #> 37 BabyNames #> 38 Badoo #> 39 BannerBit #> 40 BattlefieldHeroes #> 41 BeautifulPeople #> 42 Bell #> 43 Bell2017 #> 44 Bestialitysextaboo #> 45 BigMoneyJobs #> 46 BinWeevils #> 47 BiohackMe #> 48 BTSec #> 49 BitcoinTalk #> 50 Bitly #> 51 BitTorrent #> 52 BlackHatWorld #> 53 BlackSpigotMC #> 54 BlankMediaGames #> 55 Bolt #> 56 BombujEu #> 57 Bookmate #> 58 BotOfLegends #> 59 Boxee #> 60 Brazzers #> 61 BTCE #> 62 Bukalapak #> 63 BusinessAcumen #> 64 CafeMom #> 65 CannabisForum #> 66 CashCrate #> 67 CDProjektRed #> 68 CheapAssGamer #> 69 CivilOnline #> 70 ClixSense #> 71 CloudPets #> 72 ClubPenguinRewritten #> 73 Coachella #> 74 Collection1 #> 75 Comcast #> 76 COMELEC #> 77 CouponMomAndArmorGames #> 78 CrackCommunity #> 79 CrackingForum #> 80 Creative #> 81 CrimeAgencyVBulletin #> 82 CrossFire #> 83 D3scene #> 84 DaFont #> 85 Dailymotion #> 86 Dangdang #> 87 DaniWeb #> 88 DataAndLeads #> 89 DataEnrichment #> 90 DataCamp #> 91 DemonForums #> 92 devkitPro #> 93 DietCom #> 94 Digimon #> 95 Disqus #> 96 DLH #> 97 Dodonew #> 98 Dominos #> 99 Dropbox #> 100 Dubsmash #> 101 DDO #> 102 Duowan #> 103 DVDShopCH #> 104 Edmodo #> 105 Elance #> 106 ElasticsearchSalesLeads #> 107 Emuparadise #> 108 EpicGames #> 109 Eroticy #> 110 Estonia #> 111 eThekwiniMunicipality #> 112 Ethereum #> 113 Evermotion #> 114 EverybodyEdits #> 115 Evite #> 116 Evony #> 117 Exactis #> 118 Experian #> 119 ExploitIn #> 120 VINs #> 121 EyeEm #> 122 Facepunch #> 123 FaceUP #> 124 WhiteRoom #> 125 FashionFantasyGame #> 126 FFShrine #> 127 FlashFlashRevolution #> 128 Flashback #> 129 Fling #> 130 FLVS #> 131 Forbes #> 132 ForumCommunity #> 133 FoxyBingo #> 134 FreedomHostingII #> 135 FreshMenu #> 136 Fridae #> 137 Funimation #> 138 FunnyGames #> 139 FurAffinity #> 140 Gaadi #> 141 GamerzPlanet #> 142 GameTuts #> 143 Gamigo #> 144 Gawker #> 145 GeekedIn #> 146 GFAN #> 147 GoldSilver #> 148 gPotato #> 149 GTAGaming #> 150 Playgar #> 151 HackForums #> 152 HackingTeam #> 153 HauteLook #> 154 HealthNowNetworks #> 155 Hemmakvall #> 156 Hemmelig #> 157 HeroesOfGaia #> 158 HeroesOfNewerth #> 159 HIAPK #> 160 HLTV #> 161 HongFire #> 162 HoundDawgs #> 163 Houzz #> 164 HTHStudios #> 165 Hub4Tech #> 166 iDressup #> 167 ILikeCheats #> 168 iMesh #> 169 imgur #> 170 Insanelyi #> 171 Intelimost #> 172 Interpals #> 173 iPmart #> 174 ixigo #> 175 JobStreet #> 176 JoomlArt #> 177 JustDate #> 178 KayoMoe #> 179 Kickstarter #> 180 Kimsufi #> 181 KMRU #> 182 KnownCircle #> 183 Knuddels #> 184 Lanwar #> 185 Lastfm #> 186 LeagueOfLegends #> 187 Leet #> 188 Lifeboat #> 189 LightsHope #> 190 LinkedIn #> 191 LinuxForums #> 192 LinuxMint #> 193 LittleMonsters #> 194 LizardSquad #> 195 Lookbook #> 196 LOTR #> 197 LoungeBoard #> 198 LyricsMania #> 199 MacForums #> 200 Mac-Torrents #> 201 MailRu #> 202 MajorGeeks #> 203 MallCZ #> 204 Malwarebytes #> 205 MangaTraders #> 206 MangaFox #> 207 Mappery #> 208 MasterDeeds #> 209 Mate1 #> 210 MCBans #> 211 MDPI #> 212 MindJolt #> 213 MinecraftPocketEditionForum #> 214 MinecraftWorldMap #> 215 Minefield #> 216 MoDaCo #> 217 ModernBusinessSolutions #> 218 MoneyBookers #> 219 MoreleNet #> 220 MortalOnline #> 221 MPGH #> 222 MrExcel #> 223 mSpy #> 224 MuslimDirectory #> 225 MuslimMatch #> 226 MyFHA #> 227 MyFitnessPal #> 228 MyHeritage #> 229 myRepoSpace #> 230 MySpace #> 231 MyVidster #> 232 NapsGear #> 233 NaughtyAmerica #> 234 NemoWeb #> 235 Neopets #> 236 NetEase #> 237 Neteller #> 238 Netlog #> 239 NetProspex #> 240 Netshoes #> 241 NextGenUpdate #> 242 NexusMods #> 243 Nihonomaru #> 244 Nival #> 245 NonNudeGirls #> 246 Nulled #> 247 OGUsers #> 248 OnlinerSpambot #> 249 Onverse #> 250 OpenCSGO #> 251 OrdineAvvocatiDiRoma #> 252 OVH #> 253 OwnedCore #> 254 PaddyPower #> 255 Patreon #> 256 PayAsUGym #> 257 Pemiblanc #> 258 PHPFreaks #> 259 PixelFederation #> 260 piZap #> 261 Plex #> 262 Pokebip #> 263 PokemonCreed #> 264 PokemonNegro #> 265 PoliceOne #> 266 Powerbot #> 267 ProgrammingForums #> 268 PS3Hax #> 269 PSPISO #> 270 PSX-Scene #> 271 QatarNationalBank #> 272 QIP #> 273 QuantumBooter #> 274 QuinStreet #> 275 R2-2017 #> 276 R2Games #> 277 Rambler #> 278 Rankwatch #> 279 RbxRocks #> 280 RealEstateMogul #> 281 BlueSnapRegpack #> 282 RetinaX #> 283 Reverb-Nation #> 284 RiverCityMedia #> 285 RosebuttBoard #> 286 RussianAmerica #> 287 SaverSpy #> 288 SCDailyPhoneSpamList #> 289 Seedpeer #> 290 ServerPact #> 291 ShareThis #> 292 SHEIN #> 293 Shotbow #> 294 SkTorrent #> 295 Smogon #> 296 Snapchat #> 297 SocialEngineered #> 298 SIAE #> 299 Sony #> 300 Soundwave #> 301 SpecialKSpamList #> 302 Spirol #> 303 SpyFone #> 304 Staminus #> 305 StarNet #> 306 SterKinekor #> 307 Stratfor #> 308 SumoTorrent #> 309 SvenskaMagic #> 310 SweClockers #> 311 Taobao #> 312 Taringa #> 313 Solomid #> 314 Technic #> 315 TRAI #> 316 Teracod #> 317 Tesco #> 318 TGBUS #> 319 TheCandidBoard #> 320 TheFappening #> 321 TheFlyOnTheWall #> 322 TheTVDB #> 323 ThisHabboForum #> 324 Tianya #> 325 Ticketfly #> 326 TorrentInvites #> 327 TrikSpamBotnet #> 328 Trillian #> 329 TruckersMP #> 330 Tumblr #> 331 Uiggy #> 332 IGF #> 333 UnderworldEmpire #> 334 UnrealEngine #> 335 uTorrent #> 336 uuu9 #> 337 VBulletin #> 338 VerificationsIO #> 339 Verified #> 340 VictoryPhones #> 341 ViewFines #> 342 VK #> 343 VNG #> 344 Vodafone #> 345 VTech #> 346 VTightGel #> 347 WarInc #> 348 Warframe #> 349 Warmane #> 350 WeHeartIt #> 351 Whitepages #> 352 WHMCS #> 353 WienerBuchereien #> 354 WifeLovers #> 355 WIIUISO #> 356 WildStar #> 357 Win7Vista #> 358 Wishbone #> 359 WPSandbox #> 360 WPT #> 361 xat #> 362 Xbox360ISO #> 363 Xbox-Scene #> 364 xHamster #> 365 XPGameSaves #> 366 XSplit #> 367 Yahoo #> 368 Yandex #> 369 Yatra #> 370 Youku #> 371 YouNow #> 372 YouPorn #> 373 YouveBeenScraped #> 374 Zhenai #> 375 Zomato #> 376 Zoosk #> 377 Parapa #> 378 SprashivaiRu #> Title #> 1 000webhost #> 2 126 #> 3 17 #> 4 17173 #> 5 2,844 Separate Data Breaches #> 6 2fast4u #> 7 500px #> 8 7k7k #> 9 8fit #> 10 8tracks #> 11 Abandonia #> 12 AbuseWith.Us #> 13 Acne.org #> 14 Adapt #> 15 Adobe #> 16 Adult Friend Finder #> 17 Adult-FanFiction.Org #> 18 AerServ #> 19 AhaShare.com #> 20 ai.type #> 21 Aipai.com #> 22 AKP Emails #> 23 Ancestry #> 24 Android Forums #> 25 Animoto #> 26 Anti Public Combo List #> 27 Apollo #> 28 Appartoo #> 29 Army Force Online #> 30 Ashley Madison #> 31 Astropid #> 32 Aternos #> 33 Atlas Quantum #> 34 Autocentrum.pl #> 35 Avast #> 36 B2B USA Businesses #> 37 Baby Names #> 38 Badoo #> 39 BannerBit #> 40 Battlefield Heroes #> 41 Beautiful People #> 42 Bell (2014 breach) #> 43 Bell (2017 breach) #> 44 Bestialitysextaboo #> 45 BigMoneyJobs #> 46 Bin Weevils #> 47 Biohack.me #> 48 Bitcoin Security Forum Gmail Dump #> 49 Bitcoin Talk #> 50 Bitly #> 51 BitTorrent #> 52 Black Hat World #> 53 BlackSpigotMC #> 54 BlankMediaGames #> 55 Bolt #> 56 Bombuj.eu #> 57 Bookmate #> 58 Bot of Legends #> 59 Boxee #> 60 Brazzers #> 61 BTC-E #> 62 Bukalapak #> 63 Business Acumen Magazine #> 64 CafeMom #> 65 Cannabis.com #> 66 CashCrate #> 67 CD Projekt RED #> 68 CheapAssGamer.com #> 69 Civil Online #> 70 ClixSense #> 71 CloudPets #> 72 Club Penguin Rewritten #> 73 Coachella #> 74 Collection #1 #> 75 Comcast #> 76 COMELEC (Philippines Voters) #> 77 Coupon Mom / Armor Games #> 78 Crack Community #> 79 CrackingForum #> 80 Creative #> 81 CrimeAgency vBulletin Hacks #> 82 Cross Fire #> 83 D3Scene #> 84 DaFont #> 85 Dailymotion #> 86 Dangdang #> 87 DaniWeb #> 88 Data & Leads #> 89 Data Enrichment Records #> 90 DataCamp #> 91 Demon Forums #> 92 devkitPro #> 93 diet.com #> 94 Digimon #> 95 Disqus #> 96 DLH.net #> 97 Dodonew.com #> 98 Domino's #> 99 Dropbox #> 100 Dubsmash #> 101 Dungeons & Dragons Online #> 102 Duowan.com #> 103 dvd-shop.ch #> 104 Edmodo #> 105 Elance #> 106 Elasticsearch Instance of Sales Leads on AWS #> 107 Emuparadise #> 108 Epic Games #> 109 Eroticy #> 110 Estonian Citizens (via Estonian Cybercrime Bureau) #> 111 eThekwini Municipality #> 112 Ethereum #> 113 Evermotion #> 114 Everybody Edits #> 115 Evite #> 116 Evony #> 117 Exactis #> 118 Experian #> 119 Exploit.In #> 120 Exposed VINs #> 121 EyeEm #> 122 Facepunch #> 123 FaceUP #> 124 Fashion Nexus #> 125 FashionFantasyGame #> 126 Final Fantasy Shrine #> 127 Flash Flash Revolution #> 128 Flashback #> 129 Fling #> 130 Florida Virtual School #> 131 Forbes #> 132 ForumCommunity #> 133 Foxy Bingo #> 134 Freedom Hosting II #> 135 FreshMenu #> 136 Fridae #> 137 Funimation #> 138 Funny Games #> 139 Fur Affinity #> 140 Gaadi #> 141 Gamerzplanet #> 142 GameTuts #> 143 Gamigo #> 144 Gawker #> 145 GeekedIn #> 146 GFAN #> 147 GoldSilver #> 148 gPotato #> 149 GTAGaming #> 150 Guns and Robots #> 151 hackforums.net #> 152 Hacking Team #> 153 HauteLook #> 154 Health Now Networks #> 155 Hemmakväll #> 156 hemmelig.com #> 157 Heroes of Gaia #> 158 Heroes of Newerth #> 159 HiAPK #> 160 HLTV #> 161 HongFire #> 162 HoundDawgs #> 163 Houzz #> 164 HTH Studios #> 165 Hub4Tech #> 166 i-Dressup #> 167 ILikeCheats #> 168 iMesh #> 169 imgur #> 170 Insanelyi #> 171 Intelimost #> 172 InterPals #> 173 iPmart #> 174 ixigo #> 175 JobStreet #> 176 JoomlArt #> 177 Justdate.com #> 178 Kayo.moe Credential Stuffing List #> 179 Kickstarter #> 180 Kimsufi #> 181 KM.RU #> 182 KnownCircle #> 183 Knuddels #> 184 Lanwar #> 185 Last.fm #> 186 League of Legends #> 187 Leet #> 188 Lifeboat #> 189 Light's Hope #> 190 LinkedIn #> 191 Linux Forums #> 192 Linux Mint #> 193 Little Monsters #> 194 Lizard Squad #> 195 Lookbook #> 196 Lord of the Rings Online #> 197 Lounge Board #> 198 Lyrics Mania #> 199 Mac Forums #> 200 Mac-Torrents #> 201 mail.ru Dump #> 202 MajorGeeks #> 203 MALL.cz #> 204 Malwarebytes #> 205 Manga Traders #> 206 MangaFox.me #> 207 Mappery #> 208 Master Deeds #> 209 Mate1.com #> 210 MCBans #> 211 MDPI #> 212 MindJolt #> 213 Minecraft Pocket Edition Forum #> 214 Minecraft World Map #> 215 Minefield #> 216 MoDaCo #> 217 Modern Business Solutions #> 218 Money Bookers #> 219 Morele.net #> 220 Mortal Online #> 221 MPGH #> 222 MrExcel #> 223 mSpy #> 224 Muslim Directory #> 225 Muslim Match #> 226 MyFHA #> 227 MyFitnessPal #> 228 MyHeritage #> 229 myRepoSpace #> 230 MySpace #> 231 MyVidster #> 232 NapsGear #> 233 Naughty America #> 234 NemoWeb #> 235 Neopets #> 236 NetEase #> 237 Neteller #> 238 Netlog #> 239 NetProspex #> 240 Netshoes #> 241 NextGenUpdate #> 242 Nexus Mods #> 243 Nihonomaru #> 244 Nival #> 245 Non Nude Girls #> 246 Nulled #> 247 OGUsers #> 248 Onliner Spambot #> 249 Onverse #> 250 Open CS:GO #> 251 Ordine Avvocati di Roma #> 252 OVH #> 253 OwnedCore #> 254 Paddy Power #> 255 Patreon #> 256 PayAsUGym #> 257 Pemiblanc #> 258 PHP Freaks #> 259 Pixel Federation #> 260 piZap #> 261 Plex #> 262 Pokébip #> 263 Pokémon Creed #> 264 Pokémon Negro #> 265 PoliceOne #> 266 Powerbot #> 267 Programming Forums #> 268 PS3Hax #> 269 PSP ISO #> 270 PSX-Scene #> 271 Qatar National Bank #> 272 QIP #> 273 Quantum Booter #> 274 QuinStreet #> 275 R2 (2017 forum breach) #> 276 R2Games #> 277 Rambler #> 278 RankWatch #> 279 Rbx.Rocks #> 280 Real Estate Mogul #> 281 Regpack #> 282 Retina-X #> 283 ReverbNation #> 284 River City Media Spam List #> 285 Rosebutt Board #> 286 Russian America #> 287 SaverSpy #> 288 SC Daily Phone Spam List #> 289 Seedpeer #> 290 ServerPact #> 291 ShareThis #> 292 SHEIN #> 293 Shotbow #> 294 SkTorrent #> 295 Smogon #> 296 Snapchat #> 297 Social Engineered #> 298 Società Italiana degli Autori ed Editori #> 299 Sony #> 300 Soundwave #> 301 Special K Data Feed Spam List #> 302 Spirol #> 303 SpyFone #> 304 Staminus #> 305 StarNet #> 306 Ster-Kinekor #> 307 Stratfor #> 308 Sumo Torrent #> 309 SvenskaMagic #> 310 SweClockers.com #> 311 Taobao #> 312 Taringa #> 313 Team SoloMid #> 314 Technic #> 315 Telecom Regulatory Authority of India #> 316 Teracod #> 317 Tesco #> 318 TGBUS #> 319 The Candid Board #> 320 The Fappening #> 321 The Fly on the Wall #> 322 TheTVDB.com #> 323 ThisHabbo Forum #> 324 Tianya #> 325 Ticketfly #> 326 Torrent Invites #> 327 Trik Spam Botnet #> 328 Trillian #> 329 TruckersMP #> 330 tumblr #> 331 Uiggy #> 332 UN Internet Governance Forum #> 333 Underworld Empire #> 334 Unreal Engine #> 335 uTorrent #> 336 uuu9 #> 337 vBulletin #> 338 Verifications.io #> 339 Verified #> 340 Victory Phones #> 341 ViewFines #> 342 VK #> 343 VNG #> 344 Vodafone #> 345 VTech #> 346 V-Tight Gel #> 347 War Inc. #> 348 Warframe #> 349 Warmane #> 350 We Heart It #> 351 Whitepages #> 352 WHMCS #> 353 Wiener Büchereien #> 354 Wife Lovers #> 355 WIIU ISO #> 356 WildStar #> 357 Win7Vista Forum #> 358 Wishbone #> 359 WPSandbox #> 360 WPT Amateur Poker League #> 361 xat #> 362 Xbox 360 ISO #> 363 Xbox-Scene #> 364 xHamster #> 365 XPG #> 366 XSplit #> 367 Yahoo #> 368 Yandex Dump #> 369 Yatra #> 370 Youku #> 371 YouNow #> 372 YouPorn #> 373 You've Been Scraped #> 374 Zhenai.com #> 375 Zomato #> 376 Zoosk #> 377 Пара Па #> 378 Спрашивай.ру #> Domain BreachDate AddedDate #> 1 000webhost.com 2015-03-01 2015-10-26T23:35:45Z #> 2 126.com 2012-01-01 2016-10-08T07:46:05Z #> 3 17app.co 2016-04-19 2016-07-08T01:55:03Z #> 4 17173.com 2011-12-28 2018-04-28T04:53:15Z #> 5 2018-02-19 2018-02-26T10:06:02Z #> 6 2fast4u.be 2017-12-20 2018-01-07T08:19:39Z #> 7 500px.com 2018-07-05 2019-03-25T08:01:09Z #> 8 7k7k.com 2011-01-01 2017-09-26T21:54:01Z #> 9 8fit.com 2018-07-01 2019-03-21T18:50:00Z #> 10 8tracks.com 2017-06-27 2018-02-16T07:09:30Z #> 11 abandonia.com 2015-11-01 2017-06-05T05:56:47Z #> 12 abusewith.us 2016-07-01 2017-10-09T11:08:45Z #> 13 acne.org 2014-11-25 2016-03-06T11:07:41Z #> 14 adapt.io 2018-11-05 2018-11-22T19:43:06Z #> 15 adobe.com 2013-10-04 2013-12-04T00:00:00Z #> 16 adultfriendfinder.com 2015-05-21 2015-05-22T06:03:44Z #> 17 adult-fanfiction.org 2018-05-30 2018-08-06T08:56:03Z #> 18 aerserv.com 2018-04-01 2018-12-06T02:58:12Z #> 19 ahashare.com 2013-05-30 2014-11-06T21:47:52Z #> 20 aitype.com 2017-12-05 2017-12-08T21:31:25Z #> 21 aipai.com 2016-09-27 2016-11-07T21:55:29Z #> 22 akparti.org.tr 2016-07-19 2017-10-01T03:52:37Z #> 23 ancestry.com 2015-11-07 2017-12-24T04:28:45Z #> 24 androidforums.com 2011-10-30 2015-12-20T06:47:19Z #> 25 animoto.com 2018-07-10 2019-07-18T05:04:08Z #> 26 2016-12-16 2017-05-04T22:07:38Z #> 27 apollo.io 2018-07-23 2018-10-05T19:14:11Z #> 28 appartoo.com 2017-03-25 2019-05-02T07:07:24Z #> 29 armyforceonline.com 2016-05-18 2016-11-10T03:24:38Z #> 30 ashleymadison.com 2015-07-19 2015-08-18T20:55:05Z #> 31 astropid.com 2013-12-19 2014-07-06T03:49:45Z #> 32 aternos.org 2015-12-06 2016-10-01T23:42:56Z #> 33 atlasquantum.com 2018-08-25 2018-08-27T01:42:34Z #> 34 autocentrum.pl 2018-02-04 2018-02-09T00:55:26Z #> 35 avast.com 2014-05-26 2016-03-12T22:08:58Z #> 36 2017-07-18 2017-07-18T07:38:04Z #> 37 babynames.com 2008-10-24 2018-10-24T06:27:03Z #> 38 badoo.com 2013-06-01 2016-07-06T08:16:03Z #> 39 bannerbit.com 2018-12-29 2019-01-08T10:56:34Z #> 40 battlefieldheroes.com 2011-06-26 2014-01-23T13:10:29Z #> 41 beautifulpeople.com 2015-11-11 2016-04-25T10:05:34Z #> 42 bell.ca 2014-02-01 2014-02-01T23:57:10Z #> 43 bell.ca 2017-05-15 2017-05-16T01:49:31Z #> 44 bestialitysextaboo.com 2018-03-19 2018-03-29T06:10:06Z #> 45 bigmoneyjobs.com 2014-04-03 2014-04-08T05:44:10Z #> 46 binweevils.com 2014-09-01 2017-08-18T07:10:57Z #> 47 biohack.me 2016-12-02 2017-08-23T20:47:39Z #> 48 forum.btcsec.com 2014-01-09 2014-09-10T20:30:11Z #> 49 bitcointalk.org 2015-05-22 2017-03-27T23:45:41Z #> 50 bitly.com 2014-05-08 2017-10-06T06:31:50Z #> 51 bittorrent.com 2016-01-01 2016-06-08T10:49:24Z #> 52 blackhatworld.com 2014-06-23 2015-11-03T22:20:17Z #> 53 blackspigot.com 2019-07-14 2019-07-17T18:44:17Z #> 54 blankmediagames.com 2018-12-28 2019-01-02T05:52:56Z #> 55 bolt.cd 2017-03-01 2017-11-24T08:15:24Z #> 56 bombuj.eu 2018-12-07 2018-12-10T14:04:47Z #> 57 bookmate.com 2018-07-08 2019-03-22T16:25:58Z #> 58 botoflegends.com 2014-11-13 2016-12-27T08:24:52Z #> 59 forums.boxee.com 2014-03-29 2014-03-30T13:07:16Z #> 60 brazzers.com 2013-04-01 2016-09-05T10:02:23Z #> 61 btc-e.com 2014-10-01 2017-03-12T03:21:52Z #> 62 bukalapak.com 2017-10-23 2019-04-18T01:57:35Z #> 63 businessacumen.biz 2014-04-25 2014-05-11T04:25:48Z #> 64 cafemom.com 2014-04-10 2017-11-09T19:54:20Z #> 65 cannabis.com 2014-02-05 2014-06-01T07:55:24Z #> 66 cashcrate.com 2016-11-17 2018-04-20T21:40:38Z #> 67 cdprojektred.com 2016-03-01 2017-01-31T06:40:09Z #> 68 cheapassgamer.com 2015-07-01 2016-11-08T01:58:39Z #> 69 co188.com 2011-07-10 2016-11-07T20:41:52Z #> 70 clixsense.com 2016-09-04 2016-09-11T06:37:25Z #> 71 cloudpets.com 2017-01-01 2017-02-27T20:57:29Z #> 72 cprewritten.net 2018-01-21 2019-04-23T05:05:16Z #> 73 coachella.com 2017-02-22 2017-06-27T10:57:03Z #> 74 2019-01-07 2019-01-16T21:46:07Z #> 75 comcast.net 2015-11-08 2016-02-08T21:41:43Z #> 76 comelec.gov.ph 2016-03-27 2016-04-14T02:24:32Z #> 77 2014-02-08 2017-11-09T23:46:52Z #> 78 crackcommunity.com 2013-09-09 2015-02-03T06:30:05Z #> 79 crackingforum.com 2016-07-01 2017-12-10T20:08:30Z #> 80 creative.com 2018-05-01 2018-06-07T21:00:31Z #> 81 2017-01-19 2017-03-21T03:12:40Z #> 82 cfire.mail.ru 2016-08-08 2016-12-28T00:29:28Z #> 83 d3scene.com 2016-01-01 2019-06-15T15:19:11Z #> 84 dafont.com 2017-05-16 2017-05-18T20:05:28Z #> 85 dailymotion.com 2016-10-20 2017-08-07T02:51:12Z #> 86 dangdang.com 2011-06-01 2019-01-10T11:15:51Z #> 87 daniweb.com 2015-12-01 2016-12-28T23:12:16Z #> 88 datanleads.com 2018-11-14 2018-11-28T19:32:19Z #> 89 2016-12-23 2017-06-08T16:23:07Z #> 90 datacamp.com 2017-01-30 2019-04-09T04:29:55Z #> 91 demonforums.net 2019-02-20 2019-04-04T07:14:34Z #> 92 devkitpro.org 2019-02-03 2019-02-11T07:21:44Z #> 93 diet.com 2014-08-10 2017-10-13T21:37:10Z #> 94 digimon.co.in 2016-09-05 2018-09-28T01:34:56Z #> 95 disqus.com 2012-07-01 2017-10-06T23:03:51Z #> 96 dlh.net 2016-07-31 2016-09-07T13:29:25Z #> 97 dodonew.com 2011-12-01 2016-11-10T00:26:01Z #> 98 pizza.dominos.be 2014-06-13 2015-01-04T03:03:34Z #> 99 dropbox.com 2012-07-01 2016-08-31T00:19:19Z #> 100 dubsmash.com 2018-12-01 2019-02-25T08:35:58Z #> 101 ddo.com 2013-04-02 2016-03-12T10:59:56Z #> 102 duowan.com 2011-01-01 2016-11-07T12:53:19Z #> 103 dvd-shop.ch 2017-12-05 2017-12-10T04:58:09Z #> 104 edmodo.com 2017-05-11 2017-06-01T05:59:24Z #> 105 elance.com 2009-01-01 2017-02-18T02:54:48Z #> 106 2018-10-29 2018-11-17T09:04:54Z #> 107 emuparadise.me 2018-04-01 2019-06-09T06:23:35Z #> 108 epicgames.com 2016-08-11 2016-11-07T10:19:34Z #> 109 eroticy.com 2015-06-01 2017-01-10T02:19:56Z #> 110 2018-06-07 2018-06-11T09:41:17Z #> 111 eservices.durban.gov.za 2016-09-07 2016-09-15T00:01:47Z #> 112 ethereum.org 2016-12-16 2016-12-20T23:56:26Z #> 113 evermotion.org 2015-05-07 2017-07-02T13:49:09Z #> 114 everybodyedits.com 2019-03-23 2019-04-03T10:50:16Z #> 115 evite.com 2013-08-11 2019-07-14T14:51:51Z #> 116 evony.com 2016-06-01 2017-03-25T23:43:45Z #> 117 exactis.com 2018-06-01 2018-07-25T20:00:44Z #> 118 experian.com 2015-09-16 2016-09-06T23:49:00Z #> 119 2016-10-13 2017-05-06T07:03:18Z #> 120 2017-06-05 2017-06-09T05:35:19Z #> 121 eyeem.com 2018-02-28 2019-02-16T07:17:45Z #> 122 facepunch.com 2016-06-03 2018-10-17T13:15:39Z #> 123 faceup.dk 2013-01-01 2019-01-13T09:50:41Z #> 124 fashionnexus.co.uk 2018-07-09 2018-07-31T08:20:54Z #> 125 fashionfantasygame.com 2016-12-01 2017-04-20T10:33:38Z #> 126 ffshrine.org 2015-09-18 2015-10-31T12:43:58Z #> 127 flashflashrevolution.com 2016-02-01 2016-09-06T08:08:29Z #> 128 flashback.se 2015-02-11 2015-02-12T05:42:12Z #> 129 fling.com 2011-03-10 2016-05-28T23:08:07Z #> 130 flvs.net 2018-02-12 2018-03-18T01:40:31Z #> 131 forbes.com 2014-02-15 2014-02-15T11:24:42Z #> 132 forumcommunity.net 2016-06-01 2018-12-05T05:04:45Z #> 133 foxybingo.com 2008-04-04 2015-11-22T01:05:05Z #> 134 fhostingesps6bly.onion 2017-01-31 2017-02-05T10:06:58Z #> 135 freshmenu.com 2016-07-01 2018-09-10T12:27:19Z #> 136 fridae.asia 2014-05-02 2014-05-06T02:48:35Z #> 137 funimation.com 2016-07-01 2017-02-20T00:43:26Z #> 138 funny-games.biz 2018-04-28 2018-07-24T03:01:35Z #> 139 furaffinity.net 2016-05-17 2016-05-27T09:36:18Z #> 140 gaadi.com 2015-05-14 2018-07-01T07:17:02Z #> 141 gamerzplanet.net 2015-10-23 2016-02-05T20:12:26Z #> 142 game-tuts.com 2015-03-01 2016-09-23T23:59:38Z #> 143 gamigo.com 2012-03-01 2016-01-18T16:26:24Z #> 144 gawker.com 2010-12-11 2013-12-04T00:00:00Z #> 145 geekedin.net 2016-08-15 2016-11-17T19:44:24Z #> 146 gfan.com 2016-10-10 2016-10-10T16:32:34Z #> 147 goldsilver.com 2018-10-21 2018-12-27T08:49:18Z #> 148 gpotato.com 2007-07-12 2016-09-24T21:37:43Z #> 149 gtagaming.com 2016-08-01 2016-08-23T20:41:17Z #> 150 play-gar.com 2016-04-01 2018-02-14T22:32:25Z #> 151 hackforums.net 2011-06-25 2014-05-11T10:30:43Z #> 152 hackingteam.com 2015-07-06 2015-07-12T23:52:27Z #> 153 hautelook.com 2018-08-07 2019-03-21T21:57:32Z #> 154 healthnow.co 2017-03-25 2017-04-07T18:37:15Z #> 155 hemmakvall.se 2015-07-08 2015-07-09T09:23:52Z #> 156 hemmelig.com 2011-12-21 2014-03-25T07:23:52Z #> 157 heroesofgaia.com 2013-01-04 2016-11-07T08:11:03Z #> 158 heroesofnewerth.com 2012-12-17 2016-01-24T16:27:23Z #> 159 hiapk.com 2014-01-01 2018-04-01T07:13:44Z #> 160 hltv.org 2016-06-19 2017-03-22T08:58:10Z #> 161 hongfire.com 2015-03-01 2017-02-05T20:36:21Z #> 162 hounddawgs.org 2017-12-30 2018-01-03T12:48:10Z #> 163 houzz.com 2018-05-23 2019-03-12T20:57:35Z #> 164 hthstudios.com 2018-08-24 2018-11-20T21:22:09Z #> 165 hub4tech.com 2017-01-01 2018-12-09T22:40:51Z #> 166 i-dressup.com 2016-07-15 2016-09-26T20:14:51Z #> 167 ilikecheats.net 2014-10-18 2018-04-22T08:18:28Z #> 168 imesh.com 2013-09-22 2016-07-02T05:42:13Z #> 169 imgur.com 2013-09-01 2017-11-25T00:00:33Z #> 170 insanelyi.com 2014-07-22 2014-07-22T22:56:15Z #> 171 intelimost.com 2019-03-10 2019-04-02T20:52:19Z #> 172 interpals.net 2015-11-04 2016-08-30T11:22:42Z #> 173 ipmart-forum.com 2015-07-01 2016-02-23T10:13:22Z #> 174 ixigo.com 2019-01-03 2019-03-17T13:27:11Z #> 175 jobstreet.com 2012-03-07 2017-10-30T01:12:14Z #> 176 joomlart.com 2018-01-30 2018-11-01T03:27:26Z #> 177 justdate.com 2016-09-29 2017-02-07T01:28:41Z #> 178 2018-09-11 2018-09-13T09:37:49Z #> 179 kickstarter.com 2014-02-16 2017-10-06T07:29:07Z #> 180 kimsufi.com 2015-05-01 2016-12-27T07:05:43Z #> 181 km.ru 2016-02-29 2016-03-03T06:12:04Z #> 182 knowncircle.com 2016-04-12 2018-11-17T02:33:54Z #> 183 knuddels.de 2018-09-05 2019-04-08T21:11:56Z #> 184 lanwar.com 2018-07-28 2018-08-08T02:57:06Z #> 185 last.fm 2012-03-22 2016-09-20T20:00:49Z #> 186 leagueoflegends.com 2012-06-11 2018-07-28T21:52:12Z #> 187 leet.cc 2016-09-10 2016-09-30T22:00:48Z #> 188 lbsg.net 2016-01-01 2016-04-25T21:51:50Z #> 189 lightshope.org 2018-06-25 2018-07-04T13:32:01Z #> 190 linkedin.com 2012-05-05 2016-05-21T21:35:40Z #> 191 linuxforums.org 2018-05-01 2018-06-07T12:55:25Z #> 192 linuxmint.com 2016-02-21 2016-02-22T01:28:08Z #> 193 littlemonsters.com 2017-01-01 2017-03-07T20:39:08Z #> 194 lizardstresser.su 2015-01-16 2015-01-18T01:24:24Z #> 195 lookbook.nu 2012-08-24 2016-11-08T09:03:44Z #> 196 lotro.com 2013-08-01 2016-03-12T12:46:03Z #> 197 loungeboard.net 2013-08-01 2014-07-06T10:22:01Z #> 198 lyricsmania.com 2017-12-21 2018-01-15T06:32:46Z #> 199 mac-forums.com 2016-07-03 2018-10-29T23:47:44Z #> 200 mac-torrents.com 2015-10-31 2015-10-31T23:54:26Z #> 201 mail.ru 2014-09-10 2014-09-12T04:50:22Z #> 202 majorgeeks.com 2015-11-15 2016-03-03T02:45:09Z #> 203 mall.cz 2017-07-27 2017-09-04T12:46:39Z #> 204 malwarebytes.org 2014-11-15 2016-03-09T11:15:43Z #> 205 mangatraders.com 2014-06-09 2014-06-10T03:49:45Z #> 206 mangafox.me 2016-06-01 2018-03-17T01:43:24Z #> 207 mappery.com 2018-12-11 2018-12-18T16:19:50Z #> 208 2017-03-14 2017-10-18T11:01:46Z #> 209 mate1.com 2016-02-29 2016-04-14T23:37:15Z #> 210 mcbans.com 2016-10-27 2017-07-23T05:34:55Z #> 211 mdpi.com 2016-08-30 2018-03-25T22:50:36Z #> 212 mindjolt.com 2019-03-18 2019-07-13T19:21:12Z #> 213 minecraftpeforum.net 2015-05-24 2015-06-30T09:19:43Z #> 214 minecraftworldmap.com 2016-01-15 2016-08-29T01:07:38Z #> 215 minefield.fr 2015-06-28 2016-03-09T08:18:43Z #> 216 modaco.com 2016-01-01 2016-09-20T07:32:50Z #> 217 modbsolutions.com 2016-10-08 2016-10-12T09:09:11Z #> 218 moneybookers.com 2009-01-01 2015-11-30T09:21:55Z #> 219 morele.net 2018-10-10 2019-04-20T22:57:28Z #> 220 mortalonline.com 2018-06-17 2018-08-31T05:38:46Z #> 221 mpgh.net 2015-10-22 2015-10-26T03:20:20Z #> 222 mrexcel.com 2016-12-05 2017-01-22T07:39:17Z #> 223 mspy.com 2015-05-14 2015-05-28T18:09:16Z #> 224 muslimdirectory.co.uk 2014-02-17 2014-02-23T03:09:38Z #> 225 muslimmatch.com 2016-06-24 2016-06-29T19:08:15Z #> 226 myfha.net 2015-02-18 2018-08-09T20:26:35Z #> 227 myfitnesspal.com 2018-02-01 2019-02-21T19:28:46Z #> 228 myheritage.com 2017-10-26 2019-02-20T21:04:04Z #> 229 myrepospace.com 2015-07-06 2015-07-08T08:44:51Z #> 230 myspace.com 2008-07-01 2016-05-31T00:12:29Z #> 231 myvidster.com 2015-08-15 2015-10-10T07:06:17Z #> 232 napsgear.org 2015-10-21 2018-09-10T11:07:00Z #> 233 naughtyamerica.com 2016-03-14 2016-04-24T06:14:42Z #> 234 nemoweb.net 2016-09-04 2018-09-19T03:53:20Z #> 235 neopets.com 2013-05-05 2016-07-07T23:00:10Z #> 236 163.com 2015-10-19 2016-10-09T06:13:31Z #> 237 neteller.com 2010-05-17 2015-11-30T10:26:47Z #> 238 netlog.com 2012-11-01 2019-07-15T10:25:07Z #> 239 netprospex.com 2016-09-01 2017-03-15T01:57:04Z #> 240 netshoes.com.br 2017-12-07 2017-12-10T04:01:03Z #> 241 nextgenupdate.com 2014-04-22 2015-06-05T04:12:29Z #> 242 nexusmods.com 2013-07-22 2016-01-17T17:18:47Z #> 243 nihonomaru.net 2015-12-01 2016-08-30T09:54:55Z #> 244 nival.com 2016-02-29 2016-03-03T00:32:49Z #> 245 nonnudegirls.org 2013-05-21 2017-01-25T06:38:36Z #> 246 nulled.cr 2016-05-06 2016-05-09T11:28:01Z #> 247 ogusers.com 2018-12-26 2019-05-19T22:45:45Z #> 248 2017-08-28 2017-08-29T19:25:56Z #> 249 onverse.com 2016-01-01 2016-09-06T06:28:30Z #> 250 opencsgo.com 2017-11-28 2018-01-15T06:14:55Z #> 251 ordineavvocatiroma.it 2019-05-07 2019-05-26T23:24:11Z #> 252 ovh.com 2015-05-01 2016-12-27T07:49:12Z #> 253 OwnedCore.com 2013-08-01 2016-02-06T02:53:13Z #> 254 paddypower.com 2010-10-25 2015-10-11T01:26:05Z #> 255 patreon.com 2015-10-01 2015-10-02T02:29:20Z #> 256 payasugym.com 2016-12-15 2016-12-17T06:45:44Z #> 257 pemiblanc.com 2018-04-02 2018-07-09T22:16:26Z #> 258 phpfreaks.com 2015-10-27 2015-10-30T14:19:52Z #> 259 pixelfederation.com 2013-12-04 2013-12-06T00:00:00Z #> 260 pizap.com 2017-12-07 2019-07-16T05:43:27Z #> 261 plex.tv 2015-07-02 2016-02-08T01:35:48Z #> 262 pokebip.com 2015-07-28 2016-09-09T04:43:00Z #> 263 pokemoncreed.net 2014-08-08 2014-08-10T00:03:59Z #> 264 pokemonnegro.com 2016-10-01 2017-01-03T20:45:24Z #> 265 policeone.com 2014-07-01 2017-11-15T07:57:11Z #> 266 powerbot.org 2014-09-01 2017-07-01T16:12:37Z #> 267 programmingforums.org 2015-12-01 2017-07-01T16:42:46Z #> 268 ps3hax.net 2015-07-01 2016-02-07T04:44:49Z #> 269 pspiso.com 2015-09-25 2017-01-29T07:28:23Z #> 270 psx-scene.com 2015-02-01 2016-02-07T03:46:46Z #> 271 qnb.com 2015-07-01 2016-05-01T01:06:35Z #> 272 qip.ru 2011-06-01 2017-01-08T22:23:19Z #> 273 quantumbooter.net 2014-03-18 2015-04-04T06:40:05Z #> 274 quinstreet.com 2015-12-14 2016-12-17T07:44:31Z #> 275 r2games.com 2017-01-01 2017-04-25T11:04:29Z #> 276 r2games.com 2015-11-01 2016-02-09T12:20:35Z #> 277 rambler.ru 2014-03-01 2016-11-01T09:33:34Z #> 278 rankwatch.com 2016-11-19 2017-11-03T07:04:08Z #> 279 rbx.rocks 2018-08-06 2018-11-07T13:26:42Z #> 280 realestatemogul.com 2016-09-06 2018-09-24T05:08:57Z #> 281 bluesnap.com 2016-05-20 2016-09-13T04:35:05Z #> 282 retinax.com 2017-02-23 2017-04-30T01:51:55Z #> 283 reverbnation.com 2014-01-01 2017-10-05T06:56:23Z #> 284 rivercitymediaonline.com 2017-01-01 2017-03-08T23:49:53Z #> 285 rosebuttboard.com 2016-05-09 2016-05-10T07:37:46Z #> 286 russianamerica.com 2017-01-01 2018-09-13T04:48:08Z #> 287 2018-09-18 2018-09-25T10:59:05Z #> 288 data4marketers.com 2015-04-14 2016-11-24T06:04:34Z #> 289 seedpeer.eu 2015-07-12 2016-03-09T02:49:28Z #> 290 serverpact.com 2016-01-01 2016-09-06T04:21:06Z #> 291 sharethis.com 2018-07-09 2019-03-03T06:31:39Z #> 292 shein.com 2018-06-01 2019-07-17T13:59:41Z #> 293 shotbow.net 2016-05-09 2017-10-29T23:53:20Z #> 294 sktorrent.eu 2016-02-19 2016-02-23T03:30:49Z #> 295 smogon.com 2017-09-10 2018-04-11T00:12:09Z #> 296 snapchat.com 2014-01-01 2014-01-02T00:00:00Z #> 297 socialengineered.net 2019-06-13 2019-06-23T20:46:39Z #> 298 siae.it 2018-11-03 2018-11-07T04:31:14Z #> 299 sony.com 2011-06-02 2013-12-04T00:00:00Z #> 300 soundwave.com 2015-07-16 2017-03-17T22:36:34Z #> 301 data4marketers.com 2015-10-07 2016-11-24T00:18:27Z #> 302 spirol.com 2014-02-22 2014-02-22T20:47:56Z #> 303 spyfone.com 2018-08-16 2018-08-24T04:36:24Z #> 304 staminus.net 2016-03-11 2017-10-05T03:58:50Z #> 305 starnet.md 2015-02-26 2015-04-11T06:35:46Z #> 306 sterkinekor.co.za 2017-03-09 2017-03-13T10:13:16Z #> 307 stratfor.com 2011-12-24 2013-12-04T00:00:00Z #> 308 sumotorrent.sx 2014-06-21 2016-03-09T01:23:23Z #> 309 svenskamagic.com 2015-07-01 2018-08-30T05:05:04Z #> 310 sweclockers.com 2015-04-01 2017-03-22T02:01:20Z #> 311 taobao.com 2012-01-01 2016-10-08T10:53:23Z #> 312 taringa.net 2017-08-01 2018-04-19T10:11:37Z #> 313 solomid.net 2014-12-22 2016-03-09T13:04:08Z #> 314 technicpack.net 2018-11-30 2018-12-04T02:32:35Z #> 315 trai.gov.in 2015-04-27 2015-04-27T11:21:59Z #> 316 teracod.org 2016-05-28 2016-08-22T11:21:27Z #> 317 tesco.com 2014-02-12 2014-02-13T21:19:24Z #> 318 tgbus.com 2017-09-01 2018-04-28T02:02:29Z #> 319 thecandidboard.com 2015-09-03 2017-01-22T08:33:43Z #> 320 thefappening.so 2015-12-01 2016-04-13T01:08:20Z #> 321 theflyonthewall.com 2017-12-31 2018-01-15T06:42:31Z #> 322 thetvdb.com 2017-11-21 2018-01-29T07:50:12Z #> 323 thishabboforum.com 2014-01-01 2015-03-28T05:35:28Z #> 324 tianya.cn 2011-12-26 2016-06-30T03:39:05Z #> 325 ticketfly.com 2018-05-31 2018-06-03T06:14:14Z #> 326 torrent-invites.com 2013-12-12 2017-03-22T01:14:11Z #> 327 2018-06-12 2018-06-14T08:05:50Z #> 328 trillian.im 2015-12-27 2016-07-15T11:14:44Z #> 329 truckersmp.com 2016-02-25 2016-04-24T21:27:05Z #> 330 tumblr.com 2013-02-28 2016-05-29T22:59:04Z #> 331 uiggy.com 2016-06-01 2016-06-27T08:07:18Z #> 332 intgovforum.org 2014-02-20 2014-02-23T04:32:08Z #> 333 underworldempireforums.com 2017-04-25 2018-02-19T10:28:11Z #> 334 unrealengine.com 2016-08-11 2016-11-07T09:04:54Z #> 335 utorrent.com 2016-01-14 2016-11-05T22:32:39Z #> 336 uuu9.com 2016-09-06 2016-12-27T10:05:41Z #> 337 vbulletin.com 2015-11-03 2016-01-24T13:15:11Z #> 338 verifications.io 2019-02-25 2019-03-09T19:29:54Z #> 339 verified.cm 2014-01-10 2014-07-06T04:16:37Z #> 340 victoryphones.com 2017-01-01 2017-10-11T21:01:33Z #> 341 viewfines.co.za 2018-05-07 2018-05-24T09:11:55Z #> 342 vk.com 2012-01-01 2016-06-09T09:16:36Z #> 343 zing.vn 2015-05-19 2018-04-28T07:49:02Z #> 344 vodafone.is 2013-11-30 2013-11-30T00:00:00Z #> 345 vtechda.com 2015-11-13 2015-11-25T07:00:57Z #> 346 vtightgel.com 2016-02-13 2017-11-17T07:31:16Z #> 347 thewarinc.com 2012-07-04 2016-11-07T11:07:25Z #> 348 warframe.com 2014-11-24 2016-07-21T02:25:49Z #> 349 warmane.com 2016-12-01 2018-09-08T07:54:18Z #> 350 weheartit.com 2013-11-03 2017-10-14T20:14:58Z #> 351 whitepages.com 2016-06-27 2019-03-27T01:50:45Z #> 352 whmcs.com 2012-05-21 2016-06-28T23:47:07Z #> 353 2019-06-10 2019-06-28T07:51:50Z #> 354 wifelovers.com 2018-10-07 2018-10-20T20:26:13Z #> 355 wiiuiso.com 2015-09-25 2016-09-06T05:51:12Z #> 356 wildstar-online.com 2015-07-11 2016-03-06T21:41:16Z #> 357 win7vista.com 2013-09-03 2014-06-01T10:01:32Z #> 358 wishbone.io 2016-08-07 2017-03-15T19:29:52Z #> 359 wpsandbox.io 2018-11-04 2018-11-06T07:26:07Z #> 360 wptapl.com 2014-01-04 2014-02-01T02:57:21Z #> 361 xat.com 2015-11-04 2016-08-05T06:53:35Z #> 362 xbox360iso.com 2015-09-25 2017-01-29T07:20:52Z #> 363 xboxscene.com 2015-02-01 2016-02-07T20:26:56Z #> 364 xhamster.com 2016-11-28 2018-03-08T02:09:26Z #> 365 xpgamesaves.com 2016-01-01 2017-07-01T15:28:17Z #> 366 xsplit.com 2013-11-07 2015-08-08T04:28:48Z #> 367 yahoo.com 2012-07-11 2013-12-04T00:00:00Z #> 368 forum.btcsec.com 2014-09-07 2014-09-12T04:50:32Z #> 369 yatra.com 2013-09-01 2018-07-04T23:15:57Z #> 370 youku.com 2016-12-01 2017-04-15T11:02:35Z #> 371 younow.com 2019-02-15 2019-07-18T08:59:45Z #> 372 youporn.com 2012-02-21 2015-07-30T05:32:00Z #> 373 2018-10-05 2018-12-06T19:11:27Z #> 374 zhenai.com 2011-12-21 2019-07-11T06:31:32Z #> 375 zomato.com 2017-05-17 2017-09-04T21:06:46Z #> 376 zoosk.com 2011-01-01 2017-02-08T07:59:39Z #> 377 parapa.mail.ru 2016-08-08 2016-12-28T07:03:17Z #> 378 sprashivai.ru 2015-05-11 2015-05-12T23:50:08Z #> ModifiedDate PwnCount #> 1 2017-12-10T21:44:27Z 14936670 #> 2 2016-10-08T07:46:05Z 6414191 #> 3 2016-07-08T01:55:03Z 4009640 #> 4 2018-04-28T04:53:15Z 7485802 #> 5 2018-02-26T10:06:02Z 80115532 #> 6 2018-01-07T08:19:39Z 17706 #> 7 2019-03-25T08:01:09Z 14867999 #> 8 2017-09-26T21:54:01Z 9121434 #> 9 2019-03-21T18:50:00Z 15025407 #> 10 2018-02-16T07:09:30Z 7990619 #> 11 2017-06-05T05:56:47Z 776125 #> 12 2017-10-09T11:08:45Z 1372550 #> 13 2016-03-06T11:07:41Z 432943 #> 14 2018-11-22T19:43:06Z 9363740 #> 15 2013-12-04T00:00:00Z 152445165 #> 16 2015-05-22T06:03:44Z 3867997 #> 17 2018-08-06T08:56:03Z 186082 #> 18 2018-12-06T02:58:12Z 66308 #> 19 2014-11-06T21:47:52Z 180468 #> 20 2017-12-08T21:31:25Z 20580060 #> 21 2016-11-07T21:55:29Z 6496778 #> 22 2017-10-01T03:52:37Z 917461 #> 23 2017-12-24T04:28:45Z 297806 #> 24 2015-12-20T06:47:19Z 745355 #> 25 2019-07-18T05:04:08Z 22437749 #> 26 2017-05-04T22:07:38Z 457962538 #> 27 2018-10-23T04:01:48Z 125929660 #> 28 2019-05-02T07:07:24Z 49681 #> 29 2016-11-10T03:24:38Z 1531235 #> 30 2015-08-18T20:55:05Z 30811934 #> 31 2014-07-06T03:49:45Z 5788 #> 32 2016-10-01T23:42:56Z 1436486 #> 33 2018-08-28T21:17:47Z 261463 #> 34 2018-02-09T00:55:26Z 143717 #> 35 2016-03-12T22:08:58Z 422959 #> 36 2017-07-18T07:38:04Z 105059554 #> 37 2018-10-24T06:27:30Z 846742 #> 38 2016-07-06T08:16:03Z 112005531 #> 39 2019-01-08T10:56:34Z 213415 #> 40 2014-01-23T13:10:29Z 530270 #> 41 2016-04-25T10:05:34Z 1100089 #> 42 2014-02-01T23:57:10Z 20902 #> 43 2017-05-16T01:49:31Z 2231256 #> 44 2018-03-29T06:10:06Z 3204 #> 45 2014-04-08T05:44:10Z 36789 #> 46 2017-08-18T07:10:57Z 1287073 #> 47 2017-08-23T20:47:39Z 3402 #> 48 2014-09-10T20:30:11Z 4789599 #> 49 2017-03-27T23:45:41Z 501407 #> 50 2017-10-06T08:05:10Z 9313136 #> 51 2016-06-08T10:49:24Z 34235 #> 52 2015-11-03T22:20:17Z 777387 #> 53 2019-07-17T18:44:17Z 140029 #> 54 2019-01-02T06:03:19Z 7633234 #> 55 2017-11-24T08:16:45Z 995274 #> 56 2018-12-10T14:04:47Z 575437 #> 57 2019-03-22T16:25:58Z 3830916 #> 58 2016-12-27T08:24:52Z 238373 #> 59 2014-03-30T13:07:16Z 158093 #> 60 2016-09-05T10:02:23Z 790724 #> 61 2017-03-12T03:21:52Z 568340 #> 62 2019-04-18T02:10:15Z 13369666 #> 63 2014-05-11T04:25:48Z 26596 #> 64 2017-11-09T19:55:00Z 2628148 #> 65 2014-06-01T07:55:24Z 227746 #> 66 2018-04-20T21:40:38Z 6844490 #> 67 2017-01-31T06:40:09Z 1871373 #> 68 2016-11-08T01:58:39Z 444767 #> 69 2016-11-07T20:41:52Z 7830195 #> 70 2016-09-11T06:37:25Z 2424784 #> 71 2017-02-27T20:57:29Z 583503 #> 72 2019-04-23T05:05:16Z 1688176 #> 73 2017-06-27T10:57:03Z 599802 #> 74 2019-01-16T21:50:21Z 772904991 #> 75 2016-02-08T21:41:43Z 616882 #> 76 2016-04-14T02:24:32Z 228605 #> 77 2017-11-09T23:46:52Z 11010525 #> 78 2015-02-03T06:30:05Z 19210 #> 79 2017-12-10T20:08:30Z 660305 #> 80 2018-06-07T21:00:31Z 483015 #> 81 2017-03-21T03:12:40Z 942044 #> 82 2016-12-28T00:29:28Z 12865609 #> 83 2019-06-15T15:19:11Z 568827 #> 84 2017-05-18T20:05:28Z 637340 #> 85 2017-08-07T02:51:12Z 85176234 #> 86 2019-01-10T11:24:06Z 4848734 #> 87 2016-12-28T23:12:16Z 1131636 #> 88 2018-11-28T19:32:19Z 44320330 #> 89 2017-06-08T16:23:07Z 8176132 #> 90 2019-04-09T21:12:53Z 760561 #> 91 2019-04-04T07:14:34Z 52623 #> 92 2019-02-11T07:21:44Z 1508 #> 93 2017-10-13T21:37:10Z 1383759 #> 94 2018-09-28T01:34:56Z 7687679 #> 95 2017-10-06T23:03:51Z 17551044 #> 96 2016-09-07T13:29:25Z 3264710 #> 97 2016-11-10T00:26:01Z 8718404 #> 98 2015-01-04T03:03:34Z 648231 #> 99 2016-08-31T00:19:19Z 68648009 #> 100 2019-02-25T08:35:58Z 161749950 #> 101 2016-03-12T10:59:56Z 1580933 #> 102 2016-11-07T12:53:19Z 2639894 #> 103 2017-12-10T04:58:09Z 67973 #> 104 2017-06-01T05:59:24Z 43423561 #> 105 2017-02-18T02:54:48Z 1291178 #> 106 2018-11-18T03:30:53Z 5788169 #> 107 2019-06-15T15:19:53Z 1131229 #> 108 2016-11-07T10:19:34Z 251661 #> 109 2017-01-10T02:19:56Z 1370175 #> 110 2018-06-11T09:41:17Z 655161 #> 111 2016-09-15T00:01:47Z 81830 #> 112 2016-12-20T23:56:26Z 16431 #> 113 2017-07-02T13:49:09Z 435510 #> 114 2019-04-03T10:55:58Z 871190 #> 115 2019-07-14T14:51:51Z 100985047 #> 116 2017-03-25T23:43:45Z 29396116 #> 117 2018-07-25T20:00:44Z 131577763 #> 118 2016-09-06T23:49:00Z 7196890 #> 119 2017-05-06T07:03:18Z 593427119 #> 120 2017-06-09T05:35:19Z 396650 #> 121 2019-02-16T07:17:45Z 19611022 #> 122 2018-10-17T13:31:23Z 342913 #> 123 2019-01-13T09:50:41Z 87633 #> 124 2018-07-31T08:20:54Z 1279263 #> 125 2017-04-20T10:33:38Z 2357872 #> 126 2015-10-31T12:43:58Z 620677 #> 127 2016-09-06T08:08:29Z 1771845 #> 128 2015-02-12T05:42:12Z 40256 #> 129 2016-05-28T23:08:07Z 40767652 #> 130 2018-03-18T01:40:31Z 542902 #> 131 2014-02-15T11:24:42Z 1057819 #> 132 2018-12-05T07:29:20Z 776648 #> 133 2015-11-22T01:05:05Z 252216 #> 134 2017-02-05T10:06:58Z 380830 #> 135 2018-09-10T12:27:19Z 110355 #> 136 2014-05-06T02:48:35Z 35368 #> 137 2017-02-20T00:43:26Z 2491103 #> 138 2018-07-24T03:01:35Z 764357 #> 139 2016-05-27T09:36:18Z 1270564 #> 140 2018-07-01T07:17:02Z 4261179 #> 141 2016-02-05T20:12:26Z 1217166 #> 142 2016-09-23T23:59:38Z 2064274 #> 143 2016-01-18T16:26:24Z 8243604 #> 144 2013-12-04T00:00:00Z 1247574 #> 145 2016-11-17T19:44:24Z 1073164 #> 146 2016-10-10T16:32:34Z 22526334 #> 147 2018-12-27T08:51:50Z 242715 #> 148 2016-09-24T21:37:43Z 2136520 #> 149 2016-08-23T20:41:17Z 197184 #> 150 2018-02-14T22:32:25Z 143569 #> 151 2014-05-11T10:30:43Z 191540 #> 152 2015-07-12T23:52:27Z 32310 #> 153 2019-03-21T21:57:32Z 28510459 #> 154 2017-04-07T18:37:15Z 321920 #> 155 2015-07-09T09:23:52Z 47297 #> 156 2014-03-25T07:23:52Z 28641 #> 157 2016-11-07T08:11:03Z 179967 #> 158 2016-01-24T16:27:23Z 8089103 #> 159 2018-04-01T07:13:44Z 13873674 #> 160 2017-03-22T08:58:10Z 611070 #> 161 2017-02-05T20:36:21Z 999991 #> 162 2018-01-03T12:48:10Z 45701 #> 163 2019-03-12T20:57:35Z 48881308 #> 164 2018-11-20T21:22:09Z 411755 #> 165 2018-12-09T22:43:38Z 36916 #> 166 2016-09-26T20:14:51Z 2191565 #> 167 2018-04-22T08:27:56Z 188847 #> 168 2016-07-02T05:42:13Z 49467477 #> 169 2017-11-25T00:00:33Z 1749806 #> 170 2014-07-22T22:56:15Z 104097 #> 171 2019-04-02T20:52:19Z 3073409 #> 172 2016-08-30T11:22:42Z 3439414 #> 173 2016-02-23T10:13:22Z 2460787 #> 174 2019-03-17T13:27:11Z 17204697 #> 175 2017-10-30T01:12:14Z 3883455 #> 176 2018-11-01T03:27:26Z 22477 #> 177 2017-02-07T01:28:41Z 24451312 #> 178 2018-09-13T20:12:18Z 41826763 #> 179 2017-10-06T07:29:07Z 5176463 #> 180 2016-12-27T07:05:43Z 504565 #> 181 2016-03-03T06:12:04Z 1476783 #> 182 2018-11-17T02:38:15Z 1957600 #> 183 2019-04-08T21:11:56Z 808330 #> 184 2018-08-08T02:57:06Z 45120 #> 185 2016-09-20T20:00:49Z 37217682 #> 186 2018-07-28T21:52:12Z 339487 #> 187 2016-09-30T22:00:48Z 5081689 #> 188 2016-04-25T21:51:50Z 7089395 #> 189 2018-07-04T13:32:01Z 30484 #> 190 2016-05-21T21:35:40Z 164611595 #> 191 2018-06-07T12:55:25Z 275785 #> 192 2016-02-22T01:28:08Z 144989 #> 193 2017-03-07T20:39:08Z 995698 #> 194 2015-01-18T01:24:24Z 13451 #> 195 2016-11-08T09:03:44Z 1074948 #> 196 2016-03-12T12:46:03Z 1141278 #> 197 2014-07-06T10:22:01Z 45018 #> 198 2018-01-15T06:32:46Z 109202 #> 199 2018-10-29T23:50:37Z 326714 #> 200 2015-10-31T23:54:26Z 93992 #> 201 2018-01-09T03:38:56Z 16630988 #> 202 2016-03-03T02:45:09Z 269548 #> 203 2017-09-04T12:46:39Z 735405 #> 204 2016-03-09T11:15:43Z 111623 #> 205 2019-05-13T12:24:00Z 855249 #> 206 2018-03-17T01:43:24Z 1311610 #> 207 2018-12-18T16:19:50Z 205242 #> 208 2017-10-18T11:03:37Z 2257930 #> 209 2016-04-14T23:37:15Z 27393015 #> 210 2017-07-23T05:34:55Z 119948 #> 211 2018-03-25T22:50:36Z 845012 #> 212 2019-07-13T19:21:12Z 28364826 #> 213 2015-06-30T09:19:43Z 16034 #> 214 2016-08-29T01:07:38Z 71081 #> 215 2016-03-09T08:18:43Z 188343 #> 216 2016-09-20T07:32:50Z 879703 #> 217 2016-10-12T09:09:11Z 58843488 #> 218 2015-11-30T09:21:55Z 4483605 #> 219 2019-04-20T22:57:28Z 2467304 #> 220 2018-09-24T21:05:18Z 606637 #> 221 2015-10-26T03:20:20Z 3122898 #> 222 2017-01-22T07:39:17Z 366140 #> 223 2015-05-28T18:09:16Z 699793 #> 224 2014-02-23T03:09:38Z 37784 #> 225 2016-06-29T19:08:15Z 149830 #> 226 2018-08-09T20:26:35Z 972629 #> 227 2019-02-21T20:00:56Z 143606147 #> 228 2019-02-20T21:04:04Z 91991358 #> 229 2015-07-08T08:44:51Z 252751 #> 230 2016-05-31T00:12:29Z 359420698 #> 231 2015-10-10T07:06:17Z 19863 #> 232 2018-09-10T11:07:00Z 287071 #> 233 2016-04-24T06:14:42Z 1398630 #> 234 2018-09-24T05:09:56Z 3472916 #> 235 2016-07-07T23:00:10Z 26892897 #> 236 2016-10-09T06:13:31Z 234842089 #> 237 2015-11-30T10:26:47Z 3619948 #> 238 2019-07-15T10:25:07Z 49038354 #> 239 2017-03-15T01:57:04Z 33698126 #> 240 2017-12-10T04:01:03Z 499836 #> 241 2015-06-05T04:12:29Z 1194597 #> 242 2016-01-17T17:18:47Z 5915013 #> 243 2016-08-30T09:54:55Z 1697282 #> 244 2016-03-03T00:32:49Z 1535473 #> 245 2017-01-25T06:38:36Z 75383 #> 246 2016-05-09T11:28:01Z 599080 #> 247 2019-05-19T22:45:45Z 161143 #> 248 2017-08-29T19:25:56Z 711477622 #> 249 2016-09-06T06:28:30Z 800157 #> 250 2018-01-15T06:14:55Z 512311 #> 251 2019-05-26T23:24:11Z 41960 #> 252 2016-12-27T07:49:12Z 452899 #> 253 2016-02-06T02:53:13Z 880331 #> 254 2015-10-11T01:26:05Z 590954 #> 255 2015-10-02T02:29:20Z 2330382 #> 256 2016-12-17T06:45:44Z 400260 #> 257 2018-07-09T22:16:26Z 110964206 #> 258 2015-10-30T14:19:52Z 173891 #> 259 2013-12-06T00:00:00Z 38108 #> 260 2019-07-16T05:43:27Z 41817893 #> 261 2016-02-08T01:35:48Z 327314 #> 262 2016-09-09T04:43:00Z 657001 #> 263 2014-08-10T00:03:59Z 116465 #> 264 2017-01-03T20:45:24Z 830155 #> 265 2017-11-15T07:57:11Z 709926 #> 266 2017-07-01T16:12:37Z 503501 #> 267 2017-07-01T16:42:46Z 707432 #> 268 2016-02-07T04:44:49Z 447410 #> 269 2017-01-29T07:28:23Z 1274070 #> 270 2016-02-07T03:46:46Z 341118 #> 271 2016-05-01T01:06:35Z 88678 #> 272 2017-01-08T22:23:19Z 26183992 #> 273 2015-04-04T06:40:05Z 48592 #> 274 2016-12-17T07:44:31Z 4907802 #> 275 2017-04-25T11:04:29Z 1023466 #> 276 2016-02-09T12:20:35Z 22281337 #> 277 2016-11-01T09:33:34Z 91436280 #> 278 2017-11-03T07:04:08Z 7445067 #> 279 2018-11-07T13:26:42Z 24990 #> 280 2018-09-24T05:08:57Z 307768 #> 281 2016-09-13T04:35:05Z 104977 #> 282 2017-04-30T01:51:55Z 71153 #> 283 2017-10-05T06:56:23Z 7040725 #> 284 2017-03-08T23:49:53Z 393430309 #> 285 2016-05-10T07:37:46Z 107303 #> 286 2018-09-13T04:48:08Z 182717 #> 287 2018-09-25T10:59:05Z 2457420 #> 288 2016-11-24T06:04:34Z 32939105 #> 289 2016-03-09T02:49:28Z 281924 #> 290 2016-09-06T04:21:06Z 73587 #> 291 2019-03-12T21:00:14Z 40960499 #> 292 2019-07-17T13:59:41Z 39086762 #> 293 2017-10-29T23:53:20Z 1052753 #> 294 2016-02-23T03:30:49Z 117070 #> 295 2018-04-11T00:12:09Z 386489 #> 296 2014-01-02T00:00:00Z 4609615 #> 297 2019-06-25T18:06:57Z 89392 #> 298 2018-11-07T04:37:11Z 14609 #> 299 2013-12-04T00:00:00Z 37103 #> 300 2017-03-17T22:36:34Z 130705 #> 301 2016-11-24T00:18:27Z 30741620 #> 302 2014-02-22T20:47:56Z 55622 #> 303 2018-08-24T04:36:24Z 44109 #> 304 2017-10-05T03:58:50Z 26815 #> 305 2015-04-11T06:35:46Z 139395 #> 306 2017-03-13T10:13:16Z 1619544 #> 307 2013-12-04T00:00:00Z 859777 #> 308 2016-03-09T01:23:23Z 285191 #> 309 2018-08-30T05:08:09Z 30327 #> 310 2018-07-27T21:59:04Z 254867 #> 311 2016-10-08T10:53:23Z 21149008 #> 312 2018-04-19T10:11:37Z 27971100 #> 313 2016-03-09T13:04:08Z 442166 #> 314 2018-12-04T02:32:35Z 265410 #> 315 2015-04-27T11:21:59Z 107776 #> 316 2016-08-22T11:21:27Z 97151 #> 317 2014-02-13T21:19:24Z 2239 #> 318 2018-04-28T02:02:29Z 10371766 #> 319 2017-01-22T08:33:43Z 178201 #> 320 2016-04-13T01:08:20Z 179030 #> 321 2018-01-15T06:42:31Z 84011 #> 322 2018-01-29T07:50:12Z 181871 #> 323 2015-03-28T05:35:28Z 612414 #> 324 2016-06-30T03:39:05Z 29020808 #> 325 2018-07-14T06:06:15Z 26151608 #> 326 2017-03-22T01:14:11Z 352120 #> 327 2018-06-14T08:05:50Z 43432346 #> 328 2016-07-15T11:14:44Z 3827238 #> 329 2016-04-24T21:27:05Z 83957 #> 330 2016-05-29T22:59:04Z 65469298 #> 331 2016-06-27T08:07:18Z 2682650 #> 332 2014-02-23T04:32:08Z 3200 #> 333 2018-02-19T10:28:11Z 428779 #> 334 2016-11-07T09:04:54Z 530147 #> 335 2016-11-05T22:32:39Z 395044 #> 336 2016-12-27T10:05:41Z 7485802 #> 337 2016-01-24T13:15:11Z 518966 #> 338 2019-03-09T20:49:51Z 763117241 #> 339 2014-07-06T04:16:37Z 16919 #> 340 2017-10-11T21:01:33Z 166046 #> 341 2018-05-24T09:11:55Z 777649 #> 342 2016-06-09T09:16:36Z 93338602 #> 343 2018-04-28T07:49:02Z 24853850 #> 344 2019-05-13T12:22:01Z 56021 #> 345 2015-11-25T07:00:57Z 4833678 #> 346 2017-11-17T07:47:39Z 2013164 #> 347 2016-11-07T11:07:25Z 1020136 #> 348 2016-07-21T02:25:49Z 819478 #> 349 2018-09-08T07:57:44Z 1116256 #> 350 2017-10-14T20:14:58Z 8600635 #> 351 2019-03-27T01:50:45Z 11657763 #> 352 2016-06-28T23:47:07Z 134047 #> 353 2019-06-28T07:51:50Z 224119 #> 354 2018-10-23T06:00:07Z 1274051 #> 355 2016-09-06T05:51:12Z 458155 #> 356 2016-03-06T21:41:16Z 738556 #> 357 2014-06-01T10:01:32Z 202683 #> 358 2017-03-15T19:29:52Z 2247314 #> 359 2018-11-06T07:26:07Z 858 #> 360 2014-02-01T02:57:21Z 148366 #> 361 2016-08-05T06:53:35Z 5968783 #> 362 2017-01-29T07:20:52Z 1296959 #> 363 2016-02-07T20:26:56Z 432552 #> 364 2018-03-08T02:09:26Z 377377 #> 365 2017-07-01T15:28:17Z 890341 #> 366 2015-08-08T04:28:48Z 2983472 #> 367 2013-12-04T00:00:00Z 453427 #> 368 2014-09-12T04:50:32Z 1186564 #> 369 2018-07-04T23:15:57Z 5033997 #> 370 2017-04-15T11:02:35Z 91890110 #> 371 2019-07-18T08:59:45Z 18241518 #> 372 2018-05-20T05:24:11Z 1327567 #> 373 2018-12-06T19:11:27Z 66147869 #> 374 2019-07-11T06:31:32Z 5024908 #> 375 2017-09-04T21:06:46Z 16472873 #> 376 2017-02-08T07:59:39Z 52578183 #> 377 2016-12-28T07:03:17Z 4946850 #> 378 2015-05-12T23:50:08Z 3474763 #> Description #> 1 In approximately March 2015, the free web hosting provider <a href="http://www.troyhunt.com/2015/10/breaches-traders-plain-text-passwords.html" target="_blank" rel="noopener">000webhost suffered a major data breach</a> that exposed almost 15 million customer records. The data was sold and traded before 000webhost was alerted in October. The breach included names, email addresses and plain text passwords. #> 2 In approximately 2012, it's alleged that the Chinese email service known as <a href="http://126.com" target="_blank" rel="noopener">126</a> suffered a data breach that impacted 6.4 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 3 In April 2016, customer data obtained from the streaming app known as &quot;17&quot; <a href="http://motherboard.vice.com/read/another-day-another-hack-millions-of-user-accounts-for-streaming-app-17" target="_blank" rel="noopener">appeared listed for sale on a Tor hidden service marketplace</a>. The data contained over 4 million unique email addresses along with IP addresses, usernames and passwords stored as unsalted MD5 hashes. #> 4 In late 2011, <a href="https://news.softpedia.com/news/China-Investigates-Hacking-Operations-That-Exposed-100-Million-Users-244312.shtml" target="_blank" rel="noopener">a series of data breaches in China affected up to 100 million users</a>, including 7.5 million from the gaming site known as 17173. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 5 In February 2018, <a href="https://www.troyhunt.com/ive-just-added-2844-new-data-breaches-with-80m-records-to-have-i-been-pwned/" target="_blank" rel="noopener">a massive collection of almost 3,000 alleged data breaches was found online</a>. Whilst some of the data had previously been seen in Have I Been Pwned, 2,844 of the files consisting of more than 80 million unique email addresses had not previously been seen. Each file contained both an email address and plain text password and were consequently loaded as a single &quot;unverified&quot; data breach. #> 6 In December 2017, the Belgian motorcycle forum <a href="https://www.2fast4u.be" target="_blank" rel="noopener">2fast4u</a> discovered a data breach of their system. The breach of the vBulletin message board impacted over 17k individual users and exposed email addresses, usersnames and salted MD5 passwords. #> 7 In mid-2018, the online photography community <a href="https://support.500px.com/hc/en-us/articles/360017752493-Security-Issue-February-2019-FAQ" target="_blank" rel="noopener">500px suffered a data breach</a>. The incident exposed almost 15 million unique email addresses alongside names, usernames, genders, dates of birth and either an MD5 or bcrypt password hash. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 8 In approximately 2011, it's alleged that the Chinese gaming site known as <a href="http://www.7k7k.com" target="_blank" rel="noopener">7k7k</a> suffered a data breach that impacted 9.1 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains usernames, email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 9 In July 2018, the health and fitness service <a href="https://8fit.zendesk.com/hc/en-us/articles/360017746394-Notice" target="_blank" rel="noopener">8fit suffered a data breach</a>. The data subsequently appeared for sale on a dark web marketplace in February 2019 and included over 15M unique email addresses alongside names, genders, IP addresses and passwords stored as bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 10 In June 2017, the online playlists service known as <a href="https://blog.8tracks.com/2017/06/27/password-security-alert/" target="_blank" rel="noopener">8Tracks suffered a data breach</a> which impacted 18 million accounts. In their disclosure, 8Tracks advised that &quot;the vector for the attack was an employee’s GitHub account, which was not secured using two-factor authentication&quot;. Salted SHA-1 password hashes for users who <em>didn't</em> sign up with either Google or Facebook authentication were also included. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies and contained almost 8 million unique email addresses. #> 11 In November 2015, the gaming website dedicated to classic DOS games <a href="http://www.abandonia.com" target="_blank" rel="noopener">Abandonia</a> suffered a data breach resulting in the exposure of 776k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. #> 12 In 2016, the site dedicated to helping people hack email and online gaming accounts known as Abusewith.us suffered multiple data breaches. The site <a href="https://krebsonsecurity.com/2017/02/who-ran-leakedsource-com/" target="_blank" rel="noopener">allegedly had an administrator in common with the nefarious LeakedSource site</a>, both of which have since been shut down. The exposed data included more than 1.3 million unique email addresses, often accompanied by usernames, IP addresses and plain text or hashed passwords retrieved from various sources and intended to be used to compromise the victims' accounts. #> 13 In November 2014, the acne website <a href="http://www.acne.org/" target="_blank" rel="noopener">acne.org</a> suffered a data breach that exposed over 430k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords. #> 14 In November 2018, <a href="https://blog.hackenproof.com/industry-news/another-decision-makers-database-leaked/" target="_blank" rel="noopener">security researcher Bob Diachenko identified an unprotected database hosted by data aggregator &quot;Adapt&quot;</a>. A provider of &quot;Fresh Quality Contacts&quot;, the service exposed over 9.3M unique records of individuals and employer information including their names, employers, job titles, contact information and data relating to the employer including organisation description, size and revenue. No response was received from Adapt when contacted. #> 15 In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, <em>encrypted</em> password and a password hint in plain text. The password cryptography was poorly done and <a href="http://stricture-group.com/files/adobe-top100.txt" target="_blank" rel="noopener">many were quickly resolved back to plain text</a>. The unencrypted hints also <a href="http://www.troyhunt.com/2013/11/adobe-credentials-and-serious.html" target="_blank" rel="noopener">disclosed much about the passwords</a> adding further to the risk that hundreds of millions of Adobe customers already faced. #> 16 In May 2015, the adult hookup site <a href="http://www.bbc.com/news/business-32839196" target="_blank" rel="noopener">Adult Friend Finder was hacked</a> and nearly 4 million records dumped publicly. The data dump included extremely sensitive personal information about individuals and their relationship statuses and sexual preferences combined with personally identifiable information. #> 17 In May 2018, the website for sharing adult-orientated works of fiction known as <a href="http://www.adult-fanfiction.org" target="_blank" rel="noopener">Adult-FanFiction.Org</a> had 186k records exposed in a data breach. The data contained names, email addresses, dates of birth and passwords stored as <em>both</em> MD5 hashes and plain text. AFF did not respond when contacted about the breach and the site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 18 In April 2018, the ad management platform known as <a href="https://www.aerserv.com/" target="_blank" rel="noopener">AerServ</a> suffered a data breach. Acquired by InMobi earlier in the year, the AerServ breach impacted over 66k unique email addresses and also included contact information and passwords stored as salted SHA-512 hashes. The data was publicly posted to Twitter later in 2018 after which InMobi was notified and advised they were aware of the incident. #> 19 In May 2013, the torrent site <a href="http://www.ahashare.com">AhaShare.com</a> suffered a breach which resulted in more than 180k user accounts being published publicly. The breach included a raft of personal information on registered users plus despite assertions of not distributing personally identifiable information, the site also leaked the IP addresses used by the registered identities. #> 20 In December 2017, the virtual keyboard application <a href="https://mackeepersecurity.com/post/virtual-keyboard-developer-leaked-31-million-of-client-records" target="_blank" rel="noopener">ai.type was found to have left a huge amount of data publicly facing in an unsecured MongoDB instance</a>. Discovered by researchers at The Kromtech Security Center, the 577GB data set included extensive personal information including over 20 million unique email addresses, social media profiles and address book contacts. The email addresses alone were provided to HIBP to enable impacted users to assess their exposure. #> 21 In September 2016, data allegedly obtained from the Chinese gaming website known as <a href="http://aipai.com" target="_blank" rel="noopener">Aipai.com</a> and containing 6.5M accounts was leaked online. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and MD5 password hashes. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 22 In July 2016, a hacker known as Phineas Fisher <a href="https://motherboard.vice.com/en_us/article/yp3n55/phineas-fisher-turkish-government-hack" target="_blank" rel="noopener">hacked Turkey's ruling party (Justice and Development Party or &quot;AKP&quot;) and gained access to 300k emails</a>. The full contents of the emails were subsequently <a href="https://wikileaks.org/akp-emails/" target="_blank" rel="noopener">published by WikiLeaks and made searchable</a>. HIBP identified over 917k unique email address patterns in the data set, including message IDs and a number of other non-user addresses. #> 23 In November 2015, an Ancestry service known as <a href="https://blogs.ancestry.com/ancestry/2017/12/23/rootsweb-security-update/" target="_blank" rel="noopener">RootsWeb suffered a data breach</a>. The breach was not discovered until late 2017 when a file containing almost 300k email addresses and plain text passwords was identified. #> 24 In October 2011, the Android Forums website <a href="http://www.pcworld.com/article/259201/online_android_forum_hacked_user_data_accessed.html" target="_blank" rel="noopener">was hacked<a/> and 745k user accounts were subsequently leaked publicly. The compromised data included email addresses, user birth dates and passwords stored as a salted MD5 hash. #> 25 In July 2018, the cloud-based video making service <a href="https://techcrunch.com/2018/08/20/animoto-hack-exposes-personal-information-geolocation-data/" target="_blank" rel="noopener">Animoto suffered a data breach</a>. The breach exposed 22 million unique email addresses alongside names, dates of birth, country of origin and salted password hashes. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 26 In December 2016, a huge list of email address and password pairs appeared in a &quot;combo list&quot; referred to as &quot;Anti Public&quot;. The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for &quot;credential stuffing&quot;, that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read <a href="https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned" target="_blank" rel="noopener">Password reuse, credential stuffing and another billion records in Have I Been Pwned</a>. #> 27 In July 2018, the sales engagement startup <a href="https://www.wired.com/story/apollo-breach-linkedin-salesforce-data/" target="_blank" rel="noopener">Apollo left a database containing billions of data points publicly exposed without a password</a>. The data was discovered by security researcher <a href="http://www.vinnytroia.com/" target="_blank" rel="noopener">Vinny Troia</a> who subsequently sent a subset of the data containing 126 million unique email addresses to Have I Been Pwned. The data left exposed by Apollo was used in their &quot;revenue acceleration platform&quot; and included personal information such as names and email addresses as well as professional information including places of employment, the roles people hold and where they're located. Apollo stressed that the exposed data did not include sensitive information such as passwords, social security numbers or financial data. <a href="https://www.apollo.io/contact" target="_blank" rel="noopener">The Apollo website has a contact form</a> for those looking to get in touch with the organisation. #> 28 In March 2017, the French Flatsharing site known as <a href="https://www.appartoo.com" target="_blank" rel="noopener">Appartoo</a> suffered a data breach. The incident exposed an extensive amount of personal information on almost 50k members including email addresses, genders, ages, private messages sent between users of the service and passwords stored as SHA-256 hashes. Appartoo advised that all subscribers were notified of the incident in early 2017. #> 29 In May 2016, the the online gaming site <a href="http://armyforceonline.com" target="_blank" rel="noopener">Army Force Online</a> suffered a data breach that exposed 1.5M accounts. The breached data was found being regularly traded online and included usernames, email and IP addresses and MD5 passwords. #> 30 In July 2015, the infidelity website Ashley Madison <a href="http://krebsonsecurity.com/2015/07/online-cheating-site-ashleymadison-hacked/" target="_blank" rel="noopener">suffered a serious data breach</a>. The attackers threatened Ashley Madison with the full disclosure of the breach unless the service was shut down. One month later, the database was dumped including more than 30M unique email addresses. This breach has been classed as &quot;sensitive&quot; and is not publicly searchable, although individuals may discover if they've been impacted by <a href="https://haveibeenpwned.com/NotifyMe">registering for notifications</a>. <a href="http://www.troyhunt.com/2015/07/heres-how-im-going-to-handle-ashley.html" target="_blank" rel="noopener">Read about this approach in detail</a>. #> 31 In December 2013, the vBulletin forum for the social engineering site known as "AstroPID" was breached and <a href="https://www.sinister.ly/Thread-40-Compromised-databases" target="_blank" rel="noopener">leaked publicly</a>. The site provided tips on fraudulently obtaining goods and services, often by providing a legitimate "PID" or Product Information Description. The breach resulted in nearly 6k user accounts and over 220k private messages between forum members being exposed. #> 32 In December 2015, the service for creating and running free Minecraft servers known as <a href="https://twitter.com/AternosStatus/status/696121828360716288" target="_blank" rel="noopener">Aternos suffered a data breach that impacted 1.4 million subscribers</a>. The data included usernames, email and IP addresses and hashed passwords. #> 33 In August 2018, the cryptocurrency investment platform <a href="https://www.facebook.com/notes/atlas-quantum/comunicado-importante/2196456297259749/" target="_blank" rel="noopener">Atlas Quantum suffered a data breach</a>. The breach leaked the personal data of 261k investors on the platform including their names, phone numbers, email addresses and account balances. #> 34 In February 2018, <a href="https://niebezpiecznik.pl/post/wyciek-hasel-144-000-uzytkownikow-autocentrum-pl/" target="_blank" rel="noopener">data belonging to the Polish motoring website autocentrum.pl was found online</a>. The data contained 144k email addresses and plain text passwords. #> 35 In May 2014, <a href="https://www.grahamcluley.com/2014/05/avast-forum-hacked/" target="_blank" rel="noopener">the Avast anti-virus forum was hacked</a> and 423k member records were exposed. The Simple Machines Based forum included usernames, emails and password hashes. #> 36 In mid-2017, a spam list of over 105 million individuals in corporate America was discovered online. Referred to as &quot;B2B USA Businesses&quot;, the list categorised email addresses by employer, providing information on individuals' job titles plus their work phone numbers and physical addresses. <a href="https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information" target="_blank" rel="noopener">Read more about spam lists in HIBP.</a> #> 37 In approximately 2008, the site to help parents name their children known as <a href="https://www.babynames.com/" target="_blank" rel="noopener">Baby Names</a> suffered a data breach. The incident exposed 846k email addresses and passwords stored as salted MD5 hashes. When contacted in October 2018, Baby Names advised that &quot;the breach happened at least ten years ago&quot; and that members were notified at the time. #> 38 In June 2016, <a href="http://motherboard.vice.com/read/another-day-another-hack-user-accounts-of-dating-site-badoo" target="_blank" rel="noopener">a data breach allegedly originating from the social website Badoo was found to be circulating amongst traders</a>. Likely obtained several years earlier, the data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes. Whilst there are many indicators suggesting Badoo did indeed suffer a data breach, <a href="https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">the legitimacy of the data could not be emphatically proven</a> so this breach has been categorised as &quot;unverified&quot;. #> 39 In approximately December 2018, the online ad platform <a href="https://bannerbit.com/" target="_blank" rel="noopener">BannerBit</a> suffered a data breach. Containing 213k unique email addresses and plain text passwords, the data was provided to HIBP by a third party. Multiple attempts were made to contact BannerBit, but no response was received. #> 40 In June 2011 as part of a final breached data dump, the hacker collective &quot;LulzSec&quot; <a href="http://www.rockpapershotgun.com/2011/06/26/lulzsec-over-release-battlefield-heroes-data" target="_blank" rel="noopener">obtained and released over half a million usernames and passwords from the game Battlefield Heroes</a>. The passwords were stored as MD5 hashes with no salt and many were easily converted back to their plain text versions. #> 41 In November 2015, the dating website <a href="http://www.forbes.com/sites/thomasbrewster/2016/04/25/beautiful-people-hack-sexual-preference-location-addresses/#26a2cdf7559f" target="_blank" rel="noopener">Beautiful People was hacked</a> and over 1.1M accounts were leaked. The data was being traded in underground circles and included a huge amount of personal information related to dating. #> 42 In February 2014, <a href="http://news.softpedia.com/news/Hackers-Claim-to-Have-Breached-Bell-Canada-s-Systems-422952.shtml?utm_medium=twitter&utm_source=FredToadster" target="_blank" rel="noopener">Bell Canada suffered a data breach via the hacker collective known as NullCrew</a>. The breach included data from multiple locations within Bell and exposed email addresses, usernames, user preferences and a number of unencrypted passwords and credit card data from 40,000 records containing just over 20,000 unique email addresses and usernames. #> 43 In May 2017, <a href="http://www.cbc.ca/beta/news/technology/bell-data-breach-customer-names-phone-numbers-emails-leak-1.4116608" target="_blank" rel="noopener">the Bell telecommunications company in Canada suffered a data breach</a> resulting in the exposure of millions of customer records. The data was consequently leaked online with a message from the attacker stating that they were &quot;releasing a significant portion of Bell.ca's data due to the fact that they have failed to cooperate with us&quot; and included a threat to leak more. The impacted data included over 2 million unique email addresses and 153k survey results dating back to 2011 and 2012. There were also 162 Bell employee records with more comprehensive personal data including names, phone numbers and plain text &quot;passcodes&quot;. Bell suffered another breach in 2014 which exposed 40k records. #> 44 In March 2018, the animal bestiality website known as <a href="https://motherboard.vice.com/en_us/article/evqvpz/bestiality-website-hacked-troy-hunt-have-i-been-pwned" target="_blank" rel="noopener">Bestialitysextaboo was hacked</a>. A collection of various sites running on the same service were also compromised and details of the hack (including links to the data) were posted on a popular forum. In all, more than 3.2k unique email addresses were included alongside usernames, IP addresses, dates of birth, genders and bcrypt hashes of passwords. #> 45 In April 2014, the job site <a href="http://www.bigmoneyjobs.com">bigmoneyjobs.com</a> was <a href="https://twitter.com/ProbablyOnion2/status/451477310319779841" target="_blank" rel="noopener">hacked by an attacker known as &quot;ProbablyOnion&quot;</a>. The attack resulted in the <a href="http://news.softpedia.com/news/BigMoneyJobs-Hacked-Details-of-36-000-Users-Leaked-Online-436250.shtml?utm_source=twitterfeed&utm_medium=twitter&utm_campaign=information_security" target="_blank" rel="noopener">exposure of over 36,000 user accounts</a> including email addresses, usernames and passwords which were stored in plain text. The attack was allegedly mounted by exploiting a SQL injection vulnerability. #> 46 In September 2014, the online game <a href="http://blog.binweevils.com/2014/09/important-security-update/" target="_blank" rel="noopener">Bin Weevils suffered a data breach</a>. Whilst originally stating that only usernames and passwords had been exposed, <a href="https://www.databreaches.net/data-from-2014-hack-of-childrens-online-game-bin-weevils-leaked-online-hacker-claims-20m-records/" target="_blank" rel="noopener">a subsequent story on DataBreaches.net indicated that a more extensive set of personal attributes were impacted</a> (comments there also suggest the data may have come from a later breach). Data matching that pattern was later provided to Have I Been Pwned by <a href="https://twitter.com/akshayindia6" target="_blank" rel="noopener">@akshayindia6</a> and included almost 1.3m unique email addresses, genders, ages and plain text passwords. #> 47 In December 2016, the forum for the biohacking website <a href="https://forum.biohack.me/index.php?p=/discussion/2101/critical-website-server-compromised-read-this-action-needed" target="_blank" rel="noopener">Biohack.me suffered a data breach</a> that exposed 3.4k accounts. The data included usernames, email addresses and hashed passwords along with the private messages of forum members. The data was self-submitted to HIBP by the Biohack.me operators. #> 48 In September 2014, a large dump of nearly 5M usernames and passwords was <a href="https://forum.btcsec.com/index.php?/topic/9426-gmail-meniai-parol/" target="_blank" rel="noopener">posted to a Russian Bitcoin forum</a>. Whilst commonly reported as 5M &quot;Gmail passwords&quot;, the dump also contained 123k yandex.ru addresses. Whilst the origin of the breach remains unclear, the breached credentials were <a href="http://web.archive.org/web/20140910190920/http://www.reddit.com/r/netsec/comments/2fz13q/5_millions_of_gmail_passwords_leaked_rus_most/" target="_blank" rel="noopener">confirmed by multiple source as correct</a>, albeit a number of years old. #> 49 In May 2015, the Bitcoin forum <a href="https://www.cryptocoinsnews.com/bitcoin-exchange-btc-e-bitcointalk-forum-breaches-details-revealed/" target="_blank" rel="noopener">Bitcoin Talk was hacked</a> and over 500k unique email addresses were exposed. The attack led to the exposure of a raft of personal data including usernames, email and IP addresses, genders, birth dates, security questions and MD5 hashes of their answers plus hashes of the passwords themselves. #> 50 In May 2014, the link management company <a href="https://bitly.com/blog/urgent-security-update-regarding-your-bitly-account/" target="_blank" rel="noopener">Bitly announced they'd suffered a data breach</a>. The breach contained over 9.3 million unique email addresses, usernames and hashed passwords, most using SHA1 with a small number using bcrypt. #> 51 In January 2016, the forum for the popular torrent software <a href="https://motherboard.vice.com/read/another-day-another-hack-user-accounts-for-bittorrents-forum-hacking" target="_blank" rel="noopener">BitTorrent was hacked</a>. The IP.Board based forum stored passwords as weak SHA1 salted hashes and the breached data also included usernames, email and IP addresses. #> 52 In June 2014, the search engine optimisation forum <a href="http://www.blackhatworld.com" target="_blank" rel="noopener">Black Hat World</a> had three quarters of a million accounts breached from their system. The breach included various personally identifiable attributes which were publicly released in a MySQL database script. #> 53 In July 2019, the hacking website <a href="https://blackspigot.com/" target="_blank" rel="noopener">BlackSpigotMC suffered a data breach</a>. The XenForo forum based site was allegedly compromised by a rival hacking website and resulted in 8.5GB of data being leaked including the database and website itself. The exposed data included 140k unique email addresses, usernames, IP addresses, genders, geographic locations and passwords stored as bcrypt hashes. #> 54 In December 2018, the Town of Salem website produced by <a href="https://blog.dehashed.com/town-of-salem-blankmediagames-hacked/" target="_blank" rel="noopener">BlankMediaGames suffered a data breach</a>. Reported to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">DeHashed</a>, the data contained 7.6M unique user email addresses alongside usernames, IP addresses, purchase histories and passwords stored as phpass hashes. DeHashed made multiple attempts to contact BlankMediaGames over various channels and many days but had yet to receive a response at the time of publishing. #> 55 In approximately March 2017, the file sharing website <a href="http://bolt.cd/" target="_blank" rel="noopener">Bolt</a> suffered a data breach resulting in the exposure of 995k unique user records. The data was sourced from their vBulletin forum and contained email and IP addresses, usernames and salted MD5 password hashes. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 56 In December 2018, the Slovak website for watching movies online for free <a href="https://www.bombuj.eu" target="_blank" rel="noopener">Bombuj.eu</a> suffered a data breach. The incident exposed over 575k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Bombuj.eu when contacted about the incident. #> 57 In mid-2018, the social ebook subscription service <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Bookmate was among a raft of sites that were breached and their data then sold in early-2019</a>. The data included almost 4 million unique email addresses alongside names, genders, dates of birth and passwords stored as salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 58 In November 2014, the forum for <a href="http://botoflegends.com" target="_blank" rel="noopener">Bot of Legends</a> suffered a data breach. The IP.Board forum contained 238k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes. #> 59 In March 2014, the home theatre PC software maker Boxee had their forums compromised in an attack. The attackers obtained the entire vBulletin MySQL database and promptly posted it for download on the Boxee forum itself. The data included 160k users, password histories, private messages and a variety of other data exposed across nearly 200 publicly exposed tables. #> 60 In April 2013, the adult website known as <a href="https://motherboard.vice.com/read/nearly-800000-brazzers-porn-site-accounts-exposed-in-forum-hack" target="_blank" rel="noopener">Brazzers was hacked</a> and 790k accounts were exposed publicly. Each record included a username, email address and password stored in plain text. The breach was brought to light by the <a href="https://vigilante.pw" target="_blank" rel="noopener">Vigilante.pw</a> data breach reporting site in September 2016. #> 61 In October 2014, <a href="https://www.databreaches.net/bitcoin-exchange-btc-e-and-bitcointalk-forum-breaches/" target="_blank" rel="noopener">the Bitcoin exchange BTC-E was hacked</a> and 568k accounts were exposed. The data included email and IP addresses, wallet balances and hashed passwords. #> 62 In March 2019, the Indonesian e-commerce website <a href="https://www.bukalapak.com/blog/feature-updates/petunjuk-teknis-105502" target="_blank" rel="noopener">Bukalapak discovered a data breach of the organisation's backups dating back to October 2017</a>. The incident exposed approximately 13 million unique email addresses alongside IP addresses, names and passwords stored as bcrypt and salted SHA-512 hashes. The data was provided to HIBP by a source who requested it to be attributed to &quot;Maxime Thalet&quot;. #> 63 In April 2014, the Australian "Business Acumen Magazine" website was <a href="http://1337mir.com/cracked/2014/04/businessacumen-biz-hacked-26000-user-password-leaked/" target="_blank" rel="noopener">hacked by an attacker known as 1337MiR</a>. The breach resulted in over 26,000 accounts being exposed including usernames, email addresses and password stored with a weak cryptographic hashing algorithm (MD5 with no salt). #> 64 In 2014, the social network for mothers <a href="http://www.cafemom.com" target="_blank" rel="noopener">CafeMom</a> suffered a data breach. The data surfaced alongside a number of other historical breaches including Kickstarter, Bitly and Disqus and contained 2.6 million email addresses and plain text passwords. #> 65 In February 2014, the vBulletin forum for the Marijuana site cannabis.com was breached and <a href="https://www.google.com/search?q=%22cannabisforum.tar%22" target="_blank" rel="noopener">leaked publicly</a>. Whilst there has been no public attribution of the breach, the leaked data included over 227k accounts and nearly 10k private messages between users of the forum. #> 66 In June 2017, news broke that <a href="https://motherboard.vice.com/en_us/article/bj8pvq/hackers-steal-6-million-user-accounts-for-cash-for-surveys-site" target="_blank" rel="noopener">CashCrate had suffered a data breach exposing 6.8 million records</a>. The breach of the cash-for-surveys site dated back to November 2016 and exposed names, physical addresses, email addresses and passwords stored in plain text for older accounts along with weak MD5 hashes for newer ones. #> 67 In March 2016, <a href="http://forums.cdprojektred.com/forum/en/the-witcher-series/news-aa/7248610-important-potential-unauthorized-access-to-the-forums%E2%80%99-data" target="_blank" rel="noopener">Polish game developer CD Projekt RED suffered a data breach</a>. The hack of their forum led to the exposure of almost 1.9 million accounts along with usernames, email addresses and salted SHA1 passwords. #> 68 In approximately mid-2015, the forum for <a href="https://www.cheapassgamer.com" target="_blank" rel="noopener">CheapAssGamer.com</a> suffered a data breach. The database from the IP.Board based forum contained 445k accounts including usernames, email and IP addresses and salted MD5 password hashes. #> 69 In mid-2011, data was allegedly obtained from the Chinese engineering website known as <a href="http://www.co188.com/" target="_blank" rel="noopener">Civil Online</a> and contained 7.8M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email and IP addresses, user names and MD5 password hashes. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 70 In September 2016, the paid-to-click site <a href="http://cybercashworldwide.com/clixsense-has-been-hacked" target="_blank" rel="noopener">ClixSense suffered a data breach</a> which exposed 2.4 million subscriber identities. The breached data was then posted online by the attackers who claimed it was a subset of a larger data breach totalling 6.6 million records. The leaked data was extensive and included names, physical, email and IP addresses, genders and birth dates, account balances and passwords stored as plain text. #> 71 In January, the maker of teddy bears that record children's voices and sends them to family and friends via the internet <a href="https://www.troyhunt.com/data-from-connected-cloudpets-teddy-bears-leaked-and-ransomed-exposing-kids-voice-messages" target="_blank" rel="noopener">CloudPets left their database publicly exposed and it was subsequently downloaded by external parties</a> (the data was also subject to 3 different ransom demands). 583k records were provided to HIBP via a data trader and included email addresses and bcrypt hashes, but the full extent of user data exposed by the system was over 821k records and also included children's names and references to portrait photos and voice recordings. #> 72 In January 2018, the children's gaming site <a href="https://community.cprewritten.net/" target="_blank" rel="noopener">Club Penguin Rewritten</a> (CPRewritten) suffered a data breach (note: CPRewritten is an independent recreation of Disney's Club Penguin game). The incident exposed almost 1.7 million unique email addresses alongside IP addresses, usernames and passwords stored as bcrypt hashes. When contacted, CPRewritten advised they were aware of the breach and had &quot;contacted affected users&quot;. #> 73 In February 2017, <a href="https://motherboard.vice.com/en_us/article/mgkzkp/someone-is-selling-coachella-user-accounts-on-the-dark-web" target="_blank" rel="noopener">hundreds of thousands of records from the Coachella music festival were discovered being sold online</a>. Allegedly taken from a combination of the main Coachella website and their vBulletin-based message board, the data included almost 600k usernames, IP and email addresses and salted hashes of passwords (MD5 in the case of the message board). #> 74 In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 <em>billion</em> records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post <a href="https://www.troyhunt.com/the-773-million-record-collection-1-data-reach" target="_blank" rel="noopener">The 773 Million Record "Collection #1" Data Breach</a>. #> 75 In November 2015, the US internet and cable TV provider Comcast <a href="http://www.ibtimes.co.uk/comcast-data-breach-590000-customer-passwords-go-sale-dark-web-1528026" target="_blank" rel="noopener">suffered a data breach that exposed 590k customer email addresses and plain text passwords</a>. A further 27k accounts appeared with home addresses with the entire data set being sold on underground forums. #> 76 In March 2016, <a href="http://www.comelec.gov.ph/" target="_blank" rel="noopener">the Philippines Commission of Elections website</a> (COMELEC) was <a href="http://www.rappler.com/nation/politics/elections/2016/127256-comelec-website-hacked-anonymous-philippines" target="_blank" rel="noopener">attacked and defaced</a>, allegedly by Anonymous Philippines. Shortly after, <a href="http://www.theregister.co.uk/2016/04/07/philippine_voter_data_breach/" target="_blank" rel="noopener">data on 55 million Filipino voters was leaked publicly</a> and included sensitive information such as genders, marital statuses, height and weight and biometric fingerprint data. The breach only included 228k email addresses. #> 77 In 2014, a file allegedly containing data hacked from <a href="https://www.couponmom.com" target="_blank" rel="noopener">Coupon Mom</a> was created and included 11 million email addresses and plain text passwords. On further investigation, the file was also found to contain data indicating it had been sourced from <a href="https://armorgames.com" target="_blank" rel="noopener">Armor Games</a>. Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers. The breach has subsequently been flagged as &quot;unverified&quot; as the source cannot be emphatically proven. #> 78 In late 2013, the <a href="http://crackcommunity.com" target="_blank" rel="noopener">Crack Community</a> forum specialising in cracks for games was compromised and over 19k accounts published online. Built on the MyBB forum platform, the compromised data included email addresses, IP addresses and salted MD5 passwords. #> 79 In approximately mid-2016, the cracking community forum known as <a href="http://crackingforum.com" target="_blank" rel="noopener">CrackingForum</a> suffered a data breach. The vBulletin based forum exposed 660k email and IP addresses, usernames and salted MD5 hashes. #> 80 In May 2018, <a href="http://forums.creative.com/" target="_blank" rel="noopener">the forum for Singaporean hardware company Creative Technology</a> suffered a data breach which resulted in the disclosure of 483k unique email addresses. Running on an old version of vBulletin, the breach also disclosed usernames, IP addresses and salted MD5 password hashes. After being notified of the incident, Creative permanently shut down the forum. #> 81 In January 2016, <a href="http://news.softpedia.com/news/vbulletin-hack-exposes-820-000-accounts-from-126-forums-513416.shtml" target="_blank" rel="noopener">a large number of unpatched vBulletin forums were compromised by an actor known as &quot;CrimeAgency&quot;</a>. A total of 140 forums had data including usernames, email addresses and passwords (predominantly stored as salted MD5 hashes), extracted and then distributed. Refer to <a href="https://troyhunt.com/i-just-added-another-140-data-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">the complete list of the forums</a> for further information on which sites were impacted. #> 82 In August 2016, <a href="http://www.zdnet.com/article/over-25-million-accounts-stolen-after-mail-ru-forums-raided-by-hackers/" target="_blank" rel="noopener">the Russian gaming forum known as Cross Fire (or cfire.mail.ru) was hacked</a> along with a number of other forums on the Russian mail provider, mail.ru. The vBulletin forum contained 12.8 million accounts including usernames, email addresses and passwords stored as salted MD5 hashes. #> 83 In January 2016, the gaming website D3Scene, suffered a data breach. The compromised vBulletin forum exposed 569k million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 84 In May 2017, <a href="http://www.zdnet.com/article/font-sharing-site-dafont-hacked-thousands-of-accounts-stolen/" target="_blank" rel="noopener">font sharing site DaFont suffered a data breach</a> resulting in the exposure of 637k records. Allegedly due to a SQL injection vulnerability exploited by multiple parties, the exposed data included usernames, email addresses and passwords stored as MD5 without a salt. #> 85 In October 2016, the video sharing platform <a href="http://thehackernews.com/2016/12/dailymotion-video-hacked.html" target="_blank" rel="noopener">Dailymotion suffered a data breach</a>. The attack led to the exposure of more than 85 million user accounts and included email addresses, usernames and bcrypt hashes of passwords. #> 86 In 2011, the Chinese e-commerce site <a href="https://www.marbridgeconsulting.com/marbridgedaily/2011-12-29/article/52564/rumor_dangdang_alipay_suffer_data_breaches" target="_blank" rel="noopener">Dangdang suffered a data breach</a>. The incident exposed over 4.8 million unique email addresses which were subsequently traded online over the ensuing years. #> 87 In late 2015, the technology and social site <a href="https://www.daniweb.com" target="_blank" rel="noopener">DaniWeb</a> suffered a data breach. The attack resulted in the disclosure of 1.1 million accounts including email and IP addresses which were also accompanied by salted MD5 hashes of passwords. However, DaniWeb have advised that &quot;the breached password hashes and salts are incorrect&quot; and that they have since switched to new infrastructure and software. #> 88 In November 2018, <a href="https://blog.hackenproof.com/industry-news/new-data-breach-exposes-57-million-records" target="_blank" rel="noopener">security researcher Bob Diachenko identified an unprotected database believed to be hosted by a data aggregator</a>. Upon further investigation, the data was linked to marketing company <a href="http://web.archive.org/web/20180925092401/https://www.datanleads.com/" target="_blank" rel="noopener">Data &amp; Leads</a>. The exposed Elasticsearch instance contained over 44M unique email addresses along with names, IP and physical addresses, phone numbers and employment information. No response was received from Data &amp; Leads when contacted by Bob and their site subsequently went offline. #> 89 In December 2016, <a href="http://www.csoonline.com/article/3149713/security/data-enrichment-records-for-200-million-people-up-for-sale-on-the-darknet.html" target="_blank" rel="noopener">more than 200 million &quot;data enrichment profiles&quot; were found for sale on the darknet</a>. The seller claimed the data was sourced from Experian and whilst that claim was rejected by the company, the data itself was found to be legitimate suggesting it may have been sourced from other legitimate locations. In total, there were more than 8 million unique email addresses in the data which also contained a raft of other personal attributes including credit ratings, home ownership status, family structure and other fields described in the story linked to above. The email addresses alone were provided to HIBP. #> 90 In December 2018, the data science website <a href="https://support.datacamp.com/hc/en-us/articles/360017716074-DataCamp-Security-Update-Frequently-Asked-Questions" target="_blank" rel="noopener">DataCamp suffered a data breach</a> of records dating back to January 2017. The incident exposed 760k unique email and IP addresses along with names and passwords stored as bcrypt hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 91 In February 2019, the hacking forum <a href="https://demonforums.net/" target="_blank" rel="noopener">Demon Forums</a> suffered a data breach. The compromise of the vBulletin forum exposed 52k unique email addresses alongside usernames and passwords stored as salted MD5 hashes. #> 92 In February 2019, <a href="https://devkitpro.org/viewtopic.php?f=13&t=8846" target="_blank" rel="noopener">the devkitPro forum suffered a data breach</a>. The phpBB based forum had 1,508 unique email addresses exposed in the breach alongside forum posts, private messages and passwords stored as weak salted hashes. The data breach was self-submitted to HIBP by the forum operator. #> 93 In August 2014, the diet and nutrition website <a href="https://diet.com/" target="_blank" rel="noopener">diet.com</a> suffered a data breach resulting in the exposure of 1.4 million unique user records dating back as far as 2004. The data contained email and IP addresses, usernames, plain text passwords and dietary information about the site members including eating habits, BMI and birth date. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 94 In September 2016, over 16GB of logs from a service indicated to be digimon.co.in were obtained, most likely from an unprotected Mongo DB instance. The service ceased running shortly afterwards and no information remains about the precise nature of it. Based on <a href="https://twitter.com/troyhunt/status/1045178309926051840" target="_blank" rel="noopener">enquiries made via Twitter</a>, it appears to have been a mail service possibly based on PowerMTA and used for delivering spam. The logs contained information including 7.7M unique email recipients (names and addresses), mail server IP addresses, email subjects and tracking information including mail opens and clicks. #> 95 In October 2017, the blog commenting service <a href="https://blog.disqus.com/security-alert-user-info-breach" target="_blank" rel="noopener">Disqus announced they'd suffered a data breach</a>. The breach dated back to July 2012 but wasn't identified until years later when the data finally surfaced. The breach contained over 17.5 million unique email addresses and usernames. Users who created logins on Disqus had salted SHA1 hashes of passwords whilst users who logged in via social providers only had references to those accounts. #> 96 In July 2016, the gaming news site <a href="http://www.zdnet.com/article/millions-of-steam-game-keys-stolen-after-site-hack/" target="_blank" rel="noopener">DLH.net suffered a data breach</a> which exposed 3.3M subscriber identities. Along with the keys used to redeem and activate games on the Steam platform, the breach also resulted in the exposure of email addresses, birth dates and salted MD5 password hashes. The data was donated to Have I Been Pwned by data breach monitoring service <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a>. #> 97 In late 2011, data was allegedly obtained from the Chinese website known as <a href="http://dodonew.com" target="_blank" rel="noopener">Dodonew.com</a> and contained 8.7M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and user names. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 98 In June 2014, <a href="http://www.welivesecurity.com/2014/06/16/dominos-pizza-hacked/" target="_blank" rel="noopener">Domino's Pizza in France and Belgium was hacked</a> by a group going by the name &quot;Rex Mundi&quot; and their customer data held to ransom. Domino's refused to pay the ransom and six months later, the attackers <a href="http://cyberintelligence.in/rex-mundi-hackers-leaked-data-dominos-accord-easypay/" target="_blank" rel="noopener">released the data</a> along with troves of other hacked accounts. Amongst the customer data was passwords stored with a weak MD5 hashing algorithm and no salt. #> 99 In mid-2012, Dropbox suffered a data breach which exposed the stored credentials of tens of millions of their customers. In August 2016, <a href="https://motherboard.vice.com/read/dropbox-forces-password-resets-after-user-credentials-exposed" target="_blank" rel="noopener">they forced password resets for customers they believed may be at risk</a>. A large volume of data totalling over 68 million records <a href="https://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts" target="_blank" rel="noopener">was subsequently traded online</a> and included email addresses and salted hashes of passwords (half of them SHA1, half of them bcrypt). #> 100 In December 2018, the video messaging service <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Dubsmash suffered a data breach</a>. The incident exposed 162 million unique email addresses alongside usernames and PBKDF2 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 101 In April 2013, the interactive video game <a href="https://www.ddo.com" target="_blank" rel="noopener">Dungeons &amp; Dragons Online</a> suffered a data breach that exposed almost 1.6M players' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and password hashes. #> 102 In approximately 2011, data was allegedly obtained from the Chinese gaming website known as <a href="http://www.duowan.com" target="_blank" rel="noopener">Duowan.com</a> and contained 2.6M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses, user names and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 103 In December 2017, the online Swiss DVD store known as <a href="https://www.melani.admin.ch/melani/de/home/dokumentation/newsletter/passwoerter-von-70000-e-mail-konten-im-umlauf.html" target="_blank" rel="noopener">dvd-shop.ch suffered a data breach</a>. The incident led to the exposure of 68k email addresses and plain text passwords. The site has since been updated to indicate that it is currently closed. #> 104 In May 2017, the education platform <a href="https://motherboard.vice.com/en_us/article/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo" target="_blank" rel="noopener">Edmodo was hacked</a> resulting in the exposure of 77 million records comprised of over 43 million unique customer email addresses. The data was consequently published to a popular hacking forum and made freely available. The records in the breach included usernames, email addresses and bcrypt hashes of passwords. #> 105 Sometime in 2009, staffing platform <a href="http://www.ibtimes.co.uk/elance-data-breach-hacker-leaks-1-3-million-accounts-staffing-platform-1605368" target="_blank" rel="noopener">Elance suffered a data breach that impacted 1.3 million accounts</a>. Appearing online 8 years later, the data contained usernames, email addresses, phone numbers and SHA1 hashes of passwords, amongst other personal data. #> 106 In October 2018, <a href="https://blog.hacken.io/how-sensitive-is-your-non-sensitive-data" target="_blank" rel="noopener">security researcher Bob Diachenko identified multiple exposed databases with hundreds of millions of records</a>. One of those datasets was an Elasticsearch instance on AWS containing sales lead data and 5.8M unique email addresses. The data contained information relating to individuals and the companies they worked for including their names, email addresses and company name and contact information. Despite best efforts, it was not possible to identify the owner of the data hence this breach as been titled &quot;Elasticsearch Sales Leads&quot;. #> 107 In April 2018, the self-proclaimed &quot;biggest retro gaming website on earth&quot;, Emuparadise, suffered a data breach. The compromised vBulletin forum exposed 1.1 million email addresses, IP address, usernames and passwords stored as salted MD5 hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 108 In August 2016, <a href="http://www.zdnet.com/article/epic-games-unreal-engine-forums-hacked-in-latest-data-breach" target="_blank" rel="noopener">the Epic Games forum suffered a data breach</a>, allegedly due to a SQL injection vulnerability in vBulletin. The attack resulted in the exposure of 252k accounts including usernames, email addresses and salted MD5 hashes of passwords. #> 109 In mid-2016, it's alleged that the adult website known as <a href="http://eroticy.com" target="_blank" rel="noopener">Eroticy</a> was hacked. Almost 1.4 million unique accounts were found circulating in late 2016 which contained a raft of personal information ranging from email addresses to phone numbers to plain text passwords. Whilst many HIBP subscribers confirmed their data was legitimate, the actual source of the breach remains inconclusive. <a href="https://www.troyhunt.com/a-data-breach-investigation-blow-by-blow" target="_blank" rel="noopener">A detailed account of the data has been published</a> in the hope of identifying the origin of the breach. #> 110 In June 2018, <a href="https://www.troyhunt.com/data-provided-by-the-estonian-central-criminal-police-is-now-searchable-on-have-i-been-pwned" target="_blank" rel="noopener">the Cybercrime Bureau of the Estonian Central Criminal Police contacted HIBP</a> and asked for assistance in making a data set of 655k email addresses searchable. The Estonian police suspected the email addresses and passwords they obtained were being used to access mailboxes, cryptocurrency exchanges, cloud service accounts and other similar online assets. They've requested that individuals who find themselves in the data set <b><i>and also identify that cryptocurrency has been stolen</i></b> contact them at <a href="mailto:cybercrime@politsei.ee">cybercrime@politsei.ee</a>. #> 111 In September 2016, <a href="http://eservices.durban.gov.za" target="_blank" rel="noopener">the new eThekwini eServices website</a> in South Africa was launched with a number of security holes that lead to <a href="http://mybroadband.co.za/news/security/179064-ethekwini-municipality-leaking-private-details-of-over-300000-residents.html" target="_blank" rel="noopener">the leak of over 98k residents' personal information and utility bills</a> across 82k unique email addresses. Emails were sent prior to launch containing passwords in plain text and the site allowed anyone to download utility bills without sufficient authentication. Various methods of customer data enumeration was possible and phishing attacks began appearing the day after launch. #> 112 In December 2016, the forum for the public blockchain-based distributed computing platform <a href="https://blog.ethereum.org/2016/12/19/security-alert-12192016-ethereum-org-forums-database-compromised/" target="_blank" rel="noopener">Ethereum suffered a data breach</a>. The database contained over 16k unique email addresses along with IP addresses, private forum messages and (mostly) bcrypt hashed passwords. <a href="https://www.troyhunt.com/the-ethereum-forum-was-hacked-and-theyve-voluntarily-submitted-the-data-to-have-i-been-pwned" target="_blank" rel="noopener">Ethereum elected to self-submit the data to HIBP</a>, providing the service with a list of email addresses impacted by the incident. #> 113 In May 2015, the Polish 3D modelling website known as <a href="https://evermotion.org/" target="_blank" rel="noopener">Evermotion</a> suffered a data breach resulting in the exposure of 435k unique user records. The data was sourced from a vBulletin forum and contained email addresses, usernames, dates of birth and salted MD5 hashes of passwords. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 114 In March 2019, the multiplayer platform game <a href="https://everybodyedits.wordpress.com/2019/03/28/everybody-edits-data-security-breach/" target="_blank" rel="noopener">Everybody Edits suffered a data breach</a>. The incident exposed 871k unique email addresses alongside usernames and IP addresses. The data was subsequently distributed online across a collection of files. #> 115 In April 2019, the social planning website for managing online invitations <a href="https://www.evite.com/security/update?usource=lc&lctid=1800182" target="_blank" rel="noopener">Evite identified a data breach of their systems</a>. Upon investigation, they found unauthorised access to a database archive dating back to 2013. The exposed data included a total of 101 million unique email addresses, most belonging to recipients of invitations. Members of the service also had names, phone numbers, physical addresses, dates of birth, genders and passwords stored in plain text exposed. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 116 In June 2016, the online multiplayer game <a href="http://securityaffairs.co/wordpress/52260/data-breach/evony-data-breach.html" target="_blank" rel="noopener">Evony was hacked</a> and over 29 million unique accounts were exposed. The attack led to the exposure of usernames, email and IP addresses and MD5 hashes of passwords (without salt). #> 117 In June 2018, <a href="https://www.wired.com/story/exactis-database-leak-340-million-records/" target="_blank" rel="noopener">the marketing firm Exactis inadvertently publicly leaked 340 million records of personal data</a>. Security researcher <a href="https://www.nightlionsecurity.com/" target="_blank" rel="noopener">Vinny Troia of Night Lion Security</a> discovered the leak contained multiple terabytes of personal information spread across hundreds of separate fields including addresses, phone numbers, family structures and extensive profiling data. The data was collected as part of Exactis' service as a &quot;compiler and aggregator of premium business &amp; consumer data&quot; which they then sell for profiling and marketing purposes. A small subset of the exposed fields were provided to Have I Been Pwned and contained 132 million unique email addresses. #> 118 In September 2015, the US based credit bureau and consumer data broker <a href="http://krebsonsecurity.com/2015/10/experian-breach-affects-15-million-consumers/" target="_blank" rel="noopener">Experian suffered a data breach</a> that impacted 15 million customers who had applied for financing from T-Mobile. An alleged data breach was subsequently circulated containing personal information including names, physical and email addresses, birth dates and various other personal attributes. Multiple Have I Been Pwned subscribers verified portions of the data as being accurate, but the actual source of it was inconclusive therefor this breach has been flagged as &quot;unverified&quot;. #> 119 In late 2016, a huge list of email address and password pairs appeared in a &quot;combo list&quot; referred to as &quot;Exploit.In&quot;. The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for &quot;credential stuffing&quot;, that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read <a href="https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned" target="_blank" rel="noopener">Password reuse, credential stuffing and another billion records in Have I Been Pwned</a>. #> 120 In June 2017, <a href="https://www.bleepingcomputer.com/news/security/car-thieves-everywhere-rejoice-as-unsecured-database-exposes-10-million-car-vins/" target="_blank" rel="noopener">an unsecured database with more than 10 million VINs (vehicle identification numbers) was discovered by researchers</a>. Believed to be sourced from US car dealerships, the data included a raft of personal information and vehicle data along with 397k unique email addresses. #> 121 In February 2018, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">photography website EyeEm suffered a data breach</a>. The breach was identified among a collection of other large incidents and exposed almost 20M unique email addresses, names, usernames, bios and password hashes. The data was provided to HIBP by a source who asked for it to be attributed to &quot;Kuroi'sh or Gabriel Kimiaie-Asadi Bildstein&quot;. #> 122 In June 2016, the game development studio <a href="https://facepunch.com/" target="_blank" rel="noopener">Facepunch</a> suffered a data breach that exposed 343k users. The breached data included usernames, email and IP addresses, dates of birth and salted MD5 password hashes. Facepunch advised they were aware of the incident and had notified people at the time. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies. #> 123 In 2013, the Danish social media site <a href="https://faceup.dk/" target="_blank" rel="noopener">FaceUP</a> suffered a data breach. The incident exposed 87k unique email addresses alongside genders, dates of birth, names, phone numbers and passwords stored as unsalted MD5 hashes. When notified of the incident, FaceUP advised they had identified a SQL injection vulnerability at the time and forced password resets on impacted customers. #> 124 In July 2018, UK-based ecommerce company <a href="https://www.grahamcluley.com/online-fashion-shoppers-exposed-ecommerce-breach/" target="_blank" rel="noopener">Fashion Nexus suffered a data breach which exposed 1.4 million records</a>. Multiple websites developed by sister company White Room Solutions were impacted in the breach amongst which were sites including <a href="https://jadedldn.com/" target="_blank" rel="noopener">Jaded London</a> and <a href="http://axparis.co.uk" target="_blank" rel="noopener">AX Paris</a>. The various sites exposed in the incident included a range of different data types including names, phone numbers, addresses and passwords stored as a mix of salted MD5 and SHA-1 as well as unsalted MD5 passwords. When asked by reporter Graham Cluley if a public statement on the incident was available, a one-word response of &quot;No&quot; was received. #> 125 In late 2016, the fashion gaming website <a href="http://www.zdnet.com/article/amid-data-breach-responsibility-thrown-to-the-wind/" target="_blank" rel="noopener">Fashion Fantasy Game suffered a data breach</a>. The incident exposed 2.3 million unique user accounts and corresponding MD5 password hashes with no salt. The data was contributed to Have I Been Pwned courtesy of rip@creep.im. #> 126 In September 2015, <a href="http://ffshrine.org" target="_blank" rel="noopener">the Final Fantasy discussion forum known as FFShrine</a> was breached and the data dumped publicly. Approximately 620k records were released containing email addresses, IP addresses and salted hashes of passwords. #> 127 In February 2016, the music-based rhythm game known as <a href="http://www.flashflashrevolution.com" target="_blank" rel="noopener">Flash Flash Revolution</a> was hacked and 1.8M accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. #> 128 In February 2015, <a href="http://www.flashback.se/" target="_blank" rel="noopener">the Swedish forum known as Flashback</a> had sensitive internal data on 40k members published via the tabloid newspaper <a href="http://www.aftonbladet.se/" target="_blank" rel="noopener">Aftonbladet</a>. The data was <a href="http://swedishsurveyor.com/2015/02/11/the-inquisition/">allegedly sold to them via Researchgruppen</a> (The Research Group) <a href="http://www.technologyreview.com/photoessay/533426/the-troll-hunters/" target="_blank" rel="noopener">who have a history of exposing otherwise anonymous users</a>, primarily those who they believe participate in &quot;troll like&quot; behaviour. The compromised data includes social security numbers, home and email addresses. #> 129 In 2011, the self-proclaimed &quot;World's Best Adult Social Network&quot; website known as Fling <a href="http://motherboard.vice.com/read/another-day-another-hack-passwords-and-sexual-desires-for-dating-site-fling" target="_blank" rel="noopener">was hacked and more than 40 million accounts obtained by the attacker</a>. The breached data included highly sensitive personal attributes such as sexual orientation and sexual interests as well as email addresses and passwords stored in plain text. #> 130 In March 2018, the Florida Virtual School (FLVS) <a href="https://www.flvs.net/notices?source=homepage" target="_blank" rel="noopener">posted a data breach notification to their website</a>. The school had identified a data breach which had occurred sometime between 6 May 2016 and 12 Feb 2018 and an XML file containing 368k student records was subsequently found circulating. Each record contained student name, date of birth, password, grade, email <em>and</em> parent email resulting in a total of 543k unique email addresses. Due to the prevalence of email addresses belonging to individuals who are still legally children, the data breach has been flagged as &quot;sensitive&quot;. #> 131 In February 2014, the Forbes website <a href="http://news.cnet.com/8301-1009_3-57618945-83/syrian-electronic-army-hacks-forbes-steals-user-data" target="_blank" rel="noopener">succumbed to an attack that leaked over 1 million user accounts</a>. The attack was attributed to the Syrian Electronic Army, allegedly as retribution for a perceived "Hate of Syria". The attack not only leaked user credentials, but also resulted in the posting of fake news stories to forbes.com. #> 132 In approximately mid-2016, the Italian-based service for creating forums known as <a href="https://www.forumcommunity.net/" target="_blank" rel="noopener">ForumCommunity</a> suffered a data breach. The incident impacted over 776k unique email addresses along with usernames and unsalted MD5 password hashes. No response was received from ForumCommunity when contacted. #> 133 In April 2007, the online gambling site <a href="https://www.foxybingo.com" target="_blank" rel="noopener">Foxy Bingo</a> was hacked and 252,000 accounts were obtained by the hackers. The breached records <a href="http://www.itpro.co.uk/637279/gambler-busted-flogging-stolen-data-to-gaming-firms" target="_blank" rel="noopener">were subsequently sold and traded</a> and included personal information data such as plain text passwords, birth dates and home addresses. #> 134 In January 2017, the free hidden service host <a href="http://www.theverge.com/2017/2/3/14497992/freedom-hosting-ii-hacked-anonymous-dark-web-tor" target="_blank" rel="noopener">Freedom Hosting II suffered a data breach</a>. The attack allegedly took down 20% of dark web sites running behind Tor hidden services with the attacker claiming that of the 10,613 impacted sites, more than 50% of the content was child pornography. The hack led to the exposure of MySQL databases for the sites which included a vast amount of information on the hidden services Freedom Hosting II was managing. The impacted data classes far exceeds those listed for the breach and differ between the thousands of impacted sites. #> 135 In July 2016, the India-based food delivery service <a href="https://www.freshmenu.com/" target="_blank" rel="noopener">FreshMenu</a> suffered a data breach. The incident exposed the personal data of over 110k customers and included their names, email addresses, phone numbers, home addresses and order histories. When advised of the incident, FreshMenu acknowledged being already aware of the breach but stated they had decided not to notify impacted customers. #> 136 In May 2014, over 25,000 user accounts were breached from the Asian lesbian, gay, bisexual and transgender website known as "Fridae". The attack which was <a href="https://twitter.com/Survela/status/463327706361659392" target="_blank" rel="noopener">announced on Twitter</a> appears to have been <a href="http://pastebin.com/ipFKjv6z" target="_blank" rel="noopener">orchestrated by Deletesec</a> who claim that "Digital weapons shall annihilate all secrecy within governments and corporations". The exposed data included password stored in plain text. #> 137 In July 2016, the anime site <a href="https://www.funimation.com/" target="_blank" rel="noopener">Funimation</a> suffered a data breach that impacted 2.5 million accounts. The data contained usernames, email addresses, dates of birth and salted SHA1 hashes of passwords. #> 138 In April 2018, the online entertainment site <a href="https://www.funny-games.biz/" target="_blank" rel="noopener">Funny Games</a> suffered a data breach that disclosed 764k records including usernames, email and IP addresses and salted MD5 password hashes. The incident was disclosed to Funny Games in July who acknowledged the breach and identified it had been caused by legacy code no longer in use. The record count in the breach constitute approximately half of the user base. #> 139 In May 2016, the Fur Affinity website for people with an interest in anthropomorphic animal characters (also known as "furries") <a href="http://motherboard.vice.com/read/another-day-another-hack-furry-site-hacked-content-deleted" target="_blank" rel="noopener">was hacked</a>. The attack exposed 1.2M email addresses (many accounts had a different "first" and "last" email against them) and hashed passwords. #> 140 In May 2015, the Indian motoring website known as <a href="https://www.gaadi.com/" target="_blank" rel="noopener">Gaadi</a> had 4.3 million records exposed in a data breach. The data contained usernames, email and IP addresses, genders, the city of users as well as passwords stored in both plain text and as MD5 hashes. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 141 In approximately October 2015, the online gaming forum known as <a href="http://gamerzplanet.net" target="_blank" rel="noopener">Gamerzplanet</a> was hacked and more than 1.2M accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 142 Likely in early 2015, the video game website GameTuts suffered a data breach and over 2 million user accounts were exposed. The site later <a href="https://twitter.com/TeamModio/status/756705841168916486" target="_blank" rel="noopener">shut down in July 2016</a> but was identified as having been hosted on a vBulletin forum. The exposed data included usernames, email and IP addresses and salted MD5 hashes. #> 143 In March 2012, the German online game publisher Gamigo <a href="http://www.zdnet.com/article/8-24-million-gamigo-passwords-leaked-after-hack/" target="_blank" rel="noopener">was hacked</a> and more than 8 million accounts publicly leaked. The breach included email addresses and passwords stored as weak MD5 hashes with no salt. #> 144 In December 2010, Gawker was attacked by the hacker collective &quot;Gnosis&quot; in retaliation for what was reported to be a feud between Gawker and 4Chan. Information about Gawkers 1.3M users was published along with the data from Gawker's other web presences including Gizmodo and Lifehacker. Due to the prevalence of password reuse, many victims of the breach <a href="http://www.troyhunt.com/2011/01/why-your-apps-security-design-could.html" target="_blank" rel="noopener">then had their Twitter accounts compromised to send Acai berry spam</a>. #> 145 In August 2016, the technology recruitment site <a href="http://geekedin.net" target="_blank" rel="noopener">GeekedIn</a> left a MongoDB database exposed and over 8M records were extracted by an unknown third party. The breached data was originally scraped from GitHub in violation of their terms of use and contained information exposed in public profiles, including over 1 million members' email addresses. Full details on the incident (including how impacted members can see their leaked data) are covered in the blog post on <a href="https://www.troyhunt.com/8-million-github-profiles-were-leaked-from-geekedins-mongodb-heres-how-to-see-yours" target="_blank" rel="noopener">8 million GitHub profiles were leaked from GeekedIn's MongoDB - here's how to see yours</a>. #> 146 In October 2016, data surfaced that was allegedly obtained from the Chinese website known as <a href="http://www.gfan.com" target="_blank" rel="noopener">GFAN</a> and contained 22.5M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email and IP addresses, user names and salted and hashed passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 147 In October 2018, the bullion education and dealer services site <a href="https://goldsilver.com/" target="_blank" rel="noopener">GoldSilver</a> suffered a data breach that exposed 243k unique email addresses spanning customers and mailing list subscribers. An extensive amount of personal information on customers was obtained including names, addresses, phone numbers, purchases and passwords and answers to security questions stored as MD5 hashes. In a small number of cases, passport, social security numbers and partial credit card data was also exposed. The data breach and source code belonging to GoldSilver was publicly posted on a dark web service where it remained months later. When notified about the incident, GoldSilver advised that &quot;all affected customers have been directly notified&quot;. #> 148 In July 2007, the multiplayer game portal known as <a href="https://web.archive.org/web/20070710161412/http://gpotato.com/" target="_blank" rel="noopener">gPotato</a> (link to archive of the site at that time) suffered a data breach and over 2 million user accounts were exposed. The site later merged into the <a href="http://www.webzen.com/" target="_blank" rel="noopener">Webzen portal</a> where the original accounts still exist today. The exposed data included usernames, email and IP addresses, MD5 hashes and personal attributes such as gender, birth date, physical address and security questions and answers stored in plain text. #> 149 In August 2016, the Grand Theft Auto forum <a href="https://motherboard.vice.com/read/grand-theft-auto-fan-site-hacked" target="_blank" rel="noopener">GTAGaming was hacked and nearly 200k user accounts were leaked</a>. The vBulletin based forum included usernames, email addresses and password hashes. #> 150 In approximately April 2016, the gaming website <a href="https://www.play-gar.com/" target="_blank" rel="noopener">Guns and Robots</a> suffered a data breach resulting in the exposure of 143k unique records. The data contained email and IP addresses, usernames and SHA-1 password hashes. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 151 In June 2011, the hacktivist group known as "LulzSec" leaked <a href="http://www.forbes.com/sites/andygreenberg/2011/06/25/lulzsec-says-goodbye-dumping-nato-att-gamer-data/" target="_blank" rel="noopener">one final large data breach they titled "50 days of lulz"</a>. The compromised data came from sources such as AT&T, Battlefield Heroes and the <a href="http://hackforums.net" target="_blank" rel="noopener">hackforums.net website</a>. The leaked Hack Forums data included credentials and personal information of nearly 200,000 registered forum users. #> 152 In July 2015, the Italian security firm <a href="http://hackingteam.com" target="_blank" rel="noopener">Hacking Team</a> suffered a major data breach that resulted in over 400GB of their data being <a href="http://www.techtimes.com/articles/68204/20150711/hacking-team-hacked-400gb-data-dump-state-surveillance-exposes-dirty.htm" target="_blank" rel="noopener">posted online via a torrent</a>. The data searchable on &quot;Have I Been Pwned?&quot; is from 189GB worth of PST mail folders in the dump. The contents of the PST files is <a href="https://wikileaks.org/hackingteam/emails" target="_blank" rel="noopener">searchable on Wikileaks</a>. #> 153 In mid-2018, the fashion shopping site <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">HauteLook was among a raft of sites that were breached and their data then sold in early-2019</a>. The data included over 28 million unique email addresses alongside names, genders, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 154 In March 2017, the telemarketing service <a href="https://www.databreaches.net/leak-of-diabetic-patients-data-highlights-risks-of-giving-info-to-telemarketers" target="_blank" rel="noopener">Health Now Networks left a database containing hundreds of thousands of medical records exposed</a>. There were over 900,000 records in total containing significant volumes of personal information including names, dates of birth, various medical conditions and operator notes on the individuals' health. The data included over 320k unique email addresses. #> 155 In July 2015, the Swedish video store chain <a href="http://www.hemmakvall.se/" target="_blank" rel="noopener">Hemmakväll</a> <a href="http://www.dn.se/ekonomi/hemmakvall-hackat-50000-kunders-uppgifter-pa-vift/" target="_blank" rel="noopener">was hacked</a> and nearly 50k records dumped publicly. The disclosed data included various attributes of their customers including email and physical addresses, names and phone numbers. Passwords were also leaked, stored with a weak MD5 hashing algorithm. #> 156 In December 2011, Norway's largest online sex shop hemmelig.com was <a href="http://www.dazzlepod.com/hemmelig/?page=93" target="_blank" rel="noopener">hacked by a collective calling themselves &quot;Team Appunity&quot;</a>. The attack exposed over 28,000 usernames and email addresses along with nicknames, gender, year of birth and unsalted MD5 password hashes. #> 157 In early 2013, the online fantasy multiplayer game <a href="http://hog.playsnail.com" target="_blank" rel="noopener">Heroes of Gaia</a> suffered a data breach. The newest records in the data set indicate a breach date of 4 January 2013 and include usernames, IP and email addresses but no passwords. #> 158 In December 2012, the multiplayer online battle arena game known as <a href="http://www.heroesofnewerth.com/" target="_blank" rel="noopener">Heroes of Newerth</a> <a href="https://www.reddit.com/r/HeroesofNewerth/comments/14zj2p/i_am_the_guy_who_hacked_hon/" target="_blank" rel="noopener"> was hacked</a> and over 8 million accounts extracted from the system. The compromised data included usernames, email addresses and passwords. #> 159 In approximately 2014, it's alleged that the Chinese Android store known as <a href="http://hiapk.com/" target="_blank" rel="noopener">HIAPK</a> suffered a data breach that impacted 13.8 million unique subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided to HIBP by white hat security researcher and data analyst Adam Davies. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 160 In June 2016, the &quot;home of competitive Counter Strike&quot; website <a href="http://www.hltv.org/news/18087-security-breach" target="_blank" rel="noopener">HLTV was hacked</a> and 611k accounts were exposed. The attack led to the exposure of names, usernames, email addresses and bcrypt hashes of passwords. #> 161 In March 2015, the anime and manga forum <a href="http://www.hongfire.com" target="_blank" rel="noopener">HongFire</a> suffered a data breach. The hack of their vBulletin forum led to the exposure of 1 million accounts along with email and IP addresses, usernames, dates of birth and salted MD5 passwords. #> 162 In December 2017, the Danish torrent tracker known as <a href="https://torrentfreak.com/popular-danish-torrent-tracker-shuts-down-after-hack-180102/" target="_blank" rel="noopener">HoundDawgs suffered a data breach</a>. More than 55GB of data was dumped publicly and whilst <a href="https://www.flashback.org/p62770812" target="_blank" rel="noopener">there was initially contention as to the severity of the incident</a>, the data did indeed contain more than 45k unique email addresses complete extensive logs of torrenting activity, IP addresses and SHA1 passwords. #> 163 In mid-2018, the housing design website <a href="https://help.houzz.com/s/article/security-update?language=en_US" target="_blank" rel="noopener">Houzz suffered a data breach</a>. The company learned of the incident later that year then disclosed it to impacted members in February 2019. Almost 49 million unique email addresses were in the breach alongside names, IP addresses, geographic locations and either salted hashes of passwords or links to social media profiles used to authenticate to the service. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 164 In August 2018, the adult furry interactive game creator <a href="https://hthstudios.com/" target="_blank" rel="noopener">HTH Studios</a> suffered a data breach impacting mulitple repositories of customer data. Several months later, the data surfaced on a popular hacking forum and included 411k unique email addresses along with physical and IP addresses, names, orders, salted SHA-1 and salted MD5 hashes. HTH Studios is aware of the incident. #> 165 On an unknown date in approximately 2017, the Indian training and assessment service known as <a href="https://www.forumcommunity.net/" target="_blank" rel="noopener">Hub4Tech</a> suffered a data breach via a SQL injection attack. The incident exposed almost 37k unique email addresses and passwords stored as unsalted MD5 hashes. No response was received from Hub4Tech when contacted about the incident. #> 166 In June 2016, the teen social site known as <a href="http://arstechnica.com/security/2016/09/social-hangout-site-for-teens-leaks-millions-of-plaintext-passwords/" target="_blank" rel="noopener">i-Dressup was hacked</a> and over 2 million user accounts were exposed. At the time the hack was reported, the i-Dressup operators were not contactable and the underlying SQL injection flaw remained open, allegedly exposing a total of 5.5 million accounts. The breach included email addresses and passwords stored in plain text. #> 167 In October 2014, the game cheats website known as ILikeCheats suffered a data breach that exposed 189k accounts. The vBulletin based forum leaked usernames, IP and email addresses and weak MD5 hashes of passwords. The data was provided with support from <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 168 In September 2013, the media and file sharing client known as <a href="http://www.ibtimes.co.uk/imesh-hack-more-51-million-user-records-former-filesharing-site-sale-dark-web-1565185" target="_blank" rel="noopener">iMesh was hacked and approximately 50M accounts were exposed</a>. The data was later put up for sale on a dark market website in mid-2016 and included email and IP addresses, usernames and salted MD5 hashes. #> 169 In September 2013, the online image sharing community <a href="http://www.zdnet.com/article/imgur-reveals-hackers-stole-login-data/" target="_blank" rel="noopener">imgur suffered a data breach</a>. A selection of the data containing 1.7 million email addresses and passwords surfaced more than 4 years later in November 2017. Although imgur stored passwords as SHA-256 hashes, the data in the breach contained plain text passwords suggesting that many of the original hashes had been cracked. imgur advises that they rolled over to bcrypt hashes in 2016. #> 170 In July 2014, the iOS forum <a href="http://insanelyi.com" target="_blank" rel="noopener">Insanelyi</a> was <a href="http://securityaffairs.co/wordpress/26835/hacking/hacked-bigboss-cydia.html?utm_content=bufferc7e16" target="_blank" rel="noopener">hacked by an attacker known as Kim Jong-Cracks</a>. A popular source of information for users of jailbroken iOS devices running Cydia, the Insanelyi breach disclosed over 104k users' emails addresses, user names and weakly hashed passwords (salted MD5). #> 171 In March 2019, <a href="https://techcrunch.com/2019/04/02/inside-a-spam-operation/" target="_blank" rel="noopener">a spam operation known as &quot;Intelimost&quot; sent millions of emails appearing to come from people the recipients knew</a>. Security researcher <a href="https://securitydiscovery.com/massive-spam-operation-uncovered-in-a-database-leak/" target="_blank" rel="noopener">Bob Diachenko found over 3 million unique email addresses in an exposed Elasticsearch database</a>, alongside plain text passwords used to access the victim's mailbox and customise the spam. #> 172 In late 2015, the online penpal site InterPals had their website hacked and 3.4 million accounts exposed. The compromised data included email addresses, geographical locations, birthdates and salted hashes of passwords. #> 173 During 2015, the <a href="http://ipmart-forum.com" target="_blank" rel="noopener">iPmart forum</a> (now known as Mobi NUKE) was hacked and over 2 million forum members' details were exposed. The vBulletin forum included IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 368k accounts were added to &quot;Have I Been Pwned&quot; in March 2016 bringing the total to over 2.4M. #> 174 In January 2019, the travel and hotel booking site <a href="https://techcrunch.com/2019/02/14/hacker-strikes-again/" target="_blank" rel="noopener">ixigo suffered a data breach</a>. The data appeared for sale on a dark web marketplace the following month and included over 17M unique email addresses alongside names, genders, phone numbers, connections to Facebook profiles and passwords stored as MD5 hashes. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 175 In October 2017, the Malaysian website <a href="https://www.lowyat.net/2017/145654/personal-data-millions-malaysians-sale-source-breach-still-unknown/" target="_blank" rel="noopener">lowyat.net ran a story on a massive set of breached data affecting millions of Malaysians</a> after someone posted it for sale on their forums. The data spanned multiple separate breaches including <a href="https://www.jobstreet.com/" target="_blank" rel="noopener">the JobStreet jobs website</a> which contained almost 4 million unique email addresses. The dates in the breach indicate the incident occurred in March 2012. The data later appeared freely downloadable on a Tor hidden service and contained extensive information on job seekers including names, genders, birth dates, phone numbers, physical addresses and passwords. #> 176 In January 2018, the Joomla template website <a href="https://www.joomlart.com/" target="_blank" rel="noopener">JoomlArt</a> inadvertantly exposed more than 22k unique customer records in a Jira ticket. The exposed data was from iJoomla and JomSocial, both services that <a href="https://www.joomlart.com/blog/joomlart-acquires-ijoomla-and-jomsocial" target="_blank" rel="noopener">JoomlArt acquired the previous year</a>. The data included usernames, email addresses, purchases and passwords stored as MD5 hashes. When contacted, JoomlArt advised they were aware of the incident and had previously notified impacted parties. #> 177 An alleged breach of the dating website <a href="http://www.justdate.com/" target="_blank" rel="noopener">Justdate.com</a> began circulating in approximately September 2016. Comprised of over 24 million records, the data contained various personal attributes such as email addresses, dates of birth and physical locations. However, upon verification with HIBP subscribers, only a fraction of the data was found to be accurate and no account owners recalled using the Justdate.com service. This breach has consequently been flagged as <a href="https://www.troyhunt.com/introducing-fabricated-data-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">fabricated</a>; it's highly unlikely the data was sourced from Justdate.com. #> 178 In September 2018, a collection of almost 42 million email address and plain text password pairs was uploaded to the anonymous file sharing service <a href="https://kayo.moe/" target="_blank" rel="noopener">kayo.moe</a>. The operator of the service contacted HIBP to report the data which, upon further investigation, turned out to be a large credential stuffing list. For more information, read about <a href="https://www.troyhunt.com/the-42m-record-kayo-moe-credential-stuffing-data" target="_blank" rel="noopener">The 42M Record kayo.moe Credential Stuffing Data</a>. #> 179 In February 2014, the crowdfunding platform <a href="https://www.kickstarter.com/blog/important-kickstarter-security-notice" target="_blank" rel="noopener">Kickstarter announced they'd suffered a data breach</a>. The breach contained almost 5.2 million unique email addresses, usernames and salted SHA1 hashes of passwords. #> 180 In mid-2015, the forum for the providers of affordable dedicated servers known as <a href="https://www.kimsufi.com" target="_blank" rel="noopener">Kimsufi</a> suffered a data breach. The vBulletin forum contained over half a million accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes. #> 181 In February 2016, the Russian portal and email service <a href="http://km.ru" target="_blank" rel="noopener">KM.RU</a> was the target of an attack which was consequently <a href="https://www.reddit.com/r/pwned/comments/47u1bf/operation_wrath_of_anakin_evolved" target="_blank" rel="noopener">detailed on Reddit</a>. Allegedly protesting &quot;the foreign policy of Russia in regards to Ukraine&quot;, KM.RU was one of several Russian sites in the breach and impacted almost 1.5M accounts including sensitive personal information. #> 182 In approximately April 2016, the &quot;marketing automation for agents and professional service providers&quot; company <a href="https://web.archive.org/web/20171020171534/https://knowncircle.com/" target="_blank" rel="noopener">KnownCircle</a> had a large volume of data obtained by an external party. The data belonging to the now defunct service appeared in JSON format and contained gigabytes of data related to the real estate and insurance sectors. The personal data in the breach appears to have primarily been used for marketing purposes, including logs of emails sent and tracking of gift cards. A small number of passwords for KnownCircle staff were also present and were stored as bcrypt hashes. #> 183 In September 2018, the German social media website <a href="https://forum.knuddels.de/ubbthreads.php?ubb=showflat&Number=2916081" target="_blank" rel="noopener">Knuddels suffered a data breach</a>. The incident exposed 808k unique email addresses alongside usernames, real names, the city of the person and their password in plain text. Knuddels was <a href="https://blog.avira.com/german-flirting-network-gets-fined-20000e-for-leaking-user-information/" target="_blank" rel="noopener">subsequently fined €20k for the breach</a>. #> 184 In July 2018, staff of <a href="https://lanwar.com/" target="_blank" rel="noopener">the Lanwar gaming site</a> discovered a data breach they believe dates back to sometime over the previous several months. The data contained 45k names, email addresses, usernames and plain text passwords. A Lanwar staff member self-submitted the breach to HIBP and has also contacted the relevant authorities about the incident after identifying a phishing attempt to extort Bitcoin from a user. #> 185 In March 2012, the music website <a href="https://techcrunch.com/2016/09/01/43-million-passwords-hacked-in-last-fm-breach/" target="_blank" rel="noopener">Last.fm was hacked</a> and 43 million user accounts were exposed. Whilst <a href="http://www.last.fm/passwordsecurity" target="_blank" rel="noopener">Last.fm knew of an incident back in 2012</a>, the scale of the hack was not known until the data was released publicly in September 2016. The breach included 37 million unique email addresses, usernames and passwords stored as unsalted MD5 hashes. #> 186 In June 2012, the multiplayer online game <a href="https://www.cio.com/article/2395205/security0/european-league-of-legends-game-players-have-their-account-data-compromised.html" target="_blank" rel="noopener">League of Legends suffered a data breach</a>. At the time, the service had more than 32 million registered accounts and the breach affected various personal data attributes including &quot;encrypted&quot; passwords. In 2018, a 339k record subset of the data emerged with email addresses, usernames and plain text passwords, likely cracked from the original cryptographically protected ones. #> 187 In August 2016, the service for creating and running Pocket Minecraft edition servers known as <a href="http://news.softpedia.com/news/data-for-6-million-minecraft-gamers-stolen-from-leet-cc-servers-507445.shtml" target="_blank" rel="noopener">Leet was reported as having suffered a data breach that impacted 6 million subscribers</a>. The incident reported by Softpedia had allegedly taken place earlier in the year, although the data set sent to HIBP was dated as recently as early September but contained only 2 million subscribers. The data included usernames, email and IP addresses and SHA512 hashes. A further 3 million accounts were obtained and added to HIBP several days after the initial data was loaded bringing the total to over 5 million. #> 188 In January 2016, the Minecraft community known as Lifeboat <a href="https://motherboard.vice.com/read/another-day-another-hack-7-million-emails-and-hashed-passwords-for-minecraft" target="_blank" rel="noopener">was hacked and more than 7 million accounts leaked</a>. Lifeboat knew of the incident for three months before the breach was made public but elected not to advise customers. The leaked data included usernames, email addresses and passwords stored as straight MD5 hashes. #> 189 In June 2018, the World of Warcraft service <a href="https://lightshope.org/news/forum-breach-summary-of-investigation-and-final-report" target="_blank" rel="noopener">Light's Hope suffered a data breach</a> which they subsequently self-submitted to HIBP. Over 30K unique users were impacted and their exposed data included email addresses, dates of birth, private messages and passwords stored as bcrypt hashes. #> 190 In May 2016, <a href="https://www.troyhunt.com/observations-and-thoughts-on-the-linkedin-data-breach" target="_blank" rel="noopener">LinkedIn had 164 million email addresses and passwords exposed</a>. Originally hacked in 2012, the data remained out of sight until being offered for sale on a dark market site 4 years later. The passwords in the breach were stored as SHA1 hashes without salt, the vast majority of which were quickly cracked in the days following the release of the data. #> 191 In May 2018, <a href="http://www.linuxforums.org" target="_blank" rel="noopener">the Linux Forums website</a> suffered a data breach which resulted in the disclosure of 276k unique email addresses. Running on an old version of vBulletin, the breach also disclosed usernames, IP addresses and salted MD5 password hashes. Linux Forums did not respond to multiple attempts to contact them about the breach. #> 192 In February 2016, the website for the Linux distro known as Linux Mint <a href="http://thehackernews.com/2016/02/linux-mint-hack.html" target="_blank" rel="noopener">was hacked and the ISO infected with a backdoor</a>. The site also ran a phpBB forum which was subsequently put up for sale complete with almost 145k email addresses, passwords and other personal subscriber information. #> 193 In approximately January 2017, <a href="https://www.heise.de/security/meldung/Little-Monsters-Nutzerdaten-aus-Lady-Gagas-Social-Network-sollen-geleakt-sein-3646447.html" target="_blank" rel="noopener">the Lady Gaga fan site known as &quot;Little Monsters&quot; suffered a data breach that impacted 1 million accounts</a>. The data contained usernames, email addresses, dates of birth and bcrypt hashes of passwords. #> 194 In January 2015, the hacker collective known as &quot;Lizard Squad&quot; created a DDoS service by the name of &quot;Lizard Stresser&quot; which could be procured to mount attacks against online targets. Shortly thereafter, the service <a href="https://krebsonsecurity.com/2015/01/another-lizard-arrested-lizard-lair-hacked/">suffered a data breach</a> which resulted in the public disclosure of over 13k user accounts including passwords stored in plain text. #> 195 In August 2012, the fashion site <a href="https://www.hackread.com/hacker-selling-million-lookbook-accounts/" target="_blank" rel="noopener">Lookbook suffered a data breach</a>. The data later appeared listed for sale in June 2016 and included 1.1 million usernames, email and IP addresses, birth dates and plain text passwords. #> 196 In August 2013, the interactive video game <a href="https://www.lotro.com" target="_blank" rel="noopener">Lord of the Rings Online</a> suffered a data breach that exposed over 1.1M players' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and password hashes. #> 197 At some point in 2013, 45k accounts were <a href="http://leak.sx/thread-186921" target="_blank" rel="noopener">breached from the Lounge Board "General Discussion Forum" and then dumped publicly</a>. Lounge Board was a MyBB forum launched in 2012 and discontinued in mid 2013 (the last activity in the logs was from August 2013). #> 198 In December 2017, the song lyrics website known as <a href="https://www.lyricsmania.com/" target="_blank" rel="noopener">Lyrics Mania</a> suffered a data breach. The data in the breach included 109k usernames, email addresses and plain text passwords. <a href="https://www.troyhunt.com/streamlining-data-breach-disclosure-a-step-by-step-process" target="_blank" rel="noopener">Numerous attempts were made to contact Lyrics Mania about the incident</a>, however no responses were received. #> 199 In July 2016, the self-proclaimed &quot;Ultimate Source For Your Mac&quot; website <a href="https://www.mac-forums.com/" target="_blank" rel="noopener">Mac Forums</a> suffered a data breach. The vBulletin-based system exposed over 326k usernames, email and IP addresses, dates of birth and passwords stored as salted MD5 hashes. The data was later discovered being traded on a popular hacking forum. Mac Forums did not respond when contacted about the incident via their contact us form. #> 200 In October 2015, the torrent site <a href="http://www.mac-torrents.com" target="_blank" rel="noopener">Mac-Torrents</a> was hacked and almost 94k usernames, email addresses and passwords were leaked. The passwords were hashed with MD5 and no salt. #> 201 In September 2014, several large dumps of user accounts appeared on the <a href="https://forum.btcsec.com/" target="_blank" rel="noopener">Russian Bitcoin Security Forum</a> including one with nearly 5M email addresses and passwords, predominantly on the mail.ru domain. Whilst <a href="http://globalvoicesonline.org/2014/09/10/russia-email-yandex-mailru-passwords-hacking/" target="_blank" rel="noopener">unlikely to be the result of a direct attack against mail.ru</a>, the credentials were confirmed by many as legitimate for other services they had subscribed to. Further data allegedly valid for mail.ru and containing email addresses and plain text passwords was added in January 2018 bringing to total to more than 16M records. The incident was also then flagged as &quot;unverified&quot;, a concept that was <a href="https://www.troyhunt.com/introducing-unverified-breaches-to-have-i-been-pwned/" target="_blank" rel="noopener">introduced after the initial data load in 2014</a>. #> 202 In November 2015, almost 270k accounts from the <a href="http://www.majorgeeks.com" target="_blank" rel="noopener">MajorGeeks</a> support forum were breached. The accounts were being actively sold and traded online and included email addresses, salted password hashes and IP addresses. #> 203 In July 2017, the Czech Republic e-commerce site <a href="https://blog.mall.cz/o-nas/q-a-vse-co-jste-chteli-vedet-o-bezpecnosti-na-mall-cz-451.html" target="_blank" rel="noopener">MALL.cz suffered a data breach</a> after which 735k unique accounts including email addresses, names, phone numbers and passwords were later posted online. Whilst passwords were stored as hashes, <a href="https://pulse.michalspacek.cz/passwords/storages/site/www.mall.cz" target="_blank" rel="noopener">a number of different algorithms of varying strength were used over time</a>. All passwords included in the publicly distributed data were in plain text and were likely just those that had been successfully cracked (members with strong passwords don't appear to be included). According to MALL.cz, the breach only impacted accounts created before 2015. #> 204 In November 2014, the <a href="http://www.scmagazine.com/malwarebytes-forum-hacked/article/385187/" target="_blank" rel="noopener">Malwarebytes forum was hacked</a> and 111k member records were exposed. The IP.Board forum included email and IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 205 In June 2014, the Manga trading website <a href="http://www.mangatraders.com" target="_blank" rel="noopener">Mangatraders.com</a> had the usernames and passwords of over 900k users <a href="http://boards.4chan.org/a/thread/108603065/mangatraders-has-been-hacked-emails-and-passwords" target="_blank" rel="noopener">leaked on the internet</a> (approximately 855k of the emails were unique). The passwords were weakly hashed with a single iteration of MD5 leaving them vulnerable to being easily cracked. #> 206 In approximately July 2016, the manga website known as <a href="http://mangafox.me" target="_blank" rel="noopener">mangafox.me</a> suffered a data breach. The vBulletin based forum exposed 1.3 million accounts including usernames, email and IP addresses, dates of birth and salted MD5 password hashes. #> 207 In December 2018, the mapping website <a href="http://www.mappery.com" target="_blank" rel="noopener">Mappery</a> suffered a data breach that exposed over 205k unique email addresses. The incident also exposed usernames, the geographic location of the user and passwords stored as unsalted SHA-1 hashes. No response was received from Mappery when contacted about the incident. #> 208 In March 2017, a 27GB database backup file named "Master Deeds" was sent to HIBP by a supporter of the project. Upon detailed analysis later that year, the file was found to contain the personal data of tens of millions of living and deceased South African residents. The data included extensive personal attributes such as names, addresses, ethnicities, genders, birth dates, government issued personal identification numbers and 2.2 million email addresses. At the time of publishing, <a href="https://www.iafrikan.com/2017/10/18/dracore-data-sciences/" target="_blank" rel="noopener">it's alleged the data was sourced from Dracore Data Sciences</a> (Dracore is yet to publicly confirm or deny the data was sourced from their systems). On 18 October 2017, the file was found to have been published to a publicly accessible web server where it was located at the root of an IP address with directory listing enabled. The file was dated 8 April 2015. #> 209 In February 2016, the dating site <a href="http://motherboard.vice.com/read/hacker-claims-to-have-sold-27m-dating-site-passwords-mate1-com-hell-forum" target="_blank" rel="noopener">mate1.com suffered a huge data breach</a> resulting in the disclosure of over 27 million subscribers' information. The data included deeply personal information about their private lives including drug and alcohol habits, incomes levels and sexual fetishes as well as passwords stored in plain text. #> 210 In October 2016, the Minecraft banning service known as <a href="https://www.mcbans.com/" target="_blank" rel="noopener">MCBans</a> suffered a data breach resulting in the exposure of 120k unique user records. The data contained email and IP addresses, usernames and password hashes of unknown format. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 211 In August 2016, the Swiss scholarly open access publisher known as <a href="http://mdpi.com" target="_blank" rel="noopener">MDPI</a> had 17.5GB of data obtained from an unprotected Mongo DB instance. The data contained email exchanges between MDPI and their authors and reviewers which included 845k unique email addresses. MDPI have confirmed that the system has since been protected and that no data of a sensitive nature was impacted. As such, they concluded that notification to their subscribers was not necessary due to the fact that all their authors and reviewers are available online on their website. #> 212 In March 2019, the online gaming website <a href="https://www.zdnet.com/article/a-hacker-has-dumped-nearly-one-billion-user-records-over-the-past-two-months/" target="_blank" rel="noopener">MindJolt suffered a data breach that exposed 28M unique email addresses</a>. Also impacted were names and dates of birth, but no passwords. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 213 In May 2015, the <a href="http://www.databreaches.net/minecraft-pocket-edition-forum-hacked-dumped/" target="_blank" rel="noopener">Minecraft Pocket Edition forum was hacked</a> and over 16k accounts were dumped public. Allegedly hacked by <a href="https://twitter.com/rmsg0d" target="_blank" rel="noopener">@rmsg0d</a>, the forum data included numerous personal pieces of data for each user. The forum has subsequently been decommissioned. #> 214 In approximately January 2016, the Minecraft World Map site designed for sharing maps created for the game was hacked and over 71k user accounts were exposed. The data included usernames, email and IP addresses along with salted and hashed passwords. #> 215 In June 2015, the French Minecraft server known as <a href="https://www.minefield.fr" target="_blank" rel="noopener">Minefield</a> was hacked and 188k member records were exposed. The IP.Board forum included email and IP addresses, birth dates and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 216 In approximately January 2016, the UK based Android community known as <a href="http://www.modaco.com" target="_blank" rel="noopener">MoDaCo</a> suffered a data breach which exposed 880k subscriber identities. The data included email and IP addresses, usernames and passwords stored as salted MD5 hashes. #> 217 In October 2016, a large Mongo DB file containing tens of millions of accounts <a href="https://twitter.com/0x2Taylor/status/784544208879292417" target="_blank" rel="noopener">was shared publicly on Twitter</a> (the file has since been removed). The database contained over 58M unique email addresses along with IP addresses, names, home addresses, genders, job titles, dates of birth and phone numbers. The data was subsequently <a href="http://news.softpedia.com/news/hacker-steals-58-million-user-records-from-data-storage-provider-509190.shtml" target="_blank" rel="noopener">attributed to &quot;Modern Business Solutions&quot;</a>, a company that provides data storage and database hosting solutions. They've yet to acknowledge the incident or explain how they came to be in possession of the data. #> 218 Sometime in 2009, the e-wallet service known as Money Bookers <a href="http://www.forbes.com/sites/thomasbrewster/2015/11/30/paysafe-optimal-neteller-moneybookers-gambling-cyberattacks-data-breach/" target="_blank" rel="noopener">suffered a data breach which exposed almost 4.5M customers</a>. Now called Skrill, the breach was not discovered until October 2015 and included names, email addresses, home addresses and IP addresses. #> 219 In October 2018, the Polish e-commerce website <a href="https://niebezpiecznik.pl/post/morele-potwierdza-ze-wykradziono-dane-klientow/" target="_blank" rel="noopener">Morele.net suffered a data breach</a>. The incident exposed almost 2.5 million unique email addresses alongside phone numbers, names and passwords stored as md5crypt hashes. #> 220 In June 2018, the massively multiplayer online role-playing game (MMORPG) <a href="https://account.mortalonline.com/breach.html" target="_blank" rel="noopener">Mortal Online suffered a data breach</a>. A file containing 570k email addresses and cracked passwords was subsequently distributed online. A larger more complete file containing 607k email addresses with original unsalted MD5 password hashes along with names, usernames and physical addresses was later provided and the original breach in HIBP was updated accordingly. The data was provided to HIBP by whitehat security researcher and data analyst Adam Davies. #> 221 In October 2015, the multiplayer game hacking website <a href="http://www.mpgh.net">MPGH was hacked</a> and 3.1 million user accounts disclosed. The vBulletin forum breach contained usernames, email addresses, IP addresses and salted hashes of passwords. #> 222 In December 2016, the forum for the Microsoft Excel tips and solutions site <a href="http://www.mrexcel.com/details-of-data-breach-at-mrexcel-com/" target="_blank" rel="noopener">Mr Excel suffered a data breach</a>. The hack of the vBulletin forum led to the exposure of over 366k accounts along with email and IP addresses, dates of birth and salted passwords hashed with MD5. The owner of the MrExcel forum subsequently self-submitted the data to HIBP. #> 223 In May 2015, the &quot;monitoring&quot; software known as <a href="http://www.mspy.com" target="_blank" rel="noopener">mSpy</a> suffered a <a href="http://krebsonsecurity.com/2015/05/mobile-spy-software-maker-mspy-hacked-customer-data-leaked/#more-30913" target="_blank" rel="noopener">major data breach</a>. The software (allegedly often used to spy on unsuspecting victims), stored extensive personal information within their online service which after being breached, was made freely available on the internet. #> 224 In February 2014, the UK guide to services and business known as the Muslim Directory was <a href="http://www.cyberwarnews.info/2014/02/17/muslim-directory-hacked-38903-user-credentials-leaked/" target="_blank" rel="noopener">attacked by the hacker known as @th3inf1d3l</a>. The data was consequently dumped publicly and included the web accounts of tens of thousands of users which contained data including their names, home address, age group, email, website activity and password in plain text. #> 225 In June 2016, <a href="https://motherboard.vice.com/read/hacked-private-messages-from-dating-site-muslim-match" target="_blank" rel="noopener">the Muslim Match dating website had 150k email addresses exposed<a/>. The data included private chats and messages between relationship seekers and numerous other personal attributes including passwords hashed with MD5. #> 226 In approximately February 2015, the home financing website <a href="https://web.archive.org/web/20180324231131/http://myfha.net/" target="_blank" rel="noopener">MyFHA</a> suffered a data breach which disclosed the personal information of nearly 1 million people. The data included extensive personal information relating to home financing including personal contact info, credit statuses, household incomes, loan amounts and notes on personal circumstances, often referring to legal issues, divorces and health conditions. Multiple parties contacted HIBP with the data after which MyFHA was alerted in mid-July and acknowledged the legitimacy of the breach then took the site offline. #> 227 In February 2018, the diet and exercise service <a href="https://content.myfitnesspal.com/security-information/FAQ.html" target="_blank" rel="noopener">MyFitnessPal suffered a data breach</a>. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 228 In October 2017, the genealogy website <a href="https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/" target="_blank" rel="noopener">MyHeritage suffered a data breach</a>. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 229 In July 2015, the Cydia repository known as <a href="https://myrepospace.com/" target="_blank" rel="noopener">myRepoSpace</a> was hacked and <a href="https://www.reddit.com/r/jailbreak/comments/3c9qr1/discussion_myrepospace_user_data_leaked/" target="_blank" rel="noopener">user data leaked publicly</a>. Cydia is designed to facilitate the installation of apps on jailbroken iOS devices. The repository service was allegedly hacked by <a href="https://twitter.com/its_not_herpes" target="_blank" rel="noopener">@its_not_herpes</a> and <a href="https://twitter.com/0x8badfl00d" target="_blank" rel="noopener">0x8badfl00d</a> in retaliation for the service refusing to remove pirated tweaks. #> 230 In approximately 2008, <a href="http://motherboard.vice.com/read/427-million-myspace-passwords-emails-data-breach" target="_blank" rel="noopener">MySpace suffered a data breach that exposed almost 360 million accounts</a>. In May 2016 the data was offered up for sale on the &quot;Real Deal&quot; dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but <a href="https://www.troyhunt.com/dating-the-ginormous-myspace-breach" target="_blank" rel="noopener">analysis of the data suggests it was 8 years before being made public</a>. #> 231 In August 2015, the social video sharing and bookmarking site <a href="https://www.reddit.com/r/pwned/comments/3h4tud/myvidstercom_hacked_1_million_member_database/" target="_blank" rel="noopener">MyVidster was hacked</a> and nearly 20,000 accounts were dumped online. The dump included usernames, email addresses and hashed passwords. #> 232 In October 2015, the anabolic steroids retailer <a href="https://thinksteroids.com/community/threads/warning-naps-customer-database-compromised.134375549/" target="_blank" rel="noopener">NapsGear suffered a data breach</a>. An extensive amount of personal information on 287k customers was exposed including email addresses, names, addresses, phone numbers, purchase histories and salted MD5 password hashes. #> 233 In March 2016, the adult website <a href="http://www.forbes.com/sites/thomasbrewster/2016/04/14/naughty-america-fappening-hacked-porn-sites/" target="_blank" rel="noopener">Naughty America was hacked and the data consequently sold online</a>. The breach included data from numerous systems with various personal identity attributes, the largest of which had passwords stored as easily crackable MD5 hashes. There were 1.4 million unique email addresses in the breach. #> 234 In September 2016, almost 21GB of data from the French website used for &quot;standardised and decentralized means of exchange for publishing newsgroup articles&quot; <a href="http://www.nemoweb.net/" target="_blank" rel="noopener">NemoWeb</a> was leaked from what appears to have been an unprotected Mongo DB. The data consisted of a large volume of emails sent to the service and included almost 3.5M unique addresses, albeit many of them auto-generated. Multiple attempts were made to contact the operators of NemoWeb but no response was received. #> 235 In May 2016, <a href="http://motherboard.vice.com/read/neopets-hack-another-day-another-hack-tens-of-millions-of-neopets-accounts" target="_blank" rel="noopener">a set of breached data originating from the virtual pet website &quot;Neopets&quot; was found being traded online</a>. Allegedly hacked &quot;several years earlier&quot;, the data contains sensitive personal information including birthdates, genders and names as well as almost 27 million unique email addresses. Passwords were stored in plain text and IP addresses were also present in the breach. #> 236 In October 2015, the Chinese site known as <a href="http://www.163.com" target="_blank" rel="noopener">NetEase</a> (located at <a href="http://www.163.com" target="_blank" rel="noopener">163.com</a>) was <a href="http://news.mydrivers.com/1/452/452173.htm" target="_blank" rel="noopener">reported as having suffered a data breach that impacted hundreds of millions of subscribers</a>. Whilst there is evidence that the data itself is legitimate (multiple HIBP subscribers confirmed a password they use is in the data), due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 237 In May 2010, the e-wallet service known as Neteller <a href="http://www.forbes.com/sites/thomasbrewster/2015/11/30/paysafe-optimal-neteller-moneybookers-gambling-cyberattacks-data-breach/" target="_blank" rel="noopener">suffered a data breach which exposed over 3.6M customers</a>. The breach was not discovered until October 2015 and included names, email addresses, home addresses and account balances. #> 238 In July 2018, the Belgian social networking site <a href="https://oag.ca.gov/system/files/Communication%20to%20Users%20-%20FINAL_0.pdf" target="_blank" rel="noopener">Netlog identified a data breach of their systems dating back to November 2012 (PDF)</a>. Although the service was discontinued in 2015, the data breach still impacted 49 million subscribers for whom email addresses and plain text passwords were exposed. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 239 In 2016, a list of over 33 million individuals in corporate America sourced from Dun & Bradstreet's NetProspex service <a href="https://www.troyhunt.com/weve-lost-control-of-our-personal-data-including-33m-netprospex-records" target="_blank" rel="noopener">was leaked online</a>. D&B believe the targeted marketing data was lost by a customer who purchased it from them. It contained extensive personal and corporate information including names, email addresses, job titles and general information about the employer. #> 240 In December 2017, the online Brazilian retailer known as <a href="https://www.databreaches.net/netshoes-customer-data-possibly-hacked-500k-customers-order-info-dumped/" target="_blank" rel="noopener">Netshoes had half a million records allegedly hacked from their system posted publicly</a>. The company was contacted by local Brazilian media outlet Tecmundo and subsequently advised that <a href="https://www.tecmundo.com.br/seguranca/125038-netshoes-invadida-meio-milhao-dados-clientes-vazam-internet.htm" target="_blank" rel="noopener">no indications have been identified of an invasion of the company's systems</a>. However, Netshoes' own systems successfully confirm the presence of matching identifiers and email addresses from the data set, indicating a high likelihood that the data originated from them. #> 241 Early in 2014, the video game website <a href="http://www.nextgenupdate.com" target="_blank" rel="noopener">NextGenUpdate</a> reportedly <a href="https://leakforums.org/thread-265363" target="_blank" rel="noopener">suffered a data breach</a> that disclosed almost 1.2 million accounts. Amongst the data breach was usernames, email addresses, IP addresses and salted and hashed passwords. #> 242 In December 2015, the game modding site Nexus Mods <a href="http://www.nexusmods.com/games/news/12670/" target="_blank" rel="noopener">released a statement notifying users that they had been hacked</a>. They subsequently dated the hack as having occurred in July 2013 although there is evidence to suggest the data was being traded months in advance of that. The breach contained usernames, email addresses and passwords stored as a salted hashes. #> 243 In late 2015, the anime community known as Nihonomaru had their vBulletin forum hacked and 1.7 million accounts exposed. The compromised data included email and IP addresses, usernames and salted hashes of passwords. #> 244 In February 2016, the Russian gaming company <a href="http://nival.com" target="_blank" rel="noopener">Nival</a> was the target of an attack which was consequently <a href="https://www.reddit.com/r/pwned/comments/47u1bf/operation_wrath_of_anakin_evolved" target="_blank" rel="noopener">detailed on Reddit</a>. Allegedly protesting &quot;the foreign policy of Russia in regards to Ukraine&quot;, Nival was one of several Russian sites in the breach and impacted over 1.5M accounts including sensitive personal information. #> 245 In May 2013, the non-consensual voyeurism site <a href="http://www.ibtimes.co.uk/upskirt-porn-website-hit-massive-data-leak-exposing-nearly-180000-voyeurs-1602756" target="_blank" rel="noopener">&quot;Non Nude Girls&quot; suffered a data breach</a>. The hack of the vBulletin forum led to the exposure of over 75k accounts along with email and IP addresses, names and plain text passwords. #> 246 In May 2016, the cracking community forum known as <a href="http://nulled.cr/" target="_blank" rel="noopener">Nulled</a> was hacked and 599k user accounts were leaked publicly. The compromised data included email and IP addresses, weak salted MD5 password hashes and hundreds of thousands of private messages between members. #> 247 In May 2019, the account hijacking and SIM swapping forum <a href="https://krebsonsecurity.com/2019/05/account-hijacking-forum-ogusers-hacked/" target="_blank" rel="noopener">OGusers suffered a data breach</a>. The breach exposed a database backup from December 2018 which was published on a rival hacking forum. There were 161k unique email addresses spread across 113k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes. #> 248 In August 2017, a spambot by the name of <a href="https://benkowlab.blogspot.com.au/2017/08/from-onliner-spambot-to-millions-of.html" target="_blank" rel="noopener">Onliner Spambot was identified by security researcher Benkow moʞuƎq</a>. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled <a href="https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump" target="_blank" rel="noopener">Inside the Massive 711 Million Record Onliner Spambot Dump</a>. #> 249 In January 2016, the online virtual world known as <a href="http://www.onverse.com" target="_blank" rel="noopener">Onverse</a> was hacked and 800k accounts were exposed. Along with email and IP addresses, the site also exposed salted MD5 password hashes. #> 250 In December 2017, the website for purchasing Counter-Strike skins known as <a href="http://opencsgo.com" target="_blank" rel="noopener">Open CS:GO</a> (Counter-Strike: Global Offensive) suffered a data breach (address since redirects to dropgun.com). The 10GB file contained an extensive amount of personal information including email and IP addresses, phone numbers, physical addresses and purchase histories. <a href="https://www.troyhunt.com/streamlining-data-breach-disclosures-a-step-by-step-process" target="_blank" rel="noopener">Numerous attempts were made to contact Open CS:GO about the incident</a>, however no responses were received. #> 251 In May 2019, <a href="https://roma.repubblica.it/cronaca/2019/05/07/news/roma_anonymus_viola_la_mail_di_30mila_avvocati_c_e_anche_quella_di_raggi-225675248/" target="_blank" rel="noopener">the Lawyers Order of Rome suffered a data breach by a group claiming to be Anonymous Italy</a>. Data on tens of thousands of Roman lawyers was taken from the breached system and redistributed online. The data included contact information, email addresses and email messages themselves encompassing tens of thousands of unique email addresses. A total of 42k unique addresses appeared in the breach. #> 252 In mid-2015, the forum for the hosting provider known as <a href="https://www.ovh.com" target="_blank" rel="noopener">OVH</a> suffered a data breach. The vBulletin forum contained 453k accounts including usernames, email and IP addresses and passwords stored as salted MD5 hashes. #> 253 In approximately August 2013, the World of Warcraft exploits forum known as <a href="http://www.ownedcore.com" target="_blank" rel="noopener">OwnedCore</a> was hacked and more than 880k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 254 In October 2010, the Irish bookmaker <a href="http://www.telegraph.co.uk/technology/internet-security/11005558/Irish-government-disappointed-over-Paddy-Power-hack.html" target="_blank" rel="noopener">Paddy Power suffered a data breach</a> that exposed 750,000 customer records with nearly 600,000 unique email addresses. The breach was not disclosed until July 2014 and contained extensive personal information including names, addresses, phone numbers and plain text security questions and answers. #> 255 In October 2015, the crowdfunding site <a href="http://www.zdnet.com/article/patreon-hacked-anonymous-patrons-exposed/" target="_blank" rel="noopener">Patreon was hacked</a> and over 16GB of data was released publicly. The dump included almost 14GB of database records with more than 2.3M unique email addresses and millions of personal messages. #> 256 In December 2016, <a href="https://twitter.com/real_1x0123/status/809443917984911364" target="_blank" rel="noopener">an attacker breached PayAsUGym's website</a> exposing over 400k customers' personal data. The data was consequently leaked publicly and broadly distributed via Twitter. The leaked data contained personal information including email addresses and passwords hashed using MD5 without a salt. #> 257 In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as <a href="https://www.troyhunt.com/the-111-million-pemiblanc-credential-stuffing-list" target="_blank" rel="noopener">Pemiblanc</a> was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. <a href="https://www.troyhunt.com/the-111-million-pemiblanc-credential-stuffing-list" target="_blank" rel="noopener">Read more about the incident.</a> #> 258 In October 2015, the PHP discussion board <a href="http://forums.phpfreaks.com/topic/298874-alert-the-phpfreaks-forum-members-data-appears-to-have-been-stolen" target="_blank" rel="noopener">PHP Freaks was hacked</a> and 173k user accounts were publicly leaked. The breach included multiple personal data attributes as well as salted and hashed passwords. #> 259 In December 2013, a <a href="http://www.cyberwarnews.info/2013/12/04/pixel-federation-hacked-38000-user-credentials-leaked" target="_blank" rel="noopener">breach of the web-based game community based in Slovakia</a> exposed over 38,000 accounts which were promptly posted online. The breach included email addresses and unsalted MD5 hashed passwords, many of which were easily converted back to plain text. #> 260 In approximately December 2017, the online photo editing site <a href="https://www.zdnet.com/article/hacker-puts-up-for-sale-third-round-of-hacked-databases-on-the-dark-web/" target="_blank" rel="noopener">piZap suffered a data breach</a>. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in February 2019. A total of 42 million unique email addresses were included in the breach alongside names, genders and links to Facebook profiles when the social media platform was used to authenticate to piZap. When accounts were created directly on piZap without using Facebook for authentication, passwords stored as SHA-1 hashes were also exposed. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 261 In July 2015, the discussion forum for Plex media centre <a href="https://blog.plex.tv/2015/07/02/security-notice-forum-user-password-resets" target="_blank" rel="noopener">was hacked and over 327k accounts exposed</a>. The IP.Board forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 262 In July 2015, the French Pokémon site <a href="https://www.pokebip.com/news3382__message_de_securite_de_l_equipe_pokebip_.html" target="_blank" rel="noopener">Pokébip suffered a data breach</a> which exposed 657k subscriber identities. The data included email and IP addresses, usernames and passwords stored as unsalted MD5 hashes. #> 263 In August 2014, the Pokémon RPG website <a href="http://pokemoncreed.net" target="_blank" rel="noopener">Pokémon Creed</a> was hacked after a dispute with rival site, <a href="http://pkmndusk.in" target="_blank" rel="noopener">Pokémon Dusk</a>. In a <a href="https://www.facebook.com/ramandeep.s.dehal/posts/749666358442465" target="_blank" rel="noopener">post on Facebook</a>, &quot;Cruz Dusk&quot; announced the hack then pasted the dumped MySQL database on <a href="http://pkmndusk.in" target="_blank" rel="noopener">pkmndusk.in</a>. The breached data included over 116k usernames, email addresses and plain text passwords. #> 264 In approximately October 2016, the Spanish Pokémon site <a href="http://pokemonnegro.com" target="_blank" rel="noopener">Pokémon Negro</a> suffered a data breach. The attack resulted in the disclosure of 830k accounts including email and IP addresses along with plain text passwords. Pokémon Negro did not respond when contacted about the breach. #> 265 In February 2017, the law enforcement website <a href="http://www.zdnet.com/article/police-forum-hacked-thousands-of-records-for-sale-on-dark-web/" target="_blank" rel="noopener">PoliceOne confirmed they'd suffered a data breach</a>. The breach contained over 700k accounts which appeared for sale by a data broker and included email and IP addresses, usernames and salted MD5 password hashes. The file the data was contained in indicated the original breach dated back to July 2014. #> 266 In approximately September 2014, the RuneScape bot website <a href="https://www.powerbot.org" target="_blank" rel="noopener">Powerbot</a> suffered a data breach resulting in the exposure of over half a million unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 267 In approximately late 2015, the programming forum at <a href="http://www.programmingforums.org/" target="_blank" rel="noopener">programmingforums.org</a> suffered a data breach resulting in the exposure of 707k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 268 In approximately July 2015, the Sony Playstation hacks and mods forum known as <a href="http://www.ps3hax.net" target="_blank" rel="noopener">PS3Hax</a> was hacked and more than 447k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 269 In approximately September 2015, the PlayStation PSP forum known as <a href="http://www.pspiso.com" target="_blank" rel="noopener">PSP ISO</a> was hacked and almost 1.3 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. #> 270 In approximately February 2015, the Sony Playstation forum known as <a href="http://psx-scene.com" target="_blank" rel="noopener">PSX-Scene</a> was hacked and more than 340k accounts were exposed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 271 In July 2015, the Qatar National Bank <a href="http://www.theregister.co.uk/2016/04/25/breaking_qatar_bank_hack/" target="_blank" rel="noopener">suffered a data breach</a> which exposed 15k documents totalling 1.4GB and detailing more than 100k accounts with passwords and PINs. The incident was made public some 9 months later in April 2016 when the documents appeared publicly on a file sharing site. Analysis of the breached data suggests <a href="http://blog.trendmicro.co.uk/qatar-bank-breach-lifts-the-veil-on-targeted-attack-strategies/#more-520" target="_blank" rel="noopener">the attack began by exploiting a SQL injection flaw</a> in the bank's website. #> 272 In mid-2011, the Russian instant messaging service known as <a href="http://securityaffairs.co/wordpress/51118/data-breach/qip-data-breach.html" target="_blank" rel="noopener">QIP (Quiet Internet Pager) suffered a data breach</a>. The attack resulted in the disclosure of over 26 million unique accounts including email addresses and passwords with the data eventually appearing in public years later. #> 273 In March 2014, the <a href="http://www.webopedia.com/TERM/B/booter_services.html">booter service</a> Quantum Booter (also referred to as Quantum Stresser) suffered a breach which lead to the disclosure of their internal database. The leaked data included private discussions relating to malicious activity Quantum Booter users were performing against online adversaries, including the IP addresses of those using the service to mount DDoS attacks. #> 274 In approximately late 2015, the maker of &quot;performance marketing products&quot; <a href="http://quinstreet.com/" target="_blank" rel="noopener">QuinStreet</a> had a number of their online assets compromised. The attack impacted 28 separate sites, predominantly technology forums such as <a href="http://quinstreet.com/" target="_blank" rel="noopener">flashkit.com</a>, <a href="http://quinstreet.com/" target="_blank" rel="noopener">codeguru.com</a> and <a href="http://quinstreet.com/" target="_blank" rel="noopener">webdeveloper.com</a> (<a href="http://pastebin.com/raw/6p50GgCV" target="_blank" rel="noopener">view a full list of sites</a>). QuinStreet advised that impacted users have been notified and passwords reset. The data contained details on over 4.9 million people and included email addresses, dates of birth and salted MD5 hashes. #> 275 In early 2017, the forum for the gaming website <a href="http://www.csoonline.com/article/3192246/security/r2games-compromised-again-over-one-million-accounts-exposed.html" target="_blank" rel="noopener">R2 Games was hacked</a>. R2 had previously appeared on HIBP in 2015 after a prior incident. This one exposed over 1 million unique user accounts and corresponding MD5 password hashes with no salt. #> 276 In late 2015, the gaming website <a href="https://www.r2games.com" target="_blank" rel="noopener">R2Games</a> was hacked and more than 2.1M personal records disclosed. The vBulletin forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. A further 11M accounts were added to "Have I Been Pwned" in March 2016 and another 9M in July 2016 bringing the total to over 22M. #> 277 In late 2016, a data dump of almost 100M accounts from Rambler, sometimes referred to as &quot;The Russian Yahoo&quot;, <a href="http://www.zdnet.com/article/russian-portal-email-provider-rambler-hacked-98-million-accounts-leaked/" target="_blank" rel="noopener">was discovered being traded online</a>. The data set provided to Have I Been Pwned included 91M unique usernames (which also form part of Rambler email addresses) and plain text passwords. According to Rambler, the data dates back to March 2014. #> 278 In approximately November 2016, the search engine optimisation management company <a href="https://www.rankwatch.com/" target="_blank" rel="noopener">RankWatch</a> exposed a Mongo DB with no password publicly whereupon their data was exfiltrated and posted to an online forum. The data contained 7.4 million unique email addresses along with names, employers, phone numbers and job titles in a table called &quot;us_emails&quot;. When contacted and advised of the incident, RankWatch would not reveal the purpose of the data, where it had been acquired from and whether the data owners had consented to its collection. The forum which originally posted the data explained it as being &quot;in the same vein as the modbsolutions leak&quot;, <a href="https://haveibeenpwned.com/PwnedWebsites#ModernBusinessSolutions" target="_blank" rel="noopener">a large list of corporate data allegedly used for spam purposes</a>. #> 279 In August 2018, the Roblox trading site <a href="https://rbx.rocks/" target="_blank" rel="noopener">Rbx.Rocks</a> suffered a data breach. The personal data of almost 25k people was impacted by the breach and included names, email addresses and passwords stored as bcrypt hashes. The website has since gone offline with a message stating that &quot;Rbx.Rocks v2.0 is currently under construction&quot;. #> 280 In September 2016, the real estate investment site <a href="https://realestatemogul.com/" target="_blank" rel="noopener">Real Estate Mogul</a> had a Mongo DB instance compromised and 5GB of data downloaded by an unauthorised party. The data contained real estate listings including addresses and the names, phone numbers and 308k unique email addresses of the sellers. Real Estate Mogul was advised of the incident in September 2018 and stated that they &quot;found no instance of user account credentials like usernames and passwords nor billing information within this file&quot;. #> 281 In July 2016, a tweet was posted with a link to an alleged data breach of <a href="http://bluesnap.com" target="_blank" rel="noopener">BlueSnap, a global payment gateway and merchant account provider</a>. The data contained 324k payment records across 105k unique email addresses and included personal attributes such as name, home address and phone number. The data was verified with multiple Have I Been Pwned subscribers who confirmed it also contained valid transactions, partial credit card numbers, expiry dates and CVVs. A downstream consumer of BlueSnap services known as <a href="http://www.regpacks.com/" target="_blank" rel="noopener">Regpack</a> was subsequently identified as the source of the data after they identified human error had left the transactions exposed on a publicly facing server. A full investigation of the data and statement by Regpack is detailed in the post titled <a href="https://www.troyhunt.com/someone-just-lost-324k-payment-records-complete-with-cvvs/" target="_blank" rel="noopener">Someone just lost 324k payment records, complete with CVVs</a>. #> 282 In February 2017, the mobile device monitoring software developer Retina-X was hacked and customer data downloaded before being wiped from their servers. The incident was covered in the Motherboard article titled <a href="https://motherboard.vice.com/en_us/article/inside-stalkerware-surveillance-market-flexispy-retina-x" target="_blank" rel="noopener">Inside the 'Stalkerware' Surveillance Market, Where Ordinary People Tap Each Other's Phones</a>. The service, used to monitor mobile devices, had 71k email addresses and MD5 hashes with no salt exposed. Retina-X <a href="http://www.phonesheriff.com/blog/retina-x-studios-server-breached-by-hackers/" target="_blank" rel="noopener">disclosed the incident in a blog post</a> on April 27, 2017. #> 283 In January 2014, the online service for assisting musicians to build their careers <a href="https://www.scmagazine.com/2014-breach-prompts-reverbnation-to-notify-customers/article/532492/" target="_blank" rel="noopener">ReverbNation suffered a data breach which wasn't identified until September the following year</a>. The breach contained over 7 million accounts with unique email addresses and salted SHA1 passwords. #> 284 In January 2017, <a href="https://web.archive.org/web/20170426084052/https://mackeeper.com/blog/post/339-spammergate-the-fall-of-an-empire" target="_blank" rel="noopener">a massive trove of data from River City Media was found exposed online</a>. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. #> 285 Some time prior to May 2016, <a href="https://motherboard.vice.com/read/rosebuttboard-ip-board" target="_blank" rel="noopener">the forum known as &quot;Rosebutt Board&quot; was hacked</a> and 107k accounts were exposed. The self-described &quot;top one board for anal fisting, prolapse, huge insertions and rosebutt fans&quot; had email and IP addresses, usernames and weakly stored salted MD5 password hashes hacked from the IP.Board based forum. #> 286 In approximately 2017, the website for Russian speakers in America known as <a href="http://www.russianamerica.com/" target="_blank" rel="noopener">Russian America</a> suffered a data breach. The incident exposed 183k unique records including names, email addresses, phone numbers and passwords stored in both plain text and as MD5 hashes. Russian America was contacted about the breach but did not respond. #> 287 In September 2018, <a href="https://www.linkedin.com/pulse/another-e-marketing-database-11-million-records-bob-diachenko/" target="_blank" rel="noopener">security researcher Bob Diachenko discovered a massive collection of personal details exposed in an unprotected Mongo DB instance</a>. The data appears to have been used in marketing campaigns (possibly for spam purposes) but had little identifying data about it other than a description of &quot;Yahoo_090618_ SaverSpy&quot;. The data set provided to HIBP had almost 2.5M unique email addresses (all of which were from Yahoo!) alongside names, genders and physical addresses. #> 288 In early 2015, a spam list known as <a href="http://www.data4marketers.com/2015APRspecials.html" target="_blank" rel="noopener">SC Daily Phone</a> emerged containing almost 33M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. <a href="https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information" target="_blank" rel="noopener">Read more about spam lists in HIBP.</a> #> 289 In July 2015, the torrent site Seedpeer was hacked and 282k member records were exposed. The data included usernames, email addresses and passwords stored as weak MD5 hashes. #> 290 In mid-2015, the Dutch Minecraft site <a href="https://twitter.com/serverpact/status/772534083788365829" target="_blank" rel="noopener">ServerPact was hacked</a> and 73k accounts were exposed. Along with birth dates, email and IP addresses, the site also exposed SHA1 password hashes with the username as the salt. #> 291 In July 2018, the social bookmarking and sharing service <a href="https://www.sharethis.com/data-privacy-incident/" target="_blank" rel="noopener">ShareThis suffered a data breach</a>. The incident exposed 41 million unique email addresses alongside names and in some cases, dates of birth and password hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 292 In June 2018, online fashion retailer <a href="https://www.zdnet.com/article/shein-fashion-retailer-announces-breach-affecting-6-42-million-users/" target="_blank" rel="noopener">SHEIN suffered a data breach</a>. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 293 In May 2016, the multiplayer server for Minecraft service <a href="https://shotbow.net/forum/threads/security-data-breach-and-information-leak.346321/" target="_blank" rel="noopener">Shotbow announced they'd suffered a data breach</a>. The incident resulted in the exposure of over 1 million unique email addresses, usernames and salted SHA-256 password hashes. #> 294 In February 2016, the Slovak torrent tracking site SkTorrent <a href="http://tech.sme.sk/c/20099331/hackeri-ukradli-na-slovensku-118-tisic-identit.html" target="_blank" rel="noopener">was hacked and over 117k records leaked online</a>. The data dump included usernames, email addresses and passwords stored in plain text. #> 295 In April 2018, the Pokémon website known as <a href="https://www.smogon.com/forums/threads/we-were-hacked-recently-you-may-potentially-want-to-change-your-passwords.3632265/" target="_blank" rel="noopener">Smogon announced they'd suffered a data breach</a>. The breach dated back to September 2017 and affected their XenForo based forum. The exposed data included usernames, email addresses, genders and both bcrypt and MD5 password hashes. #> 296 In January 2014 just one week after <a href="http://gibsonsec.org/snapchat/fulldisclosure/" target="_blank" rel="noopener">Gibson Security detailed vulnerabilities in the service</a>, Snapchat had 4.6 million usernames and phone number exposed. The attack involved <a href="http://www.troyhunt.com/2014/01/searching-snapchat-data-breach-with.html" target="_blank" rel="noopener">brute force enumeration of a large number of phone numbers</a> against the Snapchat API in what appears to be a response to Snapchat's assertion that such an attack was &quot;theoretical&quot;. Consequently, the breach enabled individual usernames (which are often used across other services) to be resolved to phone numbers which users usually wish to keep private. #> 297 In June 2019, the &quot;Art of Human Hacking&quot; site <a href="https://socialengineered.net" target="_blank" rel="noopener">Social Engineered</a> suffered a data breach. The breach of the MyBB forum was published on a rival hacking forum and included 89k unique email addresses spread across 55k forum users and other tables in the database. The exposed data also included usernames, IP addresses, private messages and passwords stored as salted MD5 hashes. #> 298 In November 2018, the Società Italiana degli Autori ed Editori (Italian Society of Authors and Publishers, or SIAE) <a href="https://www.repubblica.it/tecnologia/sicurezza/2018/11/03/news/tecnologia_altro_attacco_di_anonplus_bucato_il_sito_della_siae_e_rubati_4_giga_di_dati-210654944/?ref=search" target="_blank" rel="noopener">was hacked, defaced and almost 4GB of data leaked publicly via Twitter</a>. The data included over 14k registered users' names, email addresses and passwords. #> 299 In 2011, Sony suffered breach after breach after breach &mdash; it was a <em>very</em> bad year for them. The breaches spanned various areas of the business ranging from the PlayStation network all the way through to the motion picture arm, Sony Pictures. A SQL Injection vulnerability in <a href="http://www.sonypictures.com" target="_blank" rel="noopener">sonypictures.com</a> lead to <a href="http://www.troyhunt.com/2011/06/brief-sony-password-analysis.html" target="_blank" rel="noopener">tens of thousands of accounts across multiple systems being exposed</a> complete with plain text passwords. #> 300 In approximately mid 2015, the music tracking app <a href="http://www.soundwave.com/help/" target="_blank" rel="noopener">Soundwave suffered a data breach</a>. The breach stemmed from an incident whereby &quot;production data had been used to populate the test database&quot; and was then inadvertently exposed in a MongoDB. The data contained 130k records and included email addresses, dates of birth, genders and MD5 hashes of passwords without a salt. #> 301 In mid to late 2015, a spam list known as the <a href="http://www.data4marketers.com/d4m_SpecialKfeed2015.html" target="_blank" rel="noopener">Special K Data Feed</a> was discovered containing almost 31M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. <a href="https://www.troyhunt.com/have-i-been-pwned-and-spam-lists-of-personal-information" target="_blank" rel="noopener">Read more about spam lists in HIBP.</a> #> 302 In February 2014, Connecticut based Spirol Fastening Solutions <a href="http://news.softpedia.com/news/Details-of-70-000-Users-Leaked-by-Hackers-From-Systems-of-SPIROL-International-428669.shtml" target="_blank" rel="noopener">suffered a data breach that exposed over 70,000 customer records</a>. The attack was allegedly mounted by exploiting a SQL injection vulnerability which yielded data from Spirol’s CRM system ranging from customers’ names, companies, contact information and over 55,000 unique email addresses. #> 303 In August 2018, the spyware company <a href="https://motherboard.vice.com/en_us/article/9kmj4v/spyware-company-spyfone-terabytes-data-exposed-online-leak" target="_blank" rel="noopener">SpyFone left terabytes of data publicly exposed</a>. Collected surreptitiously whilst the targets were using their devices, the data included photos, audio recordings, text messages and browsing history which were then exposed via a number of misconfigurations within SpyFone's systems. The data belonged the thousands of SpyFone customers and included 44k unique email addresses, many likely belonging to people the targeted phones had contact with. #> 304 In March 2016, the DDoS protection service <a href="https://krebsonsecurity.com/2016/03/hackers-target-anti-ddos-firm-staminus/" target="_blank" rel="noopener">Staminus was &quot;massively hacked&quot;</a> resulting in an outage of more than 20 hours and the disclosure of customer credentials (with unsalted MD5 hashes), support tickets, credit card numbers and other sensitive data. 27k unique email addresses were found in the data which was subsequently released to the public. Staminus is no longer in operation. #> 305 In February 2015, the Moldavian ISP &quot;StarNet&quot; <a href="http://www.moldova.org/the-database-of-an-internet-provider-from-moldova-was-stolen-and-published/" target="_blank" rel="noopener">had it's database published online</a>. The dump included nearly 140k email addresses, many with personal details including contact information, usage patterns of the ISP and even passport numbers. #> 306 In 2016, the South African cinema company <a href="http://blog.roguecode.co.za/sterkinekor-vulnerability-download-millions-accounts" target="_blank" rel="noopener">Ster-Kinekor had a security flaw</a> which leaked a large amount of customer data via an enumeration vulnerability in the API of their old website. Whilst more than 6 million accounts were leaked by the flaw, the exposed data only contained 1.6 million unique email addresses. The data also included extensive personal information such as names, addresses, birthdates, genders and plain text passwords. #> 307 In December 2011, &quot;Anonymous&quot; <a href="http://www.troyhunt.com/2011/12/5-website-security-lessons-courtesy-of.html" target="_blank" rel="noopener">attacked the global intelligence company known as &quot;Stratfor&quot;</a> and consequently disclosed a veritable treasure trove of data including hundreds of gigabytes of email and tens of thousands of credit card details which were promptly used by the attackers to make charitable donations (among other uses). The breach also included 860,000 user accounts complete with email address, time zone, some internal system data and MD5 hashed passwords with no salt. #> 308 In June 2014, the torrent site Sumo Torrent was hacked and 285k member records were exposed. The data included IP addresses, email addresses and passwords stored as weak MD5 hashes. #> 309 Sometime in 2015, the Swedish magic website <a href="https://www.svenskamagic.com/" target="_blank" rel="noopener">SvenskaMagic</a> suffered a data breach that exposed over 30k records. The compromised data included usernames, email addresses and MD5 password hashes. The data was self-submitted to HIBP by SvenskaMagic. #> 310 In early 2015, the Swedish tech news site <a href="http://www.sweclockers.com/nyhet/20800-sweclockers-drabbas-av-dataintrang" target="_blank" rel="noopener">SweClockers was hacked</a> and 255k accounts were exposed. The attack led to the exposure of usernames, email addresses and salted hashes of passwords stored with a combination of MD5 and SHA512. #> 311 In approximately 2012, it's alleged that the Chinese shopping site known as <a href="https://www.taobao.com" target="_blank" rel="noopener">Taobao</a> suffered a data breach that impacted over 21 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 312 In September 2017, news broke that <a href="https://thehackernews.com/2017/09/taringa-data-breach-hacking.html" target="_blank" rel="noopener">Taringa had suffered a data breach exposing 28 million records</a>. Known as &quot;The Latin American Reddit&quot;, <a href="https://www.taringa.net/posts/taringa/19972402/Un-mensaje-importante-sobre-la-seguridad-de-tu-cuenta.html" target="_blank" rel="noopener">Taringa's breach disclosure notice</a> indicated the incident dated back to August that year. The exposed data included usernames, email addresses and weak MD5 hashes of passwords. #> 313 In December 2014, the electronic sports organisation known as <a href="http://www.dailydot.com/esports/null-consolidated-team-solomid-hack/" target="_blank" rel="noopener">Team SoloMid was hacked</a> and 442k members accounts were leaked. The accounts included email and IP addresses, usernames and salted hashes of passwords. #> 314 In November 2018, the Minecraft modpack platform known as <a href="https://www.technicpack.net/article/forums-database-breach.149" target="_blank" rel="noopener">Technic suffered a data breach</a>. Technic promptly disclosed the breach and advised that the impacted data included over 265k unique users' email and IP addresses, chat logs, private messages and <a href="https://twitter.com/PedroACunha/status/1069740224497020929" target="_blank" rel="noopener">passwords stored as bcrypt hashes with a work factor of 13</a>. Technic self-submitted the breach to HIBP. #> 315 In April 2015, the Telecom Regulatory Authority of India (TRAI) <a href="http://www.dnaindia.com/scitech/report-email-savetheinternet-net-neutrality-campaign-public-privacy-spam-phishing-2081037" target="_blank" rel="noopener">published tens of thousand of emails</a> sent by Indian citizens supporting net neutrality as part of the SaveTheInternet campaign. The published data included lists of emails including the sender's name and email address as well as the contents of the email as well, often with signatures including other personal data. #> 316 In May 2015, almost 100k user records were extracted from the Hungarian torrent site known as Teracod. The data was later discovered being torrented itself and included email addresses, passwords, private messages between members and the peering history of IP addresses using the service. #> 317 In February 2014, <a href="http://www.bbc.co.uk/news/technology-26171130" target="_blank" rel="noopener">over 2,000 Tesco accounts with usernames, passwords and loyalty card balances appeared on Pastebin</a>. Whilst the source of the breach is not clear, many confirmed the credentials were valid for Tesco and indeed <a href="http://www.troyhunt.com/2012/07/lessons-in-website-security-anti.html" target="_blank" rel="noopener"> they have a history of poor online security</a>. #> 318 In approximately 2017, it's alleged that the Chinese gaming site known as <a href="http://www.tgbus.com/" target="_blank" rel="noopener">TGBUS</a> suffered a data breach that impacted over 10 million unique subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains usernames, email addresses and salted MD5 password hashes and was provided with support from <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 319 In September 2015, the non-consensual voyeurism site <a href="http://www.ibtimes.co.uk/upskirt-porn-website-hit-massive-data-leak-exposing-nearly-180000-voyeurs-1602756" target="_blank" rel="noopener">&quot;The Candid Board&quot; suffered a data breach</a>. The hack of the vBulletin forum led to the exposure of over 178k accounts along with email and IP addresses, dates of birth and salted passwords hashed with MD5. #> 320 In December 2015, the forum for discussing naked celebrity photos known as &quot;The Fappening&quot; (named after the iCloud leaks of 2014) was compromised and 179k accounts were leaked. Exposed member data included usernames, email addresses and salted hashes of passwords. #> 321 In December 2017, the stock market news website <a href="http://theflyonthewall.com/" target="_blank" rel="noopener">The Fly on the Wall</a> suffered a data breach. The data in the breach included 84k unique email addresses as well as purchase histories and credit card data. <a href="https://www.troyhunt.com/streamlining-data-breach-disclosure-a-step-by-step-process" target="_blank" rel="noopener">Numerous attempts were made to contact The Fly on the Wall about the incident</a>, however no responses were received. #> 322 In November 2017, the open television database known as <a href="https://forums.thetvdb.com/viewtopic.php?f=3&t=43254" target="_blank" rel="noopener">TheTVDB.com suffered a data breach</a>. The breached data was posted to a hacking forum and included 182k records with usernames, email addresses and MySQL password hashes. #> 323 In 2014, the ThisHabbo forum (a fan site for Habbo.com, a Finnish social networking site) <a href="https://www.google.com/search?q="thishabbo_forum.txt" target="_blank" rel="noopener">appeared among a list of compromised sites</a> which has subsequently been removed from the internet. Whilst the actual date of the exploit is not clear, the breached data includes usernames, email addresses, IP addresses and salted hashes of passwords. A further 584k records were added from a more comprehensive breach file provided in October 2016. #> 324 In December 2011, <a href="http://thehackernews.com/2011/12/tianya-chinas-biggest-online-forum-40.html" target="_blank" rel="noopener">China's largest online forum known as Tianya was hacked</a> and tens of millions of accounts were obtained by the attacker. The leaked data included names, usernames and email addresses. #> 325 In May 2018, the website for the ticket distribution service <a href="https://motherboard.vice.com/en_us/article/mbk3nx/ticketfly-website-database-hacked-data-breach" target="_blank" rel="noopener">Ticketfly was defaced by an attacker and was subsequently taken offline</a>. The attacker allegedly requested a ransom to share details of the vulnerability with Ticketfly but did not receive a reply and subsequently posted the breached data online to a publicly accessible location. The data included over 26 million unique email addresses along with names, physical addresses and phone numbers. Whilst there were no passwords in the publicly leaked data, <a href=https://support.ticketfly.com/customer/en/portal/articles/2941983-ticketfly-cyber-incident-update" target="_blank" rel="noopener">Ticketfly later issued an incident update</a> and stated that &quot;It is possible, however, that hashed values of password credentials could have been accessed&quot;. #> 326 In December 2013, the torrent site <a href="https://www.reddit.com/r/trackers/comments/1sqqf7/torrentinvites_hacked/" target="_blank" rel="noopener">Torrent Invites was hacked</a> and over 352k accounts were exposed. The vBulletin forum contained usernames, email and IP addresses, birth dates and salted MD5 hashes of passwords. #> 327 In June 2018, the command and control server of a malicious botnet known as the &quot;Trik Spam Botnet&quot; <a href="https://www.bleepingcomputer.com/news/security/trik-spam-botnet-leaks-43-million-email-addresses/" target="_blank" rel="noopener">was misconfigured such that it exposed the email addresses of more than 43 million people</a>. The researchers who discovered the exposed Russian server believe the list of addresses was used to distribute various malware strains via malspam campaigns (emails designed to deliver malware). #> 328 In December 2015, the instant messaging application <a href="https://www.trillian.im/help/trillian-blog-and-forums-security-incident/" target="_blank" rel="noopener">Trillian suffered a data breach</a>. The breach became known in July 2016 and exposed various personal data attributes including names, email addresses and passwords stored as salted MD5 hashes. #> 329 In February 2016, the online trucking simulator mod <a href="http://truckersmp.com/en_US/blog/8" target="_blank" rel="noopener">TruckersMP suffered a data breach</a> which exposed 84k user accounts. In a first for "Have I Been Pwned", <a href="https://www.troyhunt.com/100-data-breaches-later-have-i-been-pwned-gets-its-first-self-submission/" target="_blank" rel="noopener">the breached data was self-submitted directly by the organisation that was breached itself</a>. #> 330 In early 2013, <a href="https://staff.tumblr.com/post/144263069415/we-recently-learned-that-a-third-party-had" target="_blank" rel="noopener">tumblr suffered a data breach</a> which resulted in the exposure of over 65 million accounts. The data was later put up for sale on a dark market website and included email addresses and passwords stored as salted SHA1 hashes. #> 331 In June 2016, the Facebook application known as <a href="http://www.uiggy.com" target="_blank" rel="noopener">Uiggy</a> was hacked and 4.3M accounts were exposed, 2.7M of which had email addresses against them. The leaked accounts also exposed names, genders and the Facebook ID of the owners. #> 332 In February 2014, the Internet Governance Forum (formed by the United Nations for policy dialogue on issues of internet governance) was <a href="http://www.cyberwarnews.info/2014/02/20/united-nations-internet-governance-forum-hacked-3215-accounts-leaked/" target="_blank" rel="noopener">attacked by hacker collective known as Deletesec</a>. Although tasked with &quot;ensuring the security and stability of the Internet&quot;, the IGF’s website was still breached and resulted in the leak of 3,200 email addresses, names, usernames and cryptographically stored passwords. #> 333 In April 2017, <a href="http://underworldempireforums.com/" target="_blank" rel="noopener">the vBulletin forum for the Underworld Empire game</a> suffered a data breach that exposed 429k accounts. The data was then posted to a hacking forum in mid-February 2018 where it was made available to download. The source data contained IP and email addresses, usernames and salted MD5 hashes. #> 334 In August 2016, <a href="http://www.zdnet.com/article/epic-games-unreal-engine-forums-hacked-in-latest-data-breach" target="_blank" rel="noopener">the Unreal Engine Forum suffered a data breach</a>, allegedly due to a SQL injection vulnerability in vBulletin. The attack resulted in the exposure of 530k accounts including usernames, email addresses and salted MD5 hashes of passwords. #> 335 In early 2016, the forum for the uTorrent BitTorrent client <a href="https://torrentfreak.com/utorrent-forums-hacked-passwords-compromised-160608/" target="_blank" rel="noopener">suffered a data breach</a> which came to light later in the year. The database from the IP.Board based forum contained 395k accounts including usernames, email addresses and MD5 password hashes without a salt. #> 336 In September 2016, data was allegedly obtained from the Chinese website known as <a href="http://www.uuu9.com" target="_blank" rel="noopener">uuu9.com</a> and contained 7.5M accounts. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and user names. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 337 In November 2015, the forum software maker <a href="http://www.theregister.co.uk/2015/11/03/vbulletin_forum_software_hacked_defaced/" target="_blank" rel="noopener">vBulletin suffered a serious data breach</a>. The attack lead to the release of both forum user and customer accounts totalling almost 519k records. The breach included email addresses, birth dates, security questions and answers for customers and salted hashes of passwords for both sources. #> 338 In February 2019, the email address validation service <a href="https://securitydiscovery.com/800-million-emails-leaked-online-by-email-verification-service" target="_blank" rel="noopener">verifications.io suffered a data breach</a>. Discovered by <a href="https://twitter.com/mayhemdayone" target="_blank" rel="noopener">Bob Diachenko</a> and <a href="https://twitter.com/vinnytroia" target="_blank" rel="noopener">Vinny Troia</a>, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although <a href="https://web.archive.org/web/20190227230352/https://verifications.io/" target="_blank" rel="noopener">an archived copy remains viewable</a>. #> 339 In January 2014, <a href="http://securityaffairs.co/wordpress/21120/cyber-crime/verified-communities-hacked.html" target="_blank" rel="noopener">one of the largest communities of Eastern Europe cybercriminals known as "Verified" was hacked</a>. The breach exposed nearly 17k users of the vBulletin forum including their personal messages and other potentially personally identifiable information. #> 340 In January 2017, the automated telephony services company <a href="http://www.zdnet.com/article/republican-polling-firm-hacked-exposing-donor-records/" target="_blank" rel="noopener">Victory Phones left a Mongo DB database publicly facing without a password</a>. Subsequently, 213GB of data was downloaded by an unauthorised party including names, addresses, phone numbers and over 166k unique email addresses. #> 341 In May 2018, the South African website for viewing traffic fines online known as <a href="https://www.iafrikan.com/2018/05/24/south-africas-viewfines-suffered-major-data-leak/" target="_blank" rel="noopener">ViewFines suffered a data breach</a>. Over 934k records containing 778k unique email addresses were exposed and included names, phone numbers, government issued IDs and passwords stored in plain text. #> 342 In approximately 2012, the Russian social media site known as <a href="http://motherboard.vice.com/read/another-day-another-hack-100-million-accounts-for-vk-russias-facebook" target="_blank" rel="noopener">VK was hacked</a> and almost 100 million accounts were exposed. The data emerged in June 2016 where it was being sold via a dark market website and included names, phone numbers email addresses and plain text passwords. #> 343 In April 2018, <a href="https://congnghe.tuoitre.vn/lo-thong-tin-hang-tram-trieu-tai-khoan-khach-hang-vng-xin-loi-20180427225719109.htm" target="_blank" rel="noopener">news broke of a massive data breach impacting the Vietnamese company known as VNG</a> after data was discovered being traded on a popular hacking forum where it was extensively redistributed. The breach dated back to an incident in May of 2015 and included of over 163 million customers. The data in the breach contained a wide range of personal attributes including usernames, birth dates, genders and home addresses along with unsalted MD5 hashes and 25 million unique email addresses. The data was provided to HIBP by <a href="https://dehashed.com/" target="_blank" rel="noopener">dehashed.com</a>. #> 344 In November 2013, <a href="http://thehackernews.com/2013/11/vodafone-iceland-hacked-and-exposed.html" target="_blank" rel="noopener">Vodafone in Iceland suffered an attack</a> attributed to the Turkish hacker collective &quot;Maxn3y&quot;. The data was consequently publicly exposed and included user names, email addresses, social security numbers, SMS message, server logs and passwords from a variety of different internal sources. #> 345 In November 2015, <a href="http://www.troyhunt.com/2015/11/when-children-are-breached-inside.html" target="_blank" rel="noopener">hackers extracted more than 4.8 million parents' and 227k children's accounts from VTech's Learning Lodge website</a>. The Hong Kong company produces learning products for children including software sold via the compromised website. The data breach exposed extensive personal details including home addresses, security questions and answers and passwords stored as weak MD5 hashes. Furthermore, children's details including names, ages, genders and associations to their parents' records were also exposed. #> 346 In approximately February 2016, data surfaced which was allegedly obtained from <a href="http://vtightgel.com/" target="_blank" rel="noopener">V-Tight Gel (vaginal tightening gel)</a>. Whilst the data set was titled V-Tight, within there were <a href="https://pastebin.com/raw/pN7nyjJ7" target="_blank" rel="noopener">50 other (predominantly wellness-related) domain names</a>, most owned by the same entity. Multiple HIBP subscribers confirmed that although they couldn't recall providing data specifically to V-Tight, their personal information including name, phone and physical address was accurate. V-Tight Gel did not reply to multiple requests for comment. #> 347 In mid-2012, the real-time strategy game <a href="http://thewarinc.com" target="_blank" rel="noopener">War Inc.</a> suffered a data breach. The attack resulted in the exposure of over 1 million accounts including usernames, email addresses and salted MD5 hashes of passwords. #> 348 In November 2014, the online game <a href="http://motherboard.vice.com/read/gaming-site-warframe-hacked" target="_blank" rel="noopener">Warframe was hacked</a> and 819k unique email addresses were exposed. Allegedly due to a SQL injection flaw in Drupal, the attack exposed usernames, email addresses and data in a "pass" column which adheres to the salted SHA12 password hashing pattern used by Drupal 7. Digital Extremes (the developers of Warframe), asserts the salted hashes are of "alias names" rather than passwords. #> 349 In approximately December 2016, the online service for World of Warcraft private servers <a href="https://www.warmane.com" target="_blank" rel="noopener">Warmane</a> suffered a data breach. The incident exposed over 1.1M accounts including usernames, email addresses, dates of birth and salted MD5 password hashes. The data was subsequently extensively circulated online and was later provided to HIBP by whitehat security researcher and data analyst Adam Davies. #> 350 In November 2013, the image-based social network <a href="http://help.weheartit.com/customer/portal/articles/2889018" target="_blank" rel="noopener">We Heart It suffered a data breach</a>. The incident wasn't discovered until October 2017 when 8.6 million user records were sent to HIBP. The data contained user names, email addresses and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt. #> 351 In mid-2016, the telephone and address directory service <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">Whitepages was among a raft of sites that were breached and their data then sold in early-2019</a>. The data included over 11 million unique email addresses alongside names and passwords stored as either a SHA-1 or bcrypt hash. The data was provided to HIBP by a source who requested it to be attributed to &quot;BenjaminBlue@exploit.im&quot;. #> 352 In May 2012, the web hosting, billing and automation company <a href="http://news.softpedia.com/news/UGNazi-Leaks-1-7-GB-of-Data-from-WHMCS-Servers-270914.shtml" target="_blank" rel="noopener">WHMCS suffered a data breach</a> that exposed 134k email addresses. The breach included extensive information about customers and payment histories including partial credit card numbers. #> 353 In June 2019, <a href="https://futurezone.at/digital-life/wiener-buechereien-gehackt-daten-von-77000-nutzern-im-netz/400524190" target="_blank" rel="noopener">the library of Vienna (Wiener Büchereien) suffered a data breach</a>. The compromised data included 224k unique email addresses, names, physical addresses, phone numbers and dates of birth. The breached data was subsequently posted to Twitter by the alleged perpetrator of the breach. #> 354 In October 2018, the site dedicated to posting naked photos and other erotica of wives <a href="https://arstechnica.com/information-technology/2018/10/hack-on-8-adult-websites-exposes-oodles-of-intimate-user-data/" target="_blank" rel="noopener">Wife Lovers suffered a data breach</a>. The underlying database supported a total of 8 different adult websites and contained over 1.2M unique email addresses. <a href="https://web.archive.org/web/20181020185005/http://wifelovers.com/" target="_blank" rel="noopener">Wife Lovers acknowledged the breach</a> which impacted names, usernames, email and IP addresses and passwords hashed using the weak DEScrypt algorithm. The breach has been marked as &quot;sensitive&quot; due to the nature of the site. #> 355 In September 2015, the Nintendo Wii U forum known as <a href="http://www.wiiuiso.com" target="_blank" rel="noopener">WIIU ISO</a> was hacked and 458k accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. #> 356 In July 2015, the IP.Board forum for the gaming website <a href="http://www.wildstar-online.com" target="_blank" rel="noopener">WildStar</a> suffered a data breach that exposed over 738k forum members' accounts. The data was being actively traded on underground forums and included email addresses, birth dates and passwords. #> 357 In September 2013, the <a href="http://www.win7vista.com" target="_blank" rel="noopener">Win7Vista</a> Windows forum (since renamed to the "Beyond Windows 9" forum) was hacked and later <a href="http://leak.sx/thread-186933" target="_blank" rel="noopener">had its internal database dumped</a>. The dump included over 200k members’ personal information and other internal data extracted from the forum. #> 358 In August 2016, the mobile app to &quot;compare anything&quot; known as <a href="https://motherboard.vice.com/en_us/article/popular-teen-quiz-app-wishbone-has-been-hacked-exposing-tons-of-user-information" target="_blank" rel="noopener">Wishbone suffered a data breach</a>. The data contained 9.4 million records with 2.2 million unique email addresses and was allegedly a subset of the complete data set. The exposed data included genders, birthdates, email addresses and phone numbers for an audience predominantly composed of teenagers and young adults. #> 359 In November 2018, the WordPress sandboxing service that allows people to create temporary websites <a href="https://wpsandbox.io/" target="_blank" rel="noopener">WP Sandbox</a> discovered their service was being used to host a phishing site attempting to collect Microsoft OneDrive accounts. After identifying the malicious site, WP Sandbox took it offline, contacted the 858 people who provided information to it then self-submitted their addresses to HIBP. The phishing page requested both email addresses and passwords. #> 360 In January 2014, the <a href="http://www.wptapl.com" target="_blank" rel="noopener">World Poker Tour (WPT) Amateur Poker League website</a> was hacked by the Twitter user @smitt3nz. The attack resulted in the public disclosure of 175,000 accounts including 148,000 email addresses. The plain text password for each account was also included in the breach. #> 361 In November 2015, the online chatroom known as <a href="http://xat.com/databreach.html" target="_blank" rel="noopener">&quot;xat&quot; was hacked</a> and 6 million user accounts were exposed. Used as a chat engine on websites, the leaked data included usernames, email and IP addresses along with hashed passwords. #> 362 In approximately September 2015, the XBOX 360 forum known as <a href="http://www.xbox360iso.com" target="_blank" rel="noopener">XBOX360 ISO</a> was hacked and 1.2 million accounts were exposed. Along with email and IP addresses, the vBulletin forum also exposed salted MD5 password hashes. #> 363 In approximately February 2015, the Xbox forum known as <a href="http://xboxscene.com/" target="_blank" rel="noopener">Xbox-Scene</a> was hacked and more than 432k accounts were exposed. The IP.Board forum included IP addresses and passwords stored as salted hashes using a weak implementation enabling many to be rapidly cracked. #> 364 In November 2016, news broke that <a href="https://motherboard.vice.com/en_us/article/kb7kqx/hackers-are-trading-hundreds-of-thousands-of-xhamster-porn-account-details" target="_blank" rel="noopener">hackers were trading hundreds of thousands of xHamster porn account details</a>. In total, the data contained almost 380k unique user records including email addresses, usernames and unsalted MD5 password hashes. #> 365 In approximately early 2016, the gaming website <a href="http://www.xpgamesaves.com/" target="_blank" rel="noopener">Xpgamesaves</a> (XPG) suffered a data breach resulting in the exposure of 890k unique user records. The data contained email and IP addresses, usernames and salted MD5 hashes of passwords. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. This data was provided by security researcher and data analyst, Adam Davies. #> 366 In November 2013, the makers of gaming live streaming and recording software <a href="https://www.xsplit.com/blog/xsplit-password-reset-alert" target="_blank" rel="noopener">XSplit was compromised in an online attack</a>. The data breach leaked almost 3M names, email addresses, usernames and hashed passwords. #> 367 In July 2012, Yahoo! had their online publishing service &quot;Voices&quot; compromised via a SQL injection attack. The breach resulted in the disclosure of nearly half a million usernames and passwords stored in plain text. The breach showed that of the compromised accounts, a staggering <a href="http://www.troyhunt.com/2012/07/what-do-sony-and-yahoo-have-in-common.html" target="_blank" rel="noopener">59% of people who also had accounts in the Sony breach reused their passwords across both services</a>. #> 368 In September 2014, <a href="http://habrahabr.ru/post/235949/" target="_blank" rel="noopener">news broke of a massive leak of accounts from Yandex</a>, the Russian search engine giants who also provides email services. The purported million &quot;breached&quot; accounts were disclosed at the same time as nearly 5M mail.ru accounts with <a href="http://globalvoicesonline.org/2014/09/10/russia-email-yandex-mailru-passwords-hacking/" target="_blank" rel="noopener">both companies claiming the credentials were acquired via phishing scams</a> rather than being obtained as a result of direct attacks against their services. #> 369 In September 2013, the Indian bookings website known as <a href="https://www.yatra.com/" target="_blank" rel="noopener">Yatra</a> had 5 million records exposed in a data breach. The data contained email and physical addresses, dates of birth and phone numbers along with both PINs and passwords stored in plain text. The site was previously reported as compromised on the <a href="https://vigilante.pw/" target="_blank" rel="noopener">Vigilante.pw</a> breached database directory. #> 370 In late 2016, the online Chinese video service <a href="http://www.youku.com" target="_blank" rel="noopener">Youku</a> suffered a data breach. The incident exposed 92 million unique user accounts and corresponding MD5 password hashes. The data was contributed to Have I Been Pwned courtesy of rip@creep.im. #> 371 In February 2019, <a href="https://techcrunch.com/2019/02/14/hacker-strikes-again/" target="_blank" rel="noopener">data from the live broadcasting service YouNow appeared for sale on a dark web marketplace</a>. Whilst it's not clear what date the actual breach occurred on, the impacted data included 18M unique email addresses, IP addresses, names, usernames and links to social media profiles. As authentication is performed via social providers, no passwords were exposed in the breach. Many records didn't have associated email addresses thus the unique number is lower than the reported total number of accounts. The data was provided to HIBP by a source who requested it be attributed to &quot;JimScott.Sec@protonmail.com&quot;. #> 372 In February 2012, the adult website YouPorn <a href="http://www.huffingtonpost.com/2012/02/22/youporn-hacked-email-addresses-passwords_n_1294502.html" target="_blank" rel="noopener">had over 1.3M user accounts exposed in a data breach</a>. The publicly released data included both email addresses and plain text passwords. #> 373 In October and November 2018, <a href="https://blog.hackenproof.com/industry-news/new-report-unknown-data-scraper-breach/" target="_blank" rel="noopener">security researcher Bob Diachenko identified several unprotected MongoDB instances believed to be hosted by a data aggregator</a>. Containing a total of over 66M records, the owner of the data couldn't be identified but it is believed to have been scraped from LinkedIn hence the title &quot;You've Been Scraped&quot;. The exposed records included names, both work and personal email addresses, job titles and links to the individuals' LinkedIn profiles. #> 374 In December 2011, the Chinese dating site known as <a href="http://nic.xjtu.edu.cn/info/1018/1909.htm" target="_blank" rel="noopener">Zhenai.com suffered a data breach</a> that impacted 5 million subscribers. Whilst there is evidence that the data is legitimate, due to the difficulty of emphatically verifying the Chinese breach it has been flagged as &quot;unverified&quot;. The data in the breach contains email addresses and plain text passwords. <a href="https://www.troyhunt.com/handling-chinese-data-breaches-in-have-i-been-pwned/" target="_blank" rel="noopener">Read more about Chinese data breaches in Have I Been Pwned.</a> #> 375 In May 2017, the restaurant guide website <a href="https://www.hackread.com/zomato-hacked-17-million-accounts-sold-on-dark-web/" target="_blank" rel="noopener">Zomato was hacked</a> resulting in the exposure of almost 17 million accounts. The data was consequently redistributed online and contains email addresses, usernames and salted MD5 hashes of passwords (the password hash was not present on all accounts). This data was provided to HIBP by whitehat security researcher and data analyst Adam Davies. #> 376 In approximately 2011, an alleged breach of the dating website <a href="https://www.zoosk.com/" target="_blank" rel="noopener">Zoosk</a> began circulating. Comprised of almost 53 million records, the data contained email addresses and plain text passwords. However, during extensive verification in May 2016 <a href="https://www.troyhunt.com/heres-how-i-verify-data-breaches/" target="_blank" rel="noopener">no evidence could be found that the data was indeed sourced from the dating service</a>. This breach has consequently been flagged as <a href="https://www.troyhunt.com/introducing-fabricated-data-breaches-to-have-i-been-pwned" target="_blank" rel="noopener">fabricated</a>; it's highly unlikely the data was sourced from Zoosk. #> 377 In August 2016, <a href="http://www.zdnet.com/article/over-25-million-accounts-stolen-after-mail-ru-forums-raided-by-hackers/" target="_blank" rel="noopener">the Russian gaming site known as Пара Па (or parapa.mail.ru) was hacked</a> along with a number of other forums on the Russian mail provider, mail.ru. The vBulletin forum contained 4.9 million accounts including usernames, email addresses and passwords stored as salted MD5 hashes. #> 378 In May 2015, <a href="http://sprashivai.ru/" target="_blank" rel="noopener">Спрашивай.ру</a> (a the Russian website for anonymous reviews) was <a href="http://tjournal.ru/p/sprashivairu-passwords-leak" target="_blank" rel="noopener">reported to have had 6.7 million user details exposed</a> by a hacker known as &quot;w0rm&quot;. Intended to be a site for expressing anonymous opinions, the leaked data included email addresses, birth dates and other personally identifiable data about almost 3.5 million unique email addresses found in the leak. #> LogoPath #> 1 https://haveibeenpwned.com/Content/Images/PwnedLogos/000webhost.png #> 2 https://haveibeenpwned.com/Content/Images/PwnedLogos/126.png #> 3 https://haveibeenpwned.com/Content/Images/PwnedLogos/17Media.png #> 4 https://haveibeenpwned.com/Content/Images/PwnedLogos/17173.png #> 5 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 6 https://haveibeenpwned.com/Content/Images/PwnedLogos/2fast4u.png #> 7 https://haveibeenpwned.com/Content/Images/PwnedLogos/500px.png #> 8 https://haveibeenpwned.com/Content/Images/PwnedLogos/7k7k.png #> 9 https://haveibeenpwned.com/Content/Images/PwnedLogos/8fit.png #> 10 https://haveibeenpwned.com/Content/Images/PwnedLogos/8tracks.png #> 11 https://haveibeenpwned.com/Content/Images/PwnedLogos/Abandonia.png #> 12 https://haveibeenpwned.com/Content/Images/PwnedLogos/AbuseWithUs.png #> 13 https://haveibeenpwned.com/Content/Images/PwnedLogos/AcneOrg.png #> 14 https://haveibeenpwned.com/Content/Images/PwnedLogos/Adapt.png #> 15 https://haveibeenpwned.com/Content/Images/PwnedLogos/Adobe.png #> 16 https://haveibeenpwned.com/Content/Images/PwnedLogos/AdultFriendFinder.png #> 17 https://haveibeenpwned.com/Content/Images/PwnedLogos/AdultFanFiction.png #> 18 https://haveibeenpwned.com/Content/Images/PwnedLogos/AerServ.png #> 19 https://haveibeenpwned.com/Content/Images/PwnedLogos/AhaShare.png #> 20 https://haveibeenpwned.com/Content/Images/PwnedLogos/AIType.png #> 21 https://haveibeenpwned.com/Content/Images/PwnedLogos/Aipai.png #> 22 https://haveibeenpwned.com/Content/Images/PwnedLogos/AKP.png #> 23 https://haveibeenpwned.com/Content/Images/PwnedLogos/Ancestry.png #> 24 https://haveibeenpwned.com/Content/Images/PwnedLogos/AndroidForums.png #> 25 https://haveibeenpwned.com/Content/Images/PwnedLogos/Animoto.png #> 26 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 27 https://haveibeenpwned.com/Content/Images/PwnedLogos/Apollo.png #> 28 https://haveibeenpwned.com/Content/Images/PwnedLogos/Appartoo.png #> 29 https://haveibeenpwned.com/Content/Images/PwnedLogos/ArmyForceOnline.png #> 30 https://haveibeenpwned.com/Content/Images/PwnedLogos/AshleyMadison.png #> 31 https://haveibeenpwned.com/Content/Images/PwnedLogos/AstroPID.png #> 32 https://haveibeenpwned.com/Content/Images/PwnedLogos/Aternos.png #> 33 https://haveibeenpwned.com/Content/Images/PwnedLogos/AtlasQuantum.png #> 34 https://haveibeenpwned.com/Content/Images/PwnedLogos/Autocentrum.png #> 35 https://haveibeenpwned.com/Content/Images/PwnedLogos/Avast.png #> 36 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 37 https://haveibeenpwned.com/Content/Images/PwnedLogos/BabyNames.png #> 38 https://haveibeenpwned.com/Content/Images/PwnedLogos/Badoo.png #> 39 https://haveibeenpwned.com/Content/Images/PwnedLogos/BannerBit.png #> 40 https://haveibeenpwned.com/Content/Images/PwnedLogos/BattlefieldHeroes.png #> 41 https://haveibeenpwned.com/Content/Images/PwnedLogos/BeautifulPeople.png #> 42 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bell.png #> 43 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bell.png #> 44 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bestialitysextaboo.png #> 45 https://haveibeenpwned.com/Content/Images/PwnedLogos/BigMoneyJobs.png #> 46 https://haveibeenpwned.com/Content/Images/PwnedLogos/BinWeevils.png #> 47 https://haveibeenpwned.com/Content/Images/PwnedLogos/BiohackMe.png #> 48 https://haveibeenpwned.com/Content/Images/PwnedLogos/BTSec.png #> 49 https://haveibeenpwned.com/Content/Images/PwnedLogos/BitcoinTalk.png #> 50 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bitly.png #> 51 https://haveibeenpwned.com/Content/Images/PwnedLogos/BitTorrent.png #> 52 https://haveibeenpwned.com/Content/Images/PwnedLogos/BlackHatWorld.png #> 53 https://haveibeenpwned.com/Content/Images/PwnedLogos/BlackSpigotMC.png #> 54 https://haveibeenpwned.com/Content/Images/PwnedLogos/BlankMediaGames.png #> 55 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bolt.png #> 56 https://haveibeenpwned.com/Content/Images/PwnedLogos/BombujEu.png #> 57 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bookmate.png #> 58 https://haveibeenpwned.com/Content/Images/PwnedLogos/BotOfLegends.png #> 59 https://haveibeenpwned.com/Content/Images/PwnedLogos/Boxee.png #> 60 https://haveibeenpwned.com/Content/Images/PwnedLogos/Brazzers.png #> 61 https://haveibeenpwned.com/Content/Images/PwnedLogos/BTCE.png #> 62 https://haveibeenpwned.com/Content/Images/PwnedLogos/Bukalapak.png #> 63 https://haveibeenpwned.com/Content/Images/PwnedLogos/BusinessAcumen.png #> 64 https://haveibeenpwned.com/Content/Images/PwnedLogos/CafeMom.png #> 65 https://haveibeenpwned.com/Content/Images/PwnedLogos/CannabisForum.png #> 66 https://haveibeenpwned.com/Content/Images/PwnedLogos/CashCrate.png #> 67 https://haveibeenpwned.com/Content/Images/PwnedLogos/CDProjektRed.png #> 68 https://haveibeenpwned.com/Content/Images/PwnedLogos/CheapAssGamer.png #> 69 https://haveibeenpwned.com/Content/Images/PwnedLogos/CivilOnline.png #> 70 https://haveibeenpwned.com/Content/Images/PwnedLogos/ClixSense.png #> 71 https://haveibeenpwned.com/Content/Images/PwnedLogos/CloudPets.png #> 72 https://haveibeenpwned.com/Content/Images/PwnedLogos/ClubPenguinRewritten.png #> 73 https://haveibeenpwned.com/Content/Images/PwnedLogos/Coachella.png #> 74 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 75 https://haveibeenpwned.com/Content/Images/PwnedLogos/Comcast.png #> 76 https://haveibeenpwned.com/Content/Images/PwnedLogos/COMELEC.png #> 77 https://haveibeenpwned.com/Content/Images/PwnedLogos/CouponMomAndArmorGames.png #> 78 https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackCommunity.png #> 79 https://haveibeenpwned.com/Content/Images/PwnedLogos/CrackingForum.png #> 80 https://haveibeenpwned.com/Content/Images/PwnedLogos/Creative.png #> 81 https://haveibeenpwned.com/Content/Images/PwnedLogos/CrimeAgencyVBulletin.png #> 82 https://haveibeenpwned.com/Content/Images/PwnedLogos/CrossFire.png #> 83 https://haveibeenpwned.com/Content/Images/PwnedLogos/D3scene.png #> 84 https://haveibeenpwned.com/Content/Images/PwnedLogos/DaFont.png #> 85 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dailymotion.png #> 86 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dangdang.png #> 87 https://haveibeenpwned.com/Content/Images/PwnedLogos/DaniWeb.png #> 88 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 89 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 90 https://haveibeenpwned.com/Content/Images/PwnedLogos/DataCamp.png #> 91 https://haveibeenpwned.com/Content/Images/PwnedLogos/DemonForums.png #> 92 https://haveibeenpwned.com/Content/Images/PwnedLogos/devkitPro.png #> 93 https://haveibeenpwned.com/Content/Images/PwnedLogos/DietCom.png #> 94 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 95 https://haveibeenpwned.com/Content/Images/PwnedLogos/Disqus.png #> 96 https://haveibeenpwned.com/Content/Images/PwnedLogos/DLH.png #> 97 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dodonew.png #> 98 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dominos.png #> 99 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dropbox.png #> 100 https://haveibeenpwned.com/Content/Images/PwnedLogos/Dubsmash.png #> 101 https://haveibeenpwned.com/Content/Images/PwnedLogos/DDO.png #> 102 https://haveibeenpwned.com/Content/Images/PwnedLogos/Duowan.png #> 103 https://haveibeenpwned.com/Content/Images/PwnedLogos/DVDShopCH.png #> 104 https://haveibeenpwned.com/Content/Images/PwnedLogos/Edmodo.png #> 105 https://haveibeenpwned.com/Content/Images/PwnedLogos/Elance.png #> 106 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 107 https://haveibeenpwned.com/Content/Images/PwnedLogos/Emuparadise.png #> 108 https://haveibeenpwned.com/Content/Images/PwnedLogos/EpicGames.png #> 109 https://haveibeenpwned.com/Content/Images/PwnedLogos/Eroticy.png #> 110 https://haveibeenpwned.com/Content/Images/PwnedLogos/Estonia.png #> 111 https://haveibeenpwned.com/Content/Images/PwnedLogos/eThekwiniMunicipality.png #> 112 https://haveibeenpwned.com/Content/Images/PwnedLogos/Ethereum.png #> 113 https://haveibeenpwned.com/Content/Images/PwnedLogos/Evermotion.png #> 114 https://haveibeenpwned.com/Content/Images/PwnedLogos/EverybodyEdits.png #> 115 https://haveibeenpwned.com/Content/Images/PwnedLogos/Evite.png #> 116 https://haveibeenpwned.com/Content/Images/PwnedLogos/Evony.png #> 117 https://haveibeenpwned.com/Content/Images/PwnedLogos/Exactis.png #> 118 https://haveibeenpwned.com/Content/Images/PwnedLogos/Experian.png #> 119 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 120 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 121 https://haveibeenpwned.com/Content/Images/PwnedLogos/EyeEm.png #> 122 https://haveibeenpwned.com/Content/Images/PwnedLogos/Facepunch.png #> 123 https://haveibeenpwned.com/Content/Images/PwnedLogos/FaceUP.png #> 124 https://haveibeenpwned.com/Content/Images/PwnedLogos/WhiteRoom.png #> 125 https://haveibeenpwned.com/Content/Images/PwnedLogos/FashionFantasyGame.png #> 126 https://haveibeenpwned.com/Content/Images/PwnedLogos/FFShrine.png #> 127 https://haveibeenpwned.com/Content/Images/PwnedLogos/FlashFlashRevolution.png #> 128 https://haveibeenpwned.com/Content/Images/PwnedLogos/Flashback.png #> 129 https://haveibeenpwned.com/Content/Images/PwnedLogos/Fling.png #> 130 https://haveibeenpwned.com/Content/Images/PwnedLogos/FLVS.png #> 131 https://haveibeenpwned.com/Content/Images/PwnedLogos/Forbes.png #> 132 https://haveibeenpwned.com/Content/Images/PwnedLogos/ForumCommunity.png #> 133 https://haveibeenpwned.com/Content/Images/PwnedLogos/FoxyBingo.png #> 134 https://haveibeenpwned.com/Content/Images/PwnedLogos/FreedomHostingII.png #> 135 https://haveibeenpwned.com/Content/Images/PwnedLogos/FreshMenu.png #> 136 https://haveibeenpwned.com/Content/Images/PwnedLogos/Fridae.png #> 137 https://haveibeenpwned.com/Content/Images/PwnedLogos/Funimation.png #> 138 https://haveibeenpwned.com/Content/Images/PwnedLogos/FunnyGames.png #> 139 https://haveibeenpwned.com/Content/Images/PwnedLogos/FurAffinity.png #> 140 https://haveibeenpwned.com/Content/Images/PwnedLogos/Gaadi.png #> 141 https://haveibeenpwned.com/Content/Images/PwnedLogos/GamerzPlanet.png #> 142 https://haveibeenpwned.com/Content/Images/PwnedLogos/GameTuts.png #> 143 https://haveibeenpwned.com/Content/Images/PwnedLogos/Gamigo.png #> 144 https://haveibeenpwned.com/Content/Images/PwnedLogos/Gawker.png #> 145 https://haveibeenpwned.com/Content/Images/PwnedLogos/GeekedIn.png #> 146 https://haveibeenpwned.com/Content/Images/PwnedLogos/GFAN.png #> 147 https://haveibeenpwned.com/Content/Images/PwnedLogos/GoldSilver.png #> 148 https://haveibeenpwned.com/Content/Images/PwnedLogos/gPotato.png #> 149 https://haveibeenpwned.com/Content/Images/PwnedLogos/GTAGaming.png #> 150 https://haveibeenpwned.com/Content/Images/PwnedLogos/Playgar.png #> 151 https://haveibeenpwned.com/Content/Images/PwnedLogos/HackForums.png #> 152 https://haveibeenpwned.com/Content/Images/PwnedLogos/HackingTeam.png #> 153 https://haveibeenpwned.com/Content/Images/PwnedLogos/HauteLook.png #> 154 https://haveibeenpwned.com/Content/Images/PwnedLogos/HealthNowNetworks.png #> 155 https://haveibeenpwned.com/Content/Images/PwnedLogos/Hemmakvall.png #> 156 https://haveibeenpwned.com/Content/Images/PwnedLogos/Hemmelig.png #> 157 https://haveibeenpwned.com/Content/Images/PwnedLogos/HeroesOfGaia.png #> 158 https://haveibeenpwned.com/Content/Images/PwnedLogos/HeroesOfNewerth.png #> 159 https://haveibeenpwned.com/Content/Images/PwnedLogos/HIAPK.png #> 160 https://haveibeenpwned.com/Content/Images/PwnedLogos/HLTV.png #> 161 https://haveibeenpwned.com/Content/Images/PwnedLogos/HongFire.png #> 162 https://haveibeenpwned.com/Content/Images/PwnedLogos/HoundDawgs.png #> 163 https://haveibeenpwned.com/Content/Images/PwnedLogos/Houzz.png #> 164 https://haveibeenpwned.com/Content/Images/PwnedLogos/HTHStudios.png #> 165 https://haveibeenpwned.com/Content/Images/PwnedLogos/Hub4Tech.png #> 166 https://haveibeenpwned.com/Content/Images/PwnedLogos/iDressup.png #> 167 https://haveibeenpwned.com/Content/Images/PwnedLogos/ILikeCheats.png #> 168 https://haveibeenpwned.com/Content/Images/PwnedLogos/iMesh.png #> 169 https://haveibeenpwned.com/Content/Images/PwnedLogos/imgur.png #> 170 https://haveibeenpwned.com/Content/Images/PwnedLogos/Insanelyi.png #> 171 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 172 https://haveibeenpwned.com/Content/Images/PwnedLogos/Interpals.png #> 173 https://haveibeenpwned.com/Content/Images/PwnedLogos/iPmart.png #> 174 https://haveibeenpwned.com/Content/Images/PwnedLogos/ixigo.png #> 175 https://haveibeenpwned.com/Content/Images/PwnedLogos/JobStreet.png #> 176 https://haveibeenpwned.com/Content/Images/PwnedLogos/JoomlArt.png #> 177 https://haveibeenpwned.com/Content/Images/PwnedLogos/JustDate.png #> 178 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 179 https://haveibeenpwned.com/Content/Images/PwnedLogos/Kickstarter.png #> 180 https://haveibeenpwned.com/Content/Images/PwnedLogos/Kimsufi.png #> 181 https://haveibeenpwned.com/Content/Images/PwnedLogos/KMRU.png #> 182 https://haveibeenpwned.com/Content/Images/PwnedLogos/KnownCircle.png #> 183 https://haveibeenpwned.com/Content/Images/PwnedLogos/Knuddels.png #> 184 https://haveibeenpwned.com/Content/Images/PwnedLogos/Lanwar.png #> 185 https://haveibeenpwned.com/Content/Images/PwnedLogos/Lastfm.png #> 186 https://haveibeenpwned.com/Content/Images/PwnedLogos/LeagueOfLegends.png #> 187 https://haveibeenpwned.com/Content/Images/PwnedLogos/Leet.png #> 188 https://haveibeenpwned.com/Content/Images/PwnedLogos/Lifeboat.png #> 189 https://haveibeenpwned.com/Content/Images/PwnedLogos/LightsHope.png #> 190 https://haveibeenpwned.com/Content/Images/PwnedLogos/LinkedIn.png #> 191 https://haveibeenpwned.com/Content/Images/PwnedLogos/LinuxForums.png #> 192 https://haveibeenpwned.com/Content/Images/PwnedLogos/LinuxMint.png #> 193 https://haveibeenpwned.com/Content/Images/PwnedLogos/LittleMonsters.png #> 194 https://haveibeenpwned.com/Content/Images/PwnedLogos/LizardSquad.png #> 195 https://haveibeenpwned.com/Content/Images/PwnedLogos/Lookbook.png #> 196 https://haveibeenpwned.com/Content/Images/PwnedLogos/LOTR.png #> 197 https://haveibeenpwned.com/Content/Images/PwnedLogos/LoungeBoard.png #> 198 https://haveibeenpwned.com/Content/Images/PwnedLogos/LyricsMania.png #> 199 https://haveibeenpwned.com/Content/Images/PwnedLogos/MacForums.png #> 200 https://haveibeenpwned.com/Content/Images/PwnedLogos/Mac-Torrents.png #> 201 https://haveibeenpwned.com/Content/Images/PwnedLogos/MailRu.png #> 202 https://haveibeenpwned.com/Content/Images/PwnedLogos/MajorGeeks.png #> 203 https://haveibeenpwned.com/Content/Images/PwnedLogos/MallCZ.png #> 204 https://haveibeenpwned.com/Content/Images/PwnedLogos/Malwarebytes.png #> 205 https://haveibeenpwned.com/Content/Images/PwnedLogos/MangaTraders.png #> 206 https://haveibeenpwned.com/Content/Images/PwnedLogos/MangaFox.png #> 207 https://haveibeenpwned.com/Content/Images/PwnedLogos/Mappery.png #> 208 https://haveibeenpwned.com/Content/Images/PwnedLogos/MasterDeeds.png #> 209 https://haveibeenpwned.com/Content/Images/PwnedLogos/Mate1.png #> 210 https://haveibeenpwned.com/Content/Images/PwnedLogos/MCBans.png #> 211 https://haveibeenpwned.com/Content/Images/PwnedLogos/MDPI.png #> 212 https://haveibeenpwned.com/Content/Images/PwnedLogos/MindJolt.png #> 213 https://haveibeenpwned.com/Content/Images/PwnedLogos/MinecraftPocketEditionForum.png #> 214 https://haveibeenpwned.com/Content/Images/PwnedLogos/MinecraftWorldMap.png #> 215 https://haveibeenpwned.com/Content/Images/PwnedLogos/Minefield.png #> 216 https://haveibeenpwned.com/Content/Images/PwnedLogos/MoDaCo.png #> 217 https://haveibeenpwned.com/Content/Images/PwnedLogos/ModernBusinessSolutions.png #> 218 https://haveibeenpwned.com/Content/Images/PwnedLogos/MoneyBookers.png #> 219 https://haveibeenpwned.com/Content/Images/PwnedLogos/MoreleNet.png #> 220 https://haveibeenpwned.com/Content/Images/PwnedLogos/MortalOnline.png #> 221 https://haveibeenpwned.com/Content/Images/PwnedLogos/MPGH.png #> 222 https://haveibeenpwned.com/Content/Images/PwnedLogos/MrExcel.png #> 223 https://haveibeenpwned.com/Content/Images/PwnedLogos/mSpy.png #> 224 https://haveibeenpwned.com/Content/Images/PwnedLogos/MuslimDirectory.png #> 225 https://haveibeenpwned.com/Content/Images/PwnedLogos/MuslimMatch.png #> 226 https://haveibeenpwned.com/Content/Images/PwnedLogos/MyFHA.png #> 227 https://haveibeenpwned.com/Content/Images/PwnedLogos/MyFitnessPal.png #> 228 https://haveibeenpwned.com/Content/Images/PwnedLogos/MyHeritage.png #> 229 https://haveibeenpwned.com/Content/Images/PwnedLogos/myRepoSpace.png #> 230 https://haveibeenpwned.com/Content/Images/PwnedLogos/MySpace.png #> 231 https://haveibeenpwned.com/Content/Images/PwnedLogos/MyVidster.png #> 232 https://haveibeenpwned.com/Content/Images/PwnedLogos/NapsGear.png #> 233 https://haveibeenpwned.com/Content/Images/PwnedLogos/NaughtyAmerica.png #> 234 https://haveibeenpwned.com/Content/Images/PwnedLogos/NemoWeb.png #> 235 https://haveibeenpwned.com/Content/Images/PwnedLogos/Neopets.png #> 236 https://haveibeenpwned.com/Content/Images/PwnedLogos/NetEase.png #> 237 https://haveibeenpwned.com/Content/Images/PwnedLogos/Neteller.png #> 238 https://haveibeenpwned.com/Content/Images/PwnedLogos/Netlog.png #> 239 https://haveibeenpwned.com/Content/Images/PwnedLogos/NetProspex.png #> 240 https://haveibeenpwned.com/Content/Images/PwnedLogos/Netshoes.png #> 241 https://haveibeenpwned.com/Content/Images/PwnedLogos/NextGenUpdate.png #> 242 https://haveibeenpwned.com/Content/Images/PwnedLogos/NexusMods.png #> 243 https://haveibeenpwned.com/Content/Images/PwnedLogos/Nihonomaru.png #> 244 https://haveibeenpwned.com/Content/Images/PwnedLogos/Nival.png #> 245 https://haveibeenpwned.com/Content/Images/PwnedLogos/NonNudeGirls.png #> 246 https://haveibeenpwned.com/Content/Images/PwnedLogos/Nulled.png #> 247 https://haveibeenpwned.com/Content/Images/PwnedLogos/OGUsers.png #> 248 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 249 https://haveibeenpwned.com/Content/Images/PwnedLogos/Onverse.png #> 250 https://haveibeenpwned.com/Content/Images/PwnedLogos/OpenCSGO.png #> 251 https://haveibeenpwned.com/Content/Images/PwnedLogos/OrdineAvvocatiDiRoma.png #> 252 https://haveibeenpwned.com/Content/Images/PwnedLogos/OVH.png #> 253 https://haveibeenpwned.com/Content/Images/PwnedLogos/OwnedCore.png #> 254 https://haveibeenpwned.com/Content/Images/PwnedLogos/PaddyPower.png #> 255 https://haveibeenpwned.com/Content/Images/PwnedLogos/Patreon.png #> 256 https://haveibeenpwned.com/Content/Images/PwnedLogos/PayAsUGym.png #> 257 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 258 https://haveibeenpwned.com/Content/Images/PwnedLogos/PHPFreaks.png #> 259 https://haveibeenpwned.com/Content/Images/PwnedLogos/PixelFederation.png #> 260 https://haveibeenpwned.com/Content/Images/PwnedLogos/piZap.png #> 261 https://haveibeenpwned.com/Content/Images/PwnedLogos/Plex.png #> 262 https://haveibeenpwned.com/Content/Images/PwnedLogos/Pokebip.png #> 263 https://haveibeenpwned.com/Content/Images/PwnedLogos/PokemonCreed.png #> 264 https://haveibeenpwned.com/Content/Images/PwnedLogos/PokemonNegro.png #> 265 https://haveibeenpwned.com/Content/Images/PwnedLogos/PoliceOne.png #> 266 https://haveibeenpwned.com/Content/Images/PwnedLogos/Powerbot.png #> 267 https://haveibeenpwned.com/Content/Images/PwnedLogos/ProgrammingForums.png #> 268 https://haveibeenpwned.com/Content/Images/PwnedLogos/PS3Hax.png #> 269 https://haveibeenpwned.com/Content/Images/PwnedLogos/PSPISO.png #> 270 https://haveibeenpwned.com/Content/Images/PwnedLogos/PSX-Scene.png #> 271 https://haveibeenpwned.com/Content/Images/PwnedLogos/QatarNationalBank.png #> 272 https://haveibeenpwned.com/Content/Images/PwnedLogos/QIP.png #> 273 https://haveibeenpwned.com/Content/Images/PwnedLogos/QuantumBooter.png #> 274 https://haveibeenpwned.com/Content/Images/PwnedLogos/QuinStreet.png #> 275 https://haveibeenpwned.com/Content/Images/PwnedLogos/R2Games.png #> 276 https://haveibeenpwned.com/Content/Images/PwnedLogos/R2Games.png #> 277 https://haveibeenpwned.com/Content/Images/PwnedLogos/Rambler.png #> 278 https://haveibeenpwned.com/Content/Images/PwnedLogos/Rankwatch.png #> 279 https://haveibeenpwned.com/Content/Images/PwnedLogos/RbxRocks.png #> 280 https://haveibeenpwned.com/Content/Images/PwnedLogos/RealEstateMogul.png #> 281 https://haveibeenpwned.com/Content/Images/PwnedLogos/BlueSnapRegpack.png #> 282 https://haveibeenpwned.com/Content/Images/PwnedLogos/RetinaX.png #> 283 https://haveibeenpwned.com/Content/Images/PwnedLogos/Reverb-Nation.png #> 284 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 285 https://haveibeenpwned.com/Content/Images/PwnedLogos/RosebuttBoard.png #> 286 https://haveibeenpwned.com/Content/Images/PwnedLogos/RussianAmerica.png #> 287 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 288 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 289 https://haveibeenpwned.com/Content/Images/PwnedLogos/Seedpeer.png #> 290 https://haveibeenpwned.com/Content/Images/PwnedLogos/ServerPact.png #> 291 https://haveibeenpwned.com/Content/Images/PwnedLogos/ShareThis.png #> 292 https://haveibeenpwned.com/Content/Images/PwnedLogos/SHEIN.png #> 293 https://haveibeenpwned.com/Content/Images/PwnedLogos/Shotbow.png #> 294 https://haveibeenpwned.com/Content/Images/PwnedLogos/SkTorrent.png #> 295 https://haveibeenpwned.com/Content/Images/PwnedLogos/Smogon.png #> 296 https://haveibeenpwned.com/Content/Images/PwnedLogos/Snapchat.png #> 297 https://haveibeenpwned.com/Content/Images/PwnedLogos/SocialEngineered.png #> 298 https://haveibeenpwned.com/Content/Images/PwnedLogos/SIAE.png #> 299 https://haveibeenpwned.com/Content/Images/PwnedLogos/Sony.png #> 300 https://haveibeenpwned.com/Content/Images/PwnedLogos/Soundwave.png #> 301 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 302 https://haveibeenpwned.com/Content/Images/PwnedLogos/Spirol.png #> 303 https://haveibeenpwned.com/Content/Images/PwnedLogos/SpyFone.png #> 304 https://haveibeenpwned.com/Content/Images/PwnedLogos/Staminus.png #> 305 https://haveibeenpwned.com/Content/Images/PwnedLogos/StarNet.png #> 306 https://haveibeenpwned.com/Content/Images/PwnedLogos/SterKinekor.png #> 307 https://haveibeenpwned.com/Content/Images/PwnedLogos/Stratfor.png #> 308 https://haveibeenpwned.com/Content/Images/PwnedLogos/SumoTorrent.png #> 309 https://haveibeenpwned.com/Content/Images/PwnedLogos/SvenskaMagic.png #> 310 https://haveibeenpwned.com/Content/Images/PwnedLogos/SweClockers.png #> 311 https://haveibeenpwned.com/Content/Images/PwnedLogos/Taobao.png #> 312 https://haveibeenpwned.com/Content/Images/PwnedLogos/Taringa.png #> 313 https://haveibeenpwned.com/Content/Images/PwnedLogos/Solomid.png #> 314 https://haveibeenpwned.com/Content/Images/PwnedLogos/Technic.png #> 315 https://haveibeenpwned.com/Content/Images/PwnedLogos/TRAI.png #> 316 https://haveibeenpwned.com/Content/Images/PwnedLogos/Teracod.png #> 317 https://haveibeenpwned.com/Content/Images/PwnedLogos/Tesco.png #> 318 https://haveibeenpwned.com/Content/Images/PwnedLogos/TGBUS.png #> 319 https://haveibeenpwned.com/Content/Images/PwnedLogos/TheCandidBoard.png #> 320 https://haveibeenpwned.com/Content/Images/PwnedLogos/TheFappening.png #> 321 https://haveibeenpwned.com/Content/Images/PwnedLogos/TheFlyOnTheWall.png #> 322 https://haveibeenpwned.com/Content/Images/PwnedLogos/TheTVDB.png #> 323 https://haveibeenpwned.com/Content/Images/PwnedLogos/ThisHabboForum.png #> 324 https://haveibeenpwned.com/Content/Images/PwnedLogos/Tianya.png #> 325 https://haveibeenpwned.com/Content/Images/PwnedLogos/Ticketfly.png #> 326 https://haveibeenpwned.com/Content/Images/PwnedLogos/TorrentInvites.png #> 327 https://haveibeenpwned.com/Content/Images/PwnedLogos/Email.png #> 328 https://haveibeenpwned.com/Content/Images/PwnedLogos/Trillian.png #> 329 https://haveibeenpwned.com/Content/Images/PwnedLogos/TruckersMP.png #> 330 https://haveibeenpwned.com/Content/Images/PwnedLogos/Tumblr.png #> 331 https://haveibeenpwned.com/Content/Images/PwnedLogos/Uiggy.png #> 332 https://haveibeenpwned.com/Content/Images/PwnedLogos/IGF.png #> 333 https://haveibeenpwned.com/Content/Images/PwnedLogos/UnderworldEmpire.png #> 334 https://haveibeenpwned.com/Content/Images/PwnedLogos/UnrealEngine.png #> 335 https://haveibeenpwned.com/Content/Images/PwnedLogos/uTorrent.png #> 336 https://haveibeenpwned.com/Content/Images/PwnedLogos/uuu9.png #> 337 https://haveibeenpwned.com/Content/Images/PwnedLogos/VBulletin.png #> 338 https://haveibeenpwned.com/Content/Images/PwnedLogos/VerificationsIO.png #> 339 https://haveibeenpwned.com/Content/Images/PwnedLogos/Verified.png #> 340 https://haveibeenpwned.com/Content/Images/PwnedLogos/VictoryPhones.png #> 341 https://haveibeenpwned.com/Content/Images/PwnedLogos/ViewFines.png #> 342 https://haveibeenpwned.com/Content/Images/PwnedLogos/VK.png #> 343 https://haveibeenpwned.com/Content/Images/PwnedLogos/VNG.png #> 344 https://haveibeenpwned.com/Content/Images/PwnedLogos/Vodafone.png #> 345 https://haveibeenpwned.com/Content/Images/PwnedLogos/VTech.png #> 346 https://haveibeenpwned.com/Content/Images/PwnedLogos/VTightGel.png #> 347 https://haveibeenpwned.com/Content/Images/PwnedLogos/WarInc.png #> 348 https://haveibeenpwned.com/Content/Images/PwnedLogos/Warframe.png #> 349 https://haveibeenpwned.com/Content/Images/PwnedLogos/Warmane.png #> 350 https://haveibeenpwned.com/Content/Images/PwnedLogos/WeHeartIt.png #> 351 https://haveibeenpwned.com/Content/Images/PwnedLogos/Whitepages.png #> 352 https://haveibeenpwned.com/Content/Images/PwnedLogos/WHMCS.png #> 353 https://haveibeenpwned.com/Content/Images/PwnedLogos/WienerBuchereien.png #> 354 https://haveibeenpwned.com/Content/Images/PwnedLogos/WifeLovers.png #> 355 https://haveibeenpwned.com/Content/Images/PwnedLogos/WIIUISO.png #> 356 https://haveibeenpwned.com/Content/Images/PwnedLogos/WildStar.png #> 357 https://haveibeenpwned.com/Content/Images/PwnedLogos/Win7Vista.png #> 358 https://haveibeenpwned.com/Content/Images/PwnedLogos/Wishbone.png #> 359 https://haveibeenpwned.com/Content/Images/PwnedLogos/WPSandbox.png #> 360 https://haveibeenpwned.com/Content/Images/PwnedLogos/WPT.png #> 361 https://haveibeenpwned.com/Content/Images/PwnedLogos/xat.png #> 362 https://haveibeenpwned.com/Content/Images/PwnedLogos/Xbox360ISO.png #> 363 https://haveibeenpwned.com/Content/Images/PwnedLogos/Xbox-Scene.png #> 364 https://haveibeenpwned.com/Content/Images/PwnedLogos/xHamster.png #> 365 https://haveibeenpwned.com/Content/Images/PwnedLogos/XPGameSaves.png #> 366 https://haveibeenpwned.com/Content/Images/PwnedLogos/XSplit.png #> 367 https://haveibeenpwned.com/Content/Images/PwnedLogos/Yahoo.png #> 368 https://haveibeenpwned.com/Content/Images/PwnedLogos/Yandex.png #> 369 https://haveibeenpwned.com/Content/Images/PwnedLogos/Yatra.png #> 370 https://haveibeenpwned.com/Content/Images/PwnedLogos/Youku.png #> 371 https://haveibeenpwned.com/Content/Images/PwnedLogos/YouNow.png #> 372 https://haveibeenpwned.com/Content/Images/PwnedLogos/YouPorn.png #> 373 https://haveibeenpwned.com/Content/Images/PwnedLogos/List.png #> 374 https://haveibeenpwned.com/Content/Images/PwnedLogos/Zhenai.png #> 375 https://haveibeenpwned.com/Content/Images/PwnedLogos/Zomato.png #> 376 https://haveibeenpwned.com/Content/Images/PwnedLogos/Zoosk.png #> 377 https://haveibeenpwned.com/Content/Images/PwnedLogos/Parapa.png #> 378 https://haveibeenpwned.com/Content/Images/PwnedLogos/SprashivaiRu.png #> DataClasses #> 1 Email addresses, IP addresses, Names, Passwords #> 2 Email addresses, Passwords #> 3 Device information, Email addresses, IP addresses, Passwords, Usernames #> 4 Email addresses, Passwords, Usernames #> 5 Email addresses, Passwords #> 6 Email addresses, Passwords, Usernames #> 7 Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames #> 8 Email addresses, Passwords, Usernames #> 9 Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords #> 10 Email addresses, Passwords #> 11 Email addresses, IP addresses, Passwords, Usernames #> 12 Email addresses, IP addresses, Passwords, Usernames #> 13 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 14 Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses, Social media profiles #> 15 Email addresses, Password hints, Passwords, Usernames #> 16 Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Races, Relationship statuses, Sexual orientations, Spoken languages, Usernames #> 17 Dates of birth, Email addresses, Names, Passwords #> 18 Email addresses, Employers, Job titles, Names, Passwords, Phone numbers, Physical addresses #> 19 Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames, Website activity, Years of birth #> 20 Address book contacts, Apps installed on devices, Cellular network names, Dates of birth, Device information, Email addresses, Genders, Geographic locations, IMEI numbers, IMSI numbers, IP addresses, Names, Phone numbers, Profile photos, Social media profiles #> 21 Email addresses, Passwords #> 22 Email addresses, Email messages #> 23 Email addresses, Passwords #> 24 Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords #> 25 Dates of birth, Email addresses, Geographic locations, Names, Passwords #> 26 Email addresses, Passwords #> 27 Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Salutations, Social media profiles #> 28 Ages, Auth tokens, Email addresses, Employment statuses, Genders, IP addresses, Marital statuses, Names, Passwords, Physical addresses, Private messages, Social media profiles #> 29 Avatars, Email addresses, Geographic locations, IP addresses, Names, Passwords, Usernames, Website activity #> 30 Dates of birth, Email addresses, Ethnicities, Genders, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Security questions and answers, Sexual orientations, Usernames, Website activity #> 31 Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity #> 32 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 33 Account balances, Email addresses, Names, Phone numbers #> 34 Email addresses, Passwords #> 35 Email addresses, Passwords, Usernames #> 36 Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses #> 37 Email addresses, Passwords #> 38 Dates of birth, Email addresses, Genders, Names, Passwords, Usernames #> 39 Email addresses, Passwords #> 40 Passwords, Usernames #> 41 Beauty ratings, Car ownership statuses, Dates of birth, Drinking habits, Education levels, Email addresses, Genders, Geographic locations, Home ownership statuses, Income levels, IP addresses, Job titles, Names, Passwords, Personal descriptions, Personal interests, Physical attributes, Sexual orientations, Smoking habits, Website activity #> 42 Credit cards, Genders, Passwords, Usernames #> 43 Email addresses, Geographic locations, IP addresses, Job titles, Names, Passwords, Phone numbers, Spoken languages, Survey results, Usernames #> 44 Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Private messages, Usernames #> 45 Career levels, Education levels, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Salutations, User website URLs, Website activity #> 46 Ages, Email addresses, Genders, IP addresses, Passwords, Usernames #> 47 Email addresses, Passwords, Private messages, Usernames #> 48 Email addresses, Passwords #> 49 Dates of birth, Email addresses, Genders, IP addresses, Passwords, Security questions and answers, Usernames, Website activity #> 50 Email addresses, Passwords, Usernames #> 51 Email addresses, IP addresses, Passwords, Usernames #> 52 Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Usernames, Website activity #> 53 Device information, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Usernames #> 54 Browser user agent details, Email addresses, IP addresses, Passwords, Purchases, Usernames, Website activity #> 55 Email addresses, IP addresses, Passwords, Usernames #> 56 Email addresses, Passwords #> 57 Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Usernames #> 58 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 59 Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, User website URLs, Usernames #> 60 Email addresses, Passwords, Usernames #> 61 Account balances, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 62 Email addresses, IP addresses, Names, Passwords, Usernames #> 63 Email addresses, Names, Passwords, Usernames, Website activity #> 64 Email addresses, Passwords #> 65 Dates of birth, Email addresses, Geographic locations, Historical passwords, Instant messenger identities, IP addresses, Passwords, Private messages, Usernames, Website activity #> 66 Email addresses, Names, Passwords, Physical addresses #> 67 Email addresses, Passwords, Usernames #> 68 Email addresses, IP addresses, Passwords, Usernames #> 69 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 70 Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Payment histories, Payment methods, Physical addresses, Usernames, Website activity #> 71 Email addresses, Family members' names, Passwords #> 72 Email addresses, IP addresses, Passwords, Usernames #> 73 Email addresses, IP addresses, Passwords, Usernames #> 74 Email addresses, Passwords #> 75 Email addresses, Passwords, Physical addresses #> 76 Biometric data, Dates of birth, Email addresses, Family members' names, Genders, Job titles, Marital statuses, Names, Passport numbers, Phone numbers, Physical addresses, Physical attributes #> 77 Email addresses, Passwords #> 78 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 79 Email addresses, IP addresses, Passwords, Usernames #> 80 Email addresses, IP addresses, Passwords, Usernames #> 81 Email addresses, Passwords, Usernames #> 82 Email addresses, Passwords, Usernames #> 83 Email addresses, IP addresses, Passwords, Usernames #> 84 Email addresses, Passwords, Usernames #> 85 Email addresses, Passwords, Usernames #> 86 Email addresses #> 87 Email addresses, IP addresses, Passwords #> 88 Email addresses, Employers, IP addresses, Job titles, Names, Phone numbers, Physical addresses #> 89 Buying preferences, Charitable donations, Credit status information, Dates of birth, Email addresses, Family structure, Financial investments, Home ownership statuses, Income levels, Job titles, Marital statuses, Names, Net worths, Phone numbers, Physical addresses, Political donations #> 90 Email addresses, Geographic locations, IP addresses, Names, Passwords #> 91 Email addresses, Passwords, Usernames #> 92 Email addresses, Passwords, Private messages #> 93 Dates of birth, Eating habits, Email addresses, IP addresses, Names, Passwords, Physical attributes, Usernames #> 94 Email addresses, Email messages, IP addresses, Names #> 95 Email addresses, Passwords, Usernames #> 96 Dates of birth, Email addresses, Names, Passwords, Usernames, Website activity #> 97 Email addresses, Usernames #> 98 Email addresses, Names, Passwords, Phone numbers, Physical addresses #> 99 Email addresses, Passwords #> 100 Email addresses, Geographic locations, Names, Passwords, Phone numbers, Spoken languages, Usernames #> 101 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 102 Email addresses, Passwords, Usernames #> 103 Email addresses, Passwords #> 104 Email addresses, Passwords, Usernames #> 105 Email addresses, Employers, Geographic locations, Passwords, Phone numbers, Usernames #> 106 Email addresses, Employers, Names, Physical addresses #> 107 Email addresses, IP addresses, Passwords, Usernames #> 108 Email addresses, Passwords, Usernames #> 109 Email addresses, IP addresses, Names, Passwords, Payment histories, Phone numbers, Physical addresses, Usernames, Website activity #> 110 Email addresses, Passwords #> 111 Dates of birth, Deceased date, Email addresses, Genders, Government issued IDs, Names, Passport numbers, Passwords, Phone numbers, Physical addresses, Utility bills #> 112 Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity #> 113 Dates of birth, Email addresses, Passwords, Usernames #> 114 Email addresses, IP addresses, Usernames #> 115 Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses #> 116 Email addresses, IP addresses, Passwords, Usernames #> 117 Credit status information, Dates of birth, Education levels, Email addresses, Ethnicities, Family structure, Financial investments, Genders, Home ownership statuses, Income levels, IP addresses, Marital statuses, Names, Net worths, Occupations, Personal interests, Phone numbers, Physical addresses, Religions, Spoken languages #> 118 Credit status information, Dates of birth, Email addresses, Ethnicities, Family structure, Genders, Home ownership statuses, Income levels, IP addresses, Names, Phone numbers, Physical addresses, Purchasing habits #> 119 Email addresses, Passwords #> 120 Dates of birth, Email addresses, Family structure, Genders, Names, Phone numbers, Physical addresses, Vehicle details #> 121 Bios, Email addresses, Names, Passwords, Usernames #> 122 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 123 Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Usernames #> 124 Browser user agent details, Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases #> 125 Email addresses, Passwords #> 126 Email addresses, Passwords, Usernames, Website activity #> 127 Email addresses, Passwords, Usernames #> 128 Email addresses, Government issued IDs, Physical addresses #> 129 Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Phone numbers, Sexual fetishes, Sexual orientations, Usernames, Website activity #> 130 Dates of birth, Email addresses, Names, Passwords, School grades (class levels), Usernames #> 131 Email addresses, Passwords, User website URLs, Usernames #> 132 Email addresses, Passwords, Usernames #> 133 Account balances, Browser user agent details, Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Usernames, Website activity #> 134 Email addresses, Passwords, Usernames #> 135 Device information, Email addresses, Names, Phone numbers, Physical addresses, Purchases #> 136 Email addresses, Passwords, Usernames, Website activity #> 137 Dates of birth, Email addresses, Passwords, Usernames #> 138 Email addresses, IP addresses, Passwords, Usernames #> 139 Email addresses, Passwords, Usernames #> 140 Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Phone numbers, Usernames #> 141 Email addresses, IP addresses, Passwords, Usernames #> 142 Email addresses, IP addresses, Passwords, Usernames #> 143 Email addresses, Passwords #> 144 Email addresses, Passwords, Usernames #> 145 Email addresses, Geographic locations, Names, Professional skills, Usernames, Years of professional experience #> 146 Email addresses, IP addresses, Passwords, Usernames #> 147 Bank account numbers, Email addresses, IP addresses, Names, Partial credit card data, Passport numbers, Phone numbers, Physical addresses, Purchases, Security questions and answers, Social security numbers #> 148 Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Physical addresses, Security questions and answers, Usernames, Website activity #> 149 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 150 Email addresses, IP addresses, Passwords, Usernames #> 151 Dates of birth, Email addresses, Instant messenger identities, IP addresses, Passwords, Social connections, Spoken languages, Time zones, User website URLs, Usernames, Website activity #> 152 Email addresses, Email messages #> 153 Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords #> 154 Dates of birth, Email addresses, Genders, Health insurance information, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Security questions and answers, Social connections #> 155 Email addresses, Names, Passwords, Phone numbers, Physical addresses #> 156 Email addresses, Genders, Nicknames, Passwords, Usernames, Years of birth #> 157 Browser user agent details, Email addresses, IP addresses, Usernames, Website activity #> 158 Email addresses, Passwords, Usernames #> 159 Email addresses, Passwords, Usernames #> 160 Email addresses, Names, Passwords, Usernames, Website activity #> 161 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 162 Email addresses, IP addresses, Passwords, Website activity #> 163 Email addresses, Geographic locations, IP addresses, Names, Passwords, Social media profiles, Usernames #> 164 Browser user agent details, Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Purchases, Usernames #> 165 Email addresses, Passwords #> 166 Email addresses, Passwords #> 167 Email addresses, IP addresses, Passwords, Usernames #> 168 Email addresses, IP addresses, Passwords, Usernames #> 169 Email addresses, Passwords #> 170 Email addresses, Passwords, Usernames, Website activity #> 171 Email addresses, Passwords #> 172 Dates of birth, Email addresses, Geographic locations, Names, Passwords, Usernames #> 173 Dates of birth, Email addresses, Passwords, Usernames #> 174 Auth tokens, Device information, Email addresses, Genders, Names, Passwords, Phone numbers, Salutations, Social media profiles, Usernames #> 175 Dates of birth, Email addresses, Genders, Geographic locations, Government issued IDs, Marital statuses, Names, Nationalities, Passwords, Phone numbers, Physical addresses, Usernames #> 176 Email addresses, Names, Passwords, Payment histories, Usernames #> 177 Dates of birth, Email addresses, Geographic locations, Names #> 178 Email addresses, Passwords #> 179 Email addresses, Passwords #> 180 Email addresses, IP addresses, Passwords, Usernames #> 181 Dates of birth, Email addresses, Genders, Geographic locations, Recovery email addresses, Security questions and answers, Usernames #> 182 Email addresses, Email messages, Genders, Names, Passwords, Phone numbers, Physical addresses #> 183 Email addresses, Geographic locations, Names, Passwords, Usernames #> 184 Email addresses, Names, Passwords, Physical addresses, Usernames #> 185 Email addresses, Passwords, Usernames, Website activity #> 186 Email addresses, Passwords, Usernames #> 187 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 188 Email addresses, Passwords, Usernames #> 189 Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, Usernames #> 190 Email addresses, Passwords #> 191 Email addresses, IP addresses, Passwords, Usernames #> 192 Avatars, Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Time zones, Website activity #> 193 Dates of birth, Email addresses, Passwords, Usernames #> 194 Email addresses, Passwords, Usernames #> 195 Dates of birth, Email addresses, IP addresses, Names, Passwords, Usernames, Website activity #> 196 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 197 Email addresses, IP addresses, Names, Passwords, Private messages, Usernames, Website activity #> 198 Email addresses, Passwords, Usernames #> 199 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 200 Email addresses, Passwords, Usernames #> 201 Email addresses, Passwords #> 202 Email addresses, IP addresses, Passwords, Usernames #> 203 Email addresses, Names, Passwords, Phone numbers #> 204 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 205 Email addresses, Passwords #> 206 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 207 Email addresses, Geographic locations, Passwords, Usernames #> 208 Dates of birth, Deceased statuses, Email addresses, Employers, Ethnicities, Genders, Government issued IDs, Home ownership statuses, Job titles, Names, Nationalities, Phone numbers, Physical addresses #> 209 Astrological signs, Dates of birth, Drinking habits, Drug habits, Education levels, Email addresses, Ethnicities, Fitness levels, Genders, Geographic locations, Income levels, Job titles, Names, Parenting plans, Passwords, Personal descriptions, Physical attributes, Political views, Relationship statuses, Religions, Sexual fetishes, Travel habits, Usernames, Website activity, Work habits #> 210 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 211 Email addresses, Email messages, IP addresses, Names #> 212 Dates of birth, Email addresses, Names #> 213 Email addresses, IP addresses, Passwords, Usernames #> 214 Email addresses, IP addresses, Passwords, Usernames #> 215 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 216 Email addresses, IP addresses, Passwords, Usernames #> 217 Dates of birth, Email addresses, Genders, IP addresses, Job titles, Names, Phone numbers, Physical addresses #> 218 Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses #> 219 Email addresses, Names, Passwords, Phone numbers #> 220 Email addresses, Names, Passwords, Physical addresses, Usernames #> 221 Email addresses, IP addresses, Passwords, Usernames #> 222 Dates of birth, Email addresses, IP addresses, Passwords, Social connections, Usernames, Website activity #> 223 Device usage tracking data #> 224 Age groups, Email addresses, Employers, Names, Passwords, Phone numbers, Physical addresses, Website activity #> 225 Chat logs, Email addresses, Geographic locations, IP addresses, Passwords, Private messages, User statuses, Usernames #> 226 Credit status information, Email addresses, Home loan information, Income levels, IP addresses, Names, Passwords, Personal descriptions, Physical addresses #> 227 Email addresses, IP addresses, Passwords, Usernames #> 228 Email addresses, Passwords #> 229 Email addresses, IP addresses, Passwords, Usernames #> 230 Email addresses, Passwords, Usernames #> 231 Email addresses, Passwords, Usernames #> 232 Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Purchases #> 233 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 234 Email addresses, Names #> 235 Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Usernames #> 236 Email addresses, Passwords #> 237 Account balances, Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Security questions and answers, Website activity #> 238 Email addresses, Passwords #> 239 Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses #> 240 Dates of birth, Email addresses, Names, Purchases #> 241 Email addresses, IP addresses, Passwords, Usernames #> 242 Email addresses, Passwords, Usernames #> 243 Email addresses, IP addresses, Passwords, Usernames #> 244 Avatars, Dates of birth, Email addresses, Genders, Names, Spoken languages, Usernames, Website activity #> 245 Email addresses, IP addresses, Names, Passwords, Usernames, Website activity #> 246 Dates of birth, Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity #> 247 Email addresses, IP addresses, Passwords, Private messages, Usernames #> 248 Email addresses, Passwords #> 249 Email addresses, IP addresses, Passwords, Usernames #> 250 Avatars, Email addresses, IP addresses, Phone numbers, Physical addresses, Purchases, Social media profiles, Usernames #> 251 Email addresses, Email messages, Geographic locations, Passwords, Phone numbers #> 252 Email addresses, IP addresses, Passwords, Usernames #> 253 Email addresses, IP addresses, Passwords, Usernames #> 254 Account balances, Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses, Security questions and answers, Usernames, Website activity #> 255 Email addresses, Payment histories, Physical addresses, Private messages, Website activity #> 256 Browser user agent details, Email addresses, IP addresses, Names, Partial credit card data, Passwords, Phone numbers, Website activity #> 257 Email addresses, Passwords #> 258 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 259 Email addresses, Passwords #> 260 Email addresses, Genders, Geographic locations, Names, Passwords, Social media profiles, Usernames, Website activity #> 261 Email addresses, IP addresses, Passwords, Usernames #> 262 Email addresses, IP addresses, Passwords, Time zones, Usernames, Website activity #> 263 Email addresses, Genders, IP addresses, Passwords, Usernames, Website activity #> 264 Email addresses, IP addresses, Passwords #> 265 Email addresses, IP addresses, Passwords, Usernames #> 266 Email addresses, IP addresses, Passwords, Usernames #> 267 Email addresses, IP addresses, Passwords, Usernames #> 268 Email addresses, IP addresses, Passwords, Usernames #> 269 Email addresses, IP addresses, Passwords, Usernames #> 270 Email addresses, IP addresses, Passwords, Usernames #> 271 Bank account numbers, Customer feedback, Dates of birth, Financial transactions, Genders, Geographic locations, Government issued IDs, IP addresses, Marital statuses, Names, Passwords, Phone numbers, Physical addresses, PINs, Security questions and answers, Spoken languages #> 272 Email addresses, Passwords, Usernames, Website activity #> 273 Email addresses, IP addresses, Passwords, Private messages, Usernames, Website activity #> 274 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 275 Email addresses, Passwords, Usernames, Website activity #> 276 Email addresses, IP addresses, Passwords, Usernames #> 277 Email addresses, Passwords, Usernames #> 278 Email addresses, Employers, Job titles, Names, Phone numbers #> 279 Email addresses, Names, Passwords #> 280 Email addresses, Names, Phone numbers, Physical addresses #> 281 Browser user agent details, Credit card CVV, Email addresses, IP addresses, Names, Partial credit card data, Phone numbers, Physical addresses, Purchases #> 282 Email addresses, Passwords #> 283 Email addresses, Passwords #> 284 Email addresses, IP addresses, Names, Physical addresses #> 285 Email addresses, IP addresses, Passwords, Usernames #> 286 Email addresses, Names, Passwords, Phone numbers #> 287 Email addresses, Genders, Names, Physical addresses #> 288 Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses #> 289 Email addresses, Passwords, Usernames #> 290 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 291 Dates of birth, Email addresses, Names, Passwords #> 292 Email addresses, Passwords #> 293 Email addresses, Passwords, Usernames #> 294 Email addresses, Passwords, Usernames #> 295 Email addresses, Genders, Geographic locations, Passwords, Usernames, Website activity #> 296 Geographic locations, Phone numbers, Usernames #> 297 Email addresses, IP addresses, Passwords, Private messages, Usernames #> 298 Email addresses, IP addresses, Names, Passwords, Phone numbers #> 299 Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Usernames #> 300 Dates of birth, Email addresses, Genders, Geographic locations, Names, Passwords, Social connections #> 301 Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses #> 302 Email addresses, Employers, Job titles, Names, Phone numbers, Physical addresses #> 303 Audio recordings, Browsing histories, Device information, Email addresses, Geographic locations, IMEI numbers, IP addresses, Names, Passwords, Photos, SMS messages #> 304 Credit cards, Email addresses, IP addresses, Passwords, Support tickets, Usernames #> 305 Customer interactions, Dates of birth, Email addresses, Genders, IP addresses, MAC addresses, Names, Passport numbers, Passwords, Phone numbers #> 306 Dates of birth, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Spoken languages #> 307 Credit cards, Email addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames #> 308 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 309 Email addresses, Passwords, Usernames #> 310 Email addresses, Passwords, Usernames #> 311 Email addresses, Passwords #> 312 Email addresses, Passwords, Usernames #> 313 Email addresses, IP addresses, Passwords, Usernames #> 314 Chat logs, Email addresses, IP addresses, Passwords, Private messages, Time zones #> 315 Email addresses, Email messages #> 316 Avatars, Email addresses, IP addresses, Passwords, Payment histories, Private messages, Usernames, Website activity #> 317 Email addresses, Passwords, Reward program balances #> 318 Email addresses, Passwords, Usernames #> 319 Dates of birth, Email addresses, Geographic locations, IP addresses, Passwords, Usernames, Website activity #> 320 Email addresses, Passwords, Usernames #> 321 Age groups, Credit cards, Email addresses, Genders, Names, Passwords, Phone numbers, Physical addresses, Purchases, Usernames #> 322 Email addresses, Passwords, Usernames #> 323 Email addresses, IP addresses, Passwords, Usernames #> 324 Email addresses, Names, Usernames #> 325 Email addresses, Names, Phone numbers, Physical addresses #> 326 Dates of birth, Email addresses, IP addresses, Passwords, Usernames, Website activity #> 327 Email addresses #> 328 Dates of birth, Email addresses, IP addresses, Names, Passwords, Usernames #> 329 Email addresses, Passwords, Usernames #> 330 Email addresses, Passwords #> 331 Email addresses, Genders, Names, Social connections, Website activity #> 332 Email addresses, Names, Passwords, Usernames #> 333 Email addresses, IP addresses, Passwords, Usernames #> 334 Email addresses, Passwords, Usernames #> 335 Email addresses, Passwords, Usernames #> 336 Email addresses, Passwords, Usernames #> 337 Dates of birth, Email addresses, Homepage URLs, Instant messenger identities, IP addresses, Passwords, Security questions and answers, Spoken languages, Website activity #> 338 Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses #> 339 Email addresses, Historical passwords, IP addresses, Passwords, Private messages, Usernames, Website activity #> 340 Dates of birth, Email addresses, IP addresses, Names, Phone numbers, Physical addresses #> 341 Email addresses, Government issued IDs, Names, Passwords, Phone numbers #> 342 Email addresses, Names, Passwords, Phone numbers #> 343 Dates of birth, Email addresses, Genders, IP addresses, Marital statuses, Names, Occupations, Passwords, Phone numbers, Physical addresses, Usernames #> 344 Credit cards, Email addresses, Government issued IDs, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Purchases, SMS messages, Usernames #> 345 Dates of birth, Email addresses, Family members' names, Genders, IP addresses, Names, Passwords, Physical addresses, Security questions and answers, Usernames, Website activity #> 346 Email addresses, IP addresses, Names, Phone numbers, Physical addresses #> 347 Email addresses, Passwords, Usernames, Website activity #> 348 Email addresses, Usernames, Website activity #> 349 Dates of birth, Email addresses, Passwords, Usernames #> 350 Email addresses, Passwords, Usernames #> 351 Email addresses, Names, Passwords #> 352 Email addresses, Email messages, Employers, IP addresses, Names, Partial credit card data, Passwords, Payment histories, Physical addresses, Website activity #> 353 Dates of birth, Email addresses, Names, Phone numbers, Physical addresses #> 354 Email addresses, IP addresses, Names, Passwords, Usernames #> 355 Email addresses, IP addresses, Passwords, Usernames #> 356 Dates of birth, Email addresses, IP addresses, Passwords, Usernames #> 357 Email addresses, Instant messenger identities, IP addresses, Names, Passwords, Private messages, Usernames, Website activity #> 358 Auth tokens, Dates of birth, Email addresses, Genders, Names, Phone numbers, Usernames #> 359 Email addresses, Passwords #> 360 Email addresses, Passwords #> 361 Email addresses, IP addresses, Passwords, Usernames, Website activity #> 362 Email addresses, IP addresses, Passwords, Usernames #> 363 Email addresses, IP addresses, Passwords, Usernames #> 364 Email addresses, Passwords, Usernames #> 365 Email addresses, IP addresses, Passwords, Usernames #> 366 Email addresses, Names, Passwords, Usernames #> 367 Email addresses, Passwords #> 368 Email addresses, Passwords #> 369 Dates of birth, Email addresses, Names, Passwords, Phone numbers, Physical addresses, PINs #> 370 Email addresses, Passwords #> 371 Email addresses, IP addresses, Names, Social media profiles, Usernames #> 372 Email addresses, Passwords #> 373 Email addresses, Employers, Geographic locations, Job titles, Names, Social media profiles #> 374 Email addresses, Passwords #> 375 Email addresses, Passwords, Usernames #> 376 Email addresses, Passwords #> 377 Email addresses, Passwords, Usernames #> 378 Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Passwords, Spoken languages #> IsVerified IsFabricated IsSensitive IsRetired IsSpamList #> 1 TRUE FALSE FALSE FALSE FALSE #> 2 FALSE FALSE FALSE FALSE FALSE #> 3 TRUE FALSE FALSE FALSE FALSE #> 4 FALSE FALSE FALSE FALSE FALSE #> 5 FALSE FALSE FALSE FALSE FALSE #> 6 TRUE FALSE FALSE FALSE FALSE #> 7 TRUE FALSE FALSE FALSE FALSE #> 8 FALSE FALSE FALSE FALSE FALSE #> 9 TRUE FALSE FALSE FALSE FALSE #> 10 TRUE FALSE FALSE FALSE FALSE #> 11 TRUE FALSE FALSE FALSE FALSE #> 12 TRUE FALSE FALSE FALSE FALSE #> 13 TRUE FALSE FALSE FALSE FALSE #> 14 TRUE FALSE FALSE FALSE FALSE #> 15 TRUE FALSE FALSE FALSE FALSE #> 16 TRUE FALSE TRUE FALSE FALSE #> 17 TRUE FALSE TRUE FALSE FALSE #> 18 TRUE FALSE FALSE FALSE FALSE #> 19 TRUE FALSE FALSE FALSE FALSE #> 20 TRUE FALSE FALSE FALSE FALSE #> 21 FALSE FALSE FALSE FALSE FALSE #> 22 TRUE FALSE FALSE FALSE FALSE #> 23 TRUE FALSE FALSE FALSE FALSE #> 24 TRUE FALSE FALSE FALSE FALSE #> 25 TRUE FALSE FALSE FALSE FALSE #> 26 FALSE FALSE FALSE FALSE FALSE #> 27 TRUE FALSE FALSE FALSE FALSE #> 28 TRUE FALSE FALSE FALSE FALSE #> 29 TRUE FALSE FALSE FALSE FALSE #> 30 TRUE FALSE TRUE FALSE FALSE #> 31 TRUE FALSE FALSE FALSE FALSE #> 32 TRUE FALSE FALSE FALSE FALSE #> 33 TRUE FALSE FALSE FALSE FALSE #> 34 TRUE FALSE FALSE FALSE FALSE #> 35 TRUE FALSE FALSE FALSE FALSE #> 36 TRUE FALSE FALSE FALSE TRUE #> 37 TRUE FALSE FALSE FALSE FALSE #> 38 FALSE FALSE TRUE FALSE FALSE #> 39 TRUE FALSE FALSE FALSE FALSE #> 40 TRUE FALSE FALSE FALSE FALSE #> 41 TRUE FALSE TRUE FALSE FALSE #> 42 TRUE FALSE FALSE FALSE FALSE #> 43 TRUE FALSE FALSE FALSE FALSE #> 44 TRUE FALSE TRUE FALSE FALSE #> 45 TRUE FALSE FALSE FALSE FALSE #> 46 TRUE FALSE FALSE FALSE FALSE #> 47 TRUE FALSE FALSE FALSE FALSE #> 48 TRUE FALSE FALSE FALSE FALSE #> 49 TRUE FALSE FALSE FALSE FALSE #> 50 TRUE FALSE FALSE FALSE FALSE #> 51 TRUE FALSE FALSE FALSE FALSE #> 52 TRUE FALSE FALSE FALSE FALSE #> 53 TRUE FALSE FALSE FALSE FALSE #> 54 TRUE FALSE FALSE FALSE FALSE #> 55 TRUE FALSE FALSE FALSE FALSE #> 56 TRUE FALSE FALSE FALSE FALSE #> 57 TRUE FALSE FALSE FALSE FALSE #> 58 TRUE FALSE FALSE FALSE FALSE #> 59 TRUE FALSE FALSE FALSE FALSE #> 60 TRUE FALSE TRUE FALSE FALSE #> 61 TRUE FALSE FALSE FALSE FALSE #> 62 TRUE FALSE FALSE FALSE FALSE #> 63 TRUE FALSE FALSE FALSE FALSE #> 64 TRUE FALSE FALSE FALSE FALSE #> 65 TRUE FALSE FALSE FALSE FALSE #> 66 TRUE FALSE FALSE FALSE FALSE #> 67 TRUE FALSE FALSE FALSE FALSE #> 68 TRUE FALSE FALSE FALSE FALSE #> 69 FALSE FALSE FALSE FALSE FALSE #> 70 TRUE FALSE FALSE FALSE FALSE #> 71 TRUE FALSE FALSE FALSE FALSE #> 72 TRUE FALSE FALSE FALSE FALSE #> 73 TRUE FALSE FALSE FALSE FALSE #> 74 FALSE FALSE FALSE FALSE FALSE #> 75 TRUE FALSE FALSE FALSE FALSE #> 76 TRUE FALSE FALSE FALSE FALSE #> 77 FALSE FALSE FALSE FALSE FALSE #> 78 TRUE FALSE FALSE FALSE FALSE #> 79 TRUE FALSE FALSE FALSE FALSE #> 80 TRUE FALSE FALSE FALSE FALSE #> 81 TRUE FALSE TRUE FALSE FALSE #> 82 TRUE FALSE FALSE FALSE FALSE #> 83 TRUE FALSE FALSE FALSE FALSE #> 84 TRUE FALSE FALSE FALSE FALSE #> 85 TRUE FALSE FALSE FALSE FALSE #> 86 TRUE FALSE FALSE FALSE FALSE #> 87 TRUE FALSE FALSE FALSE FALSE #> 88 TRUE FALSE FALSE FALSE FALSE #> 89 FALSE FALSE FALSE FALSE FALSE #> 90 TRUE FALSE FALSE FALSE FALSE #> 91 TRUE FALSE FALSE FALSE FALSE #> 92 TRUE FALSE FALSE FALSE FALSE #> 93 TRUE FALSE FALSE FALSE FALSE #> 94 TRUE FALSE FALSE FALSE TRUE #> 95 TRUE FALSE FALSE FALSE FALSE #> 96 TRUE FALSE FALSE FALSE FALSE #> 97 FALSE FALSE FALSE FALSE FALSE #> 98 TRUE FALSE FALSE FALSE FALSE #> 99 TRUE FALSE FALSE FALSE FALSE #> 100 TRUE FALSE FALSE FALSE FALSE #> 101 TRUE FALSE FALSE FALSE FALSE #> 102 FALSE FALSE FALSE FALSE FALSE #> 103 TRUE FALSE FALSE FALSE FALSE #> 104 TRUE FALSE FALSE FALSE FALSE #> 105 TRUE FALSE FALSE FALSE FALSE #> 106 TRUE FALSE FALSE FALSE FALSE #> 107 TRUE FALSE FALSE FALSE FALSE #> 108 TRUE FALSE FALSE FALSE FALSE #> 109 FALSE FALSE TRUE FALSE FALSE #> 110 TRUE FALSE FALSE FALSE FALSE #> 111 TRUE FALSE FALSE FALSE FALSE #> 112 TRUE FALSE FALSE FALSE FALSE #> 113 TRUE FALSE FALSE FALSE FALSE #> 114 TRUE FALSE FALSE FALSE FALSE #> 115 TRUE FALSE FALSE FALSE FALSE #> 116 TRUE FALSE FALSE FALSE FALSE #> 117 TRUE FALSE FALSE FALSE FALSE #> 118 FALSE FALSE FALSE FALSE FALSE #> 119 FALSE FALSE FALSE FALSE FALSE #> 120 FALSE FALSE FALSE FALSE FALSE #> 121 TRUE FALSE FALSE FALSE FALSE #> 122 TRUE FALSE FALSE FALSE FALSE #> 123 TRUE FALSE FALSE FALSE FALSE #> 124 TRUE FALSE FALSE FALSE FALSE #> 125 TRUE FALSE FALSE FALSE FALSE #> 126 TRUE FALSE FALSE FALSE FALSE #> 127 TRUE FALSE FALSE FALSE FALSE #> 128 TRUE FALSE FALSE FALSE FALSE #> 129 TRUE FALSE TRUE FALSE FALSE #> 130 TRUE FALSE TRUE FALSE FALSE #> 131 TRUE FALSE FALSE FALSE FALSE #> 132 TRUE FALSE FALSE FALSE FALSE #> 133 TRUE FALSE FALSE FALSE FALSE #> 134 TRUE FALSE TRUE FALSE FALSE #> 135 TRUE FALSE FALSE FALSE FALSE #> 136 TRUE FALSE TRUE FALSE FALSE #> 137 TRUE FALSE FALSE FALSE FALSE #> 138 TRUE FALSE FALSE FALSE FALSE #> 139 TRUE FALSE TRUE FALSE FALSE #> 140 TRUE FALSE FALSE FALSE FALSE #> 141 TRUE FALSE FALSE FALSE FALSE #> 142 TRUE FALSE FALSE FALSE FALSE #> 143 TRUE FALSE FALSE FALSE FALSE #> 144 TRUE FALSE FALSE FALSE FALSE #> 145 TRUE FALSE FALSE FALSE FALSE #> 146 FALSE FALSE FALSE FALSE FALSE #> 147 TRUE FALSE FALSE FALSE FALSE #> 148 TRUE FALSE FALSE FALSE FALSE #> 149 TRUE FALSE FALSE FALSE FALSE #> 150 TRUE FALSE FALSE FALSE FALSE #> 151 TRUE FALSE FALSE FALSE FALSE #> 152 TRUE FALSE FALSE FALSE FALSE #> 153 TRUE FALSE FALSE FALSE FALSE #> 154 TRUE FALSE FALSE FALSE FALSE #> 155 TRUE FALSE FALSE FALSE FALSE #> 156 TRUE FALSE FALSE FALSE FALSE #> 157 TRUE FALSE FALSE FALSE FALSE #> 158 TRUE FALSE FALSE FALSE FALSE #> 159 FALSE FALSE FALSE FALSE FALSE #> 160 TRUE FALSE FALSE FALSE FALSE #> 161 TRUE FALSE TRUE FALSE FALSE #> 162 TRUE FALSE FALSE FALSE FALSE #> 163 TRUE FALSE FALSE FALSE FALSE #> 164 TRUE FALSE TRUE FALSE FALSE #> 165 TRUE FALSE FALSE FALSE FALSE #> 166 TRUE FALSE FALSE FALSE FALSE #> 167 TRUE FALSE FALSE FALSE FALSE #> 168 TRUE FALSE FALSE FALSE FALSE #> 169 TRUE FALSE FALSE FALSE FALSE #> 170 TRUE FALSE FALSE FALSE FALSE #> 171 TRUE FALSE FALSE FALSE TRUE #> 172 TRUE FALSE FALSE FALSE FALSE #> 173 TRUE FALSE FALSE FALSE FALSE #> 174 TRUE FALSE FALSE FALSE FALSE #> 175 TRUE FALSE FALSE FALSE FALSE #> 176 TRUE FALSE FALSE FALSE FALSE #> 177 FALSE TRUE TRUE FALSE FALSE #> 178 FALSE FALSE FALSE FALSE FALSE #> 179 TRUE FALSE FALSE FALSE FALSE #> 180 TRUE FALSE FALSE FALSE FALSE #> 181 TRUE FALSE FALSE FALSE FALSE #> 182 TRUE FALSE FALSE FALSE FALSE #> 183 TRUE FALSE FALSE FALSE FALSE #> 184 TRUE FALSE FALSE FALSE FALSE #> 185 TRUE FALSE FALSE FALSE FALSE #> 186 TRUE FALSE FALSE FALSE FALSE #> 187 TRUE FALSE FALSE FALSE FALSE #> 188 TRUE FALSE FALSE FALSE FALSE #> 189 TRUE FALSE FALSE FALSE FALSE #> 190 TRUE FALSE FALSE FALSE FALSE #> 191 TRUE FALSE FALSE FALSE FALSE #> 192 TRUE FALSE FALSE FALSE FALSE #> 193 TRUE FALSE FALSE FALSE FALSE #> 194 TRUE FALSE FALSE FALSE FALSE #> 195 TRUE FALSE FALSE FALSE FALSE #> 196 TRUE FALSE FALSE FALSE FALSE #> 197 TRUE FALSE FALSE FALSE FALSE #> 198 TRUE FALSE FALSE FALSE FALSE #> 199 TRUE FALSE FALSE FALSE FALSE #> 200 TRUE FALSE FALSE FALSE FALSE #> 201 FALSE FALSE FALSE FALSE FALSE #> 202 TRUE FALSE FALSE FALSE FALSE #> 203 TRUE FALSE FALSE FALSE FALSE #> 204 TRUE FALSE FALSE FALSE FALSE #> 205 TRUE FALSE FALSE FALSE FALSE #> 206 TRUE FALSE FALSE FALSE FALSE #> 207 TRUE FALSE FALSE FALSE FALSE #> 208 TRUE FALSE FALSE FALSE FALSE #> 209 TRUE FALSE TRUE FALSE FALSE #> 210 TRUE FALSE FALSE FALSE FALSE #> 211 TRUE FALSE FALSE FALSE FALSE #> 212 TRUE FALSE FALSE FALSE FALSE #> 213 TRUE FALSE FALSE FALSE FALSE #> 214 TRUE FALSE FALSE FALSE FALSE #> 215 TRUE FALSE FALSE FALSE FALSE #> 216 TRUE FALSE FALSE FALSE FALSE #> 217 TRUE FALSE FALSE FALSE FALSE #> 218 TRUE FALSE FALSE FALSE FALSE #> 219 TRUE FALSE FALSE FALSE FALSE #> 220 TRUE FALSE FALSE FALSE FALSE #> 221 TRUE FALSE FALSE FALSE FALSE #> 222 TRUE FALSE FALSE FALSE FALSE #> 223 TRUE FALSE FALSE FALSE FALSE #> 224 TRUE FALSE FALSE FALSE FALSE #> 225 TRUE FALSE TRUE FALSE FALSE #> 226 TRUE FALSE FALSE FALSE FALSE #> 227 TRUE FALSE FALSE FALSE FALSE #> 228 TRUE FALSE FALSE FALSE FALSE #> 229 TRUE FALSE FALSE FALSE FALSE #> 230 TRUE FALSE FALSE FALSE FALSE #> 231 TRUE FALSE FALSE FALSE FALSE #> 232 TRUE FALSE TRUE FALSE FALSE #> 233 TRUE FALSE TRUE FALSE FALSE #> 234 TRUE FALSE FALSE FALSE FALSE #> 235 TRUE FALSE FALSE FALSE FALSE #> 236 FALSE FALSE FALSE FALSE FALSE #> 237 TRUE FALSE FALSE FALSE FALSE #> 238 TRUE FALSE FALSE FALSE FALSE #> 239 TRUE FALSE FALSE FALSE TRUE #> 240 TRUE FALSE FALSE FALSE FALSE #> 241 TRUE FALSE FALSE FALSE FALSE #> 242 TRUE FALSE FALSE FALSE FALSE #> 243 TRUE FALSE FALSE FALSE FALSE #> 244 TRUE FALSE FALSE FALSE FALSE #> 245 TRUE FALSE TRUE FALSE FALSE #> 246 TRUE FALSE FALSE FALSE FALSE #> 247 TRUE FALSE FALSE FALSE FALSE #> 248 TRUE FALSE FALSE FALSE TRUE #> 249 TRUE FALSE FALSE FALSE FALSE #> 250 TRUE FALSE FALSE FALSE FALSE #> 251 TRUE FALSE FALSE FALSE FALSE #> 252 TRUE FALSE FALSE FALSE FALSE #> 253 TRUE FALSE FALSE FALSE FALSE #> 254 TRUE FALSE FALSE FALSE FALSE #> 255 TRUE FALSE FALSE FALSE FALSE #> 256 TRUE FALSE FALSE FALSE FALSE #> 257 FALSE FALSE FALSE FALSE FALSE #> 258 TRUE FALSE FALSE FALSE FALSE #> 259 TRUE FALSE FALSE FALSE FALSE #> 260 TRUE FALSE FALSE FALSE FALSE #> 261 TRUE FALSE FALSE FALSE FALSE #> 262 TRUE FALSE FALSE FALSE FALSE #> 263 TRUE FALSE FALSE FALSE FALSE #> 264 TRUE FALSE FALSE FALSE FALSE #> 265 TRUE FALSE FALSE FALSE FALSE #> 266 TRUE FALSE FALSE FALSE FALSE #> 267 TRUE FALSE FALSE FALSE FALSE #> 268 TRUE FALSE FALSE FALSE FALSE #> 269 TRUE FALSE FALSE FALSE FALSE #> 270 TRUE FALSE FALSE FALSE FALSE #> 271 TRUE FALSE FALSE FALSE FALSE #> 272 TRUE FALSE FALSE FALSE FALSE #> 273 TRUE FALSE FALSE FALSE FALSE #> 274 TRUE FALSE FALSE FALSE FALSE #> 275 TRUE FALSE FALSE FALSE FALSE #> 276 TRUE FALSE FALSE FALSE FALSE #> 277 TRUE FALSE FALSE FALSE FALSE #> 278 TRUE FALSE FALSE FALSE TRUE #> 279 TRUE FALSE FALSE FALSE FALSE #> 280 TRUE FALSE FALSE FALSE FALSE #> 281 TRUE FALSE FALSE FALSE FALSE #> 282 TRUE FALSE FALSE FALSE FALSE #> 283 TRUE FALSE FALSE FALSE FALSE #> 284 TRUE FALSE FALSE FALSE TRUE #> 285 TRUE FALSE TRUE FALSE FALSE #> 286 TRUE FALSE FALSE FALSE FALSE #> 287 TRUE FALSE FALSE FALSE TRUE #> 288 TRUE FALSE FALSE FALSE TRUE #> 289 TRUE FALSE FALSE FALSE FALSE #> 290 TRUE FALSE FALSE FALSE FALSE #> 291 TRUE FALSE FALSE FALSE FALSE #> 292 TRUE FALSE FALSE FALSE FALSE #> 293 TRUE FALSE FALSE FALSE FALSE #> 294 TRUE FALSE FALSE FALSE FALSE #> 295 TRUE FALSE FALSE FALSE FALSE #> 296 TRUE FALSE FALSE FALSE FALSE #> 297 TRUE FALSE FALSE FALSE FALSE #> 298 TRUE FALSE FALSE FALSE FALSE #> 299 TRUE FALSE FALSE FALSE FALSE #> 300 TRUE FALSE FALSE FALSE FALSE #> 301 TRUE FALSE FALSE FALSE TRUE #> 302 TRUE FALSE FALSE FALSE FALSE #> 303 TRUE FALSE FALSE FALSE FALSE #> 304 TRUE FALSE FALSE FALSE FALSE #> 305 TRUE FALSE FALSE FALSE FALSE #> 306 TRUE FALSE FALSE FALSE FALSE #> 307 TRUE FALSE FALSE FALSE FALSE #> 308 TRUE FALSE FALSE FALSE FALSE #> 309 TRUE FALSE FALSE FALSE FALSE #> 310 TRUE FALSE FALSE FALSE FALSE #> 311 FALSE FALSE FALSE FALSE FALSE #> 312 TRUE FALSE FALSE FALSE FALSE #> 313 TRUE FALSE FALSE FALSE FALSE #> 314 TRUE FALSE FALSE FALSE FALSE #> 315 TRUE FALSE FALSE FALSE FALSE #> 316 TRUE FALSE FALSE FALSE FALSE #> 317 TRUE FALSE FALSE FALSE FALSE #> 318 FALSE FALSE FALSE FALSE FALSE #> 319 TRUE FALSE TRUE FALSE FALSE #> 320 TRUE FALSE TRUE FALSE FALSE #> 321 TRUE FALSE FALSE FALSE FALSE #> 322 TRUE FALSE FALSE FALSE FALSE #> 323 TRUE FALSE FALSE FALSE FALSE #> 324 TRUE FALSE FALSE FALSE FALSE #> 325 TRUE FALSE FALSE FALSE FALSE #> 326 TRUE FALSE FALSE FALSE FALSE #> 327 TRUE FALSE FALSE FALSE TRUE #> 328 TRUE FALSE FALSE FALSE FALSE #> 329 TRUE FALSE FALSE FALSE FALSE #> 330 TRUE FALSE FALSE FALSE FALSE #> 331 TRUE FALSE FALSE FALSE FALSE #> 332 TRUE FALSE FALSE FALSE FALSE #> 333 TRUE FALSE FALSE FALSE FALSE #> 334 TRUE FALSE FALSE FALSE FALSE #> 335 TRUE FALSE FALSE FALSE FALSE #> 336 FALSE FALSE FALSE FALSE FALSE #> 337 TRUE FALSE FALSE FALSE FALSE #> 338 TRUE FALSE FALSE FALSE FALSE #> 339 TRUE FALSE FALSE FALSE FALSE #> 340 TRUE FALSE FALSE FALSE FALSE #> 341 TRUE FALSE FALSE FALSE FALSE #> 342 TRUE FALSE FALSE FALSE FALSE #> 343 TRUE FALSE FALSE FALSE FALSE #> 344 TRUE FALSE FALSE FALSE FALSE #> 345 TRUE FALSE FALSE TRUE FALSE #> 346 FALSE FALSE TRUE FALSE FALSE #> 347 TRUE FALSE FALSE FALSE FALSE #> 348 TRUE FALSE FALSE FALSE FALSE #> 349 TRUE FALSE FALSE FALSE FALSE #> 350 TRUE FALSE FALSE FALSE FALSE #> 351 TRUE FALSE FALSE FALSE FALSE #> 352 TRUE FALSE FALSE FALSE FALSE #> 353 TRUE FALSE FALSE FALSE FALSE #> 354 TRUE FALSE TRUE FALSE FALSE #> 355 TRUE FALSE FALSE FALSE FALSE #> 356 TRUE FALSE FALSE FALSE FALSE #> 357 TRUE FALSE FALSE FALSE FALSE #> 358 TRUE FALSE FALSE FALSE FALSE #> 359 TRUE FALSE FALSE FALSE FALSE #> 360 TRUE FALSE FALSE FALSE FALSE #> 361 TRUE FALSE FALSE FALSE FALSE #> 362 TRUE FALSE FALSE FALSE FALSE #> 363 TRUE FALSE FALSE FALSE FALSE #> 364 TRUE FALSE TRUE FALSE FALSE #> 365 TRUE FALSE FALSE FALSE FALSE #> 366 TRUE FALSE FALSE FALSE FALSE #> 367 TRUE FALSE FALSE FALSE FALSE #> 368 TRUE FALSE FALSE FALSE FALSE #> 369 TRUE FALSE FALSE FALSE FALSE #> 370 TRUE FALSE FALSE FALSE FALSE #> 371 TRUE FALSE FALSE FALSE FALSE #> 372 TRUE FALSE TRUE FALSE FALSE #> 373 TRUE FALSE FALSE FALSE FALSE #> 374 FALSE FALSE TRUE FALSE FALSE #> 375 TRUE FALSE FALSE FALSE FALSE #> 376 FALSE TRUE TRUE FALSE FALSE #> 377 TRUE FALSE FALSE FALSE FALSE #> 378 TRUE FALSE FALSE FALSE FALSE