███╗   ███╗ █████╗ ██████╗ ███████╗                   
████╗ ████║██╔══██╗██╔══██╗██╔════╝                   
██╔████╔██║███████║██║  ██║█████╗                     
██║╚██╔╝██║██╔══██║██║  ██║██╔══╝                     
██║ ╚═╝ ██║██║  ██║██████╔╝███████╗                   
╚═╝     ╚═╝╚═╝  ╚═╝╚═════╝ ╚══════╝                   
                                                      
██████╗ ██╗   ██╗                                     
██╔══██╗╚██╗ ██╔╝                                     
██████╔╝ ╚████╔╝                                      
██╔══██╗  ╚██╔╝                                       
██████╔╝   ██║                                        
╚═════╝    ╚═╝                                        
                                                      
 █████╗ ███╗   ██╗████████╗ ██████╗ ███╗   ██╗        
██╔══██╗████╗  ██║╚══██╔══╝██╔═══██╗████╗  ██║        
███████║██╔██╗ ██║   ██║   ██║   ██║██╔██╗ ██║        
██╔══██║██║╚██╗██║   ██║   ██║   ██║██║╚██╗██║        
██║  ██║██║ ╚████║   ██║   ╚██████╔╝██║ ╚████║        
╚═╝  ╚═╝╚═╝  ╚═══╝   ╚═╝    ╚═════╝ ╚═╝  ╚═══╝        
                                                      
██████╗ ██████╗  █████╗ ██╗  ██╗ ██████╗ ██╗   ██╗    
██╔══██╗██╔══██╗██╔══██╗██║ ██╔╝██╔═══██╗██║   ██║    
██║  ██║██████╔╝███████║█████╔╝ ██║   ██║██║   ██║    
██║  ██║██╔══██╗██╔══██║██╔═██╗ ██║   ██║╚██╗ ██╔╝    
██████╔╝██║  ██║██║  ██║██║  ██╗╚██████╔╝ ╚████╔╝     
╚═════╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝ ╚═════╝   ╚═══╝      
                                                     



 ______  __                                   
/\__  _\/\ \                                  
\/_/\ \/\ \ \___      __                      
   \ \ \ \ \  _ `\  /'__`\                    
    \ \ \ \ \ \ \ \/\  __/                    
     \ \_\ \ \_\ \_\ \____\                   
      \/_/  \/_/\/_/\/____/                   
                                              
                                              
 ____                    __                   
/\  _`\                 /\ \__                
\ \ \/\ \    ___     ___\ \ ,_\   ___   _ __  
 \ \ \ \ \  / __`\  /'___\ \ \/  / __`\/\`'__\
  \ \ \_\ \/\ \L\ \/\ \__/\ \ \_/\ \L\ \ \ \/ 
   \ \____/\ \____/\ \____\\ \__\ \____/\ \_\ 
    \/___/  \/___/  \/____/ \/__/\/___/  \/_/ 
                                              
                                              
   __       __                                
 /'__`\    /\ \                               
/\_\L\ \   \_\ \                              
\/_/_\_<_  /'_` \                             
  /\ \L\ \/\ \L\ \                            
  \ \____/\ \___,_\                           
   \/___/  \/__,_ /                           
                                              
                                             

  ____  _____    _    ____   ___  _   _ ____   
 |  _ \| ____|  / \  / ___| / _ \| \ | / ___|  
 | |_) |  _|   / _ \ \___ \| | | |  \| \___ \  
 |  _ <| |___ / ___ \ ___) | |_| | |\  |___) | 
 |_| \_\_____/_/   \_\____/ \___/|_| \_|____/  
                                               

defend @sherbetwerehusky83 a pedophile 



  ____  _____ ____  ____   ___  _   _    _    _       ___ _   _ _____ ___   
 |  _ \| ____|  _ \/ ___| / _ \| \ | |  / \  | |     |_ _| \ | |  ___/ _ \  
 | |_) |  _| | |_) \___ \| | | |  \| | / _ \ | |      | ||  \| | |_ | | | | 
 |  __/| |___|  _ < ___) | |_| | |\  |/ ___ \| |___   | || |\  |  _|| |_| | 
 |_|   |_____|_| \_\____/ \___/|_| \_/_/   \_\_____| |___|_| \_|_|   \___/  
                                                                           
Username: TheDoctor_3D
Name: Rafael 
Age: 17

Bithday: August 6 2006

School: South Mountain High school 




  ____   ___   ____ ___    _    _       __  __ _____ ____ ___    _     
 / ___| / _ \ / ___|_ _|  / \  | |     |  \/  | ____|  _ \_ _|  / \    
 \___ \| | | | |    | |  / _ \ | |     | |\/| |  _| | | | | |  / _ \   
  ___) | |_| | |___ | | / ___ \| |___  | |  | | |___| |_| | | / ___ \  
 |____/ \___/ \____|___/_/   \_\_____| |_|  |_|_____|____/___/_/   \_\ 
                                                                       
https://youtube.com/@TheDoctor_3D?si=UOKS3VcE9f7Ynb5S

https://m.twitch.tv/thedoctor3d

https://steamcommunity.com/profiles/76561199082950866

https://open.spotify.com/user/31zc4orxrht2vqodzh3fuxsfovn4

Discord:
Username: thedoctor3d
USER ID: 725967333419647000


  _     ___   ____    _  _____ ___ ___  _   _  
 | |   / _ \ / ___|  / \|_   _|_ _/ _ \| \ | | 
 | |  | | | | |     / _ \ | |  | | | | |  \| | 
 | |__| |_| | |___ / ___ \| |  | | |_| | |\  | 
 |_____\___/ \____/_/   \_\_| |___\___/|_| \_| 
                                               
Country: USA 
State: Arizona
City: Phoenix

Coordinates:

Latitude: 33.38623920000000000
Longitude: -112.05734370000000000

Accuracy: gps

Accuracy-radius: 18 m

  _   _  ___  __  __ _____  
 | | | |/ _ \|  \/  | ____| 
 | |_| | | | | |\/| |  _|   
 |  _  | |_| | |  | | |___  
 |_| |_|\___/|_|  |_|_____| 
                            
images of his home: https://imgur.com/a/DG68EWz



  _   _  ___  _   _ ____  _____   ___ _   _ _____ ___  
 | | | |/ _ \| | | / ___|| ____| |_ _| \ | |  ___/ _ \ 
 | |_| | | | | | | \___ \|  _|    | ||  \| | |_ | | | |
 |  _  | |_| | |_| |___) | |___   | || |\  |  _|| |_| |
 |_| |_|\___/ \___/|____/|_____| |___|_| \_|_|   \___/ 
                                                       

House info:

Address: 6614 S 11th St, Phoenix, AZ 85042, USA

Single-family
Built in 1951
8,960 sq ft lot
$133 Redfin Estimate per sq ft
1 parking space

Bathroom Information
# of Bathroom Fixtures: 3
Heating & Cooling
Air Conditioning Type: Refrigeration
Heating Type: Forced Air
Room Information
# of Rooms: 5

Exterior Information
Physical Condition: Average
Exterior Wall: Frame Wood
Building Type: Residential
Property Information
Subdivision Name: ESTRELLA RANCHO NUMERO DOS
Living Sq. Ft: 1,206
Building Sq. Ft: 1,206
# of Stories: 1
Legal Description: LOT A ESTRELLA RANCHO NUMERO DOS N2 E2 OF N 124' OF S 474.6' OF TR A EX E 30'
Parking & Garage Information
# of Parking Spaces: 1
Lot Information
# of Buildings: 1
Land Sq. Ft: 8,960
Legal Lot Number: A
Municipality Name: PHOENIX
Acres: 0.2057
Zoning Code: R-3
State Use Description: SINGLE FAM RES-URBAN SUBD

Assessor Information
Assessment Year: 2022
Tax Area: 661300

2022	$481 (−3.0%)	$13,180
2021	$496 (+1.3%)	$11,760
2020	$490 (+3.5%)	$10,800
2019	$474 (−7.3%)	$9,210
2018	$511 (+4.9%)	$9,210
2017	$487 (+5.1%)	$6,170
2016	$463 (+6.2%)	$4,920
2015	$436 (−1.6%)	$4,210
2014	$443 (+35.9%)	$2,970
2013	$326 (−12.0%)	$2,010
2012	$370 (−43.3%)	$2,360
2011	$653 (−12.5%)	$4,700
2010	$747 (−28.5%)	$7,300
2009	$1,045	$12,100

Beds
—
Baths
1
Sq. Ft.
1,206
Stories
1
Lot Size
8,960 Sq. Ft.
Style
Single Family Residential
Year Built
1951
Year Renovated
—
County
Maricopa County
APN
11424017

MORE INFORMATIONS ABOUT @TheDoctor_3D house: https://www.redfin.com/AZ/Phoenix/6614-S-11th-St-85042/home/28366454 



  ___                   _     _                    
 |_ _|_ __     __ _  __| | __| |_ __ ___  ___ ___  
  | || '_ \   / _` |/ _` |/ _` | '__/ _ \/ __/ __| 
  | || |_) | | (_| | (_| | (_| | | |  __/\__ \__ \ 
 |___| .__/   \__,_|\__,_|\__,_|_|  \___||___/___/ 
     |_|                                           


IP ADDRESS: 70.190.218.70

accelerometer: true
Adblock: false
Applepay: false
Googlepay: false
Audiodevices: false
Battery: 56.00000000000001%
Screen: 832 x 384 x 24
colorgamut: srgb
Network: wifi
RTT: 50 ms
Downlink: 0.4 Mbps
ECT: 4g
Contrast: false
cookiesenabled: true
Darkmode: true
RAM: 4 Gb
forcedcolors: false
gyroscope: true
CPU Threads: 8
hdr: false
Incognito: false
indexeddb: true
Language: en-US
Localstorage: true
monochrome: false
offset: -07:00
Opendatabase: false
pixelratio: 2.8125
Platform: Android 10
Plugins: none detected
reducedmotion: false
sessionstorage: true
TIMEZONE: America/Phoenix -07:00
Touchsupport: 5 points
vendor: Google Inc.

Browser: Chrome 124

Isp: Cox Communications Inc.

Asn: AS22773

Domain: cox.com

Route: 70.190.0.0/16

Type: isp

Network: 70.190.0.0/16

Useragent: Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Mobile Safari/537.36

Fingerprint: 2rom4ut

Hostname: ip70-190-218-70.ph.ph.cox.net

Postal code: 85001


  ____  ____  _____     ___    ______   __ 
 |  _ \|  _ \|_ _\ \   / / \  / ___\ \ / / 
 | |_) | |_) || | \ \ / / _ \| |    \ V /  
 |  __/|  _ < | |  \ V / ___ \ |___  | |   
 |_|   |_| \_\___|  \_/_/   \_\____| |_|   
                                           
PRIVACY:

Vpn: false 
Proxy: false 
Tor: false 
Relay: false 
Hosting: false 
Service: none detected 


  ___        __               _                 _     _     _                _                 _ 
 |_ _|_ __  / _| ___     __ _| |__   ___  _   _| |_  | |__ (_)___   ___  ___| |__   ___   ___ | |
  | || '_ \| |_ / _ \   / _` | '_ \ / _ \| | | | __| | '_ \| / __| / __|/ __| '_ \ / _ \ / _ \| |
  | || | | |  _| (_) | | (_| | |_) | (_) | |_| | |_  | | | | \__ \ \__ \ (__| | | | (_) | (_) | |
 |___|_| |_|_|  \___/   \__,_|_.__/ \___/ \__,_|\__| |_| |_|_|___/ |___/\___|_| |_|\___/ \___/|_|
                                                                                                 

School: South Mountain High school 

LOCATION of the school: 

Latitude: 33.39842760000000000
Longitude: -112.06106980000000000

Domain: enrollams.org

REAL IP ADDRESS OF HIS SCHOOL (CLOUDFLARE BYPASS) 

50.63.202.57

https://www.domains.ch/en/iphistory/enrollams.org/



██████╗  █████╗ ████████╗ █████╗                                
██╔══██╗██╔══██╗╚══██╔══╝██╔══██╗                               
██║  ██║███████║   ██║   ███████║                               
██║  ██║██╔══██║   ██║   ██╔══██║                               
██████╔╝██║  ██║   ██║   ██║  ██║                               
╚═════╝ ╚═╝  ╚═╝   ╚═╝   ╚═╝  ╚═╝                               
                                                                
██████╗ ██████╗ ███████╗ █████╗  ██████╗██╗  ██╗███████╗███████╗
██╔══██╗██╔══██╗██╔════╝██╔══██╗██╔════╝██║  ██║██╔════╝██╔════╝
██████╔╝██████╔╝█████╗  ███████║██║     ███████║█████╗  ███████╗
██╔══██╗██╔══██╗██╔══╝  ██╔══██║██║     ██╔══██║██╔══╝  ╚════██║
██████╔╝██║  ██║███████╗██║  ██║╚██████╗██║  ██║███████╗███████║
╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝╚══════╝╚══════╝
                                                                

🗃️Collection #1

In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the first collection found. It contained 12,300 files with a total size of 87 GB. The collection contains more than 2.5 billion lines with emails and passwords for them. There were only 1.25 billion unique rows. For many strings, the site where the leak occurred was indicated.

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: gPotato.com [1,9kk]

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: LOTRO.com [746k]

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: NexusMods.com [4,6kk]

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: WarcraftMovies.com [336k]

🗃️Collection #5

In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. The fifth collection contains 16 thousand files with a total size of 42 gigabytes. The files contained 1.25 billion pairs of emails and passwords, but there were only 600 million unique strings. Unlike other collections, there was often information about which site the data was leaked from.

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Lotro.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Movies.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: NexMods.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Portal.net

📦Collection of 7,651 databases

In December 2022, all databases from the hacker data trading site were made publicly available. A total of 7,651 leaks were published. The data contained only plaintext emails and passwords. A total of 493 million records in all databases.

📩Email: bcox02@hotmail.com
🔑Password: gvbhytf02
🌐Leak site: All_goods_S

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Lotro.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Movies.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: NexMods

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Portal.net

🥔gPotato

In July 2007, the multiplayer gaming portal gPotato suffered from a data leak. More than 2 million user accounts were exposed. The site was later merged into Webzen, where the original accounts still exist. The exposed data included usernames, email and IP addresses, MD5 hashed passwords, and personal information such as gender, date of birth, physical address, security questions and answers in plain text.

📩Email: bcox02@hotmail.com
🔐Encrypted password: 5871210ac01e592bb5eb8aae4acf6c48
📆Registration date: Aug 3 2006 12:22PM
❓Secret Question: What is your fathers middle name?
👤Name: bryan
👤Nick: bcoxlye
👤Surname: cox
🗾A country: UNITED STATES
🚻Floor: M
🤐Secret answer: wonly

📚Collection

In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history.

📩Email: bcox02@hotmail.com
🔑Password: gvbhytf02

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🎎Roll20

In December 2018, tabletop role-playing game site Roll20 suffered a data breach. The hack affected nearly 4 million customers. Email addresses, IP addresses, names, bcrypt password hashes, and the last 4 digits of credit cards were published.

📩Email: bcox02@hotmail.com
🔐Encrypted password: $2a$10$e/lCiB4f/WvBuaBQ/EZdVOmJhU.Igs2hY8LNBAJAIP5fBjqlj4zzm
📆Registration date: 19.01.2014 04:02:35
🇦🇺Language: en
🎯IP: 72.211.135.246
👤Name: Bryan
👤Nick: Bryan C.
👤Surname: Cox
🤴Status: subscriber

🛍︎Ga$$Pacc

In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only emails and unencrypted passwords.

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: Lotro.com

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: myfitnesspal_emailpass_50

📩Email: bcox02@hotmail.com
🔑Password: misfits02
🌐Leak site: NexusMods.com

♻︎NexusMods

In December 2015, game modding site Nexus Mods released a statement notifying users that they had been hacked. They subsequently dated the hack to July 2013, although there is evidence that the data was sold several months earlier. The hack contained usernames, email addresses and passwords as salted hashes.

📩Email: bcox02@hotmail.com
🔐Encrypted password: 15545342a97c6a96efb6a89b1bef398a
🍚Salt: nA9AV
👤Nick: goose007

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🏋️MyFitnessPal

In February 2018, diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique emails along with names, IPs and passwords in the form of SHA-1 and bcrypt hashes. All data, except for bcrypt hashes, was later made publicly available.

📩Email: bcox02@hotmail.com
🔐Encrypted password: 259493fbd06377daa691c2d96658822fad794984
🎯IP: 68.228.226.182
👤Nick: bryancox1984

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🗃️Collection #2

In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the second collection, it was the largest of all and contained 20 thousand files with a total size of 526 GB. These files contained 15.8 billion lines with emails and passwords, but there were only 3.2 billion unique pairs.

📩Email: bcox02@hotmail.com
🔑Password: Misfits02

📩Email: bcox02@hotmail.com
🔑Password: nimble

🚗Parkmobile

In March 2021, a leak occurred in the ParkMobile parking service, which exposed the data of 21 million customers. They included emails, names, phone numbers, car numbers and passwords in the form of bcrypt hashes.

📩Email: bcox02@hotmail.com
🔐Encrypted password: $2a$05$6H2unSVB7KuicNbCGpGfn.YYDTwYGAdIcsphaVE9Rhi8eGXzu3TpW
🏎️Car make: govMinesamHeidiHazel
👤Nick: bcox02@hotmail.com
🚘Vehicle number: G203DVAWX6521BCL8001AJM4393CEB0407

☁️Cloudata

Large collection of email-pass data. The database was collected from many files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained.

📩Email: bcox02@hotmail.com
🔑Password: dmlies

📩Email: bcox02@hotmail.com
🔑Password: Gvbhytf02.

📩Email: bcox02@hotmail.com
🔑Password: Gvbhytf123

🕵️‍BreachedForum Combolists

Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords.

📩Email: bcox02@hotmail.com
🔑Password: gvbhytf02.

🍕HomeChef

In early 2020, food delivery service Home Chef suffered a leak and was subsequently sold online. The hack exposed the information of 9 million customers, including names, IP, zip codes, last 4 digits of credit cards and passwords in the form of bcrypt hashes.

📩Email: bcox02@hotmail.com
🔐Encrypted password: $2a$10$4HnmKR7MrG/POHBmsguOwua/4/A/lk77wR1DX0iMMVec9dU1CBJVO
🎯IP or token: 2600:8800:3788:a250:996e:2bfa:7c7b:89c5

☄MySpace

Around 2008, MySpace suffered a data breach that exposed nearly 360 million accounts. In May 2016, the data was offered for sale on the dark market website "Real Deal" and included email addresses, usernames, and SHA1 hashes of the first 10 characters of the password, converted to lowercase and stored without salt. The exact date of the hack is unknown.

📩Email: bcox02@hotmail.com
🔑Password: misfits02
👤Nick: BryanLye

🐷NeoPets

In May 2016, a dataset from virtual pet website Neopets leaked online. The data contains dates of birth, IP, gender and names, as well as almost 27 million emails. Passwords were stored in plain text.

📩Email: bcox02@hotmail.com
🔑Password: nimble
🎂Date of Birth: 1984-05-30
👤Full name: Bryan Cox
👤Nick: bcox02
🗾A country: US
🚻Floor: M

🌄TeraBase64

A huge collection of files published in February 2020 by a person with the handle @HTTSMVKCOM. It contained 3.2 billion lines of plain text emails and passwords, but only 1.28 billion unique lines. All this data was most likely obtained from many other leaks.

📩Email: bcox02@hotmail.com
🔑Password: misfits021

📩Email: bcox02@hotmail.com
🔑Password: nimble

🎯RobinHood

In November 2021, online trading platform Robinhood suffered a data breach. Hackers used social engineering on a customer service representative. The incident exposed more than 5 million email addresses and 2 million customer names.

📩Email: bcox02@hotmail.com
📆Last Activity: 2/11/2021
📆Registration date: 1/28/2021
💁‍Account owner: System

📜Adobe

In October 2013, 153 million Adobe accounts were hacked, containing names, emails, encrypted passwords and text hints. The cryptography of the passwords was terrible and they were quickly cracked.

📩Email: bcox02@hotmail.com
🔐Partial password: ××××××××2▯

📩Email: bcox02@hotmail.com
🔑Password: v8gsj2LXIRGaSMtqJlttPQ==

🦸‍Heroes of Newerth

In December 2012, an online multiplayer game known as Heroes of Newerth was hacked. More than 8 million accounts were extracted from the system. The data included usernames, email addresses and passwords, but no publicly available passwords currently exist.

📩Email: bcox02@hotmail.com
🍚Salt: \t,
👤Nick: Lye

🧳Exploit.In

In late 2016, a huge list of email/password pairs appeared in the Exploit.In leak. The list contained 593 million unique email addresses and was used for “credential stuffing.”

📩Email: bcox02@hotmail.com
🔑Password: gvbhytf02

📩Email: bcox02@hotmail.com
🔑Password: misfits02

📨VerificationsIO

In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data.

📩Email: BCOX02@HOTMAIL.COM

👁️Zeeroq

Around 2019, about 250 combo players were found in the open directory on the demo.zeeroq.com domain. The number of entries was more than 200 million. The leak contained emails and passwords in plain text.

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🍽️Opentable

The leak occurred on the website opentable.com, which specializes in selecting and ordering tables in restaurants. The leak occurred in 2020 and contained 12 million email addresses and passwords.

📩Email: bcox02@hotmail.com
🔑Password: gvbhytf02

🪟Microsoft

In June 2022, a list of emails and passwords of Microsoft users was published using a hacker formula. This list contained 54 million rows and was obtained by combining data from many other leaks.

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🏢DailyMotion

In October 2016, video sharing platform Dailymotion suffered a data breach. The attack exposed 85 million user accounts and included email addresses, names and bcrypt password hashes.

📩Email: bcox02@hotmail.com
👤Nick: dmlies


🪬MIX Database

In May 2022, a collection containing 464 million emails and plain text passwords obtained from various leaks appeared on a hacker forum.

📩Email: bcox02@hotmail.com
🔑Password: misfits02

🇺🇸USA Consumer Optin 28 million

In early 2023, a database called “USA Consumer Optin” began to circulate online. It contained the data of 28 million US citizens and was positioned as a spam database. Despite the fact that it can be easily downloaded for free, it is actively sold on the Internet for hundreds of dollars. The database contains emails, phone numbers, names, addresses and other data obtained from various sources.

📩Email: rafbradley@cox.net
📞Telephone: 6022462822
🎂Date of Birth: 2/2/1963
🏘️Address: 2210 w morten ave
🇺🇸State: AZ
🌃City: Phoenix
🏤Postal code: 85021
👤Name: Rafael
👤Surname: Bradley
🚻Floor: M

📞SC Daily Phone Spam List

At the beginning of 2015, a spam list appeared, called SC Daily Phone. It contained almost 33 million records. Data included emails, names, physical and IP addresses, gender, dates of birth and telephone numbers.

📩Email: rafbradley@cox.net
📞Telephone: 6022462822
📆Registration date: 3/1/2013 13:43
🏘️Address: 37 n great rd
🇺🇸State: ma
🌃City: phoenix
🌐Website: getyourgift.com
🎯IP: 70.190.218.70
🏤Postal code: 85021
👤Name: rafael
👤Surname: bradley

📨VerificationsIO

In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data.

📩Email: rafbradley@cox.net


🎭DonJuji

On February 7, 2023, a hacker under the pseudonym DonJuji made publicly available all the databases he had ever hacked. He said that this was due to the fact that he was changing his field of activity. In total, he published more than 2,000 databases with a total size of 105 gigabytes, mainly in the form of SQL dumps. The data contained more than 150 million emails and related information.

📩Email: gravekeeps@yahoo.com
💾Data: ('71431', '', '82f56de317481a2a317f84ad4599984f', '', '100001213700395', 'John Butters', '', '', '1378447136', '68.227.245.254', '1378447136', '68.227.245.254', '
🗂️Leak base: crystal_saga_1.39m

📩Email: gravekeeps@yahoo.com
💾Data: INSERT INTO pre_ucenter_members VALUES ('400531','graveice','28ce7e18ba18f923403a0c17e7011721','','','','70.190.218.70','1467945777','0','0','1a299d','');
🗂️Leak base: forums.gamesprite.me

📩Email: gravekeeps@yahoo.com
💾Data: insert into `yahoo`.`users`(`id`,`email`,`password`) values (3375182,'','nopass1word');
🗂️Leak base: Yahoo.com

📦Collection of 7,651 databases

In December 2022, all databases from the hacker data trading site were made publicly available. A total of 7,651 leaks were published. The data contained only plaintext emails and passwords. A total of 493 million records in all databases.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Evony

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Gamigo

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Mix dump 1.389.856

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word
🌐Leak site: 4║800

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword
🌐Leak site: Portal.net

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword1
🌐Leak site: 4║400

📩Email: gravekeeps@yahoo.com:2018-04-19
🔑Password: 15:45:34
🌐Leak site: games.dzucker.com

⛏️MinecraftDatabases

Since 2010, there have been more than 1,200 hacks of various MineCraft servers. All of these hacks were collected into large collections and distributed as a means of hacking player accounts in MineCraft. This collection contains emails, nicknames, passwords, IP addresses and other data from all these collections. There are about 57 million rows in total.

📩Email: gravekeeps@yahoo.com
💾Data: (54493, 0, 2, '', 0, '68.227.245.254', 1330231108, 'gravenecron', 'gravenecron', '$H$9krOXTCiZYInC6eSdjWmIB7oTcPQm..', 1330231108, 0, '', 373218763020, '', 1330231291, 1330231108, 1330231287, 'viewtopic.php?f=5&t=71688&p=713610&_f_=5x', '', 0, 0, 0, 0, 0, 0, 1, 'en', -6.00, 0, 'D M d, Y g:i a', 2, 0, '', 0, 0, 0, 0, -3, 0, 0, 't', 'd', 0, 't', 'a', 0, 1, 0, 1, 1, 1, 1, 230271, '', 0, 0, 0, '', '', '', '', '', '', '', '', '', '', '', '', '', '', '709b828b89fac213', 0, 'nopass1word', 0, 0, 0, 0, 0),
📑Leak file: miniwargaming_126.7k

🗃️Collection #5

In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. The fifth collection contains 16 thousand files with a total size of 42 gigabytes. The files contained 1.25 billion pairs of emails and passwords, but there were only 600 million unique strings. Unlike other collections, there was often information about which site the data was leaked from.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: alora.io

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Gamigo.com

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Mix dump 1.389.856

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword
🌐Leak site: Portal.net

📚Collection

In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword1

📩Email: gravekeeps@yahoo.com
🔑Password: phone60334
🔖Collection numbers: 1,2,4

🚀RocketText

Around January 2020, customer engagement tool RocketText experienced a data breach. The violation included email addresses, home addresses, IP addresses, gender, ethnicity, and telephone numbers (including the operator of the number listed). In total, 32 million records were affected. Rocket Text now operates under the name "LaunchSMS" and was previously known as ApexSMS.

📩Email: gravekeeps@yahoo.com
📞Telephone: 6024872434
📆Registration date: 2019-10-29T14:22:41.000Z
📆date: 2019-10-27
🏘️Address: 1115 E.Emma Ave
⌚Timezone: MST
🇺🇸State: IA
🌃City: Des Moines
🎯IP: 173.23.49.173
🏤Postal code: 50301
👤Name: John
👤Surname: Butters
🗺️Region: Arizona
🗾A country: US

🛍︎Ga$$Pacc

In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only emails and unencrypted passwords.

📩Email: gravekeeps@yahoo.com
🔑Password: 48028570
🌐Leak site: Funny-Games.biz

📩Email: gravekeeps@yahoo.com
🔑Password: n01passw0rd
🌐Leak site: Subagames.com

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: EmuParadise.me

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Jagex.com

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: R2Games.com

🎰Nival

In February 2016, the Russian gaming company Nival became the target of a hacker attack. Nival was one of several Russian websites hacked as a protest against "Russian foreign policy towards Ukraine." More than 1.5 million accounts were made public, including dates of birth, email addresses, gender, names, languages ​​spoken and usernames.

📩Email: gravekeeps@yahoo.com
📆Last Activity: 27.08.2013 16:44:44
📆Registration date: 27.08.2013 16:44:44
ⓕFacebookID: 100001213700395
🚻Floor: 1

📩Email: gravekeeps@yahoo.com
📆Last Activity: 27.08.2013 16:44:44
📆Registration date: 27.08.2013 16:44:44
ⓕFacebookID: 100001213700395
👤Full name: John Butters
🚻Floor: 1

🗃️Collection #1

In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the first collection found. It contained 12,300 files with a total size of 87 GB. The collection contains more than 2.5 billion lines with emails and passwords for them. There were only 1.25 billion unique rows. For many strings, the site where the leak occurred was indicated.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Evony.com [28kk]

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Gamigo.com [8,2kk]

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword
🌐Leak site: gPotato.com [1,9kk]

🥔gPotato

In July 2007, the multiplayer gaming portal gPotato suffered from a data leak. More than 2 million user accounts were exposed. The site was later merged into Webzen, where the original accounts still exist. The exposed data included usernames, email and IP addresses, MD5 hashed passwords, and personal information such as gender, date of birth, physical address, security questions and answers in plain text.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 8c54a5f14da6824b117780a2676d7593
📆Registration date: Feb 24 2007 9:24PM
❓Secret Question: What is your favorite pastime?
👤Name: jo
👤Nick: gravekeeps
👤Surname: but
🗾A country: UNITED STATES
🚻Floor: M
🤐Secret answer: yugioh

☁️Cloudata

Large collection of email-pass data. The database was collected from many files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained.

📩Email: gravekeeps@yahoo.com
🔑Password: 2018-04-19

📩Email: gravekeeps@yahoo.com
🔑Password: 48028570

📩Email: gravekeeps@yahoo.com
🔑Password: graveice

📩Email: gravekeeps@yahoo.com
🔑Password: Nopassword1!

📩Email: gravekeeps@yahoo.com.mx
🔑Password: nopass2word

📩SpecialKSpamList

At the end of 2015, a spam list known as the “Special K Data Feed” was discovered on the Internet, containing almost 31 million entries. Data includes names, physical and IP addresses, gender, dates of birth and telephone numbers.

📩Email: gravekeeps@yahoo.com
🎯IP: 69.13.188.39
👤Name: Russell
👤Surname: Groce

📩Email: gravekeeps@yahoo.com
📞Telephone: 7065991115
🎂Date of Birth: 5/3/84
🏘️Address: 750 S Broad StToccoa1998
🎯IP: 209.61.134.138
👤Name: Russell
👤Surname: Groce

🌄TeraBase64

A huge collection of files published in February 2020 by a person with the handle @HTTSMVKCOM. It contained 3.2 billion lines of plain text emails and passwords, but only 1.28 billion unique lines. All this data was most likely obtained from many other leaks.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword1

📩Email: gravekeeps@yahoo.com
🔑Password: phone60334

🕹️FunnyGames

In April 2018, online entertainment site Funny Games suffered a data breach that exposed 764,000 emails, as well as IP addresses and salted MD5 hashes of passwords. In July, the incident was reported to Funny Games, which acknowledged the breach and determined that it was caused by outdated code that was no longer in use. The number of entries in the hack is approximately half of the user base.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: da50f3c6707b3de253fee33554b573ab
🍚Salt: ?.3
🎯IP: 4.240.24.10
👤Nick: nighmare

🎎Roll20

In December 2018, tabletop role-playing game site Roll20 suffered a data breach. The hack affected nearly 4 million customers. Email addresses, IP addresses, names, bcrypt password hashes, and the last 4 digits of credit cards were published.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: $2a$10$iuRFUkefYr45J/ppuIrcUefDSBjL.pg3zQJwX2qb106NbM3g31qn6
📆Registration date: 29.10.2012 08:55:41
🇦🇺Language: en
🎯IP: 166.181.82.218
👤Name: john
👤Nick: john b.
👤Surname: butters
🤴Status: subscriber

📲ApexSMS

Around April 2019, the cloud-based SMS platform ApexSMS (also known as "MobileDrip") suffered a data breach. Because of her, 88 million posts were published. The violation included full names, email addresses, physical addresses, IP addresses and phone numbers.

📩Email: gravekeeps@yahoo.com
📞Telephone: 6024872434
🏘️Address: 4265 connick way
🇺🇸State: AZ
🌃City: Phoenix
🏤Postal code: 85003
👤Name: John
👤Surname: Butters
🗺️Region: Arizona
🗾A country: US

💼Modern Business Solutions

In October 2016, a large Mongo database file containing tens of millions of accounts was published by Twitter. The database contained more than 58 million unique emails, as well as IP addresses, names, home addresses, gender, positions, dates of birth and telephone numbers. The data is attributed to Modern Business Solutions, a company that provides data storage and database hosting solutions.

📩Email: gravekeeps@yahoo.com
📆Registration date: 2016-06-26T13:31:01.677Z
👤Name: John
🚻Floor: M

👙Fling

In 2011, the adult social network Fling was hacked. 40 million accounts were exposed. The leak included personal data, as well as email addresses and passwords stored in plain text.

📩Email: gravekeeps@yahoo.com
🔑Password: phone60334
📆release date: 2010-08-09 15:02:11
📆Registration date: 2010-04-12 05:05:12
🎂Date of Birth: 1987-11-03
🎯IP: 72.201.99.197
👤Nick: gravekeeps46
🚻Floor: MAN
🤔Interests: FETISHGROUPSEXONLINE FLIRTINGOTHER
🧠Interested: WOMAN

🕵️‍BreachedForum Combolists

Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word123

📩Email: gravekeeps@yahoo.com
🔑Password: toqquycw

🇺🇸USA phones database

A huge database of US residents containing 183 million rows. It was published in April 2022 and included full names, phone numbers, emails, gender and career details. There were very few emails - approximately 9.2 million.

📩Email: GRAVEKEEPS@YAHOO.COM
📞Telephone: 6024872434
🏘️Address: 11623 N 21ST DR
🇺🇸State: AZ
🌃City: PHOENIX
🏤Postal code: 85021
👤Name: JOHN
👤Surname: BUTTERS
📡Mobile operator: CRICKET
🚻Floor: MALE

🍾GameSprit

In December 2019, the popular gaming platform GameSprite was hacked. The website was hacked via the admin panel “discuz! Forum" along with several other gaming websites. The hack affected more than 7 million users and exposed email addresses, usernames and salted MD5 passwords.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 28ce7e18ba18f923403a0c17e7011721
📆Registration date: 08.07.2016 05:42:57
🍚Salt: 1a299d
🎯IP: 70.190.218.70
👤Nick: graveice

🪃DuelingNetwork

Dueling Network is a Flash game based on the card game Yu-Gi-Oh. In March 2017, it suffered a data breach. The site itself was taken offline in 2016, but the forum remained online for another year. The data breach exposed usernames, IP addresses, email addresses and passwords in the form of MD5 hashes. The leak includes 2.5 million records.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: f88c070419de4472ad677773d5c9cbb3
🎯IP: 68.3.112.235
👤Nick: graveice

🤐AntiPublic

In December 2016, a huge leak containing 458 million unique emails and passwords appeared in the public domain. It was used to hack accounts in which the owner reused his password. Similar leaks are also used to assess the novelty of data in other databases.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word

📩Email: gravekeeps@yahoo.com
🔑Password: phone60334

📨VerificationsIO

In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data.

📩Email: gravekeeps@yahoo.com
🇺🇸State: MO
🌃City: SPRINGFIELD
🌐Website: Dealzingo.com
🎯IP: 173.27.146.94
🏤Postal code: 65807
👤Name: John
👤Surname: Butters

🍓AdultFriendFinder 2016

In October 2016, adult entertainment company Friend Finder suffered a massive data breach. The exposed data included names, SHA-1 hashed passwords, and 170 million unique emails. This company was previously hacked in May 2015, but then the leak contained only 4 million records.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 5W249
📆Last Activity: 2010-04-12 01:09:31
🇦🇺Language: english
👤Nick: graveice

⚽Dfb.de

Dfb.de is a German football website. In November 2016, information appeared that it had leaked 3.3 million users. Another 16 million users were published later. However, upon closer examination, it became clear that the leak did not originate from the Dfb.de website, but from somewhere else, so its source remains unknown. The leak contains only emails and passwords.

📩Email: gravekeeps@yahoo.com
🔑Password: 96ff2397fd4e82443f180bef5d5af8a4

🗡️SwordFantasy

In January 2017, the online MMO and role-playing game SwordFantasy suffered a data breach that affected 3.2 million users. The breach included usernames, email addresses, IP addresses and passwords stored as salted MD5 hashes.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 28ce7e18ba18f923403a0c17e7011721
📆Registration date: 1467945777
🍚Salt: 1a299d
🎯IP: 70.190.218.70
👤Nick: graveice

🕯️EmuParadise

In April 2018, the self-proclaimed "world's largest retro gaming website" Emuparadise suffered a data breach. 1.1 million email addresses, IP addresses, usernames and passwords were discovered as salted MD5 hashes.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 8e7fbc415939d223de484a67d2280011:b^O/V[{X#&2g7rtGv]agWf]R&o1{4N
👤Nick: graveice

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

🔐LeakBase Collection

Leakbase.cc is one of the sites that publish various leaks. This database contains all leaks from the “Mixed Database” section on this site, containing emails and passwords. There were 50GB of files (1.5 billion rows) in this partition. After deduplication and removal of rows from the collections, only 210 million remained. The data was downloaded in early 2023.

📩Email: gravekeeps@yahoo.com
🔑Password: graveice

🥫Onliner Spambot

In August 2017, a spam bot called "Onliner Spambot" was identified by security researcher Benkow mokueq. The malware contained a server component located on an IP address in the Netherlands, which exposed a large number of files containing personal information. It contained 711 million unique emails, many of which also included passwords.

📩Email: gravekeeps@yahoo.com
📑Leak file: Email_yahoo.com_usa.txt

🧰Pemiblanc

In April 2018, a Pemiblanc list containing 111 million emails and passwords was discovered on a French server. The data was collected as a result of various leaks from other services.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword1

🎮Gamigo

In March 2012, German online game publisher Gamigo was hacked and more than 8 million accounts were exposed. The hack involved email addresses and passwords stored as unsalted MD5 hashes.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 79ea9f2383e6b4e0336cc100a39f449a
📆Registration date: 2012-07-06 20:43

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

🧳Exploit.In

In late 2016, a huge list of email/password pairs appeared in the Exploit.In leak. The list contained 593 million unique email addresses and was used for “credential stuffing.”

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopass2word

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword1

💻Ddo.com

In April 2013, the interactive video game Dungeons Dragons Online suffered a data breach that exposed the data of nearly 1.6 million players. The data was actively traded on underground forums and included birthdate email addresses and password hashes.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: df6fa76372dc3a3b2e0dab2279b3e4a9:ye"
🎯IP: 10.64.97.10
👤Nick: graveice

👫JustDate

The alleged hack of the dating website Justdate.com hit the internet in September 2016. It included more than 24 million records: email addresses, dates of birth and physical location. Most likely, the data was obtained from another source.

📩Email: gravekeeps@yahoo.com
🎂Date of Birth: 1983-01-01
🎯Country IP: US
🗾Code of the country: US

💻︎2844

In February 2018, a huge collection of nearly 3,000 suspected data breaches was discovered online. Each file contained an email address and text passwords.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Evony.com

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word
🌐Leak site: Gamigo.com

⛵AhoyGame

Around 2017, the gaming website AhoyGame suffered a data breach that affected 191 thousand users. The breach involved email addresses and passwords stored as Vbulletin hashes.

📩Email: gravekeeps@yahoo.com
🔐Encrypted password: 6a37c7324755deb34ee4dfba2231aa2a
🍚Salt: fb7088

🪬MIX Database

In May 2022, a collection containing 464 million emails and plain text passwords obtained from various leaks appeared on a hacker forum.

📩Email: gravekeeps@yahoo.com
🔑Password: nopass1word

📩Email: gravekeeps@yahoo.com
🔑Password: nopassword


🏢DailyMotion

In October 2016, video sharing platform Dailymotion suffered a data breach. The attack exposed 85 million user accounts and included email addresses, names and bcrypt password hashes.

📩Email: gravekeeps@yahoo.com
👤Nick: graveice

🇺🇸USA Consumer Optin 28 million

In early 2023, a database called “USA Consumer Optin” began to circulate online. It contained the data of 28 million US citizens and was positioned as a spam database. Despite the fact that it can be easily downloaded for free, it is actively sold on the Internet for hundreds of dollars. The database contains emails, phone numbers, names, addresses and other data obtained from various sources.

📩Email: rafbradley@cox.net
📞Telephone: 6022462822
🎂Date of Birth: 2/2/1963
🏘️Address: 2210 w morten ave
🇺🇸State: AZ
🌃City: Phoenix
🏤Postal code: 85021
👤Name: Rafael
👤Surname: Bradley
🚻Floor: M

📞SC Daily Phone Spam List

At the beginning of 2015, a spam list appeared, called SC Daily Phone. It contained almost 33 million records. Data included emails, names, physical and IP addresses, gender, dates of birth and telephone numbers.

📩Email: rafbradley@cox.net
📞Telephone: 6022462822
📆Registration date: 3/1/2013 13:43
🏘️Address: 37 n great rd
🇺🇸State: ma
🌃City: phoenix
🌐Website: getyourgift.com
🎯IP: 70.190.218.70
🏤Postal code: 85021
👤Name: rafael
👤Surname: bradley

📨VerificationsIO

In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data.

📩Email: rafbradley@cox.net