███╗ ███╗ █████╗ ██████╗ ███████╗ ████╗ ████║██╔══██╗██╔══██╗██╔════╝ ██╔████╔██║███████║██║ ██║█████╗ ██║╚██╔╝██║██╔══██║██║ ██║██╔══╝ ██║ ╚═╝ ██║██║ ██║██████╔╝███████╗ ╚═╝ ╚═╝╚═╝ ╚═╝╚═════╝ ╚══════╝ ██████╗ ██╗ ██╗ ██╔══██╗╚██╗ ██╔╝ ██████╔╝ ╚████╔╝ ██╔══██╗ ╚██╔╝ ██████╔╝ ██║ ╚═════╝ ╚═╝ █████╗ ███╗ ██╗████████╗ ██████╗ ███╗ ██╗ ██╔══██╗████╗ ██║╚══██╔══╝██╔═══██╗████╗ ██║ ███████║██╔██╗ ██║ ██║ ██║ ██║██╔██╗ ██║ ██╔══██║██║╚██╗██║ ██║ ██║ ██║██║╚██╗██║ ██║ ██║██║ ╚████║ ██║ ╚██████╔╝██║ ╚████║ ╚═╝ ╚═╝╚═╝ ╚═══╝ ╚═╝ ╚═════╝ ╚═╝ ╚═══╝ ██████╗ ██████╗ █████╗ ██╗ ██╗ ██████╗ ██╗ ██╗ ██╔══██╗██╔══██╗██╔══██╗██║ ██╔╝██╔═══██╗██║ ██║ ██║ ██║██████╔╝███████║█████╔╝ ██║ ██║██║ ██║ ██║ ██║██╔══██╗██╔══██║██╔═██╗ ██║ ██║╚██╗ ██╔╝ ██████╔╝██║ ██║██║ ██║██║ ██╗╚██████╔╝ ╚████╔╝ ╚═════╝ ╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═════╝ ╚═══╝ ______ __ /\__ _\/\ \ \/_/\ \/\ \ \___ __ \ \ \ \ \ _ `\ /'__`\ \ \ \ \ \ \ \ \/\ __/ \ \_\ \ \_\ \_\ \____\ \/_/ \/_/\/_/\/____/ ____ __ /\ _`\ /\ \__ \ \ \/\ \ ___ ___\ \ ,_\ ___ _ __ \ \ \ \ \ / __`\ /'___\ \ \/ / __`\/\`'__\ \ \ \_\ \/\ \L\ \/\ \__/\ \ \_/\ \L\ \ \ \/ \ \____/\ \____/\ \____\\ \__\ \____/\ \_\ \/___/ \/___/ \/____/ \/__/\/___/ \/_/ __ __ /'__`\ /\ \ /\_\L\ \ \_\ \ \/_/_\_<_ /'_` \ /\ \L\ \/\ \L\ \ \ \____/\ \___,_\ \/___/ \/__,_ / ____ _____ _ ____ ___ _ _ ____ | _ \| ____| / \ / ___| / _ \| \ | / ___| | |_) | _| / _ \ \___ \| | | | \| \___ \ | _ <| |___ / ___ \ ___) | |_| | |\ |___) | |_| \_\_____/_/ \_\____/ \___/|_| \_|____/ defend @sherbetwerehusky83 a pedophile ____ _____ ____ ____ ___ _ _ _ _ ___ _ _ _____ ___ | _ \| ____| _ \/ ___| / _ \| \ | | / \ | | |_ _| \ | | ___/ _ \ | |_) | _| | |_) \___ \| | | | \| | / _ \ | | | || \| | |_ | | | | | __/| |___| _ < ___) | |_| | |\ |/ ___ \| |___ | || |\ | _|| |_| | |_| |_____|_| \_\____/ \___/|_| \_/_/ \_\_____| |___|_| \_|_| \___/ Username: TheDoctor_3D Name: Rafael Age: 17 Bithday: August 6 2006 School: South Mountain High school ____ ___ ____ ___ _ _ __ __ _____ ____ ___ _ / ___| / _ \ / ___|_ _| / \ | | | \/ | ____| _ \_ _| / \ \___ \| | | | | | | / _ \ | | | |\/| | _| | | | | | / _ \ ___) | |_| | |___ | | / ___ \| |___ | | | | |___| |_| | | / ___ \ |____/ \___/ \____|___/_/ \_\_____| |_| |_|_____|____/___/_/ \_\ https://youtube.com/@TheDoctor_3D?si=UOKS3VcE9f7Ynb5S https://m.twitch.tv/thedoctor3d https://steamcommunity.com/profiles/76561199082950866 https://open.spotify.com/user/31zc4orxrht2vqodzh3fuxsfovn4 Discord: Username: thedoctor3d USER ID: 725967333419647000 _ ___ ____ _ _____ ___ ___ _ _ | | / _ \ / ___| / \|_ _|_ _/ _ \| \ | | | | | | | | | / _ \ | | | | | | | \| | | |__| |_| | |___ / ___ \| | | | |_| | |\ | |_____\___/ \____/_/ \_\_| |___\___/|_| \_| Country: USA State: Arizona City: Phoenix Coordinates: Latitude: 33.38623920000000000 Longitude: -112.05734370000000000 Accuracy: gps Accuracy-radius: 18 m _ _ ___ __ __ _____ | | | |/ _ \| \/ | ____| | |_| | | | | |\/| | _| | _ | |_| | | | | |___ |_| |_|\___/|_| |_|_____| images of his home: https://imgur.com/a/DG68EWz _ _ ___ _ _ ____ _____ ___ _ _ _____ ___ | | | |/ _ \| | | / ___|| ____| |_ _| \ | | ___/ _ \ | |_| | | | | | | \___ \| _| | || \| | |_ | | | | | _ | |_| | |_| |___) | |___ | || |\ | _|| |_| | |_| |_|\___/ \___/|____/|_____| |___|_| \_|_| \___/ House info: Address: 6614 S 11th St, Phoenix, AZ 85042, USA Single-family Built in 1951 8,960 sq ft lot $133 Redfin Estimate per sq ft 1 parking space Bathroom Information # of Bathroom Fixtures: 3 Heating & Cooling Air Conditioning Type: Refrigeration Heating Type: Forced Air Room Information # of Rooms: 5 Exterior Information Physical Condition: Average Exterior Wall: Frame Wood Building Type: Residential Property Information Subdivision Name: ESTRELLA RANCHO NUMERO DOS Living Sq. Ft: 1,206 Building Sq. Ft: 1,206 # of Stories: 1 Legal Description: LOT A ESTRELLA RANCHO NUMERO DOS N2 E2 OF N 124' OF S 474.6' OF TR A EX E 30' Parking & Garage Information # of Parking Spaces: 1 Lot Information # of Buildings: 1 Land Sq. Ft: 8,960 Legal Lot Number: A Municipality Name: PHOENIX Acres: 0.2057 Zoning Code: R-3 State Use Description: SINGLE FAM RES-URBAN SUBD Assessor Information Assessment Year: 2022 Tax Area: 661300 2022 $481 (−3.0%) $13,180 2021 $496 (+1.3%) $11,760 2020 $490 (+3.5%) $10,800 2019 $474 (−7.3%) $9,210 2018 $511 (+4.9%) $9,210 2017 $487 (+5.1%) $6,170 2016 $463 (+6.2%) $4,920 2015 $436 (−1.6%) $4,210 2014 $443 (+35.9%) $2,970 2013 $326 (−12.0%) $2,010 2012 $370 (−43.3%) $2,360 2011 $653 (−12.5%) $4,700 2010 $747 (−28.5%) $7,300 2009 $1,045 $12,100 Beds — Baths 1 Sq. Ft. 1,206 Stories 1 Lot Size 8,960 Sq. Ft. Style Single Family Residential Year Built 1951 Year Renovated — County Maricopa County APN 11424017 MORE INFORMATIONS ABOUT @TheDoctor_3D house: https://www.redfin.com/AZ/Phoenix/6614-S-11th-St-85042/home/28366454 ___ _ _ |_ _|_ __ __ _ __| | __| |_ __ ___ ___ ___ | || '_ \ / _` |/ _` |/ _` | '__/ _ \/ __/ __| | || |_) | | (_| | (_| | (_| | | | __/\__ \__ \ |___| .__/ \__,_|\__,_|\__,_|_| \___||___/___/ |_| IP ADDRESS: 70.190.218.70 accelerometer: true Adblock: false Applepay: false Googlepay: false Audiodevices: false Battery: 56.00000000000001% Screen: 832 x 384 x 24 colorgamut: srgb Network: wifi RTT: 50 ms Downlink: 0.4 Mbps ECT: 4g Contrast: false cookiesenabled: true Darkmode: true RAM: 4 Gb forcedcolors: false gyroscope: true CPU Threads: 8 hdr: false Incognito: false indexeddb: true Language: en-US Localstorage: true monochrome: false offset: -07:00 Opendatabase: false pixelratio: 2.8125 Platform: Android 10 Plugins: none detected reducedmotion: false sessionstorage: true TIMEZONE: America/Phoenix -07:00 Touchsupport: 5 points vendor: Google Inc. Browser: Chrome 124 Isp: Cox Communications Inc. Asn: AS22773 Domain: cox.com Route: 70.190.0.0/16 Type: isp Network: 70.190.0.0/16 Useragent: Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Mobile Safari/537.36 Fingerprint: 2rom4ut Hostname: ip70-190-218-70.ph.ph.cox.net Postal code: 85001 ____ ____ _____ ___ ______ __ | _ \| _ \|_ _\ \ / / \ / ___\ \ / / | |_) | |_) || | \ \ / / _ \| | \ V / | __/| _ < | | \ V / ___ \ |___ | | |_| |_| \_\___| \_/_/ \_\____| |_| PRIVACY: Vpn: false Proxy: false Tor: false Relay: false Hosting: false Service: none detected ___ __ _ _ _ _ _ _ |_ _|_ __ / _| ___ __ _| |__ ___ _ _| |_ | |__ (_)___ ___ ___| |__ ___ ___ | | | || '_ \| |_ / _ \ / _` | '_ \ / _ \| | | | __| | '_ \| / __| / __|/ __| '_ \ / _ \ / _ \| | | || | | | _| (_) | | (_| | |_) | (_) | |_| | |_ | | | | \__ \ \__ \ (__| | | | (_) | (_) | | |___|_| |_|_| \___/ \__,_|_.__/ \___/ \__,_|\__| |_| |_|_|___/ |___/\___|_| |_|\___/ \___/|_| School: South Mountain High school LOCATION of the school: Latitude: 33.39842760000000000 Longitude: -112.06106980000000000 Domain: enrollams.org REAL IP ADDRESS OF HIS SCHOOL (CLOUDFLARE BYPASS) 50.63.202.57 https://www.domains.ch/en/iphistory/enrollams.org/ ██████╗ █████╗ ████████╗ █████╗ ██╔══██╗██╔══██╗╚══██╔══╝██╔══██╗ ██║ ██║███████║ ██║ ███████║ ██║ ██║██╔══██║ ██║ ██╔══██║ ██████╔╝██║ ██║ ██║ ██║ ██║ ╚═════╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝ ╚═╝ ██████╗ ██████╗ ███████╗ █████╗ ██████╗██╗ ██╗███████╗███████╗ ██╔══██╗██╔══██╗██╔════╝██╔══██╗██╔════╝██║ ██║██╔════╝██╔════╝ ██████╔╝██████╔╝█████╗ ███████║██║ ███████║█████╗ ███████╗ ██╔══██╗██╔══██╗██╔══╝ ██╔══██║██║ ██╔══██║██╔══╝ ╚════██║ ██████╔╝██║ ██║███████╗██║ ██║╚██████╗██║ ██║███████╗███████║ ╚═════╝ ╚═╝ ╚═╝╚══════╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚══════╝╚══════╝ 🗃️Collection #1 In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the first collection found. It contained 12,300 files with a total size of 87 GB. The collection contains more than 2.5 billion lines with emails and passwords for them. There were only 1.25 billion unique rows. For many strings, the site where the leak occurred was indicated. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: gPotato.com [1,9kk] 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: LOTRO.com [746k] 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: NexusMods.com [4,6kk] 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: WarcraftMovies.com [336k] 🗃️Collection #5 In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. The fifth collection contains 16 thousand files with a total size of 42 gigabytes. The files contained 1.25 billion pairs of emails and passwords, but there were only 600 million unique strings. Unlike other collections, there was often information about which site the data was leaked from. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Lotro.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Movies.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: NexMods.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Portal.net 📦Collection of 7,651 databases In December 2022, all databases from the hacker data trading site were made publicly available. A total of 7,651 leaks were published. The data contained only plaintext emails and passwords. A total of 493 million records in all databases. 📩Email: bcox02@hotmail.com 🔑Password: gvbhytf02 🌐Leak site: All_goods_S 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Lotro.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Movies.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: NexMods 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Portal.net 🥔gPotato In July 2007, the multiplayer gaming portal gPotato suffered from a data leak. More than 2 million user accounts were exposed. The site was later merged into Webzen, where the original accounts still exist. The exposed data included usernames, email and IP addresses, MD5 hashed passwords, and personal information such as gender, date of birth, physical address, security questions and answers in plain text. 📩Email: bcox02@hotmail.com 🔐Encrypted password: 5871210ac01e592bb5eb8aae4acf6c48 📆Registration date: Aug 3 2006 12:22PM ❓Secret Question: What is your fathers middle name? 👤Name: bryan 👤Nick: bcoxlye 👤Surname: cox 🗾A country: UNITED STATES 🚻Floor: M 🤐Secret answer: wonly 📚Collection In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history. 📩Email: bcox02@hotmail.com 🔑Password: gvbhytf02 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🎎Roll20 In December 2018, tabletop role-playing game site Roll20 suffered a data breach. The hack affected nearly 4 million customers. Email addresses, IP addresses, names, bcrypt password hashes, and the last 4 digits of credit cards were published. 📩Email: bcox02@hotmail.com 🔐Encrypted password: $2a$10$e/lCiB4f/WvBuaBQ/EZdVOmJhU.Igs2hY8LNBAJAIP5fBjqlj4zzm 📆Registration date: 19.01.2014 04:02:35 🇦🇺Language: en 🎯IP: 72.211.135.246 👤Name: Bryan 👤Nick: Bryan C. 👤Surname: Cox 🤴Status: subscriber 🛍︎Ga$$Pacc In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only emails and unencrypted passwords. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: Lotro.com 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: myfitnesspal_emailpass_50 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🌐Leak site: NexusMods.com ♻︎NexusMods In December 2015, game modding site Nexus Mods released a statement notifying users that they had been hacked. They subsequently dated the hack to July 2013, although there is evidence that the data was sold several months earlier. The hack contained usernames, email addresses and passwords as salted hashes. 📩Email: bcox02@hotmail.com 🔐Encrypted password: 15545342a97c6a96efb6a89b1bef398a 🍚Salt: nA9AV 👤Nick: goose007 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🏋️MyFitnessPal In February 2018, diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique emails along with names, IPs and passwords in the form of SHA-1 and bcrypt hashes. All data, except for bcrypt hashes, was later made publicly available. 📩Email: bcox02@hotmail.com 🔐Encrypted password: 259493fbd06377daa691c2d96658822fad794984 🎯IP: 68.228.226.182 👤Nick: bryancox1984 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🗃️Collection #2 In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the second collection, it was the largest of all and contained 20 thousand files with a total size of 526 GB. These files contained 15.8 billion lines with emails and passwords, but there were only 3.2 billion unique pairs. 📩Email: bcox02@hotmail.com 🔑Password: Misfits02 📩Email: bcox02@hotmail.com 🔑Password: nimble 🚗Parkmobile In March 2021, a leak occurred in the ParkMobile parking service, which exposed the data of 21 million customers. They included emails, names, phone numbers, car numbers and passwords in the form of bcrypt hashes. 📩Email: bcox02@hotmail.com 🔐Encrypted password: $2a$05$6H2unSVB7KuicNbCGpGfn.YYDTwYGAdIcsphaVE9Rhi8eGXzu3TpW 🏎️Car make: govMinesamHeidiHazel 👤Nick: bcox02@hotmail.com 🚘Vehicle number: G203DVAWX6521BCL8001AJM4393CEB0407 ☁️Cloudata Large collection of email-pass data. The database was collected from many files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained. 📩Email: bcox02@hotmail.com 🔑Password: dmlies 📩Email: bcox02@hotmail.com 🔑Password: Gvbhytf02. 📩Email: bcox02@hotmail.com 🔑Password: Gvbhytf123 🕵️‍BreachedForum Combolists Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords. 📩Email: bcox02@hotmail.com 🔑Password: gvbhytf02. 🍕HomeChef In early 2020, food delivery service Home Chef suffered a leak and was subsequently sold online. The hack exposed the information of 9 million customers, including names, IP, zip codes, last 4 digits of credit cards and passwords in the form of bcrypt hashes. 📩Email: bcox02@hotmail.com 🔐Encrypted password: $2a$10$4HnmKR7MrG/POHBmsguOwua/4/A/lk77wR1DX0iMMVec9dU1CBJVO 🎯IP or token: 2600:8800:3788:a250:996e:2bfa:7c7b:89c5 ☄MySpace Around 2008, MySpace suffered a data breach that exposed nearly 360 million accounts. In May 2016, the data was offered for sale on the dark market website "Real Deal" and included email addresses, usernames, and SHA1 hashes of the first 10 characters of the password, converted to lowercase and stored without salt. The exact date of the hack is unknown. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 👤Nick: BryanLye 🐷NeoPets In May 2016, a dataset from virtual pet website Neopets leaked online. The data contains dates of birth, IP, gender and names, as well as almost 27 million emails. Passwords were stored in plain text. 📩Email: bcox02@hotmail.com 🔑Password: nimble 🎂Date of Birth: 1984-05-30 👤Full name: Bryan Cox 👤Nick: bcox02 🗾A country: US 🚻Floor: M 🌄TeraBase64 A huge collection of files published in February 2020 by a person with the handle @HTTSMVKCOM. It contained 3.2 billion lines of plain text emails and passwords, but only 1.28 billion unique lines. All this data was most likely obtained from many other leaks. 📩Email: bcox02@hotmail.com 🔑Password: misfits021 📩Email: bcox02@hotmail.com 🔑Password: nimble 🎯RobinHood In November 2021, online trading platform Robinhood suffered a data breach. Hackers used social engineering on a customer service representative. The incident exposed more than 5 million email addresses and 2 million customer names. 📩Email: bcox02@hotmail.com 📆Last Activity: 2/11/2021 📆Registration date: 1/28/2021 💁‍Account owner: System 📜Adobe In October 2013, 153 million Adobe accounts were hacked, containing names, emails, encrypted passwords and text hints. The cryptography of the passwords was terrible and they were quickly cracked. 📩Email: bcox02@hotmail.com 🔐Partial password: ××××××××2▯ 📩Email: bcox02@hotmail.com 🔑Password: v8gsj2LXIRGaSMtqJlttPQ== 🦸‍Heroes of Newerth In December 2012, an online multiplayer game known as Heroes of Newerth was hacked. More than 8 million accounts were extracted from the system. The data included usernames, email addresses and passwords, but no publicly available passwords currently exist. 📩Email: bcox02@hotmail.com 🍚Salt: \t, 👤Nick: Lye 🧳Exploit.In In late 2016, a huge list of email/password pairs appeared in the Exploit.In leak. The list contained 593 million unique email addresses and was used for “credential stuffing.” 📩Email: bcox02@hotmail.com 🔑Password: gvbhytf02 📩Email: bcox02@hotmail.com 🔑Password: misfits02 📨VerificationsIO In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data. 📩Email: BCOX02@HOTMAIL.COM 👁️Zeeroq Around 2019, about 250 combo players were found in the open directory on the demo.zeeroq.com domain. The number of entries was more than 200 million. The leak contained emails and passwords in plain text. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🍽️Opentable The leak occurred on the website opentable.com, which specializes in selecting and ordering tables in restaurants. The leak occurred in 2020 and contained 12 million email addresses and passwords. 📩Email: bcox02@hotmail.com 🔑Password: gvbhytf02 🪟Microsoft In June 2022, a list of emails and passwords of Microsoft users was published using a hacker formula. This list contained 54 million rows and was obtained by combining data from many other leaks. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🏢DailyMotion In October 2016, video sharing platform Dailymotion suffered a data breach. The attack exposed 85 million user accounts and included email addresses, names and bcrypt password hashes. 📩Email: bcox02@hotmail.com 👤Nick: dmlies 🪬MIX Database In May 2022, a collection containing 464 million emails and plain text passwords obtained from various leaks appeared on a hacker forum. 📩Email: bcox02@hotmail.com 🔑Password: misfits02 🇺🇸USA Consumer Optin 28 million In early 2023, a database called “USA Consumer Optin” began to circulate online. It contained the data of 28 million US citizens and was positioned as a spam database. Despite the fact that it can be easily downloaded for free, it is actively sold on the Internet for hundreds of dollars. The database contains emails, phone numbers, names, addresses and other data obtained from various sources. 📩Email: rafbradley@cox.net 📞Telephone: 6022462822 🎂Date of Birth: 2/2/1963 🏘️Address: 2210 w morten ave 🇺🇸State: AZ 🌃City: Phoenix 🏤Postal code: 85021 👤Name: Rafael 👤Surname: Bradley 🚻Floor: M 📞SC Daily Phone Spam List At the beginning of 2015, a spam list appeared, called SC Daily Phone. It contained almost 33 million records. Data included emails, names, physical and IP addresses, gender, dates of birth and telephone numbers. 📩Email: rafbradley@cox.net 📞Telephone: 6022462822 📆Registration date: 3/1/2013 13:43 🏘️Address: 37 n great rd 🇺🇸State: ma 🌃City: phoenix 🌐Website: getyourgift.com 🎯IP: 70.190.218.70 🏤Postal code: 85021 👤Name: rafael 👤Surname: bradley 📨VerificationsIO In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data. 📩Email: rafbradley@cox.net 🎭DonJuji On February 7, 2023, a hacker under the pseudonym DonJuji made publicly available all the databases he had ever hacked. He said that this was due to the fact that he was changing his field of activity. In total, he published more than 2,000 databases with a total size of 105 gigabytes, mainly in the form of SQL dumps. The data contained more than 150 million emails and related information. 📩Email: gravekeeps@yahoo.com 💾Data: ('71431', '', '82f56de317481a2a317f84ad4599984f', '', '100001213700395', 'John Butters', '', '', '1378447136', '68.227.245.254', '1378447136', '68.227.245.254', ' 🗂️Leak base: crystal_saga_1.39m 📩Email: gravekeeps@yahoo.com 💾Data: INSERT INTO pre_ucenter_members VALUES ('400531','graveice','28ce7e18ba18f923403a0c17e7011721','','','','70.190.218.70','1467945777','0','0','1a299d',''); 🗂️Leak base: forums.gamesprite.me 📩Email: gravekeeps@yahoo.com 💾Data: insert into `yahoo`.`users`(`id`,`email`,`password`) values (3375182,'','nopass1word'); 🗂️Leak base: Yahoo.com 📦Collection of 7,651 databases In December 2022, all databases from the hacker data trading site were made publicly available. A total of 7,651 leaks were published. The data contained only plaintext emails and passwords. A total of 493 million records in all databases. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Evony 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Gamigo 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Mix dump 1.389.856 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 🌐Leak site: 4║800 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword 🌐Leak site: Portal.net 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword1 🌐Leak site: 4║400 📩Email: gravekeeps@yahoo.com:2018-04-19 🔑Password: 15:45:34 🌐Leak site: games.dzucker.com ⛏️MinecraftDatabases Since 2010, there have been more than 1,200 hacks of various MineCraft servers. All of these hacks were collected into large collections and distributed as a means of hacking player accounts in MineCraft. This collection contains emails, nicknames, passwords, IP addresses and other data from all these collections. There are about 57 million rows in total. 📩Email: gravekeeps@yahoo.com 💾Data: (54493, 0, 2, '', 0, '68.227.245.254', 1330231108, 'gravenecron', 'gravenecron', '$H$9krOXTCiZYInC6eSdjWmIB7oTcPQm..', 1330231108, 0, '', 373218763020, '', 1330231291, 1330231108, 1330231287, 'viewtopic.php?f=5&t=71688&p=713610&_f_=5x', '', 0, 0, 0, 0, 0, 0, 1, 'en', -6.00, 0, 'D M d, Y g:i a', 2, 0, '', 0, 0, 0, 0, -3, 0, 0, 't', 'd', 0, 't', 'a', 0, 1, 0, 1, 1, 1, 1, 230271, '', 0, 0, 0, '', '', '', '', '', '', '', '', '', '', '', '', '', '', '709b828b89fac213', 0, 'nopass1word', 0, 0, 0, 0, 0), 📑Leak file: miniwargaming_126.7k 🗃️Collection #5 In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. The fifth collection contains 16 thousand files with a total size of 42 gigabytes. The files contained 1.25 billion pairs of emails and passwords, but there were only 600 million unique strings. Unlike other collections, there was often information about which site the data was leaked from. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: alora.io 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Gamigo.com 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Mix dump 1.389.856 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword 🌐Leak site: Portal.net 📚Collection In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword1 📩Email: gravekeeps@yahoo.com 🔑Password: phone60334 🔖Collection numbers: 1,2,4 🚀RocketText Around January 2020, customer engagement tool RocketText experienced a data breach. The violation included email addresses, home addresses, IP addresses, gender, ethnicity, and telephone numbers (including the operator of the number listed). In total, 32 million records were affected. Rocket Text now operates under the name "LaunchSMS" and was previously known as ApexSMS. 📩Email: gravekeeps@yahoo.com 📞Telephone: 6024872434 📆Registration date: 2019-10-29T14:22:41.000Z 📆date: 2019-10-27 🏘️Address: 1115 E.Emma Ave ⌚Timezone: MST 🇺🇸State: IA 🌃City: Des Moines 🎯IP: 173.23.49.173 🏤Postal code: 50301 👤Name: John 👤Surname: Butters 🗺️Region: Arizona 🗾A country: US 🛍︎Ga$$Pacc In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only emails and unencrypted passwords. 📩Email: gravekeeps@yahoo.com 🔑Password: 48028570 🌐Leak site: Funny-Games.biz 📩Email: gravekeeps@yahoo.com 🔑Password: n01passw0rd 🌐Leak site: Subagames.com 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: EmuParadise.me 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Jagex.com 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: R2Games.com 🎰Nival In February 2016, the Russian gaming company Nival became the target of a hacker attack. Nival was one of several Russian websites hacked as a protest against "Russian foreign policy towards Ukraine." More than 1.5 million accounts were made public, including dates of birth, email addresses, gender, names, languages ​​spoken and usernames. 📩Email: gravekeeps@yahoo.com 📆Last Activity: 27.08.2013 16:44:44 📆Registration date: 27.08.2013 16:44:44 ⓕFacebookID: 100001213700395 🚻Floor: 1 📩Email: gravekeeps@yahoo.com 📆Last Activity: 27.08.2013 16:44:44 📆Registration date: 27.08.2013 16:44:44 ⓕFacebookID: 100001213700395 👤Full name: John Butters 🚻Floor: 1 🗃️Collection #1 In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the first collection found. It contained 12,300 files with a total size of 87 GB. The collection contains more than 2.5 billion lines with emails and passwords for them. There were only 1.25 billion unique rows. For many strings, the site where the leak occurred was indicated. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Evony.com [28kk] 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Gamigo.com [8,2kk] 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword 🌐Leak site: gPotato.com [1,9kk] 🥔gPotato In July 2007, the multiplayer gaming portal gPotato suffered from a data leak. More than 2 million user accounts were exposed. The site was later merged into Webzen, where the original accounts still exist. The exposed data included usernames, email and IP addresses, MD5 hashed passwords, and personal information such as gender, date of birth, physical address, security questions and answers in plain text. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 8c54a5f14da6824b117780a2676d7593 📆Registration date: Feb 24 2007 9:24PM ❓Secret Question: What is your favorite pastime? 👤Name: jo 👤Nick: gravekeeps 👤Surname: but 🗾A country: UNITED STATES 🚻Floor: M 🤐Secret answer: yugioh ☁️Cloudata Large collection of email-pass data. The database was collected from many files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained. 📩Email: gravekeeps@yahoo.com 🔑Password: 2018-04-19 📩Email: gravekeeps@yahoo.com 🔑Password: 48028570 📩Email: gravekeeps@yahoo.com 🔑Password: graveice 📩Email: gravekeeps@yahoo.com 🔑Password: Nopassword1! 📩Email: gravekeeps@yahoo.com.mx 🔑Password: nopass2word 📩SpecialKSpamList At the end of 2015, a spam list known as the “Special K Data Feed” was discovered on the Internet, containing almost 31 million entries. Data includes names, physical and IP addresses, gender, dates of birth and telephone numbers. 📩Email: gravekeeps@yahoo.com 🎯IP: 69.13.188.39 👤Name: Russell 👤Surname: Groce 📩Email: gravekeeps@yahoo.com 📞Telephone: 7065991115 🎂Date of Birth: 5/3/84 🏘️Address: 750 S Broad StToccoa1998 🎯IP: 209.61.134.138 👤Name: Russell 👤Surname: Groce 🌄TeraBase64 A huge collection of files published in February 2020 by a person with the handle @HTTSMVKCOM. It contained 3.2 billion lines of plain text emails and passwords, but only 1.28 billion unique lines. All this data was most likely obtained from many other leaks. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword1 📩Email: gravekeeps@yahoo.com 🔑Password: phone60334 🕹️FunnyGames In April 2018, online entertainment site Funny Games suffered a data breach that exposed 764,000 emails, as well as IP addresses and salted MD5 hashes of passwords. In July, the incident was reported to Funny Games, which acknowledged the breach and determined that it was caused by outdated code that was no longer in use. The number of entries in the hack is approximately half of the user base. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: da50f3c6707b3de253fee33554b573ab 🍚Salt: ?.3 🎯IP: 4.240.24.10 👤Nick: nighmare 🎎Roll20 In December 2018, tabletop role-playing game site Roll20 suffered a data breach. The hack affected nearly 4 million customers. Email addresses, IP addresses, names, bcrypt password hashes, and the last 4 digits of credit cards were published. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: $2a$10$iuRFUkefYr45J/ppuIrcUefDSBjL.pg3zQJwX2qb106NbM3g31qn6 📆Registration date: 29.10.2012 08:55:41 🇦🇺Language: en 🎯IP: 166.181.82.218 👤Name: john 👤Nick: john b. 👤Surname: butters 🤴Status: subscriber 📲ApexSMS Around April 2019, the cloud-based SMS platform ApexSMS (also known as "MobileDrip") suffered a data breach. Because of her, 88 million posts were published. The violation included full names, email addresses, physical addresses, IP addresses and phone numbers. 📩Email: gravekeeps@yahoo.com 📞Telephone: 6024872434 🏘️Address: 4265 connick way 🇺🇸State: AZ 🌃City: Phoenix 🏤Postal code: 85003 👤Name: John 👤Surname: Butters 🗺️Region: Arizona 🗾A country: US 💼Modern Business Solutions In October 2016, a large Mongo database file containing tens of millions of accounts was published by Twitter. The database contained more than 58 million unique emails, as well as IP addresses, names, home addresses, gender, positions, dates of birth and telephone numbers. The data is attributed to Modern Business Solutions, a company that provides data storage and database hosting solutions. 📩Email: gravekeeps@yahoo.com 📆Registration date: 2016-06-26T13:31:01.677Z 👤Name: John 🚻Floor: M 👙Fling In 2011, the adult social network Fling was hacked. 40 million accounts were exposed. The leak included personal data, as well as email addresses and passwords stored in plain text. 📩Email: gravekeeps@yahoo.com 🔑Password: phone60334 📆release date: 2010-08-09 15:02:11 📆Registration date: 2010-04-12 05:05:12 🎂Date of Birth: 1987-11-03 🎯IP: 72.201.99.197 👤Nick: gravekeeps46 🚻Floor: MAN 🤔Interests: FETISHGROUPSEXONLINE FLIRTINGOTHER 🧠Interested: WOMAN 🕵️‍BreachedForum Combolists Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word123 📩Email: gravekeeps@yahoo.com 🔑Password: toqquycw 🇺🇸USA phones database A huge database of US residents containing 183 million rows. It was published in April 2022 and included full names, phone numbers, emails, gender and career details. There were very few emails - approximately 9.2 million. 📩Email: GRAVEKEEPS@YAHOO.COM 📞Telephone: 6024872434 🏘️Address: 11623 N 21ST DR 🇺🇸State: AZ 🌃City: PHOENIX 🏤Postal code: 85021 👤Name: JOHN 👤Surname: BUTTERS 📡Mobile operator: CRICKET 🚻Floor: MALE 🍾GameSprit In December 2019, the popular gaming platform GameSprite was hacked. The website was hacked via the admin panel “discuz! Forum" along with several other gaming websites. The hack affected more than 7 million users and exposed email addresses, usernames and salted MD5 passwords. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 28ce7e18ba18f923403a0c17e7011721 📆Registration date: 08.07.2016 05:42:57 🍚Salt: 1a299d 🎯IP: 70.190.218.70 👤Nick: graveice 🪃DuelingNetwork Dueling Network is a Flash game based on the card game Yu-Gi-Oh. In March 2017, it suffered a data breach. The site itself was taken offline in 2016, but the forum remained online for another year. The data breach exposed usernames, IP addresses, email addresses and passwords in the form of MD5 hashes. The leak includes 2.5 million records. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: f88c070419de4472ad677773d5c9cbb3 🎯IP: 68.3.112.235 👤Nick: graveice 🤐AntiPublic In December 2016, a huge leak containing 458 million unique emails and passwords appeared in the public domain. It was used to hack accounts in which the owner reused his password. Similar leaks are also used to assess the novelty of data in other databases. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 📩Email: gravekeeps@yahoo.com 🔑Password: phone60334 📨VerificationsIO In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data. 📩Email: gravekeeps@yahoo.com 🇺🇸State: MO 🌃City: SPRINGFIELD 🌐Website: Dealzingo.com 🎯IP: 173.27.146.94 🏤Postal code: 65807 👤Name: John 👤Surname: Butters 🍓AdultFriendFinder 2016 In October 2016, adult entertainment company Friend Finder suffered a massive data breach. The exposed data included names, SHA-1 hashed passwords, and 170 million unique emails. This company was previously hacked in May 2015, but then the leak contained only 4 million records. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 5W249 📆Last Activity: 2010-04-12 01:09:31 🇦🇺Language: english 👤Nick: graveice ⚽Dfb.de Dfb.de is a German football website. In November 2016, information appeared that it had leaked 3.3 million users. Another 16 million users were published later. However, upon closer examination, it became clear that the leak did not originate from the Dfb.de website, but from somewhere else, so its source remains unknown. The leak contains only emails and passwords. 📩Email: gravekeeps@yahoo.com 🔑Password: 96ff2397fd4e82443f180bef5d5af8a4 🗡️SwordFantasy In January 2017, the online MMO and role-playing game SwordFantasy suffered a data breach that affected 3.2 million users. The breach included usernames, email addresses, IP addresses and passwords stored as salted MD5 hashes. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 28ce7e18ba18f923403a0c17e7011721 📆Registration date: 1467945777 🍚Salt: 1a299d 🎯IP: 70.190.218.70 👤Nick: graveice 🕯️EmuParadise In April 2018, the self-proclaimed "world's largest retro gaming website" Emuparadise suffered a data breach. 1.1 million email addresses, IP addresses, usernames and passwords were discovered as salted MD5 hashes. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 8e7fbc415939d223de484a67d2280011:b^O/V[{X#&2g7rtGv]agWf]R&o1{4N 👤Nick: graveice 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🔐LeakBase Collection Leakbase.cc is one of the sites that publish various leaks. This database contains all leaks from the “Mixed Database” section on this site, containing emails and passwords. There were 50GB of files (1.5 billion rows) in this partition. After deduplication and removal of rows from the collections, only 210 million remained. The data was downloaded in early 2023. 📩Email: gravekeeps@yahoo.com 🔑Password: graveice 🥫Onliner Spambot In August 2017, a spam bot called "Onliner Spambot" was identified by security researcher Benkow mokueq. The malware contained a server component located on an IP address in the Netherlands, which exposed a large number of files containing personal information. It contained 711 million unique emails, many of which also included passwords. 📩Email: gravekeeps@yahoo.com 📑Leak file: Email_yahoo.com_usa.txt 🧰Pemiblanc In April 2018, a Pemiblanc list containing 111 million emails and passwords was discovered on a French server. The data was collected as a result of various leaks from other services. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword1 🎮Gamigo In March 2012, German online game publisher Gamigo was hacked and more than 8 million accounts were exposed. The hack involved email addresses and passwords stored as unsalted MD5 hashes. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 79ea9f2383e6b4e0336cc100a39f449a 📆Registration date: 2012-07-06 20:43 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🧳Exploit.In In late 2016, a huge list of email/password pairs appeared in the Exploit.In leak. The list contained 593 million unique email addresses and was used for “credential stuffing.” 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopass2word 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword1 💻Ddo.com In April 2013, the interactive video game Dungeons Dragons Online suffered a data breach that exposed the data of nearly 1.6 million players. The data was actively traded on underground forums and included birthdate email addresses and password hashes. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: df6fa76372dc3a3b2e0dab2279b3e4a9:ye" 🎯IP: 10.64.97.10 👤Nick: graveice 👫JustDate The alleged hack of the dating website Justdate.com hit the internet in September 2016. It included more than 24 million records: email addresses, dates of birth and physical location. Most likely, the data was obtained from another source. 📩Email: gravekeeps@yahoo.com 🎂Date of Birth: 1983-01-01 🎯Country IP: US 🗾Code of the country: US 💻︎2844 In February 2018, a huge collection of nearly 3,000 suspected data breaches was discovered online. Each file contained an email address and text passwords. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Evony.com 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 🌐Leak site: Gamigo.com ⛵AhoyGame Around 2017, the gaming website AhoyGame suffered a data breach that affected 191 thousand users. The breach involved email addresses and passwords stored as Vbulletin hashes. 📩Email: gravekeeps@yahoo.com 🔐Encrypted password: 6a37c7324755deb34ee4dfba2231aa2a 🍚Salt: fb7088 🪬MIX Database In May 2022, a collection containing 464 million emails and plain text passwords obtained from various leaks appeared on a hacker forum. 📩Email: gravekeeps@yahoo.com 🔑Password: nopass1word 📩Email: gravekeeps@yahoo.com 🔑Password: nopassword 🏢DailyMotion In October 2016, video sharing platform Dailymotion suffered a data breach. The attack exposed 85 million user accounts and included email addresses, names and bcrypt password hashes. 📩Email: gravekeeps@yahoo.com 👤Nick: graveice 🇺🇸USA Consumer Optin 28 million In early 2023, a database called “USA Consumer Optin” began to circulate online. It contained the data of 28 million US citizens and was positioned as a spam database. Despite the fact that it can be easily downloaded for free, it is actively sold on the Internet for hundreds of dollars. The database contains emails, phone numbers, names, addresses and other data obtained from various sources. 📩Email: rafbradley@cox.net 📞Telephone: 6022462822 🎂Date of Birth: 2/2/1963 🏘️Address: 2210 w morten ave 🇺🇸State: AZ 🌃City: Phoenix 🏤Postal code: 85021 👤Name: Rafael 👤Surname: Bradley 🚻Floor: M 📞SC Daily Phone Spam List At the beginning of 2015, a spam list appeared, called SC Daily Phone. It contained almost 33 million records. Data included emails, names, physical and IP addresses, gender, dates of birth and telephone numbers. 📩Email: rafbradley@cox.net 📞Telephone: 6022462822 📆Registration date: 3/1/2013 13:43 🏘️Address: 37 n great rd 🇺🇸State: ma 🌃City: phoenix 🌐Website: getyourgift.com 🎯IP: 70.190.218.70 🏤Postal code: 85021 👤Name: rafael 👤Surname: bradley 📨VerificationsIO In February 2019, the email verification service Verifications.io was damaged. Data in MongoDB was left publicly accessible without a password, which exposed 763 million unique emails, phone numbers and IPs. Passwords were not included in the data. 📩Email: rafbradley@cox.net