DarkHive Breach Catalog

Breached records added in the last 30 days: 62,807,686

stealer_log Telegram StarLinkClouds Logs v3 6-11-25 by .boxed.pw

Telegram StarLinkClouds Logs v3 6-11-25 by .boxed.pw

Breached Records: 24,805

On June 11, 2025, a stealer log titled StarLink[Logs] v.3 was shared on a Telegram channel. It exposed rougly 25,000 email addresses, along with plaintext passwords, homepage URLs, IP addresses, and system details of infected machines. This incident underscores the ongoing need for strong cybersecurity measures to prevent the spread of stealer malware.

Leaked Data Types: Email Address, Plaintext Password, HomePage URL

Added on July 1, 2025

stealer_log Telegram CuckooLogs 6-17-25 by .boxed.pw

Telegram CuckooLogs 6-17-25 by .boxed.pw

Breached Records: 69,085

On June 17, 2025, a stealer log titled CuckooLogsPublic-20250617 was shared on a Telegram channel. The log exposed around 69,085 email addresses, as well as plaintext passwords, homepage URLs, and system information on affected devices. This type of breach, stemming from infostealer malware, underscores the urgent need for proactive cybersecurity measures—including the use of password managers, antivirus protection, and routine system monitoring—to mitigate the risk of identity theft and further exploitation.

Leaked Data Types: Email Address, Username, IP Address, Credit Card, Plaintext Password, HomePage URL

Added on July 1, 2025

stealer_log Telegram RusCloud 6-16-25 by .boxed.pw

Telegram RusCloud 6-16-25 by .boxed.pw

Breached Records: 885

On June 17, 2025, a stealer log titled Logs_16 June was shared on a Telegram channel. The log exposed around 885 email addresses, as well as plaintext passwords, homepage URLs, and system information on affected devices. This type of breach, stemming from infostealer malware, underscores the urgent need for proactive cybersecurity measures—including the use of password managers, antivirus protection, and routine system monitoring—to mitigate the risk of identity theft and further exploitation.

Leaked Data Types: Email Address, Username, IP Address, Credit Card, Plaintext Password, HomePage URL

Added on July 1, 2025

stealer_log Telegram StarLinkClouds Logs 6-10-25 by .boxed.pw

Telegram StarLinkClouds Logs 6-10-25 by .boxed.pw

Breached Records: 39,266

On June 10, 2025, a stealer log titled StarLink[Logs] was circulated through a Telegram channel. The log exposed around 39,000 email addresses, along with plaintext passwords, usernames, homepage URLs, IP addresses, and system information from the compromised devices. This incident reinforces the necessity of strong cybersecurity defenses to guard against stealer malware threats.

Leaked Data Types: Email Address, Plaintext Password, HomePage URL

Added on July 1, 2025

database Armorama

Armorama

Breached Records: 54,372

In February 2018, Armorama, a well-established international community and media hub for armor and AFV scale modelers, hosted by the KitMaker Network in the United States, suffered a data breach that affected 54,372 users. The compromised data included email addresses and MD5 password hashes. Due to the weak security of MD5, users should change affected passwords and use unique, strong ones going forward.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database InMovil

InMovil

Breached Records: 43,782

In June 2022, InMovil, a Spanish e-commerce platform specializing in mobile phones, suffered a data breach exposing approximately 8 million records containing nearly 44,000 unique email addresses, full names, IP addresses, birthdays, and MD5 hashed passwords. The incident highlights the importance of implementing strong cybersecurity measures to protect sensitive information and prevent such breaches from escalating risks.

Leaked Data Types: Email Address, Password Hash, First Name, Last Name, IP Address, Birthday

Added on June 27, 2025

database Cambridge Australia

Cambridge Australia

Breached Records: 411,285

In August 2018, Cambridge Australia suffered a data breach affecting nearly 1 million records. The exposed data includes over 411,000 unique email addresses and passwords hashed using either MD5 or bcrypt. The presence of weak hashing like MD5 poses a significant risk to account security. Adopting consistent, modern encryption methods is essential to protect user data and prevent unauthorized access.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database Avifauna

Avifauna

Breached Records: 34,558

In October 2017, Avifauna, a Danish ecommerce platform specializing in pet supplies, suffered a data breach affecting nearly 35 thousand unique records. The exposed data includes email addresses and MD5 hashed and salted passwords. Despite salting, the use of MD5 leaves passwords vulnerable to modern cracking techniques. Adopting secure, up-to-date hashing algorithms is essential to ensure strong protection of user credentials.

Leaked Data Types: Email Address, Password Hash, Salt

Added on June 27, 2025

database BDSM Story

BDSM Story

Breached Records: 87,050

In August 2018, BDSM Story, a pornographic site, suffered a data breach affecting approximately 90 thousand records. The exposed data includes over 87,000 unique email addresses and either plaintext or MD5 hashed passwords. Using strong encryption and maintaining robust cybersecurity practices are essential to protect user anonymity and data.

Leaked Data Types: Email Address, Password Hash, Plaintext Password

Added on June 27, 2025

database EMESCN

EMESCN

Breached Records: 27,893

In August 2018, EMESCN, a now-defunct U.K.-based educational website for migrants, ethnic minorities, and stateless children, suffered a data breach that affected 27,893 users. The compromised data included email addresses and bcrypt password hashes. Although bcrypt is a stronger hashing method, users should still rotate passwords to be safe.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database WorldShop

WorldShop

Breached Records: 73,698

In August 2018, WorldShop, a now-defunct Lufthansa Miles & More shopping portal based in Germany/Europe, suffered a data breach that affected 73,698 users. The compromised data included email addresses and plaintext passwords. Users should reset passwords immediately and avoid reusing them across services.

Leaked Data Types: Email Address, Plaintext Password

Added on June 27, 2025

database InfosMarket

InfosMarket

Breached Records: 330

In November 2022, InfosMarket, an ecommerce platform based in the Democratic Republic of Congo, suffered a data breach affecting approximately 140,000 records. The exposed data included over 300 unique email addresses, usernames, and PHPass hashed passwords. Proper cybersecurity measures are essential to protect sensitive user information and safeguard online platforms from potential breaches like this one.

Leaked Data Types: Email Address, Password Hash, Username

Added on June 27, 2025

database Canal Educatif

Canal Educatif

Breached Records: 73,137

In August 2018, Canal Educatif, a non-commercial French educational video platform for students, teachers, and lifelong learners, suffered a data breach that affected 73,137 users. The compromised data included email addresses and MD5 password hashes. Users should secure their accounts with updated passwords and avoid services relying on outdated hash algorithms.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database Flashgame.Hehagame

Flashgame.Hehagame

Breached Records: 888,460

In March 2018, Flashgame.Hehagame, a Taiwanese online flash-game portal offering daily updated games, guides, and community features for Hong Kong and Taiwan gamers, suffered a data breach that affected 888,460 users. The compromised data included email addresses and MD5 password hashes. Users should update their passwords and avoid reusing old ones on insecure platforms.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database I Paid a Bribe

I Paid a Bribe

Breached Records: 4,919

In May 2022, I Paid a Bribe, an Indian platform enabling anonymous reporting of bribery cases, suffered a data breach exposing approximately 8.5 million records containing nearly 5000 unique email addresses, phone numbers, usernames, full names, IP addresses, and hashed passwords using PHPass or MD5. Proper cybersecurity measures are vital to protect sensitive information and prevent similar breaches from causing significant harm.

Leaked Data Types: Email Address, Phone Number, Password Hash, Username, First Name, Last Name, IP Address

Added on June 27, 2025

database Superfate

Superfate

Breached Records: 120,055

In August 2018, Superfate, the English version of a largely Asia-focused fortune-telling subscription service catering to users in Taiwan, suffered a data breach that affected 120,055 users. The compromised data included email addresses and plaintext passwords. Users should update their passwords immediately and avoid services that store credentials in plain text.

Leaked Data Types: Email Address, Plaintext Password

Added on June 27, 2025

database FlyingHearts

FlyingHearts

Breached Records: 308,055

In September 2018, FlyingHearts, a now-defunct website based in the Czech Republic that provided immigration legal support services, suffered a data breach that affected 304,550 users. The compromised data included email addresses and passwords stored both as plaintext and bcrypt hashes. While bcrypt is relatively secure, the presence of plaintext passwords indicates poor handling practices; affected users should change passwords and exercise caution.

Leaked Data Types: Email Address, Password Hash, Plaintext Password

Added on June 27, 2025

database Arendator

Arendator

Breached Records: 188,790

In August 2018, Arendator, a now-defunct Russian real estate informational website, suffered a data breach that affected 188,790 users. The compromised data included email addresses and password hashes stored in an unknown format. Without knowing the strength of the hashing, users are strongly advised to update passwords and use only trusted services.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database Bunedir

Bunedir

Breached Records: 46,669

In August 2018, Bunedir, a Turkish question and answer website, suffered a data breach affecting around 50 thousand records. The exposed data includes nearly 47,000 unique email addresses and MD5 hashed passwords. Reliance on outdated hashing algorithms weakens password security. Upgrading to modern encryption standards is essential to protect user credentials and maintain platform integrity.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

database AQAD (ASSET Question-A-Day)

AQAD (ASSET Question-A-Day)

Breached Records: 328,828

In August 2018, AQAD (ASSET Question-A-Day), an educational initiative by Educational Initiatives Pvt Ltd in India, suffered a data breach that affected 328,828 users. The compromised data included email addresses and MySQL password hashes. Users should update passwords and ensure that reused credentials on other platforms are changed to prevent unauthorized access.

Leaked Data Types: Email Address, Password Hash

Added on June 27, 2025

Get Early Access to the Guardian Platform

HEROIC is close to launching our next-generation platform where you can search, secure, and monitor all of your identities. To be the first in line, simply insert your email and you'll be added to the list

Please correct the marked field(s) below.

Be the first to know when we launch

HEROIC is still under development, but we are well underway. We estimate launching in early 2024. Subscribing lets you know when we launch, and how you can be the first to reserve your HERO's (special currency specific to the platform).

Sign Up for Our Newsletter

Email marketing by Interspire

Scan to sign up

Scan to sign up instantly

24/7 Dark Web Monitoring
Instant Breach Alerts
Secure Data Protection
Your Data is at Risk

Your Personal Information is Exposed

We found your data exposed in multiple breaches. This includes:

  • Email addresses
  • Passwords
  • Phone numbers
  • Financial information
Secure My Information Now

Your information is protected by enterprise-grade security

Your Breach Details

Date:
Severity:
Records Exposed:

Your Exposed Information

Your Risk Level

How This Affects You

Full Breach Details

Premium Insights

Unlock Critical Security Information

Create a free account to access:

  • Full Breach Impact Analysis
  • Identity Theft Risk Score
  • Exposed Credentials Details
  • Personalized Security Recommendations
Create Free Account

Identity Theft Risk Score

Risk Score: 8.7/10 - Critical

Data Exposure Analysis

Passwords Critical
Financial High
Personal Medium
Social High
Security Critical

Breach Timeline Analysis

March 2024 Multiple credentials exposed in recent data breach
January 2024 Password found in dark web marketplace
December 2023 Personal information leaked in major security incident

Security Recommendations

High Priority
Password Security

Critical: Change compromised passwords immediately and enable 2FA on all accounts

Important
Financial Protection

Monitor credit reports and set up fraud alerts with major credit bureaus

Recommended
Identity Protection

Enable advanced identity monitoring and dark web surveillance