Has your personal information been leaked in a databreach?
Search over 400+ Billion records on Darkhive, HEROICS Database fo compromised credentials.
🔍 Live Recent Searches
Ie_Cloud_Ie_Lgs. uploaded by Unknown
In October 2022, a telegram user uploaded a stealer log file that exposed 15 records of endpoints, email, API host and passwords.
BitMart
In July 2025, BitMart, the official portal of BitMart, a global centralized cryptocurrency exchange that operates in over 180 countries and serves more than 9 million users worldwide, based in the Cayman Islands, suffered a data breach that affected 762,293 users. The compromised data included email addresses, phone numbers, registration dates, and geographic locations. Users should be vigilant against phishing attacks and ensure their accounts use strong, unique credentials with two-factor authentication enabled.
Driving Brilliance
In June 2019, Driving Brilliance, a U.S.-based online driver education platform called Driving Brilliance, licensed and approved by the Indiana Bureau of Motor Vehicles, suffered a data breach that affected 36,500 users. The compromised data included email addresses and plaintext passwords. To strengthen cybersecurity, users should avoid using easily guessable passwords and regularly update them to reduce the risk of unauthorized access.
Loading
In August 2018, Loading, an established online community and content publisher for gaming in Sweden—a nonprofit destination centered around game talk, user content, and community-driven culture, suffered a data breach that affected 39,828 users. The compromised data included email addresses and MD5 password hashes. Using reputable password managers and avoiding password reuse across sites are critical cybersecurity measures.
Market Press Release
In August 2018, Market Press Release, a press release distribution service founded in 2008 and based in New Delhi, India, operated by Kenovate Solutions (also known as SWAAS Entertainment LLP), suffered a data breach that affected 75,695 users. The compromised data included email addresses and plaintext passwords. Avoiding simple or reused passwords and enabling multi-factor authentication helps protect against credential theft.
INTI International University & Colleges
In August 2018, INTI International University & Colleges, a well-established Malaysian private university with multiple campuses and a broad academic offering, especially geared toward international students, suffered a data breach that affected 23,324 users. The compromised data included email addresses and bcrypt password hashes. Even with stronger hashing, users should change passwords and monitor accounts after a breach.
Macquarie
In August 2018, Macquarie, a now-defunct U.S.-based commercial and sales website, suffered a data breach that affected 100,482 users. The compromised data included email addresses and password hashes stored in an unknown format. It is vital to change passwords after any breach and to use secure, modern hashing algorithms for storing credentials.
Loot100
In August 2018, Loot100, the now-defunct public-facing site for Loot100, a quiz-based e-commerce and voucher portal operated by SWAAS Entertainment LLP, based in New Delhi, India, suffered a data breach that affected 59,743 users. The compromised data included email addresses and MD5 password hashes. Users should be cautious with reused credentials and consider updating passwords after breaches.
DiversityWorking
In November 2017, DiversityWorking, a US-based online job board and resource platform focused on promoting Diversity, Equity & Inclusion (DEI) in hiring, connecting employers committed to inclusive recruitment with diverse professionals, suffered a data breach that affected 175,047 users. The compromised data included email addresses and plaintext passwords. It is important to use strong, unique passwords for each account and enable two-factor authentication to enhance cybersecurity.
Suzuki Hyperlocal CMS
In April 2025, the login portal for the Suzuki Hyperlocal CMS—a lead management platform designed for Suzuki’s internal sales teams in Indonesia—suffered a data breach affecting 36,398 users. The compromised data included email addresses, phone numbers, full names, and dates. This breach emphasizes the importance of implementing strong cybersecurity controls, especially for internal tools that manage sensitive customer and employee data.
CloudTrader
In February 2023, CloudTrader, a cloud-based and open-source trading software based in the U.S., experienced a data breach exposing approximately 127,000 unique subscriber records containing email addresses, full names, phone numbers, IP addresses, and plaintext passwords. Protecting such sensitive information is crucial to prevent unauthorized access and uphold customer trust.
CoinSpark
In July 2022, CoinSpark suffered a data breach exposing nearly 18,000 user records containing email addresses, usernames, and bcrypt hashed passwords. Protecting such sensitive information is crucial to safeguarding customer trust and preventing unauthorized access. Ensuring robust cybersecurity measures is essential to mitigate risks and maintain security.
Standardbred Owners Association of New York
In June 2019, the Standardbred Owners Association of New York, a member-driven organization representing owners, trainers, and drivers of Standardbred harness racing horses in New York State—particularly at Yonkers Raceway—suffered a data breach that affected 36,688 users. The compromised data included email addresses and plaintext passwords. Organizations serving niche professional communities must implement basic cybersecurity measures such as encrypting user credentials, especially when handling personally identifiable information (PII) of members and affiliates.
Linkin Park Fan Fiction
In August 2018, Linkin Park Fan Fiction, a U.S.-based fan fiction archive dedicated exclusively to Linkin Park fan works, suffered a data breach that affected 60,377 users. The compromised data included email addresses and MD5 password hashes. Creative communities should ensure user data is protected with modern security practices, even when operating on niche or legacy platforms.
Workwear Outlet
In August 2018, Workwear Outlet, a UK based ecommerce platform, suffered a data breach affecting over 32,000 unique records. The exposed data includes email addresses and passwords hashed with SHA1. Strengthening cybersecurity practices is essential to ensure the protection of user credentials.
Win Prizes Online
In August 2018, Win Prizes Online, a US based online portal and directory for sweepstakes, contests, and giveaways, suffered a data breach affecting around 133 thousand records. The exposed data includes over 132,000 unique email addresses and plaintext passwords. Implementing secure password handling and strong cybersecurity practices is critical to protect user data.
Wplay ISRL
In August 2018, Wplay ISRL, a defunct Israeli gaming platform, suffered a data breach affecting over 35 thousand unique records. The exposed data includes email addresses and passwords hashed with PHPass. Ongoing cybersecurity vigilance is essential to protect user data regardless of a platform’s status.
VSPORT
In August 2018, VSPORT, an Austrian sports platform, suffered a data breach affecting around 28 thousand records. The exposed data includes nearly 2600 unique email addresses and passwords hashed with MD5. Upgrading encryption methods is essential to ensure proper cybersecurity and protect user credentials.
Leeds Rumours Mobile
In August 2018, Leeds Rumours Mobile, the mobile-optimized version of Leeds Rumours—a U.K.-based, independently run fan-driven South Leeds United football rumours and discussion forum—suffered a data breach that affected # users. The compromised data included email addresses and MD5 password hashes. Fan forums must adopt better hashing algorithms and enforce stricter access controls to maintain user trust and online safety.
liderazgoymercadeo
In August 2018, liderazgoymercadeo, a now-defunct Spanish blog website, suffered a data breach that affected 86,932 users. The compromised data included email addresses and plaintext passwords. Even smaller content platforms must implement encryption and use secure frameworks to protect their users from exploitation.
Unique fingerprints of over 15 billion email addresses
The Worlds Largest Breach Database
Over 15 Billion Records
Our Data Collection Process
Our lives rely on technology. We use it to do our jobs, entertain ourselves and stay connected. As technology continues to grow, our reliance on that technology does as well.
An organization’s employee and/or customer databases are either stolen or leaked by a malicious party
The compromised data is placed on the dark web where malicious threats and attackers obtain the data
HEROIC threat analysts discover the leaked and compromised data in hacker forums, paste bins, etc.
The data is then verified, cleaned and uploaded into HEROIC DarkHive™ for search and reporting
Users and organizations using HEROIC receive account alerts and other remediation actions