DARKHIVE™
The world’s largest database of compromised credentials.
Our dark web analysts have uncovered over 100+ billion compromised records stemming from tens of thousands of company data breaches. Discover if your company, employees, or customers have been compromised.
Database Leaks
Stealerlogs
Pastebins
Combolists
Access sensitive data and breach insights
Data holds no value unless it’s actionable. Our database will show email addresses, passwords (including hashes), usernames, IP addresses and any other information that may have been exposed for your team to properly remediate.
Over 100 Billion+ Breached Records From The Dark Web
Data is breached and then leaked online
hEROIC UNCOVERS THE DATA AS IT’S SHARED
DATA IS CLEANED, Processed, & distributed
Data is uploaded into the HEROIC DarkHive™ for compromised credential search and reporting capabilities utilizing our advanced AI Engine.
PhonePanda
In June 2025, PhonePanda, a Malaysian mobile phone retailer operating around 20 physical outlets across Malaysia since 1992, suffered a data breach that affected 1.8 million users. The compromised data included phone numbers, full names, and geographic locations. While no passwords were exposed, users should be alert to potential scam calls or targeted phishing attempts and verify the authenticity of any unsolicited communications.
Universitas Indonesia
In July 2024, Universitas Indonesia, the official domain of Universitas Indonesia (UI)—one of Indonesia’s leading public universities, with campuses in Depok (main campus) and Salemba, Jakarta—suffered a data breach that affected 4,957 users. The compromised data included email addresses, phone numbers, full names, birthdates, gender, geographic locations, physical addresses, and dates. Since this breach involves extensive personal information, users should monitor accounts for identity theft risks, be cautious of targeted scams, and consider placing fraud alerts where possible.
Mashithantu
In August 2018, Mashithantu, a well-known Indian Malayalam language portal offering bilingual dictionary lookup, learning games, and crossword features tailored for Malayalam speakers—especially learners and children in Kerala—suffered a data breach that affected 28,100 users. The compromised data included email addresses and MD5 password hashes. It is important to avoid reusing passwords and to enable additional account security measures where available.
Kulturkurier
In August 2018, Kulturkurier, Germany’s leading platform for cultural publicity and event dissemination—streamlining newsletter management and event distribution across media networks to support visibility and engagement for cultural institutions nationwide—suffered a data breach that affected 21,289 users. The compromised data included email addresses and MD5 password hashes. Users should replace affected passwords and use services that store credentials with modern, secure hashing methods.
The Business Network Young Professionals
In August 2018, The Business Network Young Professionals, a now-defunct U.K.-based personal development program, suffered a data breach that affected 62,474 users. The compromised data included email addresses and plaintext passwords. Users should replace affected passwords and use services that store credentials with modern, secure hashing methods.
Midwest Readers Service
In August 2018, Midwest Readers Service, a U.S.-based magazine subscription service offering bulk magazine plans at reduced prices via telemarketing, suffered a data breach that affected 22,428 users. The compromised data included email addresses and password hashes stored in an unknown format. Users should reset affected passwords and be alert to potential spam or phishing campaigns using their exposed data.
CPHI Japan
In August 2018, CPHI Japan, a leading trade show in Tokyo catering to pharmaceutical professionals globally, organized by Informa Markets based in the UK but rooted in the Japanese pharma ecosystem, suffered a data breach that affected 32,931 users. The compromised data included email addresses and password hashes stored in an unknown format. Users should change affected credentials and use unique passwords to mitigate risks from breaches.
merrltt.tk
In March 2018, merrltt.tk, a now-defunct New Zealand-based informational website, suffered a data breach that affected 43,446 users. The compromised data included email addresses and MD5 password hashes. Users should update any reused passwords and choose services that follow modern encryption practices.
Noel Gifts
In March 2023, Noel Gifts, a Singaporean e-commerce platform tailored for SingHealth staff, exposed approximately 2700 unique records containing email addresses, full names, IP addresses, and MD5 hashed passwords. Proper cybersecurity measures are crucial to protect sensitive data from breaches and prevent future harm.
Cowalk
In December 2022, Cowalk, a Korean advocacy and research platform for disability rights, suffered a data breach exposing approximately 9700 unique records containing email addresses, phone numbers, usernames, names, IP addresses, physical addresses, and either hashed or plaintext passwords. Robust cybersecurity practices are essential to prevent similar breaches and ensure the protection of personal data from unauthorized access.
ErernityTeam FREE uploaded by LOGS CHAT
In October 2022, a telegram user uploaded a stealer log file that exposed 915 records of endpoints, email, API host and passwords.
RAZERTOP 1 uploaded by LOGS CHAT
In September 2022, a telegram user uploaded a stealer log file that exposed 534 records of endpoints, email, API host and passwords.
ARCHER LOGS CLOUD 3 uploaded by LOGS CHAT
In September 2022, a telegram user uploaded a stealer log file that exposed 9839 records of endpoints, email, API host and passwords.
ALL LOGS CLOUD 3 uploaded by LOGS CHAT
In September 2022, a telegram user uploaded a stealer log file that exposed 6914 records of endpoints, email, API host and passwords.
ARCHER LOGS CLOUD 1 uploaded by LOGS CHAT
In September 2022, a telegram user uploaded a stealer log file that exposed 9221 records of endpoints, email, API host and passwords.
UsaPoilo43 uploaded by Logs
In April 2022, a telegram user uploaded a stealer log file that exposed 1550 records of endpoints, email, API host and passwords.
CrowlerCloud FREE LOGS uploaded by Free logs
In March 2022, a telegram user uploaded a stealer log file that exposed 1707 records of endpoints, email, API host and passwords.
16 MAR CrowlerCloud FREE LOGS4 uploaded by Free logs
In March 2022, a telegram user uploaded a stealer log file that exposed 3736 records of endpoints, email, API host and passwords.
18.03.2022 TG BlackHoleCloud uploaded by Logs
In March 2022, a telegram user uploaded a stealer log file that exposed 1879 records of endpoints, email, API host and passwords.
16.03.2022 TG BlackHoleCloud uploaded by Logs
In March 2022, a telegram user uploaded a stealer log file that exposed 264 records of endpoints, email, API host and passwords.