DARKHIVEâ„¢
The world’s largest database of compromised credentials.
Our dark web analysts have uncovered over 100+ billion compromised records stemming from tens of thousands of company data breaches. Discover if your company, employees, or customers have been compromised.
Database Leaks
Stealerlogs
Pastebins
Combolists
Access sensitive data and breach insights
Data holds no value unless it’s actionable. Our database will show email addresses, passwords (including hashes), usernames, IP addresses and any other information that may have been exposed for your team to properly remediate.
Over 100 Billion+ Breached Records From The Dark Web
Data is breached and then leaked online
hEROIC UNCOVERS THE DATA AS IT’S SHARED
DATA IS CLEANED, Processed, & distributed
Data is uploaded into the HEROIC DarkHiveâ„¢ for compromised credential search and reporting capabilities utilizing our advanced AI Engine.Â
Kaidown
In March 2018, Kaidown, a now-defunct Thai general business website, suffered a data breach that affected 858,277 users. The compromised data included email addresses and plaintext passwords. Users are strongly advised to change their passwords and be wary of any services that fail to use password encryption.
Bloemendelivery
In June 2025, Bloemendelivery, a Netherlands-based e-commerce platform specializing in same-day flower delivery, suffered a data breach that impacted 24,256 users. The compromised data included email addresses and pHpass password hashes, potentially exposing users to account takeover risks if reused credentials were involved.
Telegram RusCloud 6-17-25 .boxed.pw
On June 19, 2025, a stealer log titled Logs_17 June was shared on a Telegram channel. The log exposed around 728 email addresses, as well as plaintext passwords, homepage URLs, and system information on affected devices. This type of breach, stemming from infostealer malware, underscores the urgent need for proactive cybersecurity measures—including the use of password managers, antivirus protection, and routine system monitoring—to mitigate the risk of identity theft and further exploitation.
Telegram InfernoLogsCloud #176 by .boxed.pw
On June 19, 2025, a stealer log titled @InfernoLogsCloud LOGS FREE#176 was shared on a Telegram channel. The log exposed around 13,165 email addresses, as well as plaintext passwords, homepage URLs, and system information on affected devices. This type of breach, stemming from infostealer malware, underscores the urgent need for proactive cybersecurity measures—including the use of password managers, antivirus protection, and routine system monitoring—to mitigate the risk of identity theft and further exploitation.
Kütle nedir
In August 2018, Kütle nedir, a now-defunct Turkish educational website focused on physics, suffered a data breach that affected 52,941 users. The compromised data included email addresses and MD5 password hashes. Users should change any reused passwords, as MD5 is an outdated and insecure hashing algorithm that can be easily cracked.
Gametag
In July 2018, Gametag, a now-defunct U.S.-based marketplace for buying and selling video game accounts—primarily Xbox and MMO credentials—suffered a data breach that affected 158,375 users. The compromised data included email addresses and plaintext passwords. Affected users should change passwords and be vigilant against account theft or misuse.
GasPriceWatch
In August 2018, GasPriceWatch, a now-defunct U.S.-based website for tracking gas prices and fluctuation levels, suffered a data breach that affected 315,436 users. The compromised data included email addresses and MD5 password hashes. Users should update passwords and move away from platforms using obsolete security methods.
Funded
In August 2018, Funded, a U.S.-based online network connecting entrepreneurs with accredited funding sources such as angel investors, VCs, private equity firms, and lenders, suffered a data breach that affected 136,869 users. The compromised data included email addresses and plaintext passwords. Users should change any reused credentials immediately and avoid platforms that do not encrypt stored passwords.
RUaH Music Magazine
In August 2018, RUaH Music Magazine, a now-defunct Polish gallery for music and artists, suffered a data breach that affected 155,192 users. The compromised data included email addresses and MD5 password hashes. Given the outdated nature of MD5, users should update their passwords and avoid reusing them across services.
Amenity Housekeeping
In January 2023, Amenity Housekeeping, a US-based cleaning and housekeeping service, experienced a data breach exposing approximately 31,000 records containing over 15,000 unique email addresses, full names, phone numbers, and IP addresses. This incident underscores the importance of implementing robust cybersecurity measures to protect sensitive personal information from unauthorized access and potential breaches.
Poshmark
In May 2018, Poshmark, a U.S.-based social commerce marketplace, suffered a data breach that affected 36 million user accounts. The compromised data included email addresses, names, usernames, genders, locations, and passwords stored as bcrypt hashes. This incident highlights the importance of enforcing strong cybersecurity practices in retail operations to protect customer privacy and prevent misuse of personal data.
Upstrax
In February 2018, Upstrax, a German music-sharing platform for emerging DJs and artists—known for connecting with Sunshine Live radio—suffered a data breach that affected 142,865 users. The compromised data included email addresses and password hashes stored in an unknown format. Users are advised to change passwords as a precaution due to the unclear strength of the encryption used.
GrupoDragon
In August 2018, GrupoDragon, a now-defunct Spanish construction service and oil industry website, suffered a data breach that affected 56,210 users. The compromised data included email addresses and MD5 password hashes. Users should rotate passwords immediately and be cautious with accounts that share credentials.
On Thi Online
In July 2020, On Thi Online, a now-defunct Vietnamese exam prep portal for secondary and high school students, suffered a data breach that affected 335,637 users. The compromised data included email addresses and MD5 password hashes. Users should change affected passwords and stay alert to potential credential misuse.
Obeikan Education
In July 2020, Obeikan Education, a division of the Obeikan Investment Group headquartered in Riyadh, Saudi Arabia, and active across the GCC and MENA regions, suffered a data breach that affected 838,405 users. The compromised data included email addresses and MD5 password hashes. Since MD5 is a weak algorithm, users should update their passwords and avoid using similar ones on other platforms.
Institute of History and Philology at Academia Sinica
In August 2018, the Institute of History and Philology at Academia Sinica, Taiwan’s premier academic research institution located in Nankang, Taipei, suffered a data breach that affected 35,110 users. The compromised data included email addresses and MD5 password hashes. Users should change passwords and ensure stronger credentials are used for academic and institutional platforms.
Alshref
In February 2023, Alshref, an Arabic-language educational forum in Saudi Arabia, suffered a data breach exposing approximately 900,000 records containing around 444,000 unique email addresses, usernames, IP addresses, and bcrypt or MD5 hashed and salted passwords. This incident highlights the critical need for robust cybersecurity measures to protect sensitive personal information from unauthorized access and potential breaches.
Buy Karaoke Downloads
In August 2018, Buy Karaoke Downloads, an ecommerce site selling downloadable karaoke media, suffered a data breach affecting over 96 thousand records. The exposed data includes nearly 94,000 unique email addresses and passwords stored in plain text. Proper encryption and robust cybersecurity measures are essential to protect sensitive information and prevent unauthorized access.
Sherton English
In August 2018, Sherton English, an educational e-learning platform offering a free, comprehensive 52-week English course and based in the United States, suffered a data breach that affected 569,483 users. The compromised data included email addresses and password hashes stored in an unknown format. Due to the uncertainty of the hashing method, users should update passwords and avoid reusing credentials elsewhere.
AmiHome
In February 2023, AmiHome, a Belarusian e-commerce platform specializing in furniture and home goods, experienced a data breach exposing approximately 53 million records containing nearly 434,000 unique email addresses, usernames, phone numbers, full names, genders, and MD5 hashed passwords with salts. This incident highlights the critical need for robust cybersecurity measures to safeguard sensitive personal information from unauthorized access and potential breaches.