files.miyako.rocks Open in urlscan Pro
2a06:98c1:3120::3  Public Scan

Submitted URL: http://files.miyako.rocks/
Effective URL: https://files.miyako.rocks/
Submission: On November 29 via manual from US — Scanned from NL

Form analysis 0 forms found in the DOM

Text Content

Files


DATA BREACHES

The files listed have been previously shared, I've converted them into a common
format for import into databases.

NETEASE/163.COM



In October 2015, the Chinese site known as NetEase (located at 163.com) was
reported as having suffered a data breach that impacted hundreds of millions of
subscribers. The data in the breach contains email addresses and plain text
passwords.



Download Copy Link
36.3 GB

MICROSOFT SOLR DATABASE LEAK

On April 22nd, 2021, a hacker going by the online handle of Pompompurin leaked a
database containing personal and sensitive household data of over 250 million
(250,807,711) American citizens and residents. The leak contains:

Full names, Phone numbers, Email addresses, Date of birth, Marital status,
Gender, House cost, Home rent, Home built year, Zipcodes, Credit capacity, Home
addresses, Geolocation, Political affiliation, Number of vehicles owned, Salary
and income details, Number of pets in a house, Number of children in a house.

Download Copy Link
235,446,308 Records 95.6 GB

ADOBE



In October 2013, 153 million Adobe accounts were breached with each containing
an internal ID, username, email, encrypted password and a password hint in plain
text. The password cryptography was poorly done and many were quickly resolved
back to plain text. The unencrypted hints also disclosed much about the
passwords adding further to the risk that hundreds of millions of Adobe
customers already faced.



Download Copy Link
152,989,493 Records 17.9 GB

ANIMAL JAM



In October 2020, the online game for kids Animal Jam suffered a data breach
which was subsequently shared through online hacking communities the following
month. The data contained 46 million user accounts with over 7 million unique
email addresses. Impacted data also included usernames, IP addresses and for
some records, dates of birth (sometimes in partial form), physical addresses,
parent names and passwords stored as PBKDF2 hashes.

Download Copy Link
7,088,713 Records 1.0 GB

US AUTO OWNERS



Privately sourced database. Impacted data includes first & last names,
addresses, state, phone number, and automobile details (make, model, year, VIN)

Download Copy Link
50,000,000 Records 1.0 GB

GRAVATAR



In October 2020, a security researcher published a technique for scraping large
volumes of data from Gravatar, the service for providing globally unique avatars
. 167 million names, usernames and MD5 hashes of email addresses used to
reference users' avatars were subsequently scraped and distributed within the
hacking community. 114 million of the MD5 hashes were cracked and distributed
alongside the source hash, thus disclosing the original email address and
accompanying data. Gravatar has released an FAQ detailing the incident.



Download Copy Link
50,000,000 Records 1.0 GB

MGM



In July 2019, MGM Resorts discovered a data breach of one of their cloud
services. The breach included 10.6M guest records with 3.1M unique email
addresses stemming back to 2017. The exposed data included email and physical
addresses, names, phone numbers and dates of birth and was subsequently shared
on a popular hacking forum in February 2020 where it was extensively
redistributed.

Download Copy Link
50,000,000 Records 1.0 GB

MINDJOLT



In March 2019, the online gaming website MindJolt suffered a data breach that
exposed 28M unique email addresses. Also impacted were names and dates of birth,
but no passwords.

Download Copy Link
50,000,000 Records 1.0 GB

PARKMOBILE



In March 2021, the mobile parking app service ParkMobile suffered a data breach
which exposed 21 million customers' personal data. The impacted data included
email addresses, names, phone numbers, vehicle licence plates and passwords
stored as bcrypt hashes. The following month, the data appeared on a public
hacking forum where it was extensively redistributed.



Download Copy Link
50,000,000 Records 1.0 GB

PEOPLEDATALABS



In October 2019, security researchers Vinny Troia and Bob Diachenko identified
an unprotected Elasticsearch server holding 1.2 billion records of personal
data. The exposed data included an index indicating it was sourced from data
enrichment company People Data Labs (PDL) and contained 622 million unique email
addresses. The server was not owned by PDL and it's believed a customer failed
to properly secure the database. Exposed information included email addresses,
phone numbers, social media profiles and job history data.

Download Copy Link
50,000,000 Records 1.0 GB

SHEIN



In June 2018, online fashion retailer SHEIN suffered a data breach. The company
discovered the breach 2 months later in August then disclosed the incident
another month after that. A total of 39 million unique email addresses were
found in the breach alongside MD5 password hashes.



Download Copy Link
50,000,000 Records 1.0 GB

VERIFICATIONS.IO



In February 2019, the email address validation service verifications.io suffered
a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due
to the data being stored in a MongoDB instance left publicly facing without a
password and resulted in 763 million unique email addresses being exposed. Many
records within the data also included additional personal attributes such as
names, phone numbers, IP addresses, dates of birth and genders. No passwords
were included in the data. The Verifications.io website went offline during the
disclosure process, although an archived copy remains viewable.

Download 1/2 Download 2/2 Copy Link
1.0 GB

ZYNGA



In September 2019, game developer Zynga (the creator of Words with Friends)
suffered a data breach. The incident exposed 173M unique email addresses
alongside usernames and passwords stored as salted SHA-1 hashes.

Download Copy Link
50,000,000 Records 1.0 GB