files.miyako.rocks
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
Submitted URL: http://files.miyako.rocks/
Effective URL: https://files.miyako.rocks/
Submission: On November 29 via manual from US — Scanned from NL
Effective URL: https://files.miyako.rocks/
Submission: On November 29 via manual from US — Scanned from NL
Form analysis
0 forms found in the DOMText Content
Files DATA BREACHES The files listed have been previously shared, I've converted them into a common format for import into databases. NETEASE/163.COM In October 2015, the Chinese site known as NetEase (located at 163.com) was reported as having suffered a data breach that impacted hundreds of millions of subscribers. The data in the breach contains email addresses and plain text passwords. Download Copy Link 36.3 GB MICROSOFT SOLR DATABASE LEAK On April 22nd, 2021, a hacker going by the online handle of Pompompurin leaked a database containing personal and sensitive household data of over 250 million (250,807,711) American citizens and residents. The leak contains: Full names, Phone numbers, Email addresses, Date of birth, Marital status, Gender, House cost, Home rent, Home built year, Zipcodes, Credit capacity, Home addresses, Geolocation, Political affiliation, Number of vehicles owned, Salary and income details, Number of pets in a house, Number of children in a house. Download Copy Link 235,446,308 Records 95.6 GB ADOBE In October 2013, 153 million Adobe accounts were breached with each containing an internal ID, username, email, encrypted password and a password hint in plain text. The password cryptography was poorly done and many were quickly resolved back to plain text. The unencrypted hints also disclosed much about the passwords adding further to the risk that hundreds of millions of Adobe customers already faced. Download Copy Link 152,989,493 Records 17.9 GB ANIMAL JAM In October 2020, the online game for kids Animal Jam suffered a data breach which was subsequently shared through online hacking communities the following month. The data contained 46 million user accounts with over 7 million unique email addresses. Impacted data also included usernames, IP addresses and for some records, dates of birth (sometimes in partial form), physical addresses, parent names and passwords stored as PBKDF2 hashes. Download Copy Link 7,088,713 Records 1.0 GB US AUTO OWNERS Privately sourced database. Impacted data includes first & last names, addresses, state, phone number, and automobile details (make, model, year, VIN) Download Copy Link 50,000,000 Records 1.0 GB GRAVATAR In October 2020, a security researcher published a technique for scraping large volumes of data from Gravatar, the service for providing globally unique avatars . 167 million names, usernames and MD5 hashes of email addresses used to reference users' avatars were subsequently scraped and distributed within the hacking community. 114 million of the MD5 hashes were cracked and distributed alongside the source hash, thus disclosing the original email address and accompanying data. Gravatar has released an FAQ detailing the incident. Download Copy Link 50,000,000 Records 1.0 GB MGM In July 2019, MGM Resorts discovered a data breach of one of their cloud services. The breach included 10.6M guest records with 3.1M unique email addresses stemming back to 2017. The exposed data included email and physical addresses, names, phone numbers and dates of birth and was subsequently shared on a popular hacking forum in February 2020 where it was extensively redistributed. Download Copy Link 50,000,000 Records 1.0 GB MINDJOLT In March 2019, the online gaming website MindJolt suffered a data breach that exposed 28M unique email addresses. Also impacted were names and dates of birth, but no passwords. Download Copy Link 50,000,000 Records 1.0 GB PARKMOBILE In March 2021, the mobile parking app service ParkMobile suffered a data breach which exposed 21 million customers' personal data. The impacted data included email addresses, names, phone numbers, vehicle licence plates and passwords stored as bcrypt hashes. The following month, the data appeared on a public hacking forum where it was extensively redistributed. Download Copy Link 50,000,000 Records 1.0 GB PEOPLEDATALABS In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Download Copy Link 50,000,000 Records 1.0 GB SHEIN In June 2018, online fashion retailer SHEIN suffered a data breach. The company discovered the breach 2 months later in August then disclosed the incident another month after that. A total of 39 million unique email addresses were found in the breach alongside MD5 password hashes. Download Copy Link 50,000,000 Records 1.0 GB VERIFICATIONS.IO In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Download 1/2 Download 2/2 Copy Link 1.0 GB ZYNGA In September 2019, game developer Zynga (the creator of Words with Friends) suffered a data breach. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. Download Copy Link 50,000,000 Records 1.0 GB