Breach Intelligence

2,850

Total breached databases

In 2020, Newrune.net allegedly suffered a data breach. NewRune.net appears to be related to gaming, potentially focusing on content around the video game RuneScape. Reports suggest that approximately 5,400 records were compromised. The data exposed included email addresses, passwords, usernames, IP addresses, and site activity. The passwords were stored using the SMF hashing algorithm.
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity
  • Imported:
  • Records Imported: 5,449
  • Number of lines: 5,851
  • Size: 2.22 MB
  • Passwords: SMF
  • Cracked: 0%
In 2017, Neo24, an online retail platform in Poland, allegedly suffered a data breach. Neo24 is an online retail platform in Poland, offering a wide range of consumer electronics and appliances. Reports suggest that approximately 780,000 records were compromised, including email addresses, passwords (MD5 Salted), names, phone numbers, geographic locations, usernames, and websites.
  • Date: 2017
  • Domain: neo24.pl
  • Country: Poland
  • Category: E-commerce & Retail
  • Data: Email Addresses Passwords Names Phone Numbers Geographic Locations Usernames Websites
  • Imported:
  • Records Imported: 779,956
  • Number of lines: 782,269
  • Size: 109.54 MB
  • Passwords: MD5 Salted
  • Cracked: 0%
In 2017, Mythicalworld.su allegedly suffered a data breach. MythicalWorld is a Russian-language Minecraft project featuring custom servers, unique game modes, and an active player community. Reports suggest that approximately 170,000 records were compromised. The data exposed includes email addresses, usernames, IP addresses, site activity, and passwords that were hashed using MD5.
  • Data: Email Addresses Passwords Usernames IP Addresses Site Activity
  • Imported:
  • Records Imported: 169,910
  • Number of lines: 170,010
  • Size: 81.19 MB
  • Passwords: MD5
  • Cracked: 0%
In 2015, Mythical World allegedly suffered a data breach. Mythical World is a Russian-language Minecraft project featuring custom servers, unique game modes, and an active player community. Reports suggest that approximately 92,000 records were compromised. The data allegedly exposed included email addresses, passwords, names, geographic locations, usernames, IP addresses, site activity, and social profiles. Additionally, it has been reported that the compromised passwords were hashed using MD5.
  • Data: Email Addresses Passwords Names Geographic Locations Usernames IP Addresses Site Activity Social Profiles
  • Imported:
  • Records Imported: 91,758
  • Number of lines: 91,845
  • Size: 37.29 MB
  • Passwords: MD5
  • Cracked: 98%
Moonmc.ru allegedly suffered a data breach. It has been reported that around 90,000 records were compromised in the incident. The exposed data purportedly includes passwords encrypted with SHA-256 and salted, geographic locations, usernames, IP addresses, and site activity details.
  • Data: Passwords Geographic Locations Usernames IP Addresses Site Activity
  • Imported:
  • Records Imported: 90,195
  • Number of lines: 90,226
  • Size: 14.07 MB
  • Passwords: SHA-256 Salted
  • Cracked: 0%
In 2019, Modnail, a Russian website, allegedly suffered a data breach. Modnail is a Russian website specializing in the sale and distribution of nail art products and accessories. Reports suggest that approximately 15,000 records were compromised during this incident. The data allegedly accessed includes email addresses, usernames, geographic locations, site activity, websites, and passwords encrypted with PHPass.
  • Date: 2019
  • Domain: modnail.ru
  • Country: Russia
  • Category: E-commerce & Retail
  • Data: Email Addresses Passwords Geographic Locations Usernames Site Activity Websites
  • Imported:
  • Records Imported: 15,456
  • Number of lines: 15,561
  • Size: 3.45 MB
  • Passwords: PHPass
  • Cracked: 0%
In 2021, ModelForum.cz allegedly suffered a data breach. ModelForum.cz is a Czech online forum focused on model building, where enthusiasts discuss and share information related to model crafts, kits, and techniques. Reports suggest that approximately 13,000 records were compromised. The data allegedly exposed includes email addresses, passwords, geographic locations, usernames, IP addresses, site activity, social profiles, and websites. The passwords breached were secured using PHPass.
  • Date: 2021
  • Domain: modelforum.cz
  • Country: Czech Republic
  • Category: Forums & Communities
  • Data: Email Addresses Passwords Geographic Locations Usernames IP Addresses Site Activity Social Profiles Websites
  • Imported:
  • Records Imported: 12,524
  • Number of lines: 12,646
  • Size: 23.94 MB
  • Passwords: PHPass
  • Cracked: 0%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.