Breach Intelligence

2,850

Total breached databases

Zoosbook 2021

Sensitive
Sometime in 2021, Zoosbook.com, a website associated with zoophilia and bestiality content, suffered a data breach that exposed information from approximately 68,071 users. Among the leaked data were usernames, email addresses, hashed passwords, and IP addresses.
  • Date: 2021
  • Domain: zoosbook.com
  • Category: Pornography
  • Records Announced: 68,071
  • Data: Email Addresses Passwords Usernames IP Addresses
  • Imported:
  • Passwords: BCrypt
  • Cracked: 0%

There is no official description for the Alapattdiamonds.com 2018 data breach at this time. However, this record will allow future verification once the breach is processed. For now, you can use our search tool to see if your personal information appears in other breaches.

  • Data: The specific records exposed in the Alapattdiamonds.com 2018 breach have not yet been identified. We will update this section with details when they are confirmed.
  • Imported:
  • Number of lines: 586,334
  • Size: 73.47 MB
  • Passwords: ?

The Zismo.su 2012 breach has been recorded in our database, but additional details are not yet confirmed. When more data becomes available, you will be able to verify your exposure. In the meantime, you can check our list of other breaches.

  • Data: The data categories affected by the Zismo.su 2012 breach have not been disclosed yet. We will expand this section when details are released.
  • Imported:
  • Number of lines: 848,052
  • Size: 93.26 MB
  • Passwords: ?
In February 2014, the Internet Governance Forum (formed by the United Nations for policy dialogue on issues of internet governance) was attacked by hacker collective known as Deletesec. Although tasked with "ensuring the security and stability of the Internet", the IGF’s website was still breached and resulted in the leak of 3,200 email addresses, names, usernames and cryptographically stored passwords.
  • Data: Email Addresses Names Passwords Usernames
  • Imported:
  • Passwords: Unknown
On March 22, 2022, the Russian minecraft server VictoryCraft data was exposed. There were a total of 54,535 lines with the fields "name," "ip," and, in certain fields, a user UUID. There are no passwords in the database, which is made up of multiple little sql files.
  • Date: 2022
  • Domain: victorycraft.ru
  • Country: Russia
  • Category: Gaming
  • Records Announced: 54,000
  • Data: The data categories affected by the VictoryCraft.Ru 2022 breach have not been disclosed yet. We will expand this section when details are released.
  • Imported:
  • Number of lines: 1,400,518
  • Size: 50.67 MB
  • Passwords: ?
In April 2021, Brisbanebbs.com, a forum platform, suffered a data breach that affected approximately 320,000 users. Among the leaked data were email addresses, usernames, and passwords stored in a format associated with the Discuz Forums Hash Type (2611 in Hashcat).
  • Date: Apr 2021
  • Domain: brisbanebbs.com
  • Category: Forums & Communities
  • Records Announced: 321,813
  • Data: Email Addresses Passwords Usernames
  • Imported:
  • Passwords: ?

There is no official description for the Ex-core.ru 2018 data breach at this time. However, this record will allow future verification once the breach is processed. For now, you can use our search tool to see if your personal information appears in other breaches.

  • Data: The specific records exposed in the Ex-core.ru 2018 breach have not yet been identified. We will update this section with details when they are confirmed.
  • Imported:
  • Number of lines: 1,046
  • Size: 268.49 KB
  • Passwords: ?

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.