Breach Intelligence

2,850

Total breached databases

UVI Jewelery - online jewelry store with rare inserts in gold and silver design with a 180 guarantee store experienced a security breach in 2022 about around 56K user were exposed in the incident.
  • Date: 2022
  • Domain: uvi.ru
  • Country: Russia
  • Category: E-commerce & Retail
  • Records Announced: 56,000
  • Data: It is not yet known which data types were exposed in the uvi.ru (магазин ювелирных) 2022 incident. This page will be updated as more details are verified.
  • Imported:
  • Passwords: ?
In January 2014, the World Poker Tour (WPT) Amateur Poker League website was reportedly hacked by a Twitter user known as @smitt3nz. The incident resulted in the public disclosure of 175,000 accounts, including 148,000 unique email addresses. The breach also exposed plain text passwords for all affected accounts.
  • Data: Email Addresses Passwords
  • Imported:
  • Number of lines: 265,548
  • Size: 8.6 MB
  • Passwords: Plaintext
In November 2017 the French girl gaming website Jeux-Fille-Gratuit.com was breached. The leak consisted of at least 561,492 accounts.
  • Data: Ages Email Addresses Passwords Usernames
  • Imported:
  • Passwords: Unknown
In February 2023, The Kodi Foundation, known for its open-source media player software, reportedly suffered a data breach that exposed more than 400,000 user records. The compromised data included birthdates, email addresses, IP addresses, messages, usernames, site activity, and passwords stored as MyBB salted hashes.
  • Data: Birthdates Email Addresses IP Addresses Messages Passwords Site Activity Usernames
  • Imported:
  • Passwords: Hashed Salted
  • Cracked: 0%
AlpMarathon - Марафоны БАМ marathons are a series of sports events in the Irkutsk region website suffered a data breached and exposed 14k user details.
  • Domain: alpmarathon.ru
  • Country: Russia
  • Category: Sports
  • Records Announced: 14,000
  • Data: It is not yet known which data types were exposed in the alpmarathon.ru incident. This page will be updated as more details are verified.
  • Imported:
  • Number of lines: 13,845
  • Size: 3.2 MB
  • Passwords: ?

There is no official description for the Reallyworld.ru 2020 data breach at this time. However, this record will allow future verification once the breach is processed. For now, you can use our search tool to see if your personal information appears in other breaches.

  • Data: The specific records exposed in the Reallyworld.ru 2020 breach have not yet been identified. We will update this section with details when they are confirmed.
  • Imported:
  • Number of lines: 680,318
  • Size: 109.85 MB
  • Passwords: SHA-256
  • Cracked: 0%
In February 2023, TheGradCafe, a graduate school admissions search website, suffered a data breach that exposed the personal records of approximately 310,000 users. Among the compromised data were email addresses, names and usernames, genders, geographic locations, physical addresses, phone numbers, dates of birth, and passwords stored as bcrypt hashes.
  • Data: Email Addresses Genders Geographic Locations IP Addresses Names Passwords Phone Numbers Physical Locations Usernames
  • Imported:
  • Passwords: BCrypt
  • Cracked: 0%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.