In September 2016, over 16GB of logs from a service believed to be digimon.co.in were reportedly obtained, likely from an unprotected MongoDB instance. The service ceased operations shortly after, and little information remains about its exact purpose. Based on enquiries made via Twitter, it appeared to function as a mail service, possibly using PowerMTA, and may have been involved in delivering spam. The exposed logs included details on 7.7 million unique email recipients with names and addresses, mail server IP addresses, email subjects, and tracking information such as mail opens and clicks.
- Date: Sep 5, 2016
- Domain:
digimon.co.in
- Category: Hacking
- Records Announced: 7,687,679
-
Sources:
-
Data:
Email Addresses
IP Addresses
Messages
Names
- Imported:
- Number of lines: 579,212,392
- Size: 31.98 GB
- Passwords:
No