Breach Intelligence

2,843

Total breached databases

In 2018, the cryptocurrency exchange platform Paytiz.com experienced a data breach. It is known for enabling various cryptocurrency exchanges. The breach exposed approximately 2,358 users. Among the compromised data were email addresses, passwords, and names, with passwords stored as MD5 or WordPress-type hashes. The breacher, whose identity is not explicitly mentioned, also obtained over 200 ID scans with verification photos and details, as well as all exchange records.
  • Date: 2018
  • Domain: paytiz.com
  • Threat Actor: pompompurin
  • Category: Cryptocurrency
  • Records Announced: 2,358
  • Data: Email Addresses Passwords Names
  • Imported:
  • Number of lines: 7,139
  • Size: 2.15 MB
  • Passwords: MD5, WordPress
  • Cracked:

Details about the Socket.io data breach are currently limited. This entry was added to our database to help raise awareness, and we will update this page with more information as it becomes available. You will be able to check if your data appears in this breach once it is fully imported. Meanwhile, you can see if your data appears in other breaches.

  • Data: The exact data fields compromised in the Socket.io breach are still under review. Updates will be published when confirmed.
  • Imported:
  • Number of lines: 174,066
  • Size: 5.88 MB
  • Passwords: ?

We do not yet have a full description for the 212-booter.net 2013 breach. Our goal is to track incidents like this so that users can stay informed. You will be able to check if your information is included when this breach is processed. Until then, you can check other breaches in our database.

  • Data: It is not yet known which data types were exposed in the 212-booter.net 2013 incident. This page will be updated as more details are verified.
  • Imported:
  • Number of lines: 4,311
  • Size: 221.28 KB
  • Passwords: ?
In January 2018, the Joomla template website JoomlArt inadvertently exposed more than 22k unique customer records in a Jira ticket. The exposed data was from iJoomla and JomSocial, both services that JoomlArt acquired the previous year. The data included usernames, email addresses, purchases and passwords stored as MD5 hashes. When contacted, JoomlArt advised they were aware of the incident and had previously notified impacted parties.
  • Data: Email Addresses Names Passwords Payment Information Usernames
  • Imported:
  • Passwords: MD5
  • Cracked:
In August 2017, the Keyword Research Tool known as KeywordEye suffered a data breach that impacted 38.8k users. The breach included Email addresses, Usernames and Passwords stored as SHA-1 hashes.
  • Data: Email Addresses Passwords Usernames
  • Imported:
  • Number of lines: 81,699
  • Size: 3.14 MB
  • Passwords: SHA-1
  • Cracked: