Breach Intelligence

2,850

Total breached databases

In approximately January 2022, the Forums for the MMORPG Gaming website WEBZEN was breached by @donjuji, impacting 208k users. The breach included Email addresses, IP addresses, Usernames, Dates of birth and Passwords stored as bcrypt hashes.
  • Data: Birthdates Email Addresses IP Addresses Passwords Site Activity Social Profiles Usernames Websites
  • Imported:
  • Records Imported: 208,900
  • Number of lines: 208,922
  • Size: 95.11 MB
  • Passwords: BCrypt
  • Cracked: 0%
In January or February of 2018, the RuneScape Private Server Alora suffered a data breach that impacted 207k users. The breach included Usernames, Email addresses, IP addresses and Passwords stored as IPB hashes. Alora denies that any data was accessed in their announcement.
  • Data: Email Addresses IP Addresses Passwords Usernames
  • Imported:
  • Records Imported: 207,536
  • Number of lines: 207,535
  • Size: 15.44 MB
  • Passwords: MyBB
  • Cracked: 90%
In December 2018, Mappery, a mapping website, allegedly suffered a data breach that exposed more than 205,000 unique email addresses. Among the compromised data were usernames, users’ geographic locations, and passwords stored as unsalted SHA-1 hashes.
  • Data: Email Addresses Geographic Locations Passwords Usernames
  • Imported:
  • Records Imported: 424,007
  • Number of lines: 424,008
  • Size: 55.15 MB
  • Passwords: SHA-1
  • Cracked: 0%
In November 2021, the online lending marketplace LendingTree suffered a data breach. The breach included Email addresses, Full names, Full addresses, Phone numbers, IP addresses, Loan type, Loan cost. In total, 200k users were affected.
  • Data: Email Addresses Financial Information IP Addresses Names Phone Numbers Physical Locations
  • Imported:
  • Records Imported: 200,662
  • Number of lines: 200,703
  • Size: 42.58 MB
  • Passwords: No
In August 2016, the Grand Theft Auto forum GTAGaming was hacked and nearly 200k user accounts were leaked. The vBulletin based forum included usernames, email addresses and password hashes.
  • Data: Birthdates Email Addresses IP Addresses Passwords Site Activity Social Profiles Usernames Websites
  • Imported:
  • Records Imported: 196,742
  • Number of lines: 196,824
  • Size: 93.12 MB
  • Passwords: vBulletin
  • Cracked: 44%
In approximately January 2022, the Brazilian ticket website Eleven Tickets suffered a data breach. The attack led to the exposure of data including Email addresses, Full names, Phone numbers, CPF Numbers and Physical addresses. In total, 196k users were affected.
  • Data: Email Addresses Names Phone Numbers Physical Locations Tax IDs
  • Imported:
  • Records Imported: 196,917
  • Number of lines: 196,955
  • Size: 59.65 MB
  • Passwords: No
In July 2020, the German mobile phone forum telefon-treff.de was hacked and 225k member records were exposed. The data included usernames, email addresses and passwords stored as vBulletin and BlowFish hashes.
  • Date: Jul 2020
  • Domain: telefon-treff.de
  • Country: Germany
  • Category: Telecommunications
  • Records Announced: 223,702
  • Data: Email Addresses Passwords Site Activity Usernames
  • Imported:
  • Records Imported: 225,008
  • Number of lines: 227,400
  • Size: 65.05 MB
  • Passwords: BCrypt, vBulletin
  • Cracked: 0%

Frequently Asked Questions

A data breach is unauthorized access to data (often involving account takeover, malware, or misconfigured infrastructure). A data leak is exposure of data due to mistakes like public cloud storage, open databases, or accidental publishing. A database dump is a packaged dataset that may come from a breach, leak, scraping, or aggregation.

Change passwords for any affected accounts immediately, prioritizing email, banking, and any account that shares the same password. Enable multi-factor authentication wherever possible. Monitor your accounts for suspicious activity and consider placing a fraud alert or credit freeze if financial data was exposed.

Start with containment and verification: confirm what data was exposed, identify the entry point, rotate credentials (especially SSO, VPN, email), and enforce MFA. Then investigate affected systems, notify stakeholders as required, and harden controls to prevent recurrence. A structured incident response plan helps keep the work measurable and compliant.

Dark web monitoring helps you spot exposure signals early — before stolen data is widely reused for account takeover or targeted attacks. Monitoring complements vulnerability management by revealing when attackers already have leverage. Pair it with continuous attack surface monitoring and strong Asset Discovery to reduce blind spots.

Not always. Some datasets are old, incomplete, or derived from third parties. However, any exposure increases risk because credentials and personal data can be reused indefinitely. Treat it as a priority signal: rotate credentials, enforce MFA, review suspicious logins, and audit the systems that could have produced the data.

SynScan helps you connect the dots between attack surface exposure, vulnerabilities, and breach signals so you can prioritize remediation and reduce the chance of repeat incidents.