Breach Intelligence

2,793

Total breached databases

Search breaches

This is the result of an automated process that gathers generic RedLine Stealer logs shared over different forums, Telegram groups, and other sources.
  • Category: Stealers
  • Numer of lines: 27,240,597,289
  • Size: 2.23 TB
  • Data: Cookies, Cryptocurrency Information, Device Information, Email Addresses, Geographic Locations, IP Addresses, Infection Details, Names, Passwords, Usernames, Websites
  • Passwords: Plaintext
This is the result of an automated process that gathers generic combo lists shared over different forums, Telegram groups, and other sources.
  • Category: Compilations & Combo lists
  • Numer of lines: 18,070,149,546
  • Records Imported: 5,839,762,085
  • Size: 970.6 GB
  • Data: Email Addresses, Passwords, Usernames
  • Passwords: Plaintext
  • Imported:
On January 17th of 2019, an user named Aldesa, posted a magnet link in the famous xss.is forum to a file called "12 billion special for xss.is", claiming there were no duplicates, and crediting another user named Xrenovi4 for helping process the files. The admin of xss.is also thanked for the contribution. The file, named "rez_out.txt", contains 3,039,418,396 lines.
  • Date: Jan 17, 2019
  • Domain: xss.is
  • Threat Actor: Aldesa
  • Category: Compilations & Combo lists
  • Records Announced: 12,000,000,000
  • Numer of lines: 3,039,418,396
  • Records Imported: 3,039,037,834
  • Size: 88.43 GB
  • Data: Email Addresses, Passwords
  • Passwords: Plaintext
  • Imported:
The Collection #4 data breach is part of a larger series of data dumps, including Collections #1 through #5, which compiled email addresses and passwords from thousands of sources, from previously known data breaches and some new alleged breaches. Collection #1 alone contained about 2.7 billion records, including 1.2 billion unique email and password combinations, 773 million unique email addresses, and 21 million unique plaintext passwords. Additional collections, named Collections #2 through #5, along with "AP MYR&ZABUGOR #2" and "ANTIPUBLIC #1," were also discovered, significantly adding to the scope of compromised data​.
  • Date: 2019
  • Category: Compilations & Combo lists
  • Records Announced: 5,989,185,228
  • Records Imported: 1,072,039,759
  • Size: 32.65 GB
  • Data: Email Addresses, Passwords
  • Passwords: Plaintext
  • Imported:
  • Sources:
In August 2022, news broke of an attack against the Russian streaming service "START". The incident led to the exposure of 44M records containing 7.4M unique email addresses. The impacted data also included the subscriber's country and password hash. START subsequently acknowledged the incident in a Telegram post and stated that the data dated back to 2021.
  • Date: Jun 2021
  • Domain: start.film
  • Country: Russia
  • Category: Streaming & Entertainment
  • Records Announced: 43,937,127
  • Numer of lines: 3,528,619,396
  • Records Imported: 43,937,127
  • Size: 71.97 GB
  • Data: Email Addresses, Geographic Locations, Names, Passwords
  • Passwords: MD5Crypt
  • Cracked: 0%
  • Imported:
  • Sources: