{ "APKTW": { "Data": [ { "Email": "eccm.a4@gmail.com", "IP": "61.231.117.217", "Username": "eccma417", "Password(MD5+Salt)": "95c798eaacf6d59045d8f8e5e30a93ae", "Created On": "1407080612", "Salt": "409e27" } ], "Description": "Around September 2022, on the Taiwanese website APK.tw, a data leak occurred, which affected 3.7 million users. The leak revealed the names of users, email addresses, IP addresses and passwords in the form of drift md5 with salt (type 2611)." }, "Adobe": { "Data": [ { "Email": "eccm.a4@gmail.com" } ], "Description": "In October 2013, 153 million records of Adobe accounts containing names, mail, encrypted passwords and tips for them in the form of text were hacked. Password cryptography was terrible and quickly hacked them." }, "BitcoinSecurity": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In September 2014, a large dump of 5 million users and passwords published on the Russian bitcoin forum was discovered. Mainly contained Gmail mail." }, "Cit0Day": { "Data": [ { "Category": "Adult", "Email": "eccm.a4@gmail.com", "Leak Site": "mega-porno.me", "Password": "superair" } ], "Description": "CIT0DAY is an now non -existent service for the search for e -mail among various leaks. After its closure in November 2020, a collection of more than 23,000 hacked sites fell into open access. The data was sorted into several dozen categories and contained more than 226 million posts and passwords to them. Some passwords were protected with the help of hashes." }, "Collection": { "Data": [ { "Email": "eccm.a4@gmail.com" }, { "Collection Numbers": "2,4", "Email": "eccm.a4@gmail.com", "Password": "puppykat10" }, { "Email": "eccm.a4@gmail.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In January 2019, a collection of 5 parts appeared by a hacker forum, which are a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files had 26 billion lines containing mail and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique couples. Nevertheless, this collection is considered the largest leak in history." }, "Collection #1": { "Data": [ { "Email": "eccm.a4@gmail.com", "Leak Site": "MangaTraders.com [878k]", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "WarSeer.com [69k]", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "NexusMods.com [4,6kk]", "Password": "superair121" } ], "Description": "In January 2019, 5 collections appeared at the popular hacker forum, which are a combination of data from many other leaks. This is the first of the found collections. It contained 12.300 files with a total size of 87 GB. The collection has more than 2.5 billion lines with posts and passwords from them. There were only 1.25 billion unique lines. For many lines, a site was indicated on which a leak occurred." }, "Collection #2": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair12" }, { "Email": "eccm.a4@gmail.com", "Password": "Superair121" } ], "Description": "In January 2019, 5 collections appeared at the popular hacker forum, which are a combination of data from many other leaks. This is the second collection, it was the largest of all and contained 20 thousand files with a total size of 526 GB. These files had 15.8 billion lines with posts and passwords, but only 3.2 billion were unique pairs." }, "Collection #3": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password(MD5)": "c2448b9b812b0fd6bd76d81a2007488d" } ], "Description": "In January 2019, 5 collections appeared at the popular hacker forum, which are a combination of data from many other leaks. The third collection was the smallest of all. It contained 20 thousand files with a total size of 37 GB. These files had about a billion lines with posts, passwords, nicknames and IP addresses. Part of the passwords was drunk. There were only 300 million unique lines." }, "Collection #5": { "Data": [ { "Email": "eccm.a4@gmail.com", "Leak Site": "MangaTraders.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "Seer.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "NexMods.com", "Password": "superair121" } ], "Description": "In January 2019, 5 collections appeared at the popular hacker forum, which are a combination of data from many other leaks. The fifth collection contains 16 thousand files with a total size of 42 gigabytes. The files contained 1.25 billion posts and passwords for them, but there were only 600 million unique lines. Unlike the rest of the collections, there was often information about which site the data leaked from." }, "Collection of 7,651 databases": { "Data": [ { "Email": "eccm.a4@gmail.com", "Leak Site": "HongFire.com [653k]", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "MangaTraders.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "Seer.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "NexMods", "Password": "superair121" } ], "Description": "In December 2022, all databases from the hacker data on trade trade were posted to open access. In total, 7651 leaks were published. The data contained only mail and passwords in the form of open text. Total 493 million records in all bases." }, "DomaIndiRectory.com": { "Data": [ { "Date": "2014-01-08 02:26:32", "Email": "eccm.a4@gmail.com", "IP": "111.251.186.46", "Site": "linked.com" } ], "Description": "No description yet." }, "E-mail base for free MIX": { "Data": [ { "Email": "eccm.a4@gmail.com" } ], "Description": "A set of several dozens of databases published in one of the telegram channels one at one in total 2022. Contains 62 million mail. About 5 million of them are accompanied by simple text passwords." }, "Exploit.In": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "At the end of 2016, a huge list of mail/password appeared in the leakage \"Exploit.in\". The list contained 593 million unique postal address addresses and was used to “throw accounting data”." }, "Ga$$Pacc": { "Data": [ { "Email": "eccm.a4@gmail.com", "Leak Site": "Hongfire.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "MangaTraders.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "Xpgamesaves.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Leak Site": "NexusMods.com", "Password": "superair121" } ], "Description": "In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only mails and unencrypted passwords." }, "HongFire": { "Data": [ { "Birth Day": "04-17-1982", "Email": "eccm.a4@gmail.com", "IP": "61.230.184.214", "Last Active (UNIX)": "1405402451", "Username": "eccma417", "Password(MD5+Salt)": "92930a38717ca3421f74ee65cc6cf967 >3B", "Posts Count": "0", "Created On (UNIX)": "1180525752", "Time Zone": "10" } ], "Description": "In March 2015, the Hongfire Anime and Manga Forum was leaked. Hacking led to the discovery of 1 million accounts along with email addresses, IP addresses, user names, birth dates and MD5 passwords with salt." }, "MIX Database": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "puppykat10" }, { "Email": "eccm.a4@gmail.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In May 2022, a collection containing 464 million e -mails and simple text passwords received as a result of various leaks appeared on the hacker forum." }, "MySpace": { "Data": [ { "Email": "eccm.a4@gmail.com", "Username": "517902172", "Password(SHA1)": "10c15fcdcbc01b4514dd95a9559c45a846ba5ab1" } ], "Description": "Around 2008, MySpace leaked data due to which almost 360 million accounts were disclosed. In May 2016, the data was put up for sale on the website of the Real Deal Dark Market and included email addresses, the names of users and hashs Shaha1 of the first 10 passwords converted to the lower register and stored without salt. The exact date of hacking is unknown." }, "NexusMods": { "Data": [ { "Email": "eccm.a4@gmail.com", "Username": "eccma417", "Password(MD5+Salt)": "3c6521ce18f2e196eeb07ec4d7ab7f58", "Salt": "A&AmT" }, { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In December 2015, the Nexus Mods modding site published a statement notifying users that they were hacked. Subsequently, they dated Hacking July 2013, although there is evidence that the data was sold a few months before. Hacking contained users' names, email addresses and passwords in the form of hash with salt." }, "Patreon": { "Data": [ { "About": "Through dick unity.", "Avatar": "https:/s3.amazonaws.com/patreon/0507e64b88621d8493141854491e2c9d.jpg", "Email": "eccm.a4@gmail.com", "First Name": "Feira", "Gender": "0", "Last Name": "Quest Dev Team", "Password(bcrypt)": "$2a$12$biODp1r6HjoZl2g9aaomfeFF5dx.SEOXzo4JI39y0A3tMqG2aoZqG", "Created On": "2015-02-24 06:01:49", "Title": "feiraquest" } ], "Description": "In October 2015, the Patreon crowdfunding site was hacked. The published dump included almost 14 GB of records from the database. Including 2.3 million unique email addresses, millions of personal messages and passwords stored in the form of hash bcrypt." }, "Pemiblanc": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In April 2018, the PEMIBLANC list containing 111 million posts and passwords was found on the French server. The data was collected as a result of various leaks from other services and services." }, "Pinterest.com": { "Data": [ { "Email": "eccm.a4@gmail.com", "IP": "203.247.110.240", "Posts Count": "7", "Created On": "2023-06-19", "Total Comments": "4", "Total Likes": "0" } ], "Description": "Pinterest is an American visual search platform that allows users to find, save and share ideas through images and videos. On May 14, 2025, a leak occurred on this site, which affected 6.8 million records. The leak includes e-mail, IP addresses of users, as well as data on the creation of their accounts." }, "Socradar Emails": { "Data": [ { "Email": "eccm.a4@gmail.com " } ], "Description": "Socradar is a leak monitoring tool. In 2024, a list of 280 million emails allegedly received from this site appeared online. There is no other data except emails in the leak." }, "TeraBase64": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair" }, { "Email": "eccm.a4@gmail.com", "Password": "superair12" }, { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "A huge collection of files, published in February 2020 by a man with a pseudonym @httsmvkcom. It contained 3.2 billion lines with mail and passwords in the form of a simple text, but there were only 1.28 billion unique lines. All these data were most likely obtained from many other leaks." }, "USA Fresh Dump": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "super" } ], "Description": "A combination of many hacks from the USA, collected in 2022. Contains 25 million e -mail along with passwords to them." }, "XPGameSaves": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair" } ], "Description": "Around the beginning of 2016, the XPGamesives (XPG) leaks took place on the game website, as a result of which 890,000 unique users were disclosed. The data contained email addresses and IP addresses of user names and salty hash MD5 passwords, however, only a version with decrypted passwords that appeared later was loaded in the service." }, "Zynga": { "Data": [ { "Email": "eccm.a4@gmail.com", "Password": "superair121" } ], "Description": "In September 2019, the developer of the Games Zynga (creator of Words with Friends) suffered from leakage. 173 million unique mails, as well as user names and passwords in the form of hash-1 with salt, were disclosed." } }