🐦Twitter 200M

In January 2022, a vulnerability in the Twitter platform allowed a hacker to create a database of emails and phone numbers of 200 million users of the social platform. In August 2022, Twitter reported that the vulnerability was related to a bug introduced in June 2021. The data included emails, phone numbers, username, biography, location and profile photo.

📩Email: dwrfy@hotmail.com
📆Registration date: 05.04.2013 20:11:40
👤Full name: Lulzsec
👤Nick: OpalladiumO
😻Number of subscribers: 2

📩Email: frizzyxf@gmail.com
📆Registration date: 26.04.2013 14:55:54
👤Full name: LulzSec
👤Nick: xF_Frizzy
😻Number of subscribers: 140

📩Email: lulzsec1@gmail.com
📆Registration date: 06.06.2011 00:13:57
👤Full name: LulzSec
👤Nick: LulzSec1
😻Number of subscribers: 79

📩Email: maliksusanoo@hotmail.com
📆Registration date: 07.02.2015 15:06:37
👤Full name: Lulzsec
👤Nick: Lulzsec__
😻Number of subscribers: 313

📩Email: lulzsec@yahoo.com
📆Registration date: 03.07.2013 03:23:22
👤Full name: lulzsec
👤Nick: Lulzsec14
😻Number of subscribers: 0

📩Email: security42@live.co.uk
📆Registration date: 16.06.2011 22:02:08
👤Full name: Lulzsec Follower
👤Nick: LulzsecFollower
😻Number of subscribers: 9

📩Email: pattiz96@web.de
📆Registration date: 18.06.2011 23:00:30
👤Full name: Lulzsec fan 4 life
👤Nick: Lulzsekfan11
😻Number of subscribers: 6

📩Email: bam100@sol.dk
📆Registration date: 27.03.2012 20:02:36
👤Full name: Lulzsec Reborn
👤Nick: LulzsecReborn1
😻Number of subscribers: 8

📩Email: shonplaygame@gmail.com
📆Registration date: 28.01.2015 06:38:56
👤Full name: LulzSec Here
👤Nick: somebody_elseif
😻Number of subscribers: 137

📩Email: tykeliipuleole1@icloud.com
📆Registration date: 11.05.2014 06:09:56
👤Full name: LulzSec
👤Nick: LulzSecurity15
😻Number of subscribers: 6

📩Email: twittertwit1@hotmail.com
📆Registration date: 22.07.2011 19:21:20
👤Full name: LulzSec
👤Nick: LulzSecReloaded
😻Number of subscribers: 23

📩Email: dthml@outlook.com
📆Registration date: 28.04.2012 16:15:28
👤Full name: LulzSec
👤Nick: YourLulzNews
😻Number of subscribers: 523

📩Email: xenioushf@hotmail.com
📆Registration date: 17.09.2014 20:23:20
👤Full name: LulzSec Hungary
👤Nick: Xenious_
😻Number of subscribers: 0

📩Email: mlgmalcolm1@gmail.com
📆Registration date: 12.11.2012 21:28:46
👤Full name: Lulzsec
👤Nick: malcolmgreer3
😻Number of subscribers: 228

📩Email: nerdlyanimates@gmail.com
📆Registration date: 22.01.2018 17:20:52
👤Full name: Lulzsec
👤Nick: LuIzs3c
😻Number of subscribers: 2

📩Email: pro.xuanloc@yahoo.com
📆Registration date: 13.06.2012 07:03:35
👤Full name: Lulzsec
👤Nick: Lulzsec10
😻Number of subscribers: 2

📩Email: criticalmodz@hotmail.com
📆Registration date: 18.09.2014 12:04:07
👤Full name: Lulzsec Hungary
👤Nick: LulzSecHungary
😻Number of subscribers: 1

📩Email: bruno.argc@gmail.com
📆Registration date: 22.05.2009 13:55:49
👤Full name: LulzSec The LulzBoat
👤Nick: cfdisk
😻Number of subscribers: 61

📩Email: kallebarbaren@hotmail.com
📆Registration date: 05.12.2015 21:53:18
👤Full name: Lulzsec
👤Nick: exddeee
😻Number of subscribers: 7

📩Email: skullyard@gmail.com
📆Registration date: 30.09.2014 01:33:29
👤Full name: LulzSec
👤Nick: wwefor999
😻Number of subscribers: 8

📩Email: jhonata.fx@hotmail.com
📆Registration date: 24.06.2011 15:01:21
👤Full name: lulzsec
👤Nick: lulzsecEUA
😻Number of subscribers: 4048

📩Email: lulzsecgt@hotmail.com
📆Registration date: 06.12.2011 15:16:45
👤Full name: LulzSec Guatemala
👤Nick: LulzSec_GT
😻Number of subscribers: 1807

📩Email: youreact2gwk@gmail.com
📆Registration date: 17.06.2012 01:42:31
👤Full name: LulzSec
👤Nick: Lulzsec4lulz
😻Number of subscribers: 4

📩Email: lulzsecgt@hotmail.com
📆Registration date: 06.12.2011 15:16:45
👤Full name: LulzSec Guatemala
👤Nick: LulzSec_GT
😻Number of subscribers: 1806

📩Email: shichemt@hotmail.com
📆Registration date: 17.03.2012 19:27:42
👤Full name: LulzSec Tunisia
👤Nick: LulzSecTN
😻Number of subscribers: 9

📩Email: upr00t@live.com
📆Registration date: 24.06.2011 02:12:38
👤Full name: LulzSec
👤Nick: LulzSecNews
😻Number of subscribers: 7

📩Email: jhonata.fx@hotmail.com
📆Registration date: 24.06.2011 15:01:21
👤Full name: lulzsec
👤Nick: lulzsecEUA
😻Number of subscribers: 4052

📩Email: thelulzboatoriginal@gmail.com
📆Registration date: 26.01.2012 07:14:50
👤Full name: lulzsec
👤Nick: thelulzsecboat
😻Number of subscribers: 9

📩Email: lulzl33t@gmail.com
📆Registration date: 08.01.2013 01:48:56
👤Full name: LulzSec Reunite
👤Nick: LulzL33t
😻Number of subscribers: 7

📩Email: mirohost@mail.ua
📆Registration date: 11.07.2013 09:39:21
👤Full name: Lulzsec
👤Nick: LulzSecUA
😻Number of subscribers: 6

📩Email: brasil122@hotmail.com
📆Registration date: 29.10.2013 12:54:53
👤Full name: LulzSec Syria
👤Nick: LulzSecSyria
😻Number of subscribers: 2

📘LinkedIn Scraped Data

During the first half of 2021, LinkedIn became a target for attackers who extracted data from hundreds of millions of profiles and then sold it online. This was not a leak and only publicly available information was collected. The 1.5 terabyte file contained 400 million records and 125 million unique emails, as well as the names, locations, gender and positions of users.

♟️Industry: internet
🏢Company name: lulzsec chile
🏢Company name: lulzsec chile
🏢Job title: hk
🏷️Title: hk
👤Name: mrzero
👤Surname: reeves
🗂️Summary: HK en LulzSec Chile
🗾A country: mexico
🗾Continent: north america
🚪Number of inputs: 1

♟️Industry: computer networking
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: hacker
🏷️Title: hacker
👤Name: denis
👤Surname: alsbergondish
📍Geolocation: 51.05,13.73
🗺️Region: saxony, germany
🗾A country: germany
🗾Continent: europe
🚪Number of inputs: 0
🧭Location: dresden
🧭Location: saxony

📩Email: bravoteamsec@gmail.com
ⓁLinkedinID: 126191313
♟️Industry: computer networking
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: owner
🏷️Title: owner
👤Name: eddie
👤Surname: bravo
📍Geolocation: 28.03,-81.95
🗺️Region: florida, united states
🗾A country: united states
🗾Continent: north america
🚪Number of inputs: 0
🧭Location: florida
🧭Location: lakeland

🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: ethical hacker
🏷️Title: ethical hacker
👤Name: ninta
👤Surname: thantha
📍Geolocation: 38.83,-104.22
🗺️Region: colorado, united states
🗾A country: united states
🗾Continent: north america
🚪Number of inputs: 0
🧭Location: colorado
🧭Location: yoder

🏢Company name: lanttm-development
🏢Company name: lanttm-development
🏢Job title: web designer
🏷️Title: web designer
👤Full name: lulzsec streak
👤Nick: lulzsec-streak-000393138

♟️Industry: banking
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: hacker
🏷️Title: hacker
👤Name: noir
👤Surname: hacklown
🗂️Summary: Hacker (term) chez LulzSec
🗾A country: france
🗾Continent: europe
🚪Number of inputs: 0

ⓁLinkedinID: 190575682
♟️Industry: information technology and services
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: combine major
🏷️Title: combine major
👤Name: sam
👤Surname: harbor
🗂️Summary: Combine Major at Lulzsec
🗺️Region: california, united states
🗾A country: united states
🗾Continent: north america
🚪Number of inputs: 0
🚻Floor: male
🧭Location: california
🧭Location: mountain view

🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: freelance
🏷️Title: freelance
👤Name: topiary
👤Surname: lulzsec
🗺️Region: bihar, india
🗾A country: india
🗾Continent: asia
🚪Number of inputs: 0
🧭Location: bihar
🧭Location: patna

👤Full name: lulzsec india
👤Nick: lulzsec-india-73936714a
📍Geolocation: 28.66,77.21
🗺️Region: delhi, india
🗾A country: india
🗾Continent: asia
🚪Number of inputs: 25
🧭Location: delhi
🧭Location: delhi

♟️Industry: internet
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: doxer
🏷️Title: doxer
👤Name: vize
👤Surname: reznov
📍Geolocation: 41.39,2.17
🗺️Region: catalonia, spain
🗾A country: spain
🗾Continent: europe
🚪Number of inputs: 0
🧭Location: barcelona
🧭Location: catalonia

🏢Company name: anonymous
🏢Company name: anonymous
🏢Job title: ethical hacker
🏷️Title: ethical hacker
👤Full name: lulzsec anonim
👤Nick: lulzsec-anonim-25495a1a4
📍Geolocation: -6.17,106.82
🗺️Region: jakarta raya, indonesia
🗾A country: indonesia
🗾Continent: asia
🧭Location: jakarta
🧭Location: jakarta raya

🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: hacker
🏷️Title: hacker
👤Name: devesh
👤Surname: chaurasia
📅Start date: 2013-01
🗺️Region: uttar pradesh, india
🗾A country: india
🗾Continent: asia
🚪Number of inputs: 0
🚻Floor: male
🧭Location: deoria
🧭Location: uttar pradesh

ⓁLinkedinID: 322047852
♟️Industry: computer & network security
🏢Company name: lulzsec
🏢Company name: lulzsec
🏢Job title: anonymous
🏷️Title: anonymous
👤Name: snax
👤Surname: gangsta
🗾A country: slovenia
🗾Continent: europe
🚪Number of inputs: 3

🏢Company name: lulzsec india
🏢Company name: lulzsec india
🏢Job title: lulzsec india
🏷️Title: lulzsec india
👤Name: lulzsec
👤Surname: india
📍Geolocation: 12.97,77.59
🗺️Region: karnataka, india
🗾A country: india
🗾Continent: asia
🚪Number of inputs: 0
🧭Location: bengaluru
🧭Location: karnataka

🕸️000webhost

Around March 2015, free web hosting provider 000webhost suffered a data breach. Almost 15 million customer records were exposed. The data was sold many times and became public in October. The leak included names, email addresses and passwords in plain text.

📩Email: lulzsec.nam2k3@hotmail.com
🔑Password: nam12110210
🎯IP: 183.81.57.70
👤Nick: hoangnam

📩Email: lulzsecd@gmail.com
🔑Password: lulzsecddddd96
🎯IP: 113.190.226.213
👤Nick: Steve Din

📩Email: shadowlegionx@gmail.com
🔑Password: Ttkr4mTA4OQtHL4L
🎯IP: 67.187.97.11
👤Nick: lulzsec

📩Email: hack4pce@hotmail.com
🔑Password: lulzsec101
🎯IP: 70.48.28.181
👤Nick: Uri

📩Email: sc2optv@gmail.com
🔑Password: charrie123
🎯IP: 94.169.50.166
👤Nick: lulzsec

📩Email: lulzsec2@hotmail.com
🔑Password: Anonymous101
🎯IP: 98.19.138.119
👤Nick: Lulz Sec

📩Email: viruz1221@hotmail.com
🔑Password: lulzsec1221
🎯IP: 59.103.215.117
👤Nick: Anonymous

📩Email: anon22164@gmail.com
🔑Password: P6Y5R6zc1OAfNsYz
🎯IP: 182.69.170.242
👤Nick: lulzsec

📩Email: lulzseclynchy@gmail.com
🔑Password: Ross1581
🎯IP: 5.64.70.98
👤Nick: Ross

📩Email: lulzsec.b00ter@gmail.com
🔑Password: norton369
🎯IP: 81.82.128.46
👤Nick: Kenneth Jumpman

📩Email: lulzsec2.0@hushmail.com
🔑Password: malote1
🎯IP: 80.237.226.74
👤Nick: Yoshimiru

📩Email: lulzsecgt@hotmail.com
🔑Password: mago66
🎯IP: 200.49.162.238
👤Nick: Lulzsec

📩Email: coolpoiss123@yahoo.com
🔑Password: lulzsec123
🎯IP: 67.221.255.63
👤Nick: cool poiss

📩Email: raidcore@live.com
🔑Password: LulzSec1
🎯IP: 99.66.1.142
👤Nick: Cameron Kristensen

📩Email: lulzsec.xiao@yahoo.com.ph
🔑Password: xiaojoyce10
🎯IP: 121.54.103.200
👤Nick: xiao

📩Email: lulzsechanom@gmail.com
🔑Password: qawseddeswaq12345
🎯IP: 141.0.8.157
👤Nick: Hanom

📩Email: lulzsecd@gmail.com
🔑Password: lulzsecddddd96
🎯IP: 113.190.226.213
👤Nick: Steve Diß?çn

📩Email: lulzsec@jupimail.com
🔑Password: lebgfdp123
🎯IP: 178.32.241.7
👤Nick: Hiro Hamdaoui

📩Email: lulzsec1@mt2014.com
🔑Password: 1111aa
🎯IP: 62.210.170.27
👤Nick: rs

📩Email: jakewjenkins@gmail.com
🔑Password: lulzsec11
🎯IP: 71.51.19.4
👤Nick: josh prince

📩Email: lulzsec.localhost@gmail.com
🔑Password: Sept.24/199four
🎯IP: 97.124.84.246
👤Nick: Jose

📩Email: myfolieadeux@hush.com
🔑Password: lulzsechackmenot1
🎯IP: 222.127.16.236
👤Nick: Sync

📩Email: lulzsec20@aol.com
🔑Password: n0bod1
🎯IP: 190.235.116.113
👤Nick: lulzsec20

📩Email: ghostlyring@hotmail.com
🔑Password: lulzsec23
🎯IP: 84.194.8.75
👤Nick: sec

📩Email: mrlulzking@gmail.com
🔑Password: s37iLHTM1OQUWcT6
🎯IP: 69.76.14.103
👤Nick: LulzSec

📩Email: lulzsec2012@mail.ru
🔑Password: 3472321q
🎯IP: 130.208.209.45
👤Nick: Денис

📩Email: lulzsech4x0r@hotmail.ca
🔑Password: batman11
🎯IP: 99.244.184.205
👤Nick: Resolved

📩Email: lulzsecsabu@gmail.com
🔑Password: OcPcZZDgwMw9qjQH
🎯IP: 80.7.97.83
👤Nick: ben flory

📩Email: hayder11@hotmail.fr
🔑Password: hayderski@
🎯IP: 197.0.255.64
👤Nick: Lulzsec

📩Email: lulzsecturkiye@gmail.com
🔑Password: 4175120ab
🎯IP: 85.102.176.33
👤Nick: sa23

📩Email: lulzsecoh@gmail.com
🔑Password: antisec2011
🎯IP: 173.0.3.175
👤Nick: julian

📩Email: a3797925@nepwk.com
🔑Password: hidmen.freeload
🎯IP: 84.180.180.172
👤Nick: lulzsec

📩Email: lulzsec66@hotmail.fr
🔑Password: Onche66
🎯IP: 90.36.2.125
👤Nick: Jean

📩Email: lulzsecind@gmail.com
🔑Password: sdn17pagi
🎯IP: 125.161.140.3
👤Nick: lulzsec indonesia

📩Email: lulzsec33@gmail.com
🔑Password: fikriandismi33
🎯IP: 207.244.89.112
👤Nick: fikri

📩Email: lulzsec03@ymail.com
🔑Password: lulzsecurity030303
🎯IP: 93.14.109.178
👤Nick: Yo

📩Email: titanzz@ssl-mail.com
🔑Password: lulz5ec
🎯IP: 64.255.180.124
👤Nick: LulzSec

⛏️MinecraftDatabases

Since 2010, there have been more than 1,200 hacks of various MineCraft servers. All of these hacks were collected into large collections and distributed as a means of hacking player accounts in MineCraft. This collection contains emails, nicknames, passwords, IP addresses and other data from all these collections. There are about 57 million rows in total.

📩Email: Lulzsecpit04@gmail.com
💾Data: INSERT INTO mybb_users (`uid`,`username`,`password`,`salt`,`loginkey`,`email`,`postnum`,`threadnum`,`avatar`,`avatardimensions`,`avatartype`,`usergroup`,`additionalgroups`,`displaygroup`,`usertitle`,`regdate`,`lastactive`,`lastactiveajax`,`lastvisit`,`lastpost`,`website`,`icq`,`aim`,`yahoo`,`skype`,`google`,`birthday`,`birthdayprivacy`,`signature`,`allownotices`,`hideemail`,`subscriptionmethod`,`invisible`,`receivepms`,`receivefrombuddy`,`pmnotice`,`pmnotify`,`buddyrequestspm`,`buddyrequestsauto`,`threadmode`,`showimages`,`showvideos`,`showsigs`,`showavatars`,`showquickreply`,`showredirect`,`ppp`,`tpp`,`daysprune`,`dateformat`,`timeformat`,`timezone`,`dst`,`dstcorrection`,`buddylist`,`followed_by`,`ignorelist`,`style`,`away`,`awaydate`,`returndate`,`awayreason`,`pmfolders`,`notepad`,`referrer`,`referrals`,`reputation`,`regip`,`lastip`,`language`,`timeonline`,`showcodebuttons`,`totalpms`,`unreadpms`,`warningpoints`,`moderateposts`,`moderationtime`,`suspendposting`,`suspensiontime`,`suspendsignature`,`suspendsigtime`,`coppauser`,`classicpostbit`,`loginattempts`,`usernotes`,`mysb_banned`,`mysb_banned_reason`,`minecraft_username`,`minecraft_id`,`minecraft_data_update`,`minecraft_last_try_login`,`cant_vote`,`cant_vote_count`,`minecraft_verify_ticket`,`in_server`,`show_in_map`,`mojang_email`,`admin_servers`,`moderatore_servers`,`coolermaster`,`coolermaster_risposta`,`tyl_unumtyls`,`tyl_unumrcvtyls`,`tyl_unumptyls`,`sceditor_enable`,`sceditor_sourcemode`,`lastaccess_board`,`credits`,`shop_tos`,`premium`,`neveoff`,`dati_fatturazione`,`badge`,`useragent`,`cannot_upload_resources`,`cannot_upload_resources_ts`,`cannot_access_shop`,`cannot_access_shop_ts`,`allowtags`,`sourceeditor`,`last_username_change`,`queue_points_total`,`queue_points_variation`,`queue_dropped_emerald`,`dev`,`revision_count`,`resource_count`,`snow_off`,`board_filter`) VALUES ('189134','LulzSec','09d1aba82297453875b440cd4185516a','HOJG8B12','dEST2kDyLrPhQtcsA3ZS9DbigZCDShcaX3vWKjjhBE9rC1jSLd','','0','0','https://www.minecraft-italia.it/forum/images/avatars/invalid_url.png','125|125','remote','2','','0','','1475261621','1481461161','0','1475262482','0','','0','','','','','','all','','1','0','1','0','1','0','1','0','1','0','linear','1','1','1','1','1','1','0','0','0','','','2','0','2','','0','','5','0','0','0','','1**Ricevuti$%%$2**Inviati$%%$3**Bozze$%%$4**Cestino','','0','0','0','87.5.122.253','82.50.59.8','italiano','861','1','0','0','0','0','0','0','0','0','0','0','0','3','','0','',NULL,'','0','0','0','0','0','','0','','0','0','','','0','0','0','1','0','0','0','0','0','0','','0','','0','0','0','0','1','0','0','0','0','0','0','0','0','1','0');
📑Leak file: minecraft-italia.it_190k

📩Email: lulzsec@gmail.com
💾Data: (5820, 'LulzSec', '', 'imaginemdr', 0, '250.74.67.140', '250.74.67.140', 1633255014),
📑Leak file: Mineleak

📩Email: lulzsec@hush.com
💾Data: :hiphop1234$
📑Leak file: BitcoinTalk.org_found

📩Email: lulzsec@gmail.com
💾Data: LulzSecOfficial;;[];;a749e38f556d5eb1dc13b9221d1f994f
📑Leak file: LBSG.net_MD5_12M_January_2016

📩Email: lulzsec@gmail.com
💾Data: :8402
📑Leak file: lbsg.net_5.7m

📩Email: lulzsecbuisness@gmail.com
💾Data: lullsec,,
📑Leak file: [135.37k] - BlackSpigotMC (Emails) 2019

📩Email: lulzsecbuisness@gmail.com
💾Data: lullsec,,,,
📑Leak file: BlackSpigotMC

🎵Deezer

At the end of 2022, music streaming service Deezer reported a data breach that affected more than 240 million customers. The breach occurred due to a backup published in mid-2019 by a third-party partner. The affected data included 229 million emails, as well as IP addresses, usernames, gender, dates of birth and geographic locations of customers.

📩Email: peterpeter67@hotmail.com
📆Registration date: 2016-04-05
🎂Date of Birth: 1997-01-01
🇦🇺Language: en
👤Nick: lulzsec
🗾A country: GB
🚻Floor: F

📩Email: breakboy_delete@yahoo.com
📆Registration date: 2013-04-16
🎂Date of Birth: 1994-03-03
🇦🇺Language: en
👤Name: Lulzsec
👤Nick: Lulzsec Nano
👤Surname: Nano
🗾A country: VN
🚻Floor: M

📩Email: assohan@yahoo.com
📆Registration date: 2016-02-19
🎂Date of Birth: 2003-01-01
🇦🇺Language: en
🎧︎Listening time in hours: 0.0
👤Nick: LULZSEC
💶total amount: 0.0
📜Subscriptions: 0
🗾A country: BD
🚻Floor: M
🦻Number of listening days: 0

📩Email: maliksusanoo@hotmail.com
📆Registration date: 2017-08-26
🎂Date of Birth: 1999-08-27
🇦🇺Language: en
🌃City: AVIGNON
🍎Platform: ogone
👤Full name: Lulzsec Malik
👤Nick: Malik Lulzsec
🗾A country: FR
🚻Floor: M

📩Email: rangel05@gmail.com
📆Registration date: 2017-07-22
🎂Date of Birth: 1993-01-01
🇦🇺Language: mx
🎧︎Listening time in hours: 0.0
👤Nick: lulzsec
💶total amount: 0.0
📜Subscriptions: 1
🗾A country: MX
🚻Floor: M
🦻Number of listening days: 0

📩Email: rangel04@nio.com
📆Registration date: 2017-07-22
🎂Date of Birth: 1999-01-01
🇦🇺Language: us
🎧︎Listening time in hours: 0.21666666666666667
👤Nick: LulzSec
💶total amount: 0.0
📜Subscriptions: 7
🗾A country: MX
🚻Floor: M
🦻Number of listening days: 1

📩Email: rangel04@nio.com
📆Registration date: 2017-07-22
🎂Date of Birth: 1999-01-01
🇦🇺Language: us
👤Nick: LulzSec
🗾A country: MX
🚻Floor: M

📩Email: rangel05@gmail.com
📆Registration date: 2017-07-22
🎂Date of Birth: 1993-01-01
🇦🇺Language: mx
👤Nick: lulzsec
🗾A country: MX
🚻Floor: M

📩Email: rightnight71@gmail.com
📆Registration date: 2019-02-27
🎂Date of Birth: 1993-01-01
🇦🇺Language: en
🎧︎Listening time in hours: 13.591666666666667
👤Nick: LulzSec
💶total amount: 0.0
📜Subscriptions: 6
🗾A country: SA
🚻Floor: M
🦻Number of listening days: 16

📩Email: imaxas21@gmail.com
📆Registration date: 2013-09-13
🎂Date of Birth: 1905-01-01
🇦🇺Language: en
👤Full name: Lulzsec IAnon
👤Nick: IAnon Lulzsec
🗾A country: LT
🚻Floor: M

🌟VK Parsing 2023

At the beginning of 2023, information about all users of the Russian social network VKontakte was collected using parsing. The resulting database contains more than 770 million users. The data includes names, locations, educational backgrounds and other information.

🎂Date of Birth: 1.12.1992
🆔VK ID: https://vk.com/id498632740
🌃City: Demerval Lobão
👤Full name: LulzSec Felipe
🗾A country: Brazil
😻Number of subscribers: 0
🚻Floor: 2

🆔VK ID: https://vk.com/id152033146
🌃City: Yekaterinburg
👤Full name: Lulzsec Anonimus
🚻Floor: 2

🆔VK ID: https://vk.com/id677516738
👤Full name: Lulzsec Brack
😻Number of subscribers: 0
🚻Floor: 0

‍🎓Faculty: Σχολή Επιστήμης Φυσικής Αγωγής και Αθλητισμού
🆔VK ID: https://vk.com/id169037617
🌃City: Thessaloniki
🎒School: ΙΕΚ Δέλτα 360
🏫University: Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ)
👤Full name: Lulzsec George
🗾A country: Greece
😻Number of subscribers: 0
🚻Floor: 2

🆔VK ID: https://vk.com/id472467853
🌃City: Denver
🌃Hometown: Denver
👤Full name: Lulzsec Anonym
🗾A country: USA
😻Number of subscribers: 0
🚻Floor: 2

🆔VK ID: https://vk.com/id214535728
👤Full name: Lulzsec Aushok
😻Number of subscribers: 0
🚻Floor: 2

🎂Date of Birth: 21.7.1997
🆔VK ID: https://vk.com/id457464316
👤Full name: Lulzsec Yodion
😻Number of subscribers: 0
🚻Floor: 2

🎂Date of Birth: 9.5.1996
🆔VK ID: https://vk.com/id301533408
🌃City: Chlef
👤Full name: Lulzsec Stev
🗾A country: Algeria
😻Number of subscribers: 0
🚻Floor: 0

🆔VK ID: https://vk.com/id373596768
👤Full name: Lulzsec Anonymous
😻Number of subscribers: 0
🚻Floor: 2

🎂Date of Birth: 4.4.1995
🆔VK ID: https://vk.com/id328609328
👤Full name: Lulzsec Yasuku
😻Number of subscribers: 0
🚻Floor: 0

🎂Date of Birth: 11.3.2008
🆔VK ID: https://vk.com/id711463999
👤Full name: Lulzsec Lulzsec
😻Number of subscribers: 0
🚻Floor: 2

🎂Date of Birth: 27.8.1949
🆔VK ID: https://vk.com/id273147937
👤Full name: Lulzsec Malik
😻Number of subscribers: 5
🚻Floor: 0

🪔Wattpad

In June 2020, user story site Wattpad suffered a leak that exposed 270 million records. Personal information was exposed: names, emails, IP, gender, dates of birth and passwords in the form of bcrypt hashes.

📩Email: hugocouto2015@gmail.com
📆date: 2016-04-09 10:12:13
🎂Date of Birth: 1998-12-12
ⓕFacebookID: 1768882063349219
🎯IP: 87.196.80.142
👤Full name: Lulzsec Luser
👤Nick: LulzsecLuser
🗾A country: PT
🚻Floor: M

📩Email: lulzsec123456@gmail.com
🔐Encrypted password: $2y$10$mWayuWFqRnKV0OWBkD3dleN16rmTfhzAjNm3iugAWyKoai41bOS6.
📆date: 2019-05-17 02:22:13
👤Full name: LulzSec
👤Nick: LulzSecq
🗾A country: US

📩Email: eda.e.y@outlook.com
🔐Encrypted password: 40dd31698fa07e94406f723f6d559c89a6770ec0d895b80828d6a74cf89e7acc
📆date: 2014-05-19 21:02:24
🎂Date of Birth: 1997-08-29
🎯IP: 78.190.119.46
👤Nick: lulzsec
🗾A country: TR
🚻Floor: F

📩Email: lulzsecvnn@gmail.com
🔐Encrypted password: $2y$10$NEUEmuc9C9WutDN3TQVjNOihKOAHTpz1/PKsnbuflxEkdZ4YisRQG
📆date: 2016-08-09 07:32:23
🎯IP: 42.113.197.77
👤Full name: Hùng Chu Văn
👤Nick: lulzscnecncn
🗾A country: VN
🚻Floor: M

📩Email: jakewjenkins@gmail.com
🔑Password: lulzsec

📩Email: hackergunny65@yahoo.com
📆date: 2012-07-30 11:07:05
🎂Date of Birth: 1997-11-04
ⓕFacebookID: 100003710095380
🎯IP: 123.26.28.88
👤Full name: LulzSec Kjn
👤Nick: LulzSecKjn
🗾A country: VN
🚻Floor: M

📩Email: cumakacarr@hotmail.com
🔐Encrypted password: $2y$10$mUOYRauR2SCeCD7ZFMgZUuQdvAcLzD8T.W32foI.dUIRGAD1kmF9e
📆About me: Saykosal şeyler
📆date: 2015-09-11 18:03:15
🎂Date of Birth: 1997-04-09
🎯IP: 88.229.43.236
👤Full name: Lulzsec Alderson
👤Nick: slhaml
🗾A country: TR
🚻Floor: M

🔒PasswordIndex

This is an inverse index created in March 2023. It allows you to search for all emails associated with a particular password. This index contains 1.3 billion unique passwords and 3.2 billion emails for which they were used. Enter the received emails into the search to get more information.

🔑Password: Lulzsec
📨Emails: skelly32x@gmail.com

🔑Password: lulzsec
📨Emails: 193070@yahoo.com; llong321@aol.com; mario14marth@yahoo.com; vitor_nascimento@hotmail.com; 4232260; archonex@yahoo.com; hisaac96@hotmail.com; navindugo@ovi.com; none@lulzsec.org; unkowen@outlook.com; a.haase@ymail.com; dubois77130@gmail.com; forthelulz102@gmail.com; lkllftw@gmlil.com

🔑Password: lulzsec
📨Emails: cracklepenny@aol.com; smartgrampgoblin@mailinator.com; dsantamaria@gmail.com; josh.1993@hotmail.couk; maxikd@hotmail.com; microworld2015@yahoo.com; sleepyme@hotmail.com; subcultureart@yahoo.com

🔑Password: Lulzsec
📨Emails: lulzsec@hush.com

🔑Password: lulzsec
📨Emails: kwdfjc12@gmail.com; royhsieh1996@gmail.com; lolleeee1@hotmail.de; patrick_leezp@hotmail.com; pienenes@hotmail.com; tobias@cawley.dk; x13@rpgsource.net; xmenhaxor@gmail.com

🔑Password: lulzsec
📨Emails: jakewjenkins@gmail.com; reecelockwood@hotmail.co.uk

🔑Password: LulzSec
📨Emails: eg.barinoff2015@ya.ru; emanuele.scilinguo@gmail.com; simplicityapplications@gmail.com

🔑Password: Lulzsec
📨Emails: cpdeathz@yahoo.com

🔑Password: LulzSec
📨Emails: lulzsecbuiness@gmail.com

🔑Password: lulzsec
📨Emails: shrtstuf02773376@aol.com; unkowen@comcast.net

🔑Password: LULZSEC
📨Emails: josh.1993@hotmail.co.uk

🔑Password: lulzsec
📨Emails: fokstijl@gmail.com; izanagidark0000@outlook.com; josh.1993@hotmail.co.uk; lulzsec@lulzsec.sec; sexy_angel462@yahoo.com; unkowen@yahoo.com; x13@yahoo.co.in

🍏YouNow

In February 2019, data from the YouNow live streaming service appeared for sale on the darknet. The affected data included 18 million unique email addresses, as well as IP addresses, usernames and links to social media profiles. Since authentication is done through social networks, there were no passwords.

📩Email: lulzsecaiko@gmail.com
🎯IP: 83.242.57.248
🎯Last IP: 94.176.250.71
👤Name: LulzSec
👤Nick: LulzSecAiKo
👤Surname: AiKo

📩Email: lulzsecreborn0101@gmail.com
🎯IP: 198.143.55.25
👤Name: LulzSec
👤Nick: LulzSecReborn_83967
👤Surname: Reborn

📩Email: aignerelias@yahoo.com
ⓕFacebookID: 1032629853485285
🎯IP: 149.126.78.41
🎯Last IP: 91.58.143.169
👤Name: Defalt
👤Nick: LulzSecDEFALT
👤Surname: Unkwn
📧Email: aignerelias@yahoo.com

ⓕFacebookID: 1799667030276813
🎯IP: 198.143.39.22
🎯Last IP: 124.82.21.171
👤Full name: LulzSector Sunil
👤Nick: SunilLulzSector

📩Email: lulzsecaikonv@gmail.com
🎯IP: 149.126.76.25
🎯Last IP: 93.118.15.178
👤Name: LulzSec
👤Nick: LulzSecAikogamingnv
👤Surname: Aikogamingnv

📩Email: ogbooter461@gmail.com
🎯IP: 54.239.134.64
🎯Last IP: null
👤Name: LulzSec
👤Nick: LulzSecReborn
👤Surname: Reborn

📩Email: lulzsec0600@gmail.com
🎯IP: 141.101.105.160
🎯Last IP: 81.213.169.21
👤Name: lulzsec06
👤Nick: lulzsec06Firewall
👤Surname: Firewall

🎯IP: 173.245.48.128
🎯Last IP: 172.249.115.173
👤Name: Lulzsec
👤Nick: lulzsec_ctm
👤Surname: none
📷Instagram ID: lulzsec_ctm

🪖VNG

In April 2018, news broke of a data breach at Vietnamese company VNG after data was discovered to be traded on a popular hacker forum where it was widely shared. The leak occurred in May 2015 and involved more than 16.3 million customers. The data contained names, dates of birth, gender, home addresses, unsalted MD5 hashes, and 25 million unique email addresses.

📩Email: h0lyh3x0r@gmail.com
🔐Encrypted password: E8C30A9F63950E7D2DADAFF67EFD7132
📆Registration date: 2012-04-04 12:53:41.0
🎂Date of Birth: 1992-04-03.0
🏘️Address: 62/3 XA
🎯IP: 58.186.49.122
👤Full name: Lulzsec
👤Nick: antisecurity
🚻Floor: true

📩Email: kjn.stoned@yahoo.com.vn
🔐Encrypted password: 3844F997E4D025D98E9DF327FDBBC6E0
📆Registration date: 2012-06-09 09:54:25.647
🎂Date of Birth: 1999-11-04.0
🏘️Address: Đà Nẵng
🎯IP: 123.26.30.41
👤Full name: LulzSec
👤Nick: lulzsec9x
🚻Floor: true

🔐Encrypted password: E10ADC3949BA59ABBE56E057F20F883E
📆Registration date: 2011-06-30 18:50:47.223
🎂Date of Birth: 2011-01-01.0
🎯IP: 115.72.248.10
👤Full name: sadaw da
👤Nick: lulzsec

🔐Encrypted password: 4D94B7EFC5E4EAFA9AA68670356670DF
📆Registration date: 2015-01-23 10:54:42.0
🎂Date of Birth: 2001-04-02.0
🎯IP: 42.117.158.8
👤Full name: Lulzsec
👤Nick: lulzsec123
🚻Floor: true

👤Gravatar

In October 2020, a technique for extracting large amounts of data from Gravatar was published. This service provides common avatars for all sites. Using this method, 167 million usernames and MD5 hashes of their email addresses were collected. These hashes were used as a reference to user avatars. Many hashes were subsequently decrypted.

📩Email: lulzsec30@gmail.com
👤Nick: foreverstoresocial
👤Nick: foreverstoresocial
🔗Link: http://gravatar.com/foreverstoresocial
🖼️Avatar: https://secure.gravatar.com/avatar/9c04f421302b383753cf5febb4423fef

📩Email: lulzseczazzle@gmail.com
👤Nick: lulzsec
👤Nick: lulzsec
🔗Link: http://gravatar.com/lulzsec
🖼️Avatar: https://secure.gravatar.com/avatar/2b1738614741c14e95d1f92fe460ec01

📩Email: lulzsec@gmail.com
👤Nick: bosubosubosu
👤Nick: bosubosubosu
🔗Link: http://gravatar.com/bosubosubosu
🖼️Avatar: https://secure.gravatar.com/avatar/c822cd01176a2d71eddaf2388364d932

📩Email: lulzsecer@gmail.com
👤Name: alex
👤Nick: alexsmith682
👤Nick: i3rixon
👤Surname: smith
🔗Link: http://gravatar.com/alexsmith682
🖼️Avatar: https://secure.gravatar.com/avatar/f028e0fb5715589d1f5e13cd4d621159

💾naz.api

This database was created by extracting data from stealer logs. It contains data about saved logins and passwords in users' browsers. It contains 270 million unique records.

🔑Password: fuckyou
👤Nick: lulzsec
🔗Link: http://569.unknownsecret.info/mp3/SoMo/SoMo/SoMo+-+I+Do+It+All+For+You.mp3

🔑Password: khorugane99
👤Nick: Lulzsec
🔗Link: https://vidoza.net/login.html

🔑Password: vallin01
👤Nick: Lulzsec
🔗Link: https://subscriberhelp.zendesk.com/auth/v2/login/email_verification

🔑Password: lulzsec
👤Nick: lulzs3c
🔗Link: https://www.wattpad.com/settings

🔑Password: dogu190707
👤Nick: lulzsec
🔗Link: https://auth.riotgames.com/login

🔑Password: jessecain23
👤Nick: lulzsec
🔗Link: https://habborw.com/register

📩Email: anxify@gmail.com
🔑Password: Lulzsec
🔗Link: https://thebeast1.com/signup2/register.php

🔑Password: LULZSEC
👤Nick: Phreaker
🔗Link: http://www.1337x.to/register

🔑Password: dogu123
👤Nick: lulzsec
🔗Link: https://vip120.vipsro.com/index.php

🔑Password: dogu123
👤Nick: lulzsec
🔗Link: https://www.finsro.net/index.php

🤑Vakinha

In June 2020, the Brazilian fundraising service Vakinha suffered a data breach. The incident affected nearly 4.8 million members. The exposed data included email addresses, names, phone numbers, geographic locations, and passwords in the form of bcrypt hashes.

📩Email: lulzsecml@gmail.com
🔐Encrypted password: $2a$10$3ErZhYz01dNSrGQROdZ3Ieu6jeadulJo.xZKw5mFkeZdI65AUNmD6
📞Telephone: 1125847563
📆Registration date: 2018-05-23 20:46:49.868269
🎂Date of Birth: 1980-09-28
🇧🇷Brazil Tax Number: 966.328.420-03
🇺🇸State: SP
🌃City: SP
🎯IP: 177.47.27.238
👤Full name: Pedro Lima Do Santos
🚪Number of inputs: 4

📩Email: lulzsecml1@gmail.com
🔐Encrypted password: $2a$10$6R9CsVP2M.2USo8BM8r/OOY5k20h/69nif7yJAiI45nxRO40DUZmC
📞Telephone: 11964557555
📆Registration date: 2018-06-17 01:22:23.642066
🎂Date of Birth: 1995-05-21
🇧🇷Brazil Tax Number: 353.481.532-73
🇺🇸State: SP
🌃City: Sp
🎯IP: 170.254.144.38
👤Full name: Pedro lima
🚪Number of inputs: 1

🏞Pizap

Around December 2017, online photo editing site PiZap was leaked. It contained 42 million unique records, including emails, names, genders and passwords in the form of SHA-1 hashes.

📩Email: r3dc0d3@fbi.al
📆Last Activity: 29.01.2014 03:01:09
📆Registration date: 13.01.2014 12:52:13
ⓕFacebookID: 100007519745008
👤Full name: LulzSec Redcodec
👤Nick: 100007519745008
📍Points: 34
🗾Code of the country: PH
🚻Floor: male

📩Email: sharklaser@sharklasers.com
📆Last Activity: 20.01.2015 23:03:41
📆Registration date: 20.01.2015 23:02:37
👤Nick: lulzsec
📍Points: 26

📩Email: cucokbebe@yahoo.com
📆Last Activity: 07.05.2017 08:11:55
📆Registration date: 05.08.2013 06:38:53
ⓕFacebookID: 100005916847791
👤Full name: Lulzsec
👤Nick: 100005916847791
📍Points: 29
🗾Code of the country: ID
😻Number of subscribers: 1
🚻Floor: male

🥷RaidForums.com

RaidForums - самый известный хакерский форум, действовавший с 2015 года. Он был закрыт 12 апреля 2022 года после ареста его создателя. Позже, 30 мая 2023 года, в открытый доступ была выложена база данных его участников, собраная 24.09.2020 в результате взлома. База содержит 478 тысяч записей и включает имена, почты, IP и пароли в виде хэшей с солью.

📩Email: LamboWitBands@outlook.com
🔐Encrypted password: def502009088976878c430204fd698ccf90153fbf3bf10b315607b1d59b2c4a7c7a57cc6078a84a58b5878f95ac5c71b2058370d47236f4f2538d3906769db17d80bd9450b51b006585e161df6143ac69f9de219e309a1fe44bf840c7dc825b79448ac335ffb3b4ea92630364616c7688723839e
📆Last Activity: 08.11.2015 20:53:19
📆Registration date: 08.11.2015 20:50:18
🎂Date of Birth: 28-7-1997
⌚Time online: 181
⌚Timezone: 1
🍚Salt: LF9sXDJQ
🎓Loans: 0.00
🎯IP: l?
👤Nick: LulzSec
📇Number of publications: 0
🤝Number of referrals: 1
🧵Number of topics: 0

🏰BlankMediaGames

In December 2018, the Town of Salem website created by BlankMediaGames suffered a data breach. The data contained 7.6 million unique email addresses. Also in the leak were names, IP addresses, purchase histories and passwords in the form of phpass hashes. BlankMediaGames has not responded to multiple attempts to contact regarding the incident.

📩Email: lulzsec@maildrop.cc
🔐Encrypted password: $H$9324kocfQudVAR0I/V/YS4HBpBXRsG.
🎯IP: 109.96.251.234
👤Nick: chinese6969

📩Email: lulzsec6991@yahoo.com
🔐Encrypted password: $H$9O3bZ5zxFs7FADhm2trXRdxRvU05Qw0
🎯IP: 202.12.94.225
👤Nick: asdfghjkl2323

📩Email: lulzsec.b@gmail.com
🔐Encrypted password: $H$9qEJc8nZesHnVrGXa3Ra0sBc65Xzl40
👤Nick: AztecGold

📩Email: lulzsecz@yandex.com
🔐Encrypted password: $H$9yKUZ2XVDOpYXSP9M3QkjiK2rkH9wQ.
🎯IP: 73.175.111.161
👤Nick: TheRealBronson

💻OGUsers2021

In April 2021, an account hacking and SIM swapping forum suffered a data leak. This is already the fourth (!!!) leak on this service since December 2018. The database was subsequently sold on a competing hacker forum and contained usernames, email addresses, IP addresses and passwords as salted MD5 or argon2 hashes. As a result of the hack, 348 thousand unique emails were published.

📩Email: wefawerfgarggr@lol.jp
🔐Encrypted password: fd887bbcf9913a4bbab92e6171b10c7a
📆Last Activity: 01.01.2019 18:27:26
📆Registration date: 31.12.2018 18:29:49
🎂Date of Birth: 6-11-1990
⌚Time online: 113
🍚Salt: wa2XqMJS
🎯IP: C0DF18AA
🎯Last IP: C0DF18AA
🏆Number of awards: 0
👀Number of views: 0
👤Nick: LulzSec
💎Reputation: 0
📇Number of publications: 0
🤝Number of referrals: 0
🧵Number of topics: 0

🔗LinkPass collection

In 2022, a combo player appeared on the Internet containing authorization data for various sites. It was obtained using viruses that steal saved login data in browsers. The leak contained approximately 150 million records. It indicated nicknames, emails and telephone numbers as logins and passwords in plain text, as well as the sites for which they were intended.

🔑Password: jessecain23
👤Nick: lulzsec
🔗Link: https://habborw.com/register

🔑Password: vallin01
👤Nick: Lulzsec
🔗Link: https://freedomainapi.com/members/register.php

🔑Password: jessecain23
👤Nick: LulzSec
🔗Link: https://habborw.com/register

🔑Password: Pusate38@
👤Nick: lulzsec
🔗Link: https://retroripper.nl/member.php

🔑Password: vallin01
👤Nick: Lulzsec
🔗Link: https://subscriberhelp.zendesk.com/auth/v2/login/email_verification

💬Xat

In November 2015, the xat.com online chat was hacked. Data from 6 million user accounts were exposed. The leaked data included usernames, email addresses, IP addresses, and passwords in the form of digital hashes with an unknown algorithm.

📩Email: lulzsec.xiao@yahoo.com.ph
🔑Password: -1559448011
📆Registration date: 21.05.2014 04:24:28
👤Nick: LulzsecPinas

📩Email: lulzsec@onet.pl
🔑Password: -210463397
📆Registration date: 12.11.2011 13:54:49
👤Nick: SneerQueshi

📩Email: lulzsecbras@hotmail.com
🔑Password: 1876945410
📆Registration date: 08.08.2011 23:32:49
👤Nick: lulzsecjust

📩Email: lulzsecvenezuela@outlook.com
🔑Password: 359626418
📆Registration date: 10.07.2014 23:56:05
👤Nick: Lulzsecvenezuela

🐝Bitly

In May 2014, link shortening and monetization company Bitly announced that it had suffered a data breach. The published data contained 9.3 million unique email addresses, as well as usernames and SHA1 hashed passwords. In rare cases, the bcrypt algorithm was used.

📩Email: lulzsecgt@hotmail.com
🔐Encrypted password: 0ffe63745566d79a7df22fa38138bd5f
👤Nick: lulzsecgt

📩Email: omicronhatemail@gmail.com
🔑Password: lulzsec4891

📩Email: aolxom@gmail.com
🔐Encrypted password: f81e9a7adab5ac95a673d1854b469527
👤Nick: lulzsec

📩Email: lulzsec@yahoo.com
🔐Encrypted password: 1fe5352d1a98b989479a4c471d340a5d
👤Nick: lulzsec1

📩Email: lulzsecgt@hotmail.com
🔑Password: tierrasanta

📩Email: lulzsec@yahoo.com
🔑Password: fuckyou

📡Animoto

In July 2018, the cloud video creation service Animoto suffered a data leak. As a result of the leak, 22 million email accounts were affected. In addition, the data included names, dates of birth, country of origin, and salted SHA256 password hashes.

📩Email: hisaac96@hotmail.com
🔑Password: lulzsec

📩Email: hayder17@hotmail.fr
🔐Encrypted password: 6979bf211eb9c00920c187ace373cb85642fa48e29aaabc4da70d2d035a7cb99
🎂Date of Birth: 1992-09-08
🍚Salt: c81edb18aa87e8daa38f28c655c2aa6c95320ae2
👤Full name: LulzSec Hayder

📩Email: netoj288@gmail.com
🔐Encrypted password: e7dac7d975afc309025f0852c9ea3d0b01db75537926485ccb478cc6f88e74b8
🍚Salt: 9c7068f10b87edb9c3792c7f7f938bc19e5dc57e
👤Full name: Lulzsec Lulzsec

🐒KinoKong

In March 2021, there was a data leak on the pirate website KinoKong. The leak exposed data including usernames, email addresses and passwords in the form of Bitrix hashes. In total, 824 thousand users were affected. The vast majority of entries in the database were bots due to the fact that KinoKong does not use captcha on its website.

📩Email: lulzsec2012@mail.ru
🔐Encrypted password: 316dbefb45b562266d47b768e356a2d3
(RegDateunix): 1397082586
🎯IP: 2.95.234.39
👤Full name: Денис Харисов
👤Nick: blabal666

📩Email: lulzsecer@gmail.com
🔐Encrypted password: 70963fbbeea6ae0dc60722c8740ac691
(RegDateunix): 1509851579
🌃City: Ukraine
🎯IP: 46.98.213.147
👤Full name: Alex
👤Nick: dexor

🔓CrackedTO

In July 2019, hacker website Cracked.to suffered a data breach. The forum had 749 thousand unique email addresses registered among 321 thousand users. The data also included IP addresses, passwords in the form of bcrypt hashes, personal messages, usernames and other data. A rival hacking website claimed responsibility for the hack.

📩Email: kutajadu@gmail.com
🔐Encrypted password: $2y$12$xzQYfrBTafS6vmJJY/FRu.lI59VuWBn8.Req7a32Dkt4fQ6j.0VsW
📆Last Activity: 10.04.2019 16:28:08
📆Registration date: 04.04.2019 13:57:59
⌚Time online: 15609
🍚Salt: JeqADSgY
🎯IP: 0x5266170E
🎯Last IP: 0x2EF41DFD
👀Number of views: 7
👤Nick: LulzSec
📇Number of publications: 36
🤝Number of referrals: 0
🧵Number of topics: 0

😖Facepunch

In June 2016, the game development studio Facepunch suffered a data leak that affected 343 thousand users. Emails, IP addresses, dates of birth and salted MD5 password hashes were exposed. Facepunch said they were aware of the incident and notified the affected people when it happened.

📩Email: LulzSecs@gmail.com
🔐Encrypted password: 53c7ef2ca311fd0dd695d59d91f4cf9e
📆Last Activity: 19.06.2011 01:08:03
📆Registration date: 18.06.2011 21:57:52
🎂Date of Birth: 04-13-1990
⌚Timezone: 0
🍚Salt: 17G}t1#WS]Beo~2vFg>1+Z#}:4XajO
🎯IP: 76.231.161.4
👤Nick: LulzSecurity

📩Email: taoamano@gmail.com
🔑Password: lulzsec1

📩Email: LulzSecs@gmail.com
🔑Password: xLoLnOObx9110

📘Facebook

In April 2021, data on more than 500 million Facebook users became available for free download. The data was obtained by exploiting a vulnerability fixed in August 2019. Every entry included a telephone, but only 2.5 million contained email. The records also contained names, gender, dates of birth, location, relationship status and employer.

📞Telephone: 966548169584
ⓕFacebookID: 100025729532307
👤Full name: LulzSec LulzSec
👤Nick: lulzsec.lulzsec.7505
🚻Floor: male

📞Telephone: 60172212241
ⓕFacebookID: 100015121354321
👤Full name: LulzSec Clone

📞Telephone: 447451246511
ⓕFacebookID: 100021240730538
👤Full name: Lulzsec Sabu
🚻Floor: female

🐦Twitter (Partial)

In January 2022, a vulnerability in the Twitter platform allowed the creation of a database of emails and phone numbers of millions of users. Twitter said the vulnerability stems from a bug introduced in June 2021. The data included publicly available information: username, display name, biography, location, and profile photo. 6.7 million email addresses were affected.

📩Email: Lulzsec4life@gmail.com
📆Registration date: Fri Sep 25 13:16:50 +0000 2015
❤️Number of favorites: 567
👤Name: S!ll3nt_K¡ll€s
👤Nick: _AnnA_b3LL3
📊Number of statuses: 292
🖼️Avatar: https://pbs.twimg.com/profile_images/796317588867444737/T_VcQDyc_normal.jpg
😻Number of subscribers: 26
🧭Location: Paris, France
🫂Number of friends: 178

🦾Powerbot

Around September 2014, Powerbot, a site that provides bot services for the game RuneScape, suffered a data breach. More than half a million unique user records were exposed. The data contained email addresses, IP addresses, usernames, and MD5-salted password hashes. It was previously reported that the site was compromised at Vigilante.pw using a database directory hack.

📩Email: lulzsec@fffffuuuu.com
🔑Password: null
🎯IP: 24.9.106.111
👤Name: scriptexMEMBERSHIP

📩Email: lulzsecftw@live.com
🔑Password: null
🎯IP: 68.43.41.8
👤Name: lulzsecftw

📩Email: lulzsec@fffffuuuu.com
🔑Password: qaz123

📩Email: lulzsecftw@live.com
🔑Password: yankees2

🐹FerretCheck

In the fall of 2020, the FerretCheck checker database was published. This service searched for users in hacked databases for the game MineCraft and returned lists of their passwords. This was used to hack their accounts on game servers. The database included leaks from approximately 80 game servers, totaling 19 million lines. They contained nicknames, passwords in the form of AuthMe hashes, IP addresses and a total of 447 thousand emails.

🔐Encrypted password: $SHA$7dbf200edb359b23$89839313013524226ed7c9eadd07b85612aaf1a65ebe9b7c947cb52d31180974
🌐Leak site: NexusCraft(03.2020)
🎯IP: 178.251.106.243
👤Nick: lulzsec

🔑Password: adminhack
🌐Leak site: FoxMc
🎯IP: 78.106.114.190
👤Nick: lulzsec

🥑Aptoide

In April 2020, the independent Android app store Aptoide suffered a data leak. 20 million customer records were exposed. The data included email addresses, IP addresses, names and passwords as unsalted SHA-1 hashes.

📩Email: crugerkooth@gmail.com
🔐Encrypted password: 7c046149eb872e4470d4dd9a978a63846efa614477b2a41d162f05e52088fb43
📆Registration date: 2017-04-18 16:37:39.140731
🎯IP: 90.55.143.36
👤Full name: LulZSec Hax (LulZSecHax)
🤴Status: active

📩Email: manru96@yahoo.it
🔐Encrypted password: 5b0ca796e03b518877519e3e53727e9c5339083a
📆Registration date: 2016-12-29 12:14:52.897053
🎯IP: 62.85.234.208
👤Full name: LulzSec
🤴Status: active

📁TaiLieu

In November 2019, Vietnamese education website TaiLieu suffered a data breach, exposing the records of 7.3 million customers. The data included nicknames, usernames, emails, dates of birth, gender, and passwords in the form of unsalted MD5 hashes. TaiLieu did not respond to a message about the incident.

📩Email: lulzsec_105@yahoo.com.vn
🔐Encrypted password: c3e71cda61f063051b97fc30b388cefa
🎂Date of Birth: 10-5-1993
👤Name: hien
👤Surname: dang
🚻Floor: 1

📩Email: lulzsec1992@gmail.com
🔐Encrypted password: d9ef39881e6fecbb894b4378d1860e69
🎂Date of Birth: 9-10-1992
👤Name: Hoàng
👤Surname: VÅ©
🚻Floor: 1

🎌AnimeForum.ru

In December 2017, a data leak occurred on the Russian anime forum AnimeForum, which affected 132 thousand users. The database included dates of birth, email addresses, IP addresses, languages ​​spoken, usernames, website activity, and MD5 hashed passwords.

📩Email: lulzsec2012@mail.ru
🔐Encrypted password: 85365295e470fbb32225fb085fabee6e
📆Last Activity: 1325947300
📆Registration date: 1325947300
🎂Year of birth: 0
🎂Month of birth: 0
🎂Date of birth(day): 0
🍚Salt: EVD+s
🎯IP: 95.30.85.107
🏷️Title: Кавайность
👤Nick: LulzSec
📇Number of publications: 1
📮Number of messages: 0
🔭Profile views: 108

🗂Nitro

In September 2020, the Nitro PDF service suffered a massive data breach. More than 70 million unique email addresses, names, bcrypt passwords, and converted file headers were exposed.

📩Email: lulzsecd@gmail.com
📆Registration date: 2015-06-24 18:09:54.132718
👤Name: lulzsecd@gmail.com
👤Surname: lulzsecd@gmail.com

📩Email: lulzsec_brazil@hotmail.com
📆Registration date: 2014-11-24 15:45:23.049
🇦🇺Language: PORTUGUESE

📩Email: lulzsec_brazil@hotmail.com
📆Registration date: 2015-06-24 18:14:09.903467
👤Name: lulzsec_brazil@hotmail.com
👤Surname: lulzsec_brazil@hotmail.com

❌Nulled.ch

In May 2020, the hacker forum Nulled.ch was hacked and its data was published on a rival hacker forum. More than 43 thousand accounts were compromised. The data included IP addresses, email addresses, usernames and passwords stored as salted MD5 hashes. The history of personal messages of the website administrator was also published.

📩Email: lailasin94@outlook.com
🔐Encrypted password: 55cef9fd03e35050de980b01deda15bc
📆Registration date: 20.05.2015 20:06:14
📆Last Activity: 1461927576
🍚Salt: `<&vQ
🎯IP: 77.28.86.27
👤Full name: lulzsec
👤Nick: LulzSec
📇Number of publications: 251
📮Number of messages: 56
🔭Profile views: 5

💹BitcoinTalk

In May 2015, the cryptocurrency forum Bitcoin Talk was hacked. More than 500 thousand users were affected. The attack exposed personal data including names, email addresses, IP addresses, gender, dates of birth, security questions and MD5 hashes of their answers, as well as hashes of the passwords themselves.

📩Email: lulzsec@hush.com
🔐Encrypted password: 0d6fd8e63969e335d9705bdfd5e98790482d5d69
📆Last Activity: 06.06.2011 02:38:01
📆Registration date: 04.06.2011 17:30:20
🎂Date of Birth: 0001-01-01
🎯IP: 88.202.201.127
👤Nick: Lulzsec
📇Number of publications: 2
📮Number of messages: 0
🙈Unread messages: 0
🚻Floor: 0

🖥VipHackForums

Around December 2014, a data leak occurred on the hacker forum VipHackForums, which affected 35 thousand users. The breach included usernames, IP addresses, email addresses and passwords stored as MD5 hashes.

📩Email: gushehackforums@gmail.com
🔐Encrypted password: b61ae2904b6388d7fcdf310dcef3b916
📆Last Activity: 02.02.2013 08:15:10
📆Registration date: 18.01.2013 01:22:48
🎂Date of Birth: 2-5-1990
⌚Time online: 18899
⌚Timezone: 10
🍚Salt: SxPfgyvJ
🎯IP: 68.11.98.80
🏆Number of awards: 0
👤Nick: lulzsec
💎Reputation: 1
📇Number of publications: 26
🤝Number of referrals: 1

🔧GameTuts

Apparently in early 2015, video game site GameTuts suffered a data breach that exposed over 2 million user accounts. The exposed data included usernames, email addresses and IP addresses, as well as salted MD5 hashes of passwords.

📩Email: LulzSek@live.com
🔑Password: 5b9888c93f509408a1a061cbd788bdd7
📆Last Activity: 20.06.2011 04:13:04
📆Registration date: 20.06.2011 04:11:37
🎂Date of Birth: 08-18-1974
⌚Timezone: -5
🍚Salt: @XVGWfduk_NIlGF&%ysWneWcVq7^Y
🎯IP: 208.64.124.100
🏷️Title: Awaiting Email Confirmation
👀Profile visits: 0
👤Nick: LulzSec
💎Reputation: 10

🖼500px

In mid-2018, the online photography community 500px suffered a data breach. The incident exposed nearly 15 million unique email addresses. The data also included usernames, gender, dates of birth, and MD5 or bcrypt password hash.

📩Email: lulzsec.neo@hotmail.com
🍚Salt: A3oYDBSzAwoxfjyaGnJW
👤Name: Kurt
👤Nick: lulzsecneo
👤Surname: Tong

📩Email: nabil-iguidre@live.fr
🎂Date of Birth: 1994-08-12
🌃City: Morocco, Indiana
🍚Salt: KCzKshWztEMHabnxsLq9
👤Full name: LulzSec IGui
👤Nick: IGuiLulzSec
🚻Floor: 1

🛍️Tokopedia

In April 2020, Indonesia's largest online store was hacked. The hacker forum posted 90 million lines of data, including emails, names, gender, dates of birth and passwords in the form of SHA2-384 hashes.

📩Email: lulzsecsmg@gmail.com
🔐Encrypted password: dc329fd330f237cdce87938fe3e11101726e9d47a878dc956e8681856bb0404cb6208f2fa4154e35cc7f38d4f73c2fd0
📞Telephone: 082242328772
📆Last Activity: 2017-06-13 11:42:02.411982
📆Registration date: 2017-06-13 11:33:27.203375
🍚Salt: bdff
👤Full name: LulzSec
🚻Floor: 0

📓TextRu

В марте 2022 года российский сайт text.ru, занимающийся рерайтом и проверкой текстов на уникальность, пострадал от утечки данных. Хакер под псевдонимом «Neuron» опубликовал данные 3,5 миллионов пользователей. Данные включали почты, имена, IP, уровень баланса на сайте и пароли в виде хэшей MD5 без соли. Когда сайт узнал об утечке, он принудительно сбросил пароли всех пользователей.

📩Email: lulzsecproject@gmail.com
🔐Encrypted password: fe364baad095f176ec359b4adbc2f7d9
📆Registration date: 2019-11-09 16:57:00
🎯IP: 188.163.46.39
💸Balance: 0.00

🎤ClearVoice Surveys

In April 2021, market research company ClearVoice Surveys accidentally made and distributed a public backup of its 2015 database. The data included 15 million unique email addresses, as well as names, physical and IP addresses, gender, dates of birth and plain text passwords.

📩Email: royhsieh1996@gmail.com
🔑Password: lulzsec
📆date: 2011-12-23
🎂Date of Birth: 1989-12-24
🌃City: Campbell
🏤Postal code: 95014
👤Name: Rafael
👤Surname: Lu
🚪Number of inputs: 0
🚻Floor: M

🪃DuelingNetwork

Dueling Network is a Flash game based on the card game Yu-Gi-Oh. In March 2017, it suffered a data breach. The site itself was taken offline in 2016, but the forum remained online for another year. The data breach exposed usernames, IP addresses, email addresses and passwords in the form of MD5 hashes. The leak includes 2.5 million records.

📩Email: izanagidark0000@outlook.com
🔑Password: lulzsec

📩Email: lulzsec@lulzsec.ca
🔐Encrypted password: 4ce4ece8b4aeafeedcacacc21e9049e0
🎯IP: 68.147.240.59
👤Nick: lulzsec

🧮Mathway

In January 2020, math problem-solving website Mathway suffered a data breach. As a result, more than 25 million records were exposed. The data was subsequently sold on the darknet market and included names, Google and Facebook IDs, email addresses, and base64-encoded salted MD5 password hashes.

📩Email: maliksusanoo@hotmail.com
📆Last Activity: 2016-04-16 21:23:02.043
👤Full name: Lulzsec Malik

📩Email: avdulhadys@yahoo.com
📆Last Activity: 2017-01-22 00:47:22.840
👤Full name: Lulzsec Abdullah

🤖EpicBot

In September 2019, EpicBot, the bot provider for the game RuneScape, suffered a data breach that affected 817,000 subscribers. The leak data was subsequently published on a popular hacker forum and included usernames, email addresses, IP addresses and passwords in the form of salted MD5 or bcrypt hashes. EpicBot never responded to questions about the incident.

📩Email: redstarwaasland1@hotmail.com
🔐Encrypted password: af5d0773e1e0184ebd3406a0d22d0a9c:37aT'Qn`2u-cNF%WpwBcp.}`+?qc}8
🎯IP: 78.23.119.228
👤Nick: lulzSec

♻︎NexusMods

In December 2015, game modding site Nexus Mods released a statement notifying users that they had been hacked. They subsequently dated the hack to July 2013, although there is evidence that the data was sold several months earlier. The hack contained usernames, email addresses and passwords as salted hashes.

📩Email: lulzsecisamazing@yahoo.com
🔐Encrypted password: e99b1f78946c8247450ca0d20d2b0193
🍚Salt: svRwq
👤Nick: KoolBandit

📩Email: lulzsecisamazing@yahoo.com
🔑Password: sparky88

💱Gemini

At the end of 2022, data likely taken from the Gemini crypto exchange was posted on a hacker forum. The data consisted of email addresses and phone numbers that Gemini later attributed to an incident at a third-party vendor. The numbers were in the format 123-XXX-7890. They are partial numbers and do not include the middle 3 digits. In total, 5.7 million users were affected.

📩Email: lulzsec097@gmail.com
📞Telephone: 3303260

📩Email: lulzsec30@gmail.com
📞Telephone: 1551196

🦸‍Heroes of Newerth

In December 2012, an online multiplayer game known as Heroes of Newerth was hacked. More than 8 million accounts were extracted from the system. The data included usernames, email addresses and passwords, but no publicly available passwords currently exist.

📩Email: LULZSEC@HERPLERP.COM
🍚Salt: G[1
👤Nick: Neutrinos

📩Email: LulzSecPt@lol.com
🍚Salt: cz;
👤Nick: LulzSecPT

📩Email: lulzsec@lulzsec.com
🍚Salt: Y,6
👤Nick: Supp_Its_Me

☁️Cloudata

Большая коллекция данных email-pass. База была собрана из множества файлов 18 мая 2023 года. Изначально все базы весили 338 GB (11 миллиардов строк). После удаления дубликатов и данных из коллекций осталось около 2 миллиардов.

🔑Password: khorugane99
👤Nick: Lulzsec

🔑Password: dogu190707
👤Nick: lulzsec

🔑Password: dogu1907
👤Nick: lulzsec

🔑Password: vallin01
👤Nick: Lulzsec

🔑Password: Predator7
👤Nick: lulzsec

🔑Password: adminhack
👤Nick: lulzsec

🐛BinWeevils 2017

In 2017, there was a data leak in the online game Bin Weevils. The leak included usernames, email addresses, IP addresses and passwords as PeopleSoft hashes (UIDs). In total, 6.9 million users were affected. This game previously suffered from a leak in 2014.

🔐Encrypted password: Ppc036cAxedvd/ZS31vk1JdFJ0Q=
🎯IP: 92.43.71.70
🎯Last IP: 92.43.71.70
👤Nick: lulzsec

🔐Encrypted password: Y2MBoJ+3pW3Id8oG+R/Ns+56eqA=
🎯IP: LB 88.104.157.61
🎯Last IP: 88.104.157.61
👤Nick: LulzSec

🤖AiType

In December 2017, the ai.type virtual keyboard application was compromised. A huge amount of data was exposed to the public on an unsecured MongoDB instance. The 577 GB dataset contained extensive personal information, including more than 20 million unique email addresses, as well as social media profiles and address book contacts.

📩Email: lulzsec35@gmail.com
🇦🇺Language: en_USiw_IL
📱Android version: 4.1.2
📱Device brand: samsung
📱Device model: GT-I9300
🖥️Operating system: m0

🎶Tnote

Around January 2021, the Korean travel notes app (tnote.kr) experienced a data leak that affected 170 thousand users. The attack exposed usernames, email addresses, phone numbers, dates of birth, device names, full names and passwords stored in an unknown format.

📩Email: sony_style@naver.com
🔐Encrypted password: lb0c3504710a486d3fae3adce8d124d295
📆Registration date: 2018-01-13 09:01:00
🎂Date of Birth: 19851003
👤Full name: 기우뚱맨션
👤Nick: lulzsec
🚻Floor: M

🌴RoatPkz

Around July 2022, a private RuneScape server known as Roat Pkz suffered a data breach. The leak exposed usernames, email addresses and IP addresses. In total, 876 thousand users were affected. There are only about 40 thousand email addresses in the data.

📆Registration date: 2016-06-07 19:43:05.0
📆release date: 2016-06-07 19:46:14
⌚Time online: 3
🎯IP: 142.204.27.186
🎯Last IP: 142.204.27.186
👤Nick: Lulzsec
🔪Number of kills: 0
🗳️Voices: 0
🪦Number of deaths: 1

📁Ge.tt

In May 2017, file sharing platform Ge.tt suffered a data breach. The data was subsequently put up for sale on the dark web marketplace in February 2019, along with numerous other breaches. The breach included names, social media profile IDs, SHA256 password hashes and nearly 2.5 million unique email addresses.

📩Email: lulzsecsabu@gmail.com
🔐Encrypted password: 75ce2ba694bc5f213224a0b4ae0ac4b4bf5e74d329f9ffb99228e7fcc6227a42
📆Registration date: 12.09.2013 02:24:53
👤Nick: Ryan Cleary

🗣️Telegram Chats

В 2022 году при помощи парсинга публичных телеграм-каналов было собрано 63 миллиона записей об их участниках. Эти записи содержат их ID, имена, телефоны и каналы, в которых состоят эти пользователи. Так же там есть описания этих каналов и информация о том, есть ли на пользователе отметка о мошенничестве.

✈TelegramID: 1209758752
🏷️Title: Tâm Sự 🔞
👤Full name: Lulzsec Mr
👤Nick: mrvenom8668
📢Channel ID: 1171164119
📢Telegram channel: tamsu9

🐘Animal Jam

In October 2020, the online children's game Animal Jam suffered a data leak. It contained 46 million user accounts and more than 7 million unique email addresses. The data also included usernames, IP addresses, dates of birth, physical addresses, parent names, and passwords in the form of PBKDF2 hashes.

📩Email: lulzsec097@gmail.com
🔐Encrypted password: 8af4335a8cf3504e6891cd432291354268043faa:89ae6c99264817fe735c106ea0dd1cd4b37b95ed
🎯IP: NULL
👤Nick: lulzsec097-36600935

👑VipСhecker

VipСhecker - россйский сайт для агрегации утечек майнкрафт-серверов, что позволяет взламывать аккаунты на разных серверах. В 2020 году произошла утечка полной коллекции баз этого чекера. Данные включают 26 миллионов записей. Каждая запись включает название сервера, ник игрока и использованный им пароль в виде простого текста или в виде хэша AuthMe.

🔐Encrypted password: $SHA$13704ff0be196d0b$6f587cba2c05c15d8bfa4b6cc2469d7a9a9cbb81c27f3960b98d0bdd0257a367
👤Nick: lulzsec
💻Server: FreezeCraft

🔍Instant Checkmate

In 2019, public records search service Instant Checkmate suffered a data breach that was later reported in early 2023. The data included nearly 12 million unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.

📩Email: lulzsecreturns@gmail.com
🔐Encrypted password: 0x1C4AEC2147AB46A184CDA109BB78769C
📞Telephone: 7073918247
📆Registration date: 2017-09-15 20:07:20
👤Name: Lulzsec
👤Surname: Returns

👒StockX

In July 2019, fashion and sneaker trading platform StockX suffered a data breach that was subsequently sold on a darknet marketplace. The data included 6.8 million unique email addresses, as well as names, physical purchase addresses, and salted MD5 hashes of passwords.

📩Email: lulzseconline95@gmail.com
🔐Encrypted password: 69032ef8873b42592d8e0d0563e3999d:08WEBTnriCWXHrUn9EcOMevs2kNaAOwA
👤Name: Maksym
👤Nick: Berchuk
👤Surname: Berchuk
💶Currency: USD

🎨ToonDoo

In August 2019, comic book creation site ToonDoo suffered a data breach. The data was subsequently shared on a hacker forum, where a database containing more than 6 million entries was published. The data included email addresses, IP addresses, usernames, gender location and salted password hashes.

📩Email: harrisonsmith89@Gmail.com
🔐Encrypted password: LFIvfvA/LU/dY5eH4S59ig==
🍚Salt: 1315578144256
🎯IP: 168.190.200.209
👤Nick: lulzsec

🛡ArmorGames

In January 2019, the website of the gaming portal Armor Games suffered a data leak. A total of 10.6 million email addresses were affected. Usernames, IPs, birthdays and passwords in SHA-1 hashes with salt were also revealed.

📩Email: danielcheng.tw+armor@gmail.com
🔐Encrypted password: 388a5964bee864d3b54106c9285c4865abcc5424
📆Registration date: 1309319621
⬆Level: 0
🎯IP: 99.113.36.36
👤Nick: LulzSec
🤴Status: user

☄MySpace

Around 2008, MySpace suffered a data breach that exposed nearly 360 million accounts. In May 2016, the data was offered for sale on the dark market website "Real Deal" and included email addresses, usernames, and SHA1 hashes of the first 10 characters of the password, converted to lowercase and stored without salt. The exact date of the hack is unknown.

📩Email: lulzsecurity@hotmail.com
🔑Password: 0x0D2F7097C5A8692407FC370ECB48910E4B1E4794
👤Nick: lulzsec

🐔Twitter (2022)

In January 2022, a vulnerability in the Twitter platform allowed an attacker to create a database of email addresses and phone numbers of 6.7 million platform users. The vulnerability was related to a bug introduced in June 2021. The data included either email or phone, as well as username, display name, bio, location, and profile photo.

📩Email: Lulzsec4life@gmail.com
👤Full name: S!ll3nt_K¡ll€s
👤Nick: _AnnA_b3LL3
🧭Location: Paris, France

🗣︎DatPiff

At the end of 2021, 7.5 million plain text email addresses and passwords from the rap mixtape site DatPiff appeared for sale on a hacker forum. The data was later released free of charge.

📩Email: Devilsnthasoup@yahoo.com
🔑Password: 94bab7963bb3e47e6d0903ef3d840efe
❓Secret Question: What is your favorite sports team?
👤Nick: Lulzsec

📩Email: devilsnthasoup@yahoo.com
🔑Password: juggalo
👤Nick: lulzsec

🔍Truth Finder

In 2019, the public records search service TruthFinder suffered a data breach that was later reported in early 2023. The data included more than 8 million unique customer email addresses, as well as their names, phone numbers and passwords in the form of scrypt hashes.

📩Email: lulzsecreturns@gmail.com
📞Telephone: 7073918247
📆Registration date: 2019-03-08 06:45:13
👤Name: Ray
👤Surname: Johnson

🐼D3Scene 2019

Around July 2019, gaming website D3Scene experienced a data breach. The attack exposed email addresses, usernames, IP addresses, dates of birth and passwords stored as vBulletin hashes. In total, 963 thousand users were affected. The site had previously been hacked in 2016.

📩Email: faggot@mailinator.com
📆date: 2013-09-24 00:03:59
🎯IP: 70.181.132.13
👤Nick: lulzsec
📮Number of messages: Allowed registration

🐕Zynga

In September 2019, game developer Zynga (creator of Words with Friends) suffered a leak. 173 million unique emails were exposed, as well as usernames and passwords in the form of salted SHA-1 hashes.

📩Email: zyngawf_1800425
🔐Encrypted password: 4dbb14c0699d5cd1a1b0ea2a58755621aba2d670
📆Registration date: 2014-06-05 17:10:23
🍚Salt: 8d1ef4ded2665f19d0b42011e99d8e70dcfde233
👤Nick: LulzSec
🤴Status: 2011-06-03 05:00:27

💸BukalaPak

In March 2019, Indonesian e-commerce website Bukalapak discovered a data breach of the organization's backups dating back to October 2017. The incident exposed approximately 13 million unique email addresses, as well as IP addresses, names and passwords in bcrypt and SHA hashes. 512 with salt.

📩Email: lulzsechc@gmail.com
🔐Encrypted password: None
🍚Salt: C5y1qR9qXgJluEw1xyNB
👤Nick: ridwane
👤Nick: ridwane

🧠Appen

In June 2020, an AI training company called "Appen" suffered a data breach. The data of 5.9 million users was exposed and subsequently sold online. The data included email addresses and passwords as bcrypt hashes. Some records also contained employers' phone numbers and IP addresses.

📩Email: lulzsec98@gmail.com
📆Last Activity: 2015-03-22 01:56:01.80911
📆Registration date: 2015-03-22 01:56:01.238598
👤Nick: hola men

🛳️LifeBoat

В январе 2016 года сообщество Lifeboat, посвящённое игре MineCraft, было взломано. Утекло более 7 миллионов учетных записей пользователей. Владельцы сервиса знали об инциденте за три месяца до того, как о взломе стало известно общественности, но решили не сообщать ничего клиентам. Утечка данных включала имена пользователей, электронные почты и пароли в виде хэшей MD5 без соли.

📩Email: kwdfjc12@gmail.com
🔑Password: lulzsec

💽Last.fm

In March 2012, music site Last.fm was hacked and 43 million MD5 emails and passwords were exposed. The site learned about the incident immediately, but hid it and the extent of the leak was not known until September 2016.

📩Email: freeamazons@gmail.com
🔐Encrypted password: 1785ba5cb3fd724b53647f94c25daf0b
📆Registration date: 2011-06-22 02:31:12
👤Nick: lulzsec
🔗Link: ws:56bd56d3644874253e254349500f6f71

🏋️MyFitnessPal

In February 2018, diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique emails along with names, IPs and passwords in the form of SHA-1 and bcrypt hashes. All data, except for bcrypt hashes, was later made publicly available.

📩Email: nelson.coulter@gmail.com
🔐Encrypted password: 8e04a9db1d09dcb46f54c9a0d86385ef0d448d6d
🎯IP: 75.13.86.20
👤Nick: LulzSec

🪢Lumin PDF

In April 2019, the PDF management service suffered a data breach. This was not publicly reported until September, when data from 15.5 million users appeared on a popular hacker forum. The leak also included names, email addresses, gender, spoken language, and either a bcrypt password hash or a Google authentication token.

📩Email: lulzsecd@gmail.com
🇦🇺Language: vi
👤Full name: Diện Steve
🚻Floor: null

🖊️Canva

In May 2019, the graphic design tool Canva's website suffered a data breach. This leak affected 137 million subscribers. The exposed data included email, names, cities of residence, and passwords in the form of bcrypt hashes.

📩Email: lulzsec@iname.com
🔑Password: $2a$10$VdnhYje0RpM98CEmv0bWX.LM0aXyITTu13P30RwU85HZf1pcH3FqK
📆Registration date: 2017-11-04 14:38:04
🇦🇺Language: en
👤Nick: lulzsec

🔍Villavu

In 2014, the runescape bot/script web forum Villavu (also known as the SRL Resource Library) suffered a data breach that affected 137,000 members. The breach included usernames, email addresses, IP addresses and passwords in the form of vBulletin hashes.

📩Email: wannesvandorpe@hotmail.com
🔐Encrypted password: 3b65fa8308c2812971d2f6b6ab2383ce
🍚Salt: 'Kz
🎯IP: 178.117.39.252
👤Nick: Lulzsec

🎐SmsActivate

On July 20, 2021, it became known about a massive leak of data from users of the anonymous verification service sms-activate.ru. The leaked database contains data of 163 thousand users and includes emails, names, credit card numbers, their balances and IP addresses.

📩Email: lulzsecproject@gmail.com
📆date: 2020-04-18T21:37:22Z
💳Credit card: 4100112605462515
💸Sum: 100.00

✍PeopleDataLabs

In October 2019, a server was discovered with 12 billion personal data records. They belonged to the data enrichment company PeopleDataLabs. 622 million mail, telephones and places of work were affected.

🏘️Address: monte mor, sao paulo, brazil
👤Full name: lulzsec simyork

🏘️Address: mountain view, california, united states
👤Full name: lulzsec tejas

👤Full name: lulzsec streak

❓Sprashivai.ru

In May 2015, Sprashivay.ru reported that 6.7 million user data had been exposed. The site, created for the expression of anonymous opinions, contained emails, dates of birth and other personal information.

📩Email: lulzsec2012@mail.ru
🔑Password: 89270869449q
📆Registration date: 18.10.2012 19:49:17
🎯IP: 128.71.59.156
👤Full name: Денис Кафин
👤Nick: blabal666

🏹MortalOnline

In June 2018, a data leak occurred in the massively multiplayer online role-playing game (MMORPG) Mortal Online. The file contained 570,000 email addresses and hacked passwords. A larger, more complete file was later published containing 607,000 email addresses with raw, unsalted MD5 password hashes, usernames, and physical addresses.

📩Email: lulzsec0214@gmail.com
🔑Password: ansdldl7

📝DaFont

In May 2017, DaFont, a font sharing site, suffered a data leak. This event resulted in the disclosure of 637,000 records. Presumably the hack occurred due to a vulnerability to SQL injections. The exposed data included usernames, email addresses and passwords in unsalted MD5 format.

📩Email: xacriimony@gmail.com
🔐Encrypted password: 577a75b51c8b11e409b0234b42caf6e4
👤Nick: lulzsec

📒Badoo

In June 2016, a leak occurred from the Badoo website. The data contained 112 million unique email addresses with personal data including names, dates of birth and passwords stored as MD5 hashes.

📩Email: dodde95@hotmail.fr
🔑Password: 27ff184cbcb1ac4a4cf6ce00bf59163f
🎂Date of Birth: 1988-07-02
👤Full name: Lulzsec Lulzsec
👴Age: 24
🚻Floor: M

🔧NextGenUpdate

In early 2014, video game website NextGenUpdate suffered a data breach that exposed nearly 1.2 million accounts. The published data included usernames, email addresses, IP addresses, and salted hashes of passwords.

📩Email: Mekhig246@me.com
🔐Encrypted password: 8bc74312229bafb60a9fefb32b1d969a$.>r|1bFP)U🎯IP: 76.31.211.200
👤Nick: LulzSec

🎮Xbox360 ISO

Around September 2015, the XBOX360 ISO forum was hacked and 1.2 million accounts were exposed. Email addresses, IP addresses, and salted MD5 password hashes were compromised.

📩Email: kingohalo2_99@hotmail.com
🔐Encrypted password: 9b1085c06bac089991f1d49e4d66061a
🍚Salt: IPi='#Cy?u=*?7j>q~Y%Q1j
🎯IP: 68.169.35.41
👤Nick: lulzsec

⚔️ForceOnline

In May 2016, online gaming site Army Force Online suffered a data breach that exposed 1.5 million accounts. The data includes usernames, email addresses, IP addresses and passwords in the form of MD5 hashes.

📩Email: vodicka-lukas@centrum.cz
🔐Encrypted password: cc1a70a9d1ba02e6239e312050d90fa9
🎯IP: 90.177.5.187
👤Nick: lulzsec

⚡MindJolt

In March 2019, online gaming site MindJolt suffered a breach that exposed 28 million unique email addresses. Names and dates of birth were also affected, but not passwords.

📩Email: lulzcannon@hotmail.co.uk
📆Registration date: 2011-04-21
🎂Date of Birth: 1995-10-16
👤Full name: LulzSec II
🚻Floor: f

🌎GamerzPlanet

Around October 2015, the online gaming forum Gamerzplanet was hacked. 1.2 million accounts were exposed to public access. The data included emails, IP addresses and passwords in the form of salted MD5 hashes. A weak implementation was used that allowed many passwords to be cracked quickly.

📩Email: lulzsec2012@yahoo.com
🔑Password: joel1997

🤖MPGH

In October 2015, the MPGH multiplayer game hacking website was hacked. The details of 3.1 million user accounts were exposed. The leak contained usernames, emails, IP addresses and passwords as salted MD5 hashes.

📩Email: b4553596@klzlk.com
🔐Encrypted password: b3631a4200c2d63aa7f96d1b8f5461b5:x6?
🎯IP: 70.146.132.186
👤Nick: LulzSec

👗Shein

In June 2018, the online fashion store SHEIN suffered a data leak. The company reported the leak 3 months later. As a result of the hack, hackers obtained 39 million unique email addresses and MD5 password hashes. 29 million emails and decrypted passwords to them were made publicly available.

📩Email: dubois77130@gmail.com
🔑Password: lulzsec

💬Legendas

In October 2017, Spanish subtitle site Legendas suffered a data breach that affected 3.8 million subscribers. The breach included usernames, email addresses, IP addresses, full names and unencrypted passwords.

📩Email: lulzsec.7481@gmail.com
🔑Password: NULL
🎯IP: 189.81.220.52,
👤Full name: gustavo
👤Nick: gustaplay

🧩Daily Quiz

In January 2021, a quiz website suffered a data breach that exposed over 8 million unique email addresses. The data also included usernames, IP addresses, and passwords in plain text.

📩Email: lulzsec@yopmail.com
🔑Password: carmine4
📆Registration date: 2018-07-01 14:09:10
🎯IP: 95.255.101.111
👤Nick: lulzsec

📊Minecraft-Monitor.ru

This is a Russian site that monitors activity on various Minecraft servers and stores lists of players on them. The date of the hack is unknown. The database contains almost 1.5 million entries, including nickname, server and the number of player logins to it.

👤Nick: lulzsec
💻Server: mc.FunnyCraft.su
🚪Number of inputs: 10

💱CoinMarketCap

In October 2021, it was discovered that 3.1 million email addresses were being traded on hacker forums. This data was likely leaked by cryptocurrency market capitalization website CoinMarketCap, although they denied this. The leak did not contain any data other than emails.

📩Email: lulzsec231@gmail.com

🤷‍RecklessPk

Around April 2015, RecklessPk, the "Runescape Nr 1 launch server", suffered a data leak. The breach exposed email addresses, usernames, IP addresses and passwords as SMF hashes. In total, 82 thousand users were affected.

📩Email: Argau@hotmail.fi
🎯IP: 82.141.69.17
👤Nick: LulzSec

⛏️MCResolver

В декабре 2015 года популярный сайт Minecraft Resolver (mcresolver.pw) подвергся утечке данных, в результате которой было раскрыто более 13 миллионов имен пользователей и IP-адресов.

🎯IP: 179.210.211.204
👤Nick: LulzSec_hackers

🎯IP: ns518836.ip-158-69-54.net
👤Nick: LulzSec_hackers

👌MemeChat

In June 2022, the meme-sharing app MemeChat suffered a data breach. The leak only affected usernames and email addresses. In total, 7.4 million users were affected. MemeChat was hacked because they left their ElasticSearch server open to everyone. They've done this several times in the past.

👤Nick: lulzsec

💲JD.com

In 2013 (the exact date is unknown), a leak occurred in the Chinese e-commerce service JD, revealing 13 GB of data containing 77 million unique emails and extensive user data.

🔐Encrypted password: 5A70B19
👤Full name: LulzSec
👤Nick: 40334725-94833433

🌳MyHeritage

In October 2017, the genealogy site MyHeritage was leaked. This became known 7 months later. More than 92 million customer records were exposed, including email and password hashes with SHA-1 salt.

📩Email: maxikd@hotmail.com
🔑Password: lulzsec

📁iMesh

In September 2013, the iMesh media sharing client was hacked. About 50 million accounts have been exposed. In mid-2016, the data leaked online and included emails, IPs, names, and salted MD5 hashes.

📩Email: navindugo@ovi.com
🔑Password: lulzsec

📔Taringa

In September 2017, Taringa, known as the "Latin American Reddit", suffered a data breach. 28 million records were exposed, including names, email addresses and weak MD5 password hashes.

📩Email: lulzsec91@yahoo.es
🔑Password: lulzse

🔳Roblox

There is no information about this database in my records. Try searching for it on the Internet.

🔑Password: Fvckn5hit!
👤Nick: LulzSec96

🔑Password: lulzsecback
👤Nick: forthelulzsec

🔫SGB.net

There is no information about this database in my records. Try searching for it on the Internet.

📩Email: kwdfjc12@gmail.com
🔑Password: lulzsec