{
    "AntiPublic": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Password": "2ll1a"
            }
        ],
        "Description": "In December 2016, a huge leak containing 458 million unique emails and passwords appeared in the public domain. It was used to hack accounts in which the owner reused his password. Similar leaks are also used to assess the novelty of data in other databases."
    },
    "BreachedForum Combolists": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Password": "leasia92."
            }
        ],
        "Description": "Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords."
    },
    "COMB+12billion": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Password": "519leasia"
            }
        ],
        "Description": "Two huge combo players called CompilationOfManyBreaches and 12Billion special appeared in February 2021 and September 2022, respectively. Each of them contained more than 3 billion unique emails and passwords. Most of the data was taken from collections 1-5 and combo player Ga$$Pacc, leaving only 211 million rows after removing them."
    },
    "Collection": {
        "Data": [
            {
                "Collection Numbers": "1,2,4",
                "Email": "romeopluscassie@yahoo.com",
                "Password": "2ll1a"
            }
        ],
        "Description": "In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values ​​were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history."
    },
    "Ga$$Pacc": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Leak Site": "Yahoo.com",
                "Password": "2ll1a"
            }
        ],
        "Description": "In 2020, a set of decrypted databases containing 580 million emails and passwords was made publicly available. The data was obtained from 243 different leaks and contained only mails and unencrypted passwords."
    },
    "Mathway": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Last Active": "2019-06-05 12:28:07.797",
                "Password(Hash)": "4ThFGpB96zYWqS7riLVUww=="
            },
            {
                "Email": "romeopluscassie@yahoo.com",
                "Password": "LeAsia"
            }
        ],
        "Description": "In January 2020, math problem-solving website Mathway suffered a data breach. As a result, more than 25 million records were exposed. The data was subsequently sold on the darknet market and included names, Google and Facebook IDs, email addresses, and base64-encoded salted MD5 password hashes."
    },
    "MyFitnessPal": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "IP": "166.171.185.230",
                "Username": "romeopluscassie",
                "Password(SHA1)": "NULL"
            },
            {
                "Email": "romeopluscassie@yahoo.com",
                "IP": "166.171.185.230",
                "Username": "romeopluscassie"
            }
        ],
        "Description": "In February 2018, diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique emails along with names, IPs and passwords in the form of SHA-1 and bcrypt hashes. All data, except for bcrypt hashes, was later made publicly available."
    },
    "MySpace": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Username": "525810248",
                "Password(SHA1)": "cdc0e914b4d16c809889c473f1c943fa71dcb4ac"
            }
        ],
        "Description": "Around 2008, MySpace suffered a data breach that exposed nearly 360 million accounts. In May 2016, the data was offered for sale on the dark market website \"Real Deal\" and included email addresses, usernames, and SHA1 hashes of the first 10 characters of the password, converted to lowercase and stored without salt. The exact date of the hack is unknown."
    },
    "NeoPets": {
        "Data": [
            {
                "Birth Day": "1991-10-24",
                "Country": "US",
                "Email": "romeopluscassie@yahoo.com",
                "Full Name": "cassie lunsford",
                "Gender": "F",
                "Username": "rockon519",
                "Password": "2ll1a"
            }
        ],
        "Description": "In May 2016, a dataset from virtual pet website Neopets leaked online. The data contains dates of birth, IP, gender and names, as well as almost 27 million emails. Passwords were stored in plain text."
    },
    "Poshmark": {
        "Data": [
            {
                "Email": "romeopluscassie@yahoo.com",
                "Username": "hweezy25",
                "Password(bcrypt)": "$2a$10$Iwzz3a2u1ILr/j2PXnXze.wAYLn.2CZKBBA9LIqri9aoOjmdnbA6G"
            }
        ],
        "Description": "In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed the accounts of 36 million users. The data included email addresses, usernames, gender, location, and passwords in the form of bcrypt hashes."
    }
}