░▒▓██████▓▒░░▒▓███████▓▒░ ░▒▓██████▓▒░ ░▒▓███████▓▒░▒▓████████▓▒░▒▓█▓▒░      ░▒▓████████▓▒░ 
                       ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░         ░▒▓█▓▒░   ░▒▓█▓▒░      ░▒▓█▓▒░        
                       ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░         ░▒▓█▓▒░   ░▒▓█▓▒░      ░▒▓█▓▒░        
                       ░▒▓████████▓▒░▒▓███████▓▒░░▒▓█▓▒░░▒▓█▓▒░░▒▓██████▓▒░   ░▒▓█▓▒░   ░▒▓█▓▒░      ░▒▓██████▓▒░   
                       ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░      ░▒▓█▓▒░  ░▒▓█▓▒░   ░▒▓█▓▒░      ░▒▓█▓▒░        
                       ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░      ░▒▓█▓▒░  ░▒▓█▓▒░   ░▒▓█▓▒░      ░▒▓█▓▒░        
                       ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░       ░▒▓██████▓▒░░▒▓███████▓▒░   ░▒▓█▓▒░   ░▒▓████████▓▒░▒▓████████▓▒░ 
                                                                                                                                                                                         
            ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
                                                                Discord Invite:https://discord.gg/pwning
        Reason:
        [PedoPhila]
        [Shit Talking]
        [Stirring Drama]
        [Telling Lies]
        [Liking Minors]

                                
        BASIC INFORMATION
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄

  ➤ Picture: 	
  ➤  https://www.facebook.com/share/8PFsKHeYmrMnzHN2/?mibextid=WC7FNe 
  
  ➤ Name: Brad Hollinger (Jr)
  ➣ Pseudonyms: (Shaggy),(My_Exes_fav_666)
  ➤ Address: 10328 Chester Furnace Rd Shirleysburg, PA 17260 $144,000 Huntingdon County (Sep 2018 - Jun 2024)
  ➤ Age: 27
  ➤ [DOB] Date of Birth: August 1996
  ➤ Race: White
  ➤ Sexual Orientation: Gay 
  ➤ Native Language: English
  ➤ Religion: Not Sure He switchs It Up Every Week
  ➣ Gender: Male
  ➣ Weight:5,10, 6,0
  ➣ Height:130-170
  
  ➣ Numbers: 
  ➣ (717) 721-2415
  
  ➣Emails:
  ➣ bhollinger456@gmail.com
  ➣ bradleyhollinger@blackplanet.com
  
  
  
  ➣ Carrier:Windstream_SL:2147 - NSR/1
  ➣ Is Wireless:No
  
  
  ➣ Social Security Number: 
  
  ➣ Facebook: https://www.facebook.com/bradley.hollinger.7?mibextid=JRoKGi
  ➣ Instagram: https://www.instagram.com/my_exes_fav_666
  
  
  ➣ Hashes:
  ➣ 8c38bd196d2d4319dbda7a22eeb61453 (Instagram)
  ➣ 6320629c6db2c668b9e743d9c193bf22d9dad03e (Facebook)
  ➣ 717b89583b9b4c701402351baf2e961e (Email)


	FAMILY INFORMATION
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
FAMILY PHOTO SLOT: 
  ➤ Mother Name: Mariann Ann Hollinger (Miller)
  ➣ [DOB] Date of Birth: June 1964
  ➣ Age: 59 
  ➣ Current Address:743 Primrose Ln Ephrata, PA 17522 3 Bed | 2 Bath | 1152 Sq Ft | Built 2017 Lancaster County (Jul 2019 - Jun 2024)

  ➣ Emails:
  ➣ ursowonderful3@gmail.com
  ➣ carlajk1961@gmail.com

  ➣ Phone Numbers:
  ➣ (717) 393-2642 - Landline Possible Primary Phone Last reported May 2024 Verizon Pennsylvania
  ➣ (717) 721-2415 - Landline Last reported Aug 2010 Windstream D&E
  ➣ (717) 664-0450 - Landline Last reported Oct 2021 Windstream D&E
  ➣ (727) 521-1667 - Landline Last reported Feb 2004 Frontier Communications of Florida
  ➣ (717) 393-0000 - Landline Last reported Jul 2011 Verizon Pennsylvania
  ➣ (717) 295-0000 - Landline Last reported Jul 2009 Verizon Pennsylvania


  ➣ Addresses:
  ➣ 47 Oriole Dr Ephrata, PA 17522 Lancaster County (May 2016 - Nov 2023)
  ➣ 638 Marietta Ave #7 Lancaster, PA 17603 Lancaster County (Dec 2004 - May 2015)
  ➣ 10 W Locust St #3 Ephrata, PA 17522 Lancaster County (Feb 2012 - Apr 2017)
  ➣ PO Box 365 Manheim, PA 17545 Lancaster County (Oct 2004 - Feb 2009)
  ➣ 980 Maple St Lititz, PA 17543 Lancaster County (Jul 2004 - Jan 2012)
  ➣ 3420 39th St N Saint Petersburg, FL 33713 Pinellas County (Jun 2000 - Mar 2011)
  ➣ 2615 Greenleaf Dr Orlando, FL 32810 Orange County (Jun 1997 - Nov 2016)
  ➣ 10 W Locust St #7 Ephrata, PA 17522 Lancaster County (Jun 2015)
  ➣ 10 W Locust St #9 Ephrata, PA 17522 Lancaster County (Mar 2015 - Mar 2015)
  ➣ 557 W Grant St Lancaster, PA 17603 Lancaster County (Nov 2010 - May 2012)
  ➣ 638 Marietta Ave Lancaster, PA 17603 Lancaster County (Jul 2009)
  ➣ 3420 39th St N St Petersburg, FL 33713 Pinellas County (Jun 2001 - Jul 2008)
  ➣ 21 W Ferdinand St Manheim, PA 17545 Lancaster County (Jun 2007 - Jun 2007)
  ➣ 7066 49th Ave N Saint Petersburg, FL 33709 Pinellas County (Jan 2005)
  ➣ 7066 49th Ave N St Petersburg, FL 33709 Pinellas County (Apr 2002)
  ➣ 5167 Cinderlane Pkwy Orlando, FL 32808 Orange County (Jun 1997 - Feb 2016)
  ➣ 5167 Cinderlane Pkwy #102 Orlando, FL 32808 Orange County (Nov 2000)
  ➣ 6114 51st Ter N Kenneth City, FL 33709 Pinellas County (Apr 1991 - Jan 2000)
  ➣ 5167 Cinderlane Pkwy #103 Orlando, FL 32808 Orange County (Mar 1996 - Aug 1997)
  ➣ 6114 51st #10 Kenneth City, FL 33709 Pinellas County (Apr 1991 - Jun 1996)
  ➣ 11145 7th St E Treasure Island, FL 33706 Pinellas County (Mar 1988 - Dec 1993)
  ➣ 7128 9th Ave N Saint Petersburg, FL 33710 Pinellas County (Apr 1988 - Jun 1993)
  ➣ 1053 Henn Ave #1 Ephrata, PA 17522 Lancaster County (Sep 2019)
  ➣ 

  ➣ Education and Employment
  ➣ Company:Louise Silipena
  ➣ Job Title:Home Health Aide
  ➣ From:2011 to 2011

➤ Father Name: Bradley Scott Hollinger Sr
  ➣ [DOB] Date of Birth: December 1968
  ➣ Age: 55
  ➣ Current Address:10328 Chester Furnace Rd Shirleysburg, PA 17260 $144,000 Huntingdon County (Aug 2020 - Jun 2024)

  ➣ Emails:
  ➣ bhollinger456@gmail.com
  ➣ bradleyhollinger@blackplanet.com
  ➣ bhollinger@webtv.net
  ➣ bradleyhollinger@centurytel.net


  ➣ Phone Numbers:
  ➣ (717) 664-0450 - Landline Possible Primary Phone Last reported May 2024 Windstream D&E
  ➣(814) 447-5413 - Landline Last reported Feb 2023 CenturyLink
  ➣(717) 917-5536 - Wireless Last reported Mar 2014 Verizon Wireless
  ➣(727) 521-1667 - Landline Last reported Aug 2010 Frontier Communications of Florida
  ➣(717) 721-2415 - Landline Last reported Apr 2021 Windstream D&E
  ➣(717) 665-0000 - Landline Last reported Jan 2014 Windstream D&E
  ➣(727) 726-8383 - Landline Last reported Mar 2016 Frontier Communications of Florida



  ➣ Previous Addresses:
  ➣ 
  ➣ 2112 Sipes Mill Rd Warfordsburg, PA 17267 Fulton County (May 2018 - Jan 2023)
  ➣ 107 W Poplar St Mc Connellsburg, PA 17233 Fulton County (Nov 2015 - Mar 2020)
  ➣ 42 Hemlock Acres Ct Manheim, PA 17545 Lancaster County (Jun 2006 - Jan 2024)
  ➣ PO Box 365 Manheim, PA 17545 Lancaster County (Dec 2007 - Mar 2024)
  ➣ 21 W Ferdinand St Manheim, PA 17545 Lancaster County (Apr 2007 - Nov 2020)
  ➣ 3420 39th St N Saint Petersburg, FL 33713 Pinellas County (May 2001 - Jun 2009)
  ➣ 980 Maple St Lititz, PA 17543 Lancaster County (Jun 2012)
  ➣ 2615 Greenleaf Dr Orlando, FL 32810 Orange County (Aug 1997 - Apr 2007)
  ➣ 980B Maple St Lititz, PA 17543 Lancaster County (Apr 2005)
  ➣ 5701 Haines Rd N #700 Saint Petersburg, FL 33714 Pinellas County (Oct 2001)
  ➣ 21227 Us Highway 19 N #134A Clearwater, FL 33765 Pinellas County (Mar 1997)
  ➣ 21227 Us Highway 19 N Clearwater, FL 33765 Pinellas County (Oct 1995 - Jun 1996)
  ➣ 2690 Drew St #970 Clearwater, FL 33759 Pinellas County (Feb 1995 - Oct 1995)
  ➣ 21227 Us Highway 19 N Clearwater, FL 33765 Pinellas County (Oct 1995)
  ➣ PO Box 92 Waterfall, PA 16689 Fulton County (Mar 1993 - Jun 1996)

  CARD BRAND: VISA
  CARD NUMBER: 4021468892689817
  NAME:Bradley Scott Hollinger Sr
  COUNTRY:UNITED STATES
  CVV/CVC:322
  EXPIRY:4/2030


  CARD BRAND: VISA
  CARD NUMBER: 4021657657677765
  NAME:Bradley Scott Hollinger Sr
  COUNTRY:UNITED STATES
  CVV/CVC:594
  EXPIRY:9/2030


Email Breachs
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
Breaches you were pwned in
A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.

ApexSMS logo
ApexSMS (spam list): In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.

Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Names, Phone numbers, Telecommunications carrier

Modern Business Solutions logo
Modern Business Solutions: In October 2016, a large Mongo DB file containing tens of millions of accounts was shared publicly on Twitter (the file has since been removed). The database contained over 58M unique email addresses along with IP addresses, names, home addresses, genders, job titles, dates of birth and phone numbers. The data was subsequently attributed to "Modern Business Solutions", a company that provides data storage and database hosting solutions. They've yet to acknowledge the incident or explain how they came to be in possession of the data.

Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Job titles, Names, Phone numbers, Physical addresses

River City Media Spam List logo
River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.

Compromised data: Email addresses, IP addresses, Names, Physical addresses

Straffic logo
Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".

Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses

Telegram Combolists logo
Telegram Combolists: In May 2024, 2B rows of data with 361M unique email addresses were collated from malicious Telegram channels. The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. The data appears to have been sourced from a combination of existing combolists and info stealer malware.

Compromised data: Email addresses, Passwords, Usernames

Verifications.io logo
Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.

Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses

Breaches you were pwned in
A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.

Straffic logo
Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".

Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses

Scentbird logo
Scentbird: In June 2020, the online fragrance service Scentbird suffered a data breach that exposed the personal information of over 5.8 million customers. Personal information including names, email addresses, genders, dates of birth, passwords stored as bcrypt hashes and indicators of password strength were all exposed. The data was provided to HIBP by breachbase.pw.

Compromised data: Dates of birth, Email addresses, Genders, Names, Password strengths, Passwords

The Post Millennial logo
The Post Millennial: In May 2024, the conservative news website The Post Millennial suffered a data breach. The breach resulted in the defacement of the website and links posted to 3 different corpuses of data including hundreds of writers and editors (IP, physical address and email exposed), tens of thousands of subscribers to the site (name, email, username, phone and plain text password exposed), and tens of millions of email addresses from thousands of mailing lists alleged to have been used by The Post Millennial (this has not been independently verified). The mailing lists appear to be sourced from various campaigns not necessarily run by The Post Millennial and contain a variety of different personal attributes including name, phone and physical address (depending on the campaign). The data was subsequently posted to a popular hacking forum and extensively torrented.

Compromised data: Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses, Usernames

Breaches you were pwned in
A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.

ApexSMS logo
ApexSMS (spam list): In May 2019, news broke of a massive SMS spam operation known as "ApexSMS" which was discovered after a MongoDB instance of the same name was found exposed without a password. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.

Compromised data: Email addresses, Genders, Geographic locations, IP addresses, Names, Phone numbers, Telecommunications carrier

Modern Business Solutions logo
Modern Business Solutions: In October 2016, a large Mongo DB file containing tens of millions of accounts was shared publicly on Twitter (the file has since been removed). The database contained over 58M unique email addresses along with IP addresses, names, home addresses, genders, job titles, dates of birth and phone numbers. The data was subsequently attributed to "Modern Business Solutions", a company that provides data storage and database hosting solutions. They've yet to acknowledge the incident or explain how they came to be in possession of the data.

Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Job titles, Names, Phone numbers, Physical addresses

River City Media Spam List logo
River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.

Compromised data: Email addresses, IP addresses, Names, Physical addresses

Straffic logo
Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".

Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses

Verifications.io logo
Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.

Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses

AT&T logo
AT&T: In March 2024, tens of millions of records allegedly breached from AT&T were posted to a popular hacking forum. Dating back to August 2021, the data was originally posted for sale before later being freely released. At the time, AT&T maintained that there had not been a breach of their systems and that the data originated from elsewhere. 12 days later, AT&T acknowledged that data fields specific to them were in the breach and that it was not yet known whether the breach occurred at their end or that of a vendor. AT&T also proceeded to reset customer account passcodes, an indicator that there was sufficient belief passcodes had been compromised. The incident exposed names, email and physical addresses, dates of birth, phone numbers and US social security numbers.

Compromised data: Dates of birth, Email addresses, Government issued IDs, Names, Phone numbers, Physical addresses

Data Enrichment Exposure From PDL Customer logo
Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.

Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles

Havenly logo
Havenly: In June 2020, the interior design website Havenly suffered a data breach which impacted almost 1.4 million members of the service. The exposed data included email addresses, names, phone numbers, geographic locations and passwords stored as SHA-1 hashes, all of which was subsequently shared extensively throughout online hacking communities. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Geographic locations, Names, Passwords, Phone numbers

Houzz logo
Houzz: In mid-2018, the housing design website Houzz suffered a data breach. The company learned of the incident later that year then disclosed it to impacted members in February 2019. Almost 49 million unique email addresses were in the breach alongside names, IP addresses, geographic locations and either salted hashes of passwords or links to social media profiles used to authenticate to the service. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Geographic locations, IP addresses, Names, Passwords, Social media profiles, Usernames

iMesh logo
iMesh: In September 2013, the media and file sharing client known as iMesh was hacked and approximately 50M accounts were exposed. The data was later put up for sale on a dark market website in mid-2016 and included email and IP addresses, usernames and salted MD5 hashes.

Compromised data: Email addresses, IP addresses, Passwords, Usernames

Instant Checkmate logo
Instant Checkmate: In 2019, the public records search service Instant Checkmate suffered a data breach that later came to light in early 2023. The data included almost 12M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.

Compromised data: Email addresses, Names, Passwords, Phone numbers

MGM Resorts (2022 Update) logo
MGM Resorts (2022 Update): In July 2019, MGM Resorts discovered a data breach of one of their cloud services. The breach included 10.6M guest records with 3.1M unique email addresses stemming back to 2017. In May 2022, a superset of the data totalling almost 25M unique email addresses across 142M rows was extensively shared on Telegram. On analysis, it's highly likely the data stems from the same incident with 142M records having been discovered for sale on a dark web marketplace in mid-2020. The exposed data included email and physical addresses, names, phone numbers and dates of birth.

Compromised data: Dates of birth, Email addresses, Names, Phone numbers, Physical addresses

Not Acxiom logo
Not Acxiom (unverified): In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom and subsequently circulated within the hacking community. On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach". The data contained almost 52M unique email addresses.

Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical addresses

Poshmark logo
Poshmark: In mid-2018, social commerce marketplace Poshmark suffered a data breach that exposed 36M user accounts. The compromised data included email addresses, names, usernames, genders, locations and passwords stored as bcrypt hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".

Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Usernames

Special K Data Feed Spam List logo
Special K Data Feed Spam List (spam list): In mid to late 2015, a spam list known as the Special K Data Feed was discovered containing almost 31M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. Read more about spam lists in HIBP.

Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses

Zynga logo
Zynga: In September 2019, game developer Zynga (the creator of Words with Friends) suffered a data breach. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Passwords, Phone numbers, Usernames
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
        [X] SIGNATURES
        ✖ Apostles
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄