:::!~!!!!!:.
                                         .xUHWH!! !!?M88WHX:.
                                       .X*#M@$!!  !X!M$$$$$$WWx:.
                                      :!!!!!!?H! :!$!$$$$$$$$$$8X:
                                     !!~  ~:~!! :~!$!#$$$$$$$$$$8X:
                                    :!~::!H!<   ~.U$X!?R$$$$$$$$MM!
                                    ~!~!!!!~~ .:XW$$$U!!?$$$$$$RMM!
                                      !:~~~ .:!M"T#$$$$WX??#MRRMMM!
                                      ~?WuxiW*`   `"#$$$$8!!!!??!!!
                          ╦ ╦╔═╗╔═╗╦═╗╔╦╗╦  ╔═╗╔═╗╔═╗  ╔═╗╔═╗╔═╗╦ ╦╦═╗╦╔╦╗╦ ╦
                          ╠═╣║╣ ╠═╣╠╦╝ ║ ║  ║╣ ╚═╗╚═╗  ╚═╗║╣ ║  ║ ║╠╦╝║ ║ ╚╦╝
                          ╩ ╩╚═╝╩ ╩╩╚═ ╩ ╩═╝╚═╝╚═╝╚═╝  ╚═╝╚═╝╚═╝╚═╝╩╚═╩ ╩  ╩ 
                                    :X- M$$$$       `"T#$T~!8$WUXU~
                                   :%`  ~#$$$m:        ~!~ ?$$$$$$
                                 :!`.-   ~T$$$$8xx.  .xWW- ~""##*"
                        .....   -~~:<` !    ~?T#$$@@W@*?$$      /`
                        W$@@M!!! .!~~ !!     .:XUW$W!~ `"~:    :
                        #"~~`.:x%`!!  !H:   !WM$$$$Ti.: .!WUn+!`
                        :::~:!!`:X~ .: ?H.!u "$$$B$$$!W:U!T$$M~
                        .~~   :X@!.-~   ?@WTWo("*$$$W$TH$! `
                        Wi.~!X$?!-~    : ?$$$B$Wu("**$RM!
                        $R@i.~~ !     :   ~$$$$$B$$en:``
                        ?MXT@Wx.~    :     ~"##*$$$$M~
                                          
      The Downfall of HellFire Pt.1 Virus.Breach / Hell.Breach Is A Com Tard
      Thats Goes Around Flaunting His Enormic Ego Thinking Hes Some Type Of Geine That Can't Be Touched
      He Also Thinks 'Extortion' or 'Bitchin' People Makes You Big In The Scene Well Hate To Tell You
      It Dont Work Like That Treating Females As Slaves Because You Can Get Them on Your Own

      Like Deadass Imagine Being A BloodKing Knock Off Harmless Ass Niggas Extort Someone With The Same
      Skill Set Oh Yeah You Can't Because Your Not Harmful - Recon

      Heartless Security Runs This Shit Nigga 

      	Greetings From(S):
      		$urge
      		insane
      		spider
      		cipher
      		vdirty




      Autistic Photos Of The Victim (S):
     	https://prnt.sc/1waymvn
     	https://prnt.sc/1waypp4
     	https://prnt.sc/1ways0j
     	https://prnt.sc/1waywt2
     	https://prnt.sc/1wayzy4
     	https://prnt.sc/1waz45e
     	https://prnt.sc/1waz7p2
     	https://prnt.sc/1wb0tg7
     	https://prnt.sc/1wb0vkg
     	https://prnt.sc/1wb0yb0
     	https://prnt.sc/1wb164n


══════════════════════════════════════════════════════════════════════════════════════════════════════════
	0x1 - Personal Information(S):
		Name:    Randall Bruce Devoe JR 
		Age:     23  
		DOB:     August 19 2000 
		SSN:     045-02-1075

		Sex:     Male
		Height:  5'4
		Weight:  120
		Eye:     Dark Brown
		Hair:    Brown

	Address(S):
	2104 Cromwell Hills Dr Cromwell, CT 06416 1 Bed | 1 Bath | 729 Sq Ft | Built 1973 Middlesex County (Nov 2020 - Nov 2023)
	94 Gaylord St #30 Bristol, CT 06010 Hartford County (May 1999 - Sep 2022)



	Phone Number(S):
		Number:      +1(860)940-8005
		Carrier:     T-Mobile US-SVR-10X/2
		Type:        Wireless
		SMS Gateway: 8609408005@tmomail.net
		MMS Gateway: 8609408005@tmomail.net

			Carrier Swap ;)

		Number:        18609408005
      	Carrier:       Sprint PCS/2                    
      	Type:          Wireless                                               
      	SMS Gateway:   8609408005@tmomail.net
      	MMS Gateway:   8609408005@tmomail.net 


      	Number:        (860) 589-4328
      	Carrier:       Sinch Voice-NSR-10X-Port/1                    
      	Type:          VOIP                                            

      	Number:        (860) 261-4826
      	Carrier:       Comcast IP Phone/1                   
      	Type:          VOIP                                             

      	Number:        (860) 584-4683
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          VOIP                                              

      	Number:        (860) 502-0091
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020091@tmomail.net
      	MMS Gateway:   8605020091@tmomail.net 

      	Number:        (860) 502-0101 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020101@tmomail.net
      	MMS Gateway:   8605020101@tmomail.net 

      	Number:        (860) 287-7913
      	Carrier:       Verizon Wireless:6006 - SVR/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877913@vtext.com
      	MMS Gateway:   8602877913@vzwpix.com 

      	Number:        (860) 287-7791 
      	Carrier:       Verizon Wireless:6006 - SVR/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877791@vtext.com
      	MMS Gateway:   8602877791@vzwpix.com

      	Number:        (860) 940-8993 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8609408993@tmomail.net
      	MMS Gateway:   8609408993@tmomail.net 

      	Number:        (860) 502-0141
      	Carrier:       Cingular Wireless/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020141@txt.att.net
      	MMS Gateway:   8605020141@mms.att.net 

      	Number:        (860) 637-6583
      	Carrier:       Metro PCS Communications Inc-SVR-10X/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8606376583@mymetropcs.com
      	MMS Gateway:   8606376583@mymetropcs.com 

      	Number:        (860) 584-5292 
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                       


    Credit Cards(S):
    	XXXX XXXX XXXX 3462 - Visa - 172 (Bin Checked)
    	XXXX XXXX XXXX 5071 - Visa - 018 (Bin Checked)
    	XXXX XXXX XXXX 3849 - Visa - 283 (Bin Checked)
    	XXXX XXXX XXXX 0594 - Visa - 143 (Bin Checked)
    	XXXX XXXX XXXX 1832 - Visa - 474 (Bin Checked)

    Alias(S):
    	Virus.breach                                    
        Virus                                           
        Vbreach                                         
        BarBrob                                         
        x_king_virus_of_death_x                         
        FbiBreach

    Education:        Bristol Central High School              (PROOF) https://prnt.sc/1waodyf
   	Address:           480 Wolcott St, Bristol, CT 06010        (PROOF) http://www.bristolpress.com/article/view/article_id/352617/headline/bristol-central-high-school-list-of-graduates/section/BP-Bristol+News


   	RelationShip(S):
   		Name:  Savannah
   		Age:   19
   		City:  Covington/Florence
   		State: Kentucky
   		Alias:@l0lgh0sts



══════════════════════════════════════════════════════════════════════════════════════════════════════════
	0x2 - Social Information

	Instagrams(S):
		instagram.com/nullbility
		instagram.com/hell.breach
		instagram.com/virus.breach
		instagram.com/randalldevoe
        instagram.com/randalldevoe
        instagram.com/kingvonisking
        instagram.com/virusbreach


    Facebook(S):
    	facebook.com/randy.devoe
        facebook.com/randy.devoe.1
        facebook.com/randy.devoe.7
        facebook.com/randy.devoe.3

        Jason Vargos


    TikTok(S):
    	tiktok.com/@virus.breach


    Discord(S):
    	virus0433
    	virus#0147

    Discord ID(S):
    	849738596009377852
    	834558596009377852
    	273827189982398120
    	198390109381082012

    TryHackMe(S):
    	tryhackme.com/p/virus.breach

    Email(S):
    	barbrob@bellsouth.net      - Jacked
    	rbdevoesr@aol.com          - Jacked
    	heather.bunn@laneysinc.com - Jacked
    	heather@schaefer.com       - Jacked
    	rdevoesr@yahoo.com         - Jacked
    	rbdevoesr@aol.com          - Jacked

    Snapchat(S):
    	Virus.Breach




══════════════════════════════════════════════════════════════════════════════════════════════════════════
	0x3 - Parents Information

	Mothers Information(S):
		Name:  Heather L Schaefer
		Age:   45
		YOB:   1978
		SSN:   048-98-2738

	Phone Numbers(S):

		Number:        (860) 584-4683
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          VOIP                                              

      	Number:        (860) 502-0091
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020091@tmomail.net
      	MMS Gateway:   8605020091@tmomail.net 

      	Number:        (860) 502-0101 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020101@tmomail.net
      	MMS Gateway:   8605020101@tmomail.net 

      	Number:        (860) 287-7913
      	Carrier:       Verizon Wireless:6006 - SVR/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877913@vtext.com
      	MMS Gateway:   8602877913@vzwpix.com 

      	Number:        (860) 287-7791 
      	Carrier:       Verizon Wireless:6006 - SVR/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877791@vtext.com
      	MMS Gateway:   8602877791@vzwpix.com

      	Number:        (860) 940-8993 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8609408993@tmomail.net
      	MMS Gateway:   8609408993@tmomail.net 

      	Number:        (860) 502-0141
      	Carrier:       Cingular Wireless/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020141@txt.att.net
      	MMS Gateway:   8605020141@mms.att.net 

      	Number:        (860) 637-6583
      	Carrier:       Metro PCS Communications Inc-SVR-10X/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8606376583@mymetropcs.com
      	MMS Gateway:   8606376583@mymetropcs.com 

      	Number:        (860) 584-5292 
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                       

	Email(S):

		heatherlynn32878@gmail.com

		reaches you were pwned in
A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.

Straffic logo
Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".

Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses

Drizly logo
Drizly: In approximately July 2020, the US-based online alcohol delivery service Drizly suffered a data breach. The data was sold online before being extensively redistributed and contained 2.5 million unique email addresses alongside names, physical and IP addresses, phone numbers, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com.

Compromised data: Dates of birth, Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses

Home Chef logo
Home Chef: In early 2020, the food delivery service Home Chef suffered a data breach which was subsequently sold online. The breach exposed the personal information of almost 9 million customers including names, IP addresses, post codes, the last 4 digits of credit card numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Geographic locations, IP addresses, Names, Partial credit card data, Passwords, Phone numbers

Twitter (200M) logo
Twitter (200M): In early 2023, over 200M records scraped from Twitter appeared on a popular hacking forum. The data was obtained sometime in 2021 by abusing an API that enabled email addresses to be resolved to Twitter profiles. The subsequent results were then composed into a corpus of data containing email addresses alongside public Twitter profile information including names, usernames and follower counts.

Compromised data: Email addresses, Names, Social media profiles, Usernames

Zynga logo
Zynga: In September 2019, game developer Zynga (the creator of Words with Friends) suffered a data breach. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by dehashed.com.

Compromised data: Email addresses, Passwords, Phone numbers, Usernames
		heatherlynn378@yahoo.com
		jenamericangurl@collegeclub.com

		Breaches you were pwned in "heatherlynn378@yahoo.com"
A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk.

Verifications.io logo
Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.

Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses

Anti Public Combo List logo
Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.

Compromised data: Email addresses, Passwords

CafePress logo
CafePress: In February 2019, the custom merchandise retailer CafePress suffered a data breach. The exposed data included 23 million unique email addresses with some records also containing names, physical addresses, phone numbers and passwords stored as SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".

Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical addresses

ClearVoice Surveys logo
ClearVoice Surveys: In April 2021, the market research surveys company ClearVoice Surveys had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum. The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords. ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity.

Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses

Collection #1 logo
Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach.

Compromised data: Email addresses, Passwords

Coupon Mom / Armor Games logo
Coupon Mom / Armor Games (unverified): In 2014, a file allegedly containing data hacked from Coupon Mom was created and included 11 million email addresses and plain text passwords. On further investigation, the file was also found to contain data indicating it had been sourced from Armor Games. Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers. The breach has subsequently been flagged as "unverified" as the source cannot be emphatically proven. In July 2020, the data was also found to contain BeerAdvocate accounts sourced from a previously unknown breach.

Compromised data: Email addresses, Passwords

Disqus logo
Disqus: In October 2017, the blog commenting service Disqus announced they'd suffered a data breach. The breach dated back to July 2012 but wasn't identified until years later when the data finally surfaced. The breach contained over 17.5 million unique email addresses and usernames. Users who created logins on Disqus had salted SHA1 hashes of passwords whilst users who logged in via social providers only had references to those accounts.

Compromised data: Email addresses, Passwords, Usernames

Exploit.In logo
Exploit.In (unverified): In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned.

Compromised data: Email addresses, Passwords

Instant Checkmate logo
Instant Checkmate: In 2019, the public records search service Instant Checkmate suffered a data breach that later came to light in early 2023. The data included almost 12M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes.

Compromised data: Email addresses, Names, Passwords, Phone numbers

Luxottica logo
Luxottica: In March 2021, the world's largest eyewear company Luxoticca suffered a data breach via one of their partners that exposed the personal information of more than 70M people. The data was subsequently sold via a popular hacking forum in late 2022 and included email and physical addresses, names, genders, dates of birth and phone numbers. In a statement from Luxottica, they advised they were aware of the incident and are currently "considering other notification obligations".

Compromised data: Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses

Mindjolt logo
Mindjolt: In March 2019, the online gaming website MindJolt suffered a data breach that exposed 28M unique email addresses. Also impacted were names and dates of birth, but no passwords. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".

Compromised data: Dates of birth, Email addresses, Names

MyFitnessPal logo
MyFitnessPal: In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im".

Compromised data: Email addresses, IP addresses, Passwords, Usernames

MyHeritage logo
MyHeritage: In October 2017, the genealogy website MyHeritage suffered a data breach. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to "BenjaminBlue@exploit.im".

Compromised data: Email addresses, Passwords

MySpace logo
MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public.

Compromised data: Email addresses, Passwords, Usernames

Not Acxiom logo
Not Acxiom (unverified): In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom and subsequently circulated within the hacking community. On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach". The data contained almost 52M unique email addresses.

Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical addresses

Pemiblanc logo
Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident.

Compromised data: Email addresses, Passwords

River City Media Spam List logo
River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data.

Compromised data: Email addresses, IP addresses, Names, Physical addresses

SaverSpy logo
SaverSpy (spam list): In September 2018, security researcher Bob Diachenko discovered a massive collection of personal details exposed in an unprotected Mongo DB instance. The data appears to have been used in marketing campaigns (possibly for spam purposes) but had little identifying data about it other than a description of "Yahoo_090618_ SaverSpy". The data set provided to HIBP had almost 2.5M unique email addresses (all of which were from Yahoo!) alongside names, genders and physical addresses.

Compromised data: Email addresses, Genders, Names, Physical addresses

ShareThis logo
ShareThis: In July 2018, the social bookmarking and sharing service ShareThis suffered a data breach. The incident exposed 41 million unique email addresses alongside names and in some cases, dates of birth and password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by dehashed.com.

Compromised data: Dates of birth, Email addresses, Names, Passwords

Straffic logo
Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur".

Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses

Unverified Data Source logo
Unverified Data Source (unverified): In January 2021, over 11M unique email addresses were discovered by Night Lion Security alongside an extensive amount of personal information including names, physical and IP addresses, phone numbers and dates of birth. Some records also contained social security numbers, driver's license details, personal financial information and health-related data, depending on where the information was sourced from. Initially attributed to Astoria Company, they subsequently investigated the incident and confirmed the data did not originate from their services.

Compromised data: Bank account numbers, Credit status information, Dates of birth, Email addresses, Employers, Health insurance information, Income levels, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Smoking habits, Social security numbers

Wattpad logo
Wattpad: In June 2020, the user-generated stories website Wattpad suffered a huge data breach that exposed almost 270 million records. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes.

Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Social media profiles, User website URLs, Usernames

	Addresses(S):
		94 Gaylord St #30 Bristol, CT 06010 Hartford County (May 1999 - Sep 2022)
        14 Oakdale Rd Terryville, CT 06786 Litchfield County (May 1999 - May 2014)
        9236 Town Rdg Middletown, CT 06457 Middlesex County (May 1999 - Dec 2013)
        117 Meetinghouse Ln Middletown, CT 06457 Middlesex County (Nov 2000 - Sep 2010)
        140 Knox Blvd Middletown, CT 06457 Middlesex County (Jun 1999 - Sep 2016)



	Fathers Information(S):
		Name:  Randall Bruce Devoe Sr (Deceased)
		Age:   56 
		YOB:   1966
		SSN:   044-60-3421

	Phone Numbers(S):

		Number:        (860) 584-4683
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                                            

      	Number:        (860) 585-9668
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          VOIP                                              

      	Number:        (860) 502-0091
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020091@tmomail.net
      	MMS Gateway:   8605020091@tmomail.net 

      	Number:        (860) 502-0101 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020101@tmomail.net
      	MMS Gateway:   8605020101@tmomail.net 

      	Number:        (860) 287-7913
      	Carrier:       Verizon Wireless:6006 - SVR/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877913@vtext.com
      	MMS Gateway:   8602877913@vzwpix.com 

      	Number:        (860) 287-7791 
      	Carrier:       Verizon Wireless:6006 - SVR/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8602877791@vtext.com
      	MMS Gateway:   8602877791@vzwpix.com

      	Number:        (860) 940-8993 
      	Carrier:       T-Mobile US-SVR-10X/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8609408993@tmomail.net
      	MMS Gateway:   8609408993@tmomail.net 

      	Number:        (860) 502-0141
      	Carrier:       Cingular Wireless/2                   
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8605020141@txt.att.net
      	MMS Gateway:   8605020141@mms.att.net 

      	Number:        (860) 637-6583
      	Carrier:       Metro PCS Communications Inc-SVR-10X/2                    
      	Type:          Wireless                        
      	CNAM:          Wireless Caller                        
      	SMS Gateway:   8606376583@mymetropcs.com
      	MMS Gateway:   8606376583@mymetropcs.com 

      	Number:        (860) 584-5292 
      	Carrier:       Frontier Communications:5200 - NSR/1                   
      	Type:          Land Line                       

	Email(S):

		rmikell@kopower.com

		Breaches you were pwned in
           A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put         your other services at risk.
        
        Data Enrichment Exposure From PDL Customer logo
        Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included         an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the         database. Exposed information included email addresses, phone numbers, social media profiles and job history data.
        
        Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles
        
        Verifications.io logo
        Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left         publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of         birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable.
        
        Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses


	Addresses(S):
		PO Box 2525 Bristol, CT 06011 Hartford County (Jun 1999 - Feb 2011)
        95 Constance Ln Bristol, CT 06010 Hartford County (Apr 1987 - Sep 2011)
        10 Pine Ct #13 Bristol, CT 06010 Hartford County (Feb 2011)
        41 Peck Ln Bristol, CT 06010 Hartford County (Oct 2001 - May 2011)
        18 Benham St #2 Bristol, CT 06010 Hartford County (Jul 1996 - Jul 2001)
        280 Riverside Ave Bristol, CT 06010 Hartford County (Oct 1998 - Jan 2001)
        300 Washington St New Britain, CT 06051 Hartford County (Apr 2000 - May 2000)
        29 Benham St #G Bristol, CT 06010 Hartford County (Aug 1996 - Jul 2001)
        34 Buckley Ave Bristol, CT 06010 Hartford County (Oct 1997 - Oct 2001)
        18 Benham St Bristol, CT 06010 Hartford County (Jul 1996 - Aug 1996)
        160 New St Bristol, CT 06010 Hartford County (Jul 1992 - Dec 1993)

		Obituary: https://www.funkfuneralhome.com/tributes/Randall-Devoe
══════════════════════════════════════════════════════════════════════════════════════════════════════════
	0x4 - House Details




Property features
Location
Zoning: R-15
Room description
Total bath(s): 1
Total full bath(s): 1
Total rooms: 3
Lot size and SQFT
Living Area: 729
Stories
Stories: 1
Interior Features
Heating features: Forced Hot Water
Listing information
Year Built: 1973


══════════════════════════════════════════════════════════════════════════════════════════════════════════

	0x5 - Austic Momements

https://prnt.sc/1wawgqv 
https://prnt.sc/1wawmdp 
https://prnt.sc/1wawpc1 
https://prnt.sc/1wawrji 
https://prnt.sc/1way1p3 
https://prnt.sc/1way5hg 
https://prnt.sc/1wawmdp 
https://prnt.sc/1wazbr9                                                     
https://prnt.sc/1wazxvd 
https://prnt.sc/1wb0cd7 
https://prnt.sc/1wb0lqu