____ _ _ | _ \ _____ _| |__ (_)_ __ | | | |/ _ \ \/ / '_ \| | '_ \ | |_| | (_) > <| |_) | | | | | |____/ \___/_/\_\_.__/|_|_| |_|
Title:Virus.Breach Heart;ess
Created:Nov 24th, 2023
Created by: Anonymous
Views: 445
Comments: 1
Username: Anonymous - (Login)
Please note that all posted information is publicly available and must follow our TOS.
:::!~!!!!!:. .xUHWH!! !!?M88WHX:. .X*#M@$!! !X!M$$$$$$WWx:. :!!!!!!?H! :!$!$$$$$$$$$$8X: !!~ ~:~!! :~!$!#$$$$$$$$$$8X: :!~::!H!< ~.U$X!?R$$$$$$$$MM! ~!~!!!!~~ .:XW$$$U!!?$$$$$$RMM! !:~~~ .:!M"T#$$$$WX??#MRRMMM! ~?WuxiW*` `"#$$$$8!!!!??!!! ╦ ╦╔═╗╔═╗╦═╗╔╦╗╦ ╔═╗╔═╗╔═╗ ╔═╗╔═╗╔═╗╦ ╦╦═╗╦╔╦╗╦ ╦ ╠═╣║╣ ╠═╣╠╦╝ ║ ║ ║╣ ╚═╗╚═╗ ╚═╗║╣ ║ ║ ║╠╦╝║ ║ ╚╦╝ ╩ ╩╚═╝╩ ╩╩╚═ ╩ ╩═╝╚═╝╚═╝╚═╝ ╚═╝╚═╝╚═╝╚═╝╩╚═╩ ╩ ╩ :X- M$$$$ `"T#$T~!8$WUXU~ :%` ~#$$$m: ~!~ ?$$$$$$ :!`.- ~T$$$$8xx. .xWW- ~""##*" ..... -~~:<` ! ~?T#$$@@W@*?$$ /` W$@@M!!! .!~~ !! .:XUW$W!~ `"~: : #"~~`.:x%`!! !H: !WM$$$$Ti.: .!WUn+!` :::~:!!`:X~ .: ?H.!u "$$$B$$$!W:U!T$$M~ .~~ :X@!.-~ ?@WTWo("*$$$W$TH$! ` Wi.~!X$?!-~ : ?$$$B$Wu("**$RM! $R@i.~~ ! : ~$$$$$B$$en:`` ?MXT@Wx.~ : ~"##*$$$$M~ The Downfall of HellFire Pt.1 Virus.Breach / Hell.Breach Is A Com Tard Thats Goes Around Flaunting His Enormic Ego Thinking Hes Some Type Of Geine That Can't Be Touched He Also Thinks 'Extortion' or 'Bitchin' People Makes You Big In The Scene Well Hate To Tell You It Dont Work Like That Treating Females As Slaves Because You Can Get Them on Your Own Like Deadass Imagine Being A BloodKing Knock Off Harmless Ass Niggas Extort Someone With The Same Skill Set Oh Yeah You Can't Because Your Not Harmful - Recon Heartless Security Runs This Shit Nigga Greetings From(S): $urge insane spider cipher vdirty Autistic Photos Of The Victim (S): https://prnt.sc/1waymvn https://prnt.sc/1waypp4 https://prnt.sc/1ways0j https://prnt.sc/1waywt2 https://prnt.sc/1wayzy4 https://prnt.sc/1waz45e https://prnt.sc/1waz7p2 https://prnt.sc/1wb0tg7 https://prnt.sc/1wb0vkg https://prnt.sc/1wb0yb0 https://prnt.sc/1wb164n ══════════════════════════════════════════════════════════════════════════════════════════════════════════ 0x1 - Personal Information(S): Name: Randall Bruce Devoe JR Age: 23 DOB: August 19 2000 SSN: 045-02-1075 Sex: Male Height: 5'4 Weight: 120 Eye: Dark Brown Hair: Brown Address(S): 2104 Cromwell Hills Dr Cromwell, CT 06416 1 Bed | 1 Bath | 729 Sq Ft | Built 1973 Middlesex County (Nov 2020 - Nov 2023) 94 Gaylord St #30 Bristol, CT 06010 Hartford County (May 1999 - Sep 2022) Phone Number(S): Number: +1(860)940-8005 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless SMS Gateway: 8609408005@tmomail.net MMS Gateway: 8609408005@tmomail.net Carrier Swap ;) Number: 18609408005 Carrier: Sprint PCS/2 Type: Wireless SMS Gateway: 8609408005@tmomail.net MMS Gateway: 8609408005@tmomail.net Number: (860) 589-4328 Carrier: Sinch Voice-NSR-10X-Port/1 Type: VOIP Number: (860) 261-4826 Carrier: Comcast IP Phone/1 Type: VOIP Number: (860) 584-4683 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: VOIP Number: (860) 502-0091 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020091@tmomail.net MMS Gateway: 8605020091@tmomail.net Number: (860) 502-0101 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020101@tmomail.net MMS Gateway: 8605020101@tmomail.net Number: (860) 287-7913 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877913@vtext.com MMS Gateway: 8602877913@vzwpix.com Number: (860) 287-7791 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877791@vtext.com MMS Gateway: 8602877791@vzwpix.com Number: (860) 940-8993 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8609408993@tmomail.net MMS Gateway: 8609408993@tmomail.net Number: (860) 502-0141 Carrier: Cingular Wireless/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020141@txt.att.net MMS Gateway: 8605020141@mms.att.net Number: (860) 637-6583 Carrier: Metro PCS Communications Inc-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8606376583@mymetropcs.com MMS Gateway: 8606376583@mymetropcs.com Number: (860) 584-5292 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Credit Cards(S): XXXX XXXX XXXX 3462 - Visa - 172 (Bin Checked) XXXX XXXX XXXX 5071 - Visa - 018 (Bin Checked) XXXX XXXX XXXX 3849 - Visa - 283 (Bin Checked) XXXX XXXX XXXX 0594 - Visa - 143 (Bin Checked) XXXX XXXX XXXX 1832 - Visa - 474 (Bin Checked) Alias(S): Virus.breach Virus Vbreach BarBrob x_king_virus_of_death_x FbiBreach Education: Bristol Central High School (PROOF) https://prnt.sc/1waodyf Address: 480 Wolcott St, Bristol, CT 06010 (PROOF) http://www.bristolpress.com/article/view/article_id/352617/headline/bristol-central-high-school-list-of-graduates/section/BP-Bristol+News RelationShip(S): Name: Savannah Age: 19 City: Covington/Florence State: Kentucky Alias:@l0lgh0sts ══════════════════════════════════════════════════════════════════════════════════════════════════════════ 0x2 - Social Information Instagrams(S): instagram.com/nullbility instagram.com/hell.breach instagram.com/virus.breach instagram.com/randalldevoe instagram.com/randalldevoe instagram.com/kingvonisking instagram.com/virusbreach Facebook(S): facebook.com/randy.devoe facebook.com/randy.devoe.1 facebook.com/randy.devoe.7 facebook.com/randy.devoe.3 Jason Vargos TikTok(S): tiktok.com/@virus.breach Discord(S): virus0433 virus#0147 Discord ID(S): 849738596009377852 834558596009377852 273827189982398120 198390109381082012 TryHackMe(S): tryhackme.com/p/virus.breach Email(S): barbrob@bellsouth.net - Jacked rbdevoesr@aol.com - Jacked heather.bunn@laneysinc.com - Jacked heather@schaefer.com - Jacked rdevoesr@yahoo.com - Jacked rbdevoesr@aol.com - Jacked Snapchat(S): Virus.Breach ══════════════════════════════════════════════════════════════════════════════════════════════════════════ 0x3 - Parents Information Mothers Information(S): Name: Heather L Schaefer Age: 45 YOB: 1978 SSN: 048-98-2738 Phone Numbers(S): Number: (860) 584-4683 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: VOIP Number: (860) 502-0091 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020091@tmomail.net MMS Gateway: 8605020091@tmomail.net Number: (860) 502-0101 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020101@tmomail.net MMS Gateway: 8605020101@tmomail.net Number: (860) 287-7913 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877913@vtext.com MMS Gateway: 8602877913@vzwpix.com Number: (860) 287-7791 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877791@vtext.com MMS Gateway: 8602877791@vzwpix.com Number: (860) 940-8993 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8609408993@tmomail.net MMS Gateway: 8609408993@tmomail.net Number: (860) 502-0141 Carrier: Cingular Wireless/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020141@txt.att.net MMS Gateway: 8605020141@mms.att.net Number: (860) 637-6583 Carrier: Metro PCS Communications Inc-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8606376583@mymetropcs.com MMS Gateway: 8606376583@mymetropcs.com Number: (860) 584-5292 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Email(S): heatherlynn32878@gmail.com reaches you were pwned in A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk. Straffic logo Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur". Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses Drizly logo Drizly: In approximately July 2020, the US-based online alcohol delivery service Drizly suffered a data breach. The data was sold online before being extensively redistributed and contained 2.5 million unique email addresses alongside names, physical and IP addresses, phone numbers, dates of birth and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com. Compromised data: Dates of birth, Device information, Email addresses, IP addresses, Names, Passwords, Phone numbers, Physical addresses Home Chef logo Home Chef: In early 2020, the food delivery service Home Chef suffered a data breach which was subsequently sold online. The breach exposed the personal information of almost 9 million customers including names, IP addresses, post codes, the last 4 digits of credit card numbers and passwords stored as bcrypt hashes. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Geographic locations, IP addresses, Names, Partial credit card data, Passwords, Phone numbers Twitter (200M) logo Twitter (200M): In early 2023, over 200M records scraped from Twitter appeared on a popular hacking forum. The data was obtained sometime in 2021 by abusing an API that enabled email addresses to be resolved to Twitter profiles. The subsequent results were then composed into a corpus of data containing email addresses alongside public Twitter profile information including names, usernames and follower counts. Compromised data: Email addresses, Names, Social media profiles, Usernames Zynga logo Zynga: In September 2019, game developer Zynga (the creator of Words with Friends) suffered a data breach. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Passwords, Phone numbers, Usernames heatherlynn378@yahoo.com jenamericangurl@collegeclub.com Breaches you were pwned in "heatherlynn378@yahoo.com" A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk. Verifications.io logo Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses Anti Public Combo List logo Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. Compromised data: Email addresses, Passwords CafePress logo CafePress: In February 2019, the custom merchandise retailer CafePress suffered a data breach. The exposed data included 23 million unique email addresses with some records also containing names, physical addresses, phone numbers and passwords stored as SHA-1 hashes. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Email addresses, Names, Passwords, Phone numbers, Physical addresses ClearVoice Surveys logo ClearVoice Surveys: In April 2021, the market research surveys company ClearVoice Surveys had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum. The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords. ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity. Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses Collection #1 logo Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach. Compromised data: Email addresses, Passwords Coupon Mom / Armor Games logo Coupon Mom / Armor Games (unverified): In 2014, a file allegedly containing data hacked from Coupon Mom was created and included 11 million email addresses and plain text passwords. On further investigation, the file was also found to contain data indicating it had been sourced from Armor Games. Subsequent verification with HIBP subscribers confirmed the passwords had previously been used and many subscribers had used either Coupon Mom or Armor Games in the past. On disclosure to both organisations, each found that the data did not represent their entire customer base and possibly includes records from other sources with common subscribers. The breach has subsequently been flagged as "unverified" as the source cannot be emphatically proven. In July 2020, the data was also found to contain BeerAdvocate accounts sourced from a previously unknown breach. Compromised data: Email addresses, Passwords Disqus logo Disqus: In October 2017, the blog commenting service Disqus announced they'd suffered a data breach. The breach dated back to July 2012 but wasn't identified until years later when the data finally surfaced. The breach contained over 17.5 million unique email addresses and usernames. Users who created logins on Disqus had salted SHA1 hashes of passwords whilst users who logged in via social providers only had references to those accounts. Compromised data: Email addresses, Passwords, Usernames Exploit.In logo Exploit.In (unverified): In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. Compromised data: Email addresses, Passwords Instant Checkmate logo Instant Checkmate: In 2019, the public records search service Instant Checkmate suffered a data breach that later came to light in early 2023. The data included almost 12M unique customer email addresses, names, phone numbers and passwords stored as scrypt hashes. Compromised data: Email addresses, Names, Passwords, Phone numbers Luxottica logo Luxottica: In March 2021, the world's largest eyewear company Luxoticca suffered a data breach via one of their partners that exposed the personal information of more than 70M people. The data was subsequently sold via a popular hacking forum in late 2022 and included email and physical addresses, names, genders, dates of birth and phone numbers. In a statement from Luxottica, they advised they were aware of the incident and are currently "considering other notification obligations". Compromised data: Dates of birth, Email addresses, Genders, Names, Phone numbers, Physical addresses Mindjolt logo Mindjolt: In March 2019, the online gaming website MindJolt suffered a data breach that exposed 28M unique email addresses. Also impacted were names and dates of birth, but no passwords. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com". Compromised data: Dates of birth, Email addresses, Names MyFitnessPal logo MyFitnessPal: In February 2018, the diet and exercise service MyFitnessPal suffered a data breach. The incident exposed 144 million unique email addresses alongside usernames, IP addresses and passwords stored as SHA-1 and bcrypt hashes (the former for earlier accounts, the latter for newer accounts). In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it to be attributed to "BenjaminBlue@exploit.im". Compromised data: Email addresses, IP addresses, Passwords, Usernames MyHeritage logo MyHeritage: In October 2017, the genealogy website MyHeritage suffered a data breach. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to "BenjaminBlue@exploit.im". Compromised data: Email addresses, Passwords MySpace logo MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public. Compromised data: Email addresses, Passwords, Usernames Not Acxiom logo Not Acxiom (unverified): In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom and subsequently circulated within the hacking community. On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach". The data contained almost 52M unique email addresses. Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical addresses Pemiblanc logo Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident. Compromised data: Email addresses, Passwords River City Media Spam List logo River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses SaverSpy logo SaverSpy (spam list): In September 2018, security researcher Bob Diachenko discovered a massive collection of personal details exposed in an unprotected Mongo DB instance. The data appears to have been used in marketing campaigns (possibly for spam purposes) but had little identifying data about it other than a description of "Yahoo_090618_ SaverSpy". The data set provided to HIBP had almost 2.5M unique email addresses (all of which were from Yahoo!) alongside names, genders and physical addresses. Compromised data: Email addresses, Genders, Names, Physical addresses ShareThis logo ShareThis: In July 2018, the social bookmarking and sharing service ShareThis suffered a data breach. The incident exposed 41 million unique email addresses alongside names and in some cases, dates of birth and password hashes. In 2019, the data appeared listed for sale on a dark web marketplace (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by dehashed.com. Compromised data: Dates of birth, Email addresses, Names, Passwords Straffic logo Straffic: In February 2020, Israeli marketing company Straffic exposed a database with 140GB of personal data. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In their breach disclosure message, Straffic stated that "it is impossible to create a totally immune system, and these things can occur". Compromised data: Email addresses, Genders, Names, Phone numbers, Physical addresses Unverified Data Source logo Unverified Data Source (unverified): In January 2021, over 11M unique email addresses were discovered by Night Lion Security alongside an extensive amount of personal information including names, physical and IP addresses, phone numbers and dates of birth. Some records also contained social security numbers, driver's license details, personal financial information and health-related data, depending on where the information was sourced from. Initially attributed to Astoria Company, they subsequently investigated the incident and confirmed the data did not originate from their services. Compromised data: Bank account numbers, Credit status information, Dates of birth, Email addresses, Employers, Health insurance information, Income levels, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Smoking habits, Social security numbers Wattpad logo Wattpad: In June 2020, the user-generated stories website Wattpad suffered a huge data breach that exposed almost 270 million records. The data was initially sold then published on a public hacking forum where it was broadly shared. The incident exposed extensive personal information including names and usernames, email and IP addresses, genders, birth dates and passwords stored as bcrypt hashes. Compromised data: Bios, Dates of birth, Email addresses, Genders, Geographic locations, IP addresses, Names, Passwords, Social media profiles, User website URLs, Usernames Addresses(S): 94 Gaylord St #30 Bristol, CT 06010 Hartford County (May 1999 - Sep 2022) 14 Oakdale Rd Terryville, CT 06786 Litchfield County (May 1999 - May 2014) 9236 Town Rdg Middletown, CT 06457 Middlesex County (May 1999 - Dec 2013) 117 Meetinghouse Ln Middletown, CT 06457 Middlesex County (Nov 2000 - Sep 2010) 140 Knox Blvd Middletown, CT 06457 Middlesex County (Jun 1999 - Sep 2016) Fathers Information(S): Name: Randall Bruce Devoe Sr (Deceased) Age: 56 YOB: 1966 SSN: 044-60-3421 Phone Numbers(S): Number: (860) 584-4683 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Number: (860) 585-9668 Carrier: Frontier Communications:5200 - NSR/1 Type: VOIP Number: (860) 502-0091 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020091@tmomail.net MMS Gateway: 8605020091@tmomail.net Number: (860) 502-0101 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020101@tmomail.net MMS Gateway: 8605020101@tmomail.net Number: (860) 287-7913 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877913@vtext.com MMS Gateway: 8602877913@vzwpix.com Number: (860) 287-7791 Carrier: Verizon Wireless:6006 - SVR/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8602877791@vtext.com MMS Gateway: 8602877791@vzwpix.com Number: (860) 940-8993 Carrier: T-Mobile US-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8609408993@tmomail.net MMS Gateway: 8609408993@tmomail.net Number: (860) 502-0141 Carrier: Cingular Wireless/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8605020141@txt.att.net MMS Gateway: 8605020141@mms.att.net Number: (860) 637-6583 Carrier: Metro PCS Communications Inc-SVR-10X/2 Type: Wireless CNAM: Wireless Caller SMS Gateway: 8606376583@mymetropcs.com MMS Gateway: 8606376583@mymetropcs.com Number: (860) 584-5292 Carrier: Frontier Communications:5200 - NSR/1 Type: Land Line Email(S): rmikell@kopower.com Breaches you were pwned in A "breach" is an incident where data has been unintentionally exposed to the public. Using the 1Password password manager helps you ensure all your passwords are strong and unique such that a breach of one service doesn't put your other services at risk. Data Enrichment Exposure From PDL Customer logo Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles Verifications.io logo Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses Addresses(S): PO Box 2525 Bristol, CT 06011 Hartford County (Jun 1999 - Feb 2011) 95 Constance Ln Bristol, CT 06010 Hartford County (Apr 1987 - Sep 2011) 10 Pine Ct #13 Bristol, CT 06010 Hartford County (Feb 2011) 41 Peck Ln Bristol, CT 06010 Hartford County (Oct 2001 - May 2011) 18 Benham St #2 Bristol, CT 06010 Hartford County (Jul 1996 - Jul 2001) 280 Riverside Ave Bristol, CT 06010 Hartford County (Oct 1998 - Jan 2001) 300 Washington St New Britain, CT 06051 Hartford County (Apr 2000 - May 2000) 29 Benham St #G Bristol, CT 06010 Hartford County (Aug 1996 - Jul 2001) 34 Buckley Ave Bristol, CT 06010 Hartford County (Oct 1997 - Oct 2001) 18 Benham St Bristol, CT 06010 Hartford County (Jul 1996 - Aug 1996) 160 New St Bristol, CT 06010 Hartford County (Jul 1992 - Dec 1993) Obituary: https://www.funkfuneralhome.com/tributes/Randall-Devoe ══════════════════════════════════════════════════════════════════════════════════════════════════════════ 0x4 - House Details Property features Location Zoning: R-15 Room description Total bath(s): 1 Total full bath(s): 1 Total rooms: 3 Lot size and SQFT Living Area: 729 Stories Stories: 1 Interior Features Heating features: Forced Hot Water Listing information Year Built: 1973 ══════════════════════════════════════════════════════════════════════════════════════════════════════════ 0x5 - Austic Momements https://prnt.sc/1wawgqv https://prnt.sc/1wawmdp https://prnt.sc/1wawpc1 https://prnt.sc/1wawrji https://prnt.sc/1way1p3 https://prnt.sc/1way5hg https://prnt.sc/1wawmdp https://prnt.sc/1wazbr9 https://prnt.sc/1wazxvd https://prnt.sc/1wb0cd7 https://prnt.sc/1wb0lqu
1 year ago