export_evapspades@gmail.com.pdf

OSINT Industries

Report for: evapspades@gmail.com

As of 2025-04-24T05:02:19.172Z

MapModulesTimeline

Module Responses

GITHUB

Registered : true

PICSART

Registered : true

HIBP

Registered : true

Breach : true

Name : MyHeritage

Website : myheritage.com

Bio : In October 2017, the genealogy website <a href="https://blog.myheritage.com/2018/06/myheritage-statement-about-a-cybersecurity-incident/" target="_blank" rel="noopener">MyHeritage suffered a data breach</a>. The incident was reported 7 months later after a security researcher discovered the data and contacted MyHeritage. In total, more than 92M customer records were exposed and included email addresses and salted SHA-1 password hashes. In 2019, <a href="https://www.theregister.co.uk/2019/02/11/620_million_hacked_accounts_dark_web/" target="_blank" rel="noopener">the data appeared listed for sale on a dark web marketplace</a> (along with several other large breaches) and subsequently began circulating more broadly. The data was provided to HIBP by a source who requested it be attributed to &quot;BenjaminBlue@exploit.im&quot;.

Creation Date : 2017-10-26T00:00:00

profile

Registered : true

Breach : true

Name : Verifications.io

Website : verifications.io

Bio : In February 2019, the email address validation service <a href="https://securitydiscovery.com/800-million-emails-leaked-online-by-email-verification-service" target="_blank" rel="noopener">verifications.io suffered a data breach</a>. Discovered by <a href="https://twitter.com/mayhemdayone" target="_blank" rel="noopener">Bob Diachenko</a> and <a href="https://twitter.com/vinnytroia" target="_blank" rel="noopener">Vinny Troia</a>, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although <a href="https://web.archive.org/web/20190227230352/https://verifications.io/" target="_blank" rel="noopener">an archived copy remains viewable</a>.

Creation Date : 2019-02-25T00:00:00

profile

Registered : true

Breach : true

Name : Data Enrichment Exposure From PDL Customer

Bio : In October 2019, <a href="https://www.troyhunt.com/data-enrichment-people-data-labs-and-another-622m-email-addresses" target="_blank" rel="noopener">security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data</a>. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data.

Creation Date : 2019-10-16T00:00:00

profile

Registered : true

Breach : true

Name : Straffic

Website : straffic.io

Bio : In February 2020, Israeli marketing company <a href="https://www.databreachtoday.com/israeli-marketing-company-exposes-contacts-database-a-13785" target="_blank" rel="noopener">Straffic exposed a database with 140GB of personal data</a>. The publicly accessible Elasticsearch database contained over 300M rows with 49M unique email addresses. Exposed data also included names, phone numbers, physical addresses and genders. In <a href="https://straffic.io/updates.php" target="_blank" rel="noopener">their breach disclosure message</a>, Straffic stated that &quot;it is impossible to create a totally immune system, and these things can occur&quot;.

Creation Date : 2020-02-14T00:00:00

profile

Registered : true

Breach : true

Name : Aptoide

Website : aptoide.com

Bio : In April 2020, the independent Android app store <a href="https://blog.aptoide.com/aptoide-credentials-information/" target="_blank" rel="noopener">Aptoide suffered a data breach</a>. The incident resulted in the exposure of 20M customer records which were subsequently shared online via a popular hacking forum. Impacted data included email and IP addresses, names, IP addresses and passwords stored as SHA-1 hashes without a salt.

Creation Date : 2020-04-13T00:00:00

profile

Registered : true

Breach : true

Name : ZAP-Hosting

Website : zap-hosting.com

Bio : In November 2021, web host <a href="https://twitter.com/zaphosting/status/1503346593591873543" target="_blank" rel="noopener">ZAP-Hosting suffered a data breach</a> that exposed over 60GB of data containing 746k unique email addresses. The breach also contained support chat logs, IP addresses, names, purchases, physical addresses and phone numbers.

Creation Date : 2021-11-22T00:00:00

profile

Registered : true

Breach : true

Name : ApexSMS

Bio : In May 2019, <a href="https://techcrunch.com/2019/05/09/sms-spammers-doxxed/?guccounter=1" target="_blank" rel="noopener">news broke of a massive SMS spam operation known as &quot;ApexSMS&quot; which was discovered after a MongoDB instance of the same name was found exposed without a password</a>. The incident leaked over 80M records with 23M unique email addresses alongside names, phone numbers and carriers, geographic locations (state and country), genders and IP addresses.

Creation Date : 2019-04-15T00:00:00

profile

Registered : true

Breach : true

Name : Combolists Posted to Telegram

Bio : In May 2024, <a href="https://troyhunt.com/telegram-combolists-and-361m-email-addresses" target="_blank" rel="noopener">2B rows of data with 361M unique email addresses were collated from malicious Telegram channels</a>. The data contained 122GB across 1.7k files with email addresses, usernames, passwords and in many cases, the website they were entered into. The data appears to have been sourced from a combination of existing combolists and info stealer malware.

Creation Date : 2024-05-28T00:00:00

profile

Registered : true

Breach : true

Name : Stealer Logs Posted to Telegram

Bio : In July 2024, <a href="https://troyhunt.com/begging-for-bounties-and-more-info-stealer-logs" target="_blank" rel="noopener">info stealer logs with 26M unique email addresses were collated from malicious Telegram channels</a>. The data contained 22GB of logs consisting of email addresses, passwords and the websites they were used on, all obtained by malware running on infected machines.

Creation Date : 2024-07-18T00:00:00

profile

Registered : true

Breach : true

Name : Stealer Logs, Jan 2025

Bio : In January 2025, <a href="https://troyhunt.com/experimenting-with-stealer-logs-in-have-i-been-pwned/" target="_blank" rel="noopener">stealer logs with 71M email addresses were added to HIBP</a>. Consisting of email address, password and the website the credentials were entered against, this breach marks the launch of a new HIBP feature enabling the retrieval of the specific websites the logs were collected against. The incident also resulted in 106M more passwords being added to the <a href="https://haveibeenpwned.com/Passwords" rel="noopener">Pwned Passwords service</a>.

Creation Date : 2025-01-13T00:00:00

profile

Registered : true

Breach : true

Name : ALIEN TXTBASE Stealer Logs

Bio : In February 2025, <a href="https://www.troyhunt.com/processing-23-billion-rows-of-alien-txtbase-stealer-logs" target="_blank" rel="noopener">23 billion rows of stealer logs were obtained from a Telegram channel known as ALIEN TXTBASE</a>. The data contained 284M unique email addresses alongside the websites they were entered into and the passwords used. This data is now searchable in HIBP by both email domain and the domain of the target website.

Creation Date : 2025-02-15T00:00:00

profile

BOEHMIA

Registered : true

NEXTDOOR

Registered : true

CALLOFDUTY

Registered : true

FIREFOX

Registered : true

ACTIVISION

Registered : true

PINTEREST

Registered : true

SNAPCHAT

Registered : true

ESPN

Registered : true

INSTACART

Registered : true

SPOTIFY

Registered : true

ADOBE

Registered : true

DISNEY

Registered : true

FIVERR

Registered : true

SAMSUNG

Registered : true

DIGITALOCEAN

Registered : true

DEVIANTART

Registered : true

RUMBLE

Registered : true

INSTAGRAM

Registered : true

AUTODESK

Registered : true

GRAMMARLY

Registered : true

APPLE

Registered : true

Phone Hint : (***) ***-**84

NVIDIA

Registered : true

TYPERACER

Registered : true

Name : Vincent

Username : im12yearold

Profile Url : https://data.typeracer.com/pit/profile?user=im12yearold

profile

EA

Registered : true

SMULE

Registered : true

Id : 1450342401

Username : evapspades

Profile Url : https://www.smule.com/evapspades

Verified : false

profile

BANDLAB

Registered : true

Id : 4afb99ad-ec5e-4759-b989-629e631694af

Name : Va1idate

Username : piecek

Followers : 0

Following : 0

Verified : false

Private : false

Creation Date : 2023-01-11T23:22:33+00:00

profile

MICROSOFT

Registered : true

Id : 5307AD6F607F6D67

Name : vincent scaglione

Location : US

Email Hint : ki *** @gmail.com

Phone Hint : ********84

Last Seen : 2025-03-22T12:17:16.027000+00:00

Creation Date : 2016-06-05T15:28:25.317000+00:00

DROPBOX

Registered : true

Id : dbid:AADA1K5f6QOZr_nvy2v65y85L9CDKh3duv0

Name : Evap Spades

First Name : Evap

Last Name : Spades

Verified : true

profile

DREAMSTIME

Registered : true

Timeline

Content: Breached on MyHeritage

Date/Year: 2017-10-26T00:00:00

Content: Breached on Verifications.io

Date/Year: 2019-02-25T00:00:00

Content: Breached on Data Enrichment Exposure From PDL Customer

Date/Year: 2019-10-16T00:00:00

Content: Breached on Straffic

Date/Year: 2020-02-14T00:00:00

Content: Breached on Aptoide

Date/Year: 2020-04-13T00:00:00

Content: Breached on ZAP-Hosting

Date/Year: 2021-11-22T00:00:00

Content: Breached on ApexSMS

Date/Year: 2019-04-15T00:00:00

Content: Breached on Combolists Posted to Telegram

Date/Year: 2024-05-28T00:00:00

Content: Breached on Stealer Logs Posted to Telegram

Date/Year: 2024-07-18T00:00:00

Content: Breached on Stealer Logs, Jan 2025

Date/Year: 2025-01-13T00:00:00

Content: Breached on ALIEN TXTBASE Stealer Logs

Date/Year: 2025-02-15T00:00:00

Content: Created Account (Bandlab)

Date/Year: 2023-01-11T23:22:33+00:00

Content: Last Active (Microsoft)

Date/Year: 2025-03-22T12:17:16.027000+00:00

Content: Created Account (Microsoft)

Date/Year: 2016-06-05T15:28:25.317000+00:00

osint.industries