Adult FriendFinder (2016)
Oct 16, 2016
Domain:
adultfriendfinder.com
Breach Count:
169,746,810
Region:
Global
Source:
File Size:
8.71 GB
Uncompressed File Size:
31.49 GB
File Count:
1
In 2016, a massive data breach exposed the personal information of millions of Adult FriendFinder users. The leak compromised over 169 million records, including names, email addresses, passwords, IP addresses, and zip codes.
The breach was discovered by security researcher Chris Vickery, who found the data for sale on the dark web. The data was reportedly stolen by a hacker using SQL injection techniques.
The Adult FriendFinder leak was one of the largest data breaches in history. It exposed the personal information of a significant number of people, and it raised concerns about the security of online dating sites.
Leaked Information:
Email
Password
Spoken languages
User Name
We have loaded this breach into our database.
File List:
ffadult_edb_users.sql
File Content Sample:
CREATE TABLE `users` (
`pwsid` varchar(64) NOT NULL DEFAULT '',
`handle` varchar(64) NOT NULL DEFAULT '',
`email` varchar(255) NOT NULL DEFAULT '',
`lastvisit` datetime NOT NULL DEFAULT '0000-00-00 00:00:00',
`password` varchar(40) DEFAULT NULL,
`send_email` int(11) DEFAULT '1',
`show_lang` varchar(20) DEFAULT NULL,
`cobrand_id` int(10) unsigned NOT NULL DEFAULT '0',
`no_erotic` tinyint(3) unsigned NOT NULL DEFAULT '0',
`status` char(1) DEFAULT NULL,
`internalMail` tinyint(3) unsigned NOT NULL DEFAULT '0',
`level` char(1) DEFAULT NULL,
`block` char(1) DEFAULT NULL,
PRIMARY KEY (`pwsid`),
UNIQUE KEY `handle` (`handle`),
KEY `lastvistx` (`lastvisit`),
KEY `handle_2` (`handle`,`pwsid`),
KEY `emailx` (`email`,`pwsid`),
KEY `password` (`password`),
KEY `cobrand_id` (`cobrand_id`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1;
/*!40101 SET character_set_client = @saved_cs_client */;
--
-- Dumping data for table `users`
--
-- WHERE: 200000000 limit 220000000
LOCK TABLES `users` WRITE;
/*!40000 ALTER TABLE `users` DISABLE KEYS */;
INSERT INTO `users` VALUES ('','','[email protected]@deleted1.com','0000-00-00 00:00:00',NULL,1,NULL,0,0,NULL,0,NULL,NULL),('0001RJ8504-9ab>2yZ`N`19zQ=`0Z*@bB>sF8emSg1ak{Jw$h#','%b-BtkYZ','1','0000-00-00 00:00:00','',1,'',0,0,'1',0,'0',''),('0001RJ85047jzAm3Dv^Vzck*n=Eg+q@bB>sF8emSg1ak{Jw$h#',';Q
`pwsid` varchar(64) NOT NULL DEFAULT '',
`handle` varchar(64) NOT NULL DEFAULT '',
`email` varchar(255) NOT NULL DEFAULT '',
`lastvisit` datetime NOT NULL DEFAULT '0000-00-00 00:00:00',
`password` varchar(40) DEFAULT NULL,
`send_email` int(11) DEFAULT '1',
`show_lang` varchar(20) DEFAULT NULL,
`cobrand_id` int(10) unsigned NOT NULL DEFAULT '0',
`no_erotic` tinyint(3) unsigned NOT NULL DEFAULT '0',
`status` char(1) DEFAULT NULL,
`internalMail` tinyint(3) unsigned NOT NULL DEFAULT '0',
`level` char(1) DEFAULT NULL,
`block` char(1) DEFAULT NULL,
PRIMARY KEY (`pwsid`),
UNIQUE KEY `handle` (`handle`),
KEY `lastvistx` (`lastvisit`),
KEY `handle_2` (`handle`,`pwsid`),
KEY `emailx` (`email`,`pwsid`),
KEY `password` (`password`),
KEY `cobrand_id` (`cobrand_id`)
) ENGINE=InnoDB DEFAULT CHARSET=latin1;
/*!40101 SET character_set_client = @saved_cs_client */;
--
-- Dumping data for table `users`
--
-- WHERE: 200000000 limit 220000000
LOCK TABLES `users` WRITE;
/*!40000 ALTER TABLE `users` DISABLE KEYS */;
INSERT INTO `users` VALUES ('','','[email protected]@deleted1.com','0000-00-00 00:00:00',NULL,1,NULL,0,0,NULL,0,NULL,NULL),('0001RJ8504-9ab>2yZ`N`19zQ=`0Z*@bB>sF8emSg1ak{Jw$h#','%b-BtkYZ','1','0000-00-00 00:00:00','',1,'',0,0,'1',0,'0',''),('0001RJ85047jzAm3Dv^Vzck*n=Eg+q@bB>sF8emSg1ak{Jw$h#',';Q