Telefon-Treff Database
telefon-treff.de
223,702
Global
-
12.66 MB
68.21 MB
1
The Telefon-Treff Database leak occurred in 2020, exposing the data of 223,702 users from Germany. The leaked database contained three types of information: email addresses, usernames, and passwords.
The leaked data appears to be the result of a security breach at Telefon-Treff.de, a German online dating and community platform that was established in the late 1990s. The breach is believed to have occurred in 2020, although the exact date is unclear.
The leaked data includes:
* Email addresses
* Usernames
* Passwords
Its worth noting that the passwords were likely stored in plaintext, rather than being hashed or encrypted, making it easy for unauthorized individuals to access the accounts of those affected.
The leak is significant not only because of the number of records compromised, but also because it highlights the importance of proper data security and password storage. It serves as a reminder to individuals and organizations alike to take their data protection responsibilities seriously and to implement robust security measures to prevent similar breaches in the future.
We have loaded this breach into our database.
(209210, 2, 'hexelilly', '[email protected]', '95518143fda8f5692accf9d879bf439e }fd', 'legacy', '}fd', 0, 0, 0, 0, 1),
(124029, 2, 'snitsig', '[email protected]', 'f3b46d558fa620da6b1195c05b117951 7`I', 'legacy', '7`I', 0, 0, 0, 0, 1),
(67889, 2, 'hannes01', '[email protected]', 'f1d27e95320e620385495578af3dddf3 9bL', 'legacy', '9bL', 0, 0, 0, 0, 1),
(67646, 2, 'dole1', '[email protected]', 'f1874afb7042825be9c4aeb983988dae \\CZ', 'legacy', '\\CZ', 0, 0, 0, 0, 1),
(2, 5, 'Thomas', '[email protected]', '$2y$10$xqJGdb4jHaEE5oh2Z.8imOIO7D1rlo2NGB.TsMn85OU5dU9P0lKHK', 'blowfish:10', ']Y(', 0, 0, 0, 0, 5),
(221434, 2, 'Hermann92', '[email protected]', '0119a52d25dd4179e239c1754864f352 ..6', 'legacy', '..6', 0, 0, 0, 0, 1),
(209404, 2, 'chrissi1959', '[email protected]', '52d86508df712b7f732e0af16a1835d2 CB\"', 'legacy', 'CB\"', 0, 0, 0, 0, 1),
(199737, 20, 'lilly87', '[email protected]', '59900d294d9338b8f4b3cfdb09a84c39 sW\'', 'legacy', 'sW\'', 0, 0, 0, 0, 1),
(70125, 2, 'nader786', '[email protected]', '5f2f563fc3c0267a78c6a6efa857159d gi4', 'legacy', 'gi4', 0, 0, 0, 0, 1),
(29899, 2, 'Wurlig', '[email protected]', '0323538fab4dbe09b528648b0ecb558d 4K(', 'legacy', '4K(', 0, 0, 0, 0, 1),
(18490, 20, 'meerforelle', '[email protected]', '943c94d83a3d635b77a91e4487d2769c x\";', 'legacy', 'x\";', 0, 0, 0, 0, 1),
(3, 12, 'Jochen', '[email protected]', '$2y$10$KKIYTp.Pll53HxvKvcDNkOyJcWc1k0Mb.9NszBFlkbH10lyXjj.XW', 'blowfish:10', '3)d', 0, 0, 0, 0, 1),
(63455, 2, 'Zwergpinscher', '[email protected]', 'deb6baba34c84f75b20b72df9ec7f501 zQ|', 'legacy', 'zQ|', 0, 0, 0, 0, 1),
(141909, 2, 'loop89', '[email protected]', 'c9daad4bc588b681d7e976ce1fbe60a1 [~M', 'legacy', '[~M', 0, 0, 0, 0, 1),
