Digimon

Digimon

Data Breach

digimon.co.in

7,042,743

Records Exposed

Sep 2016

Date of Breach

Database

Breach Type

Oct 2024

Added to Database

About This Breach

In September 2016, more than 16GB of logs from a service believed to be digimon.co.in were obtained, likely due to an unsecured MongoDB instance. The service shut down shortly afterward, and little information remains about its exact nature. However, based on inquiries made on Twitter, it appears to have been a mail service, possibly running on PowerMTA and used for sending spam. The logs revealed details such as 7.7 million unique email recipients (including names and email addresses), mail server IP addresses, email subjects, and tracking information like mail opens and clicks. This incident highlights the critical need for securing databases to prevent unauthorized access to sensitive information.

Compromised Data Types

Email Address IP Address

Country

India

Language

English

Password Storage

No Passwords

Category

Gaming

Indexed On

Oct 21, 2024

Breach Type

Database

What Should You Do?

Get Full Breach Details with LeakedSource Pro

Sign up for a LeakedSource Pro account to see exactly what data was exposed in this breach and get real-time notifications when your information appears in new breaches.

Sign Up for Pro
  • Watch for phishing emails targeting your inbox. Attackers may use your exposed email address to send convincing scam messages.
  • Enable two-factor authentication (2FA) on all important accounts to add an extra layer of security.
  • Use a password manager to generate and store unique, strong passwords for every account.

Were You Affected by This Breach?

Enter your email below to instantly check if your data was compromised in the Digimon breach and 12,000+ other known breaches.