7,042,743
Records Exposed
Sep 2016
Date of Breach
Database
Breach Type
Oct 2024
Added to Database
About This Breach
In September 2016, more than 16GB of logs from a service believed to be digimon.co.in were obtained, likely due to an unsecured MongoDB instance. The service shut down shortly afterward, and little information remains about its exact nature. However, based on inquiries made on Twitter, it appears to have been a mail service, possibly running on PowerMTA and used for sending spam. The logs revealed details such as 7.7 million unique email recipients (including names and email addresses), mail server IP addresses, email subjects, and tracking information like mail opens and clicks. This incident highlights the critical need for securing databases to prevent unauthorized access to sensitive information.
Compromised Data Types
Country
India
Language
English
Password Storage
No Passwords
Category
Gaming
Indexed On
Oct 21, 2024
Breach Type
Database
What Should You Do?
Get Full Breach Details with LeakedSource Pro
Sign up for a LeakedSource Pro account to see exactly what data was exposed in this breach and get real-time notifications when your information appears in new breaches.
Sign Up for Pro- Watch for phishing emails targeting your inbox. Attackers may use your exposed email address to send convincing scam messages.
- Enable two-factor authentication (2FA) on all important accounts to add an extra layer of security.
- Use a password manager to generate and store unique, strong passwords for every account.
Were You Affected by This Breach?
Enter your email below to instantly check if your data was compromised in the Digimon breach and 12,000+ other known breaches.