📷 ︎ Fotostrana.ru (parsing)
About this breach
FOTOSTRANA - Russian dating site. In 2022, all user data were collected from him using parsing, a base of 80 million lines was obtained. After removing duplicates and empty pages, the remaining 36 million records. The data include the names, date of birth, city of residence, gender, description and link to the avatar and user profile.
Compromised Data
This breach exposed the following types of personal information:
Full name
36.8M
100% of accounts
Total data points: 36.8M
Unique accounts affected: 36.8M
🔐 What should I do?
- Change your password immediately if you had an account
- Enable two-factor authentication where possible
- Monitor your accounts for suspicious activity
- Be aware of potential phishing attempts
📊 Data Classes
👤 Full name
API Access
Get information about this breach programmatically:
GET https://data-wells.niamonx.io/api/breach/-Fotostrana.ru-parsing