📷 ︎ Fotostrana.ru (parsing)

36.8M total records 36.8M unique accounts

About this breach

FOTOSTRANA - Russian dating site. In 2022, all user data were collected from him using parsing, a base of 80 million lines was obtained. After removing duplicates and empty pages, the remaining 36 million records. The data include the names, date of birth, city of residence, gender, description and link to the avatar and user profile.

Compromised Data

This breach exposed the following types of personal information:

👤
Full name
36.8M
100% of accounts

Total data points: 36.8M

Unique accounts affected: 36.8M

🔐 What should I do?

  • Change your password immediately if you had an account
  • Enable two-factor authentication where possible
  • Monitor your accounts for suspicious activity
  • Be aware of potential phishing attempts

📊 Data Classes

👤 Full name

API Access

Get information about this breach programmatically:

GET https://data-wells.niamonx.io/api/breach/-Fotostrana.ru-parsing