🚥 Parkmobile

75.1M total records 30.9M unique accounts

About this breach

In March 2021, the Parkmobile parking service took a leak, due to which the data of 21 million customers opened. They turned on the mail, names, phones, cars and passwords in the form of Heshee Bcrypt.

Compromised Data

This breach exposed the following types of personal information:

📩
Email
30.9M
100% of accounts
🚘
Car number
20.6M
66.5% of accounts
🔑
Password
8.3M
26.8% of accounts
📞
Telephone
8M
25.8% of accounts
👤
Full name
6.9M
22.2% of accounts
👤
Nick
474.2k
1.5% of accounts

Total data points: 75.1M

Unique accounts affected: 30.9M

🔐 What should I do?

  • Change your password immediately if you had an account
  • Enable two-factor authentication where possible
  • Monitor your accounts for suspicious activity
  • Be aware of potential phishing attempts

📊 Data Classes

📩 Email 🚘 Car number 🔑 Password 📞 Telephone 👤 Full name 👤 Nick

API Access

Get information about this breach programmatically:

GET https://data-wells.niamonx.io/api/breach/Parkmobile