____ _ _ | _ \ _____ _| |__ (_)_ __ | | | |/ _ \ \/ / '_ \| | '_ \ | |_| | (_) > <| |_) | | | | | |____/ \___/_/\_\_.__/|_|_| |_|
Title:Lisa holmes DOX
Created:May 25th, 2024
Created by: Holmes_Family
Views: 446
Comments: 2
Username: Anonymous - (Login)
Please note that all posted information is publicly available and must follow our TOS.
_______ / \ $$$$$$$ | ______ ______ _______ ______ _______ $$ |__$$ | / \ / \ / | / \ / \ $$ $$< /$$$$$$ | $$$$$$ |/$$$$$$$/ /$$$$$$ |$$$$$$$ | $$$$$$$ |$$ $$ | / $$ |$$ \ $$ | $$ |$$ | $$ | $$ | $$ |$$$$$$$$/ /$$$$$$$ | $$$$$$ |$$ \__$$ |$$ | $$ | $$ | $$ |$$ |$$ $$ |/ $$/ $$ $$/ $$ | $$ | $$/ $$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ $$$$$$/ $$/ $$/ Her son is a disgusting pedophile, here is the proof: https://www.youtube.com/watch?v=f8jmV226D0s&pp=ygUdbWFyc2hhbGwgbWF0aGVycyB0aGUgNHRoIHBlZG8%3D https://www.youtube.com/watch?v=5mhaIuGIzSU&t=1132s https://www.youtube.com/watch?v=1tCpQd-Tvo0&t=369s CONTACT EVERYONE LISTED, THE NEIGHBORS, THE CHURCH, AND FAMILY THAT HE IS A PEDO __ __ / | / | $$ |____ ______ _______ $$/ _______ $$ \ / \ / |/ | / | $$$$$$$ | $$$$$$ |/$$$$$$$/ $$ |/$$$$$$$/ $$ | $$ | / $$ |$$ \ $$ |$$ | $$ |__$$ |/$$$$$$$ | $$$$$$ |$$ |$$ \_____ $$ $$/ $$ $$ |/ $$/ $$ |$$ | $$$$$$$/ $$$$$$$/ $$$$$$$/ $$/ $$$$$$$/ Lisa A Holmes Age 58, Born November 1965 Lives in Gowen, MI (616) 225-1046 November 12, 1965 __ __ / | / | ______ ____$$ | ____$$ | ______ ______ _______ _______ / \ / $$ | / $$ | / \ / \ / |/ | $$$$$$ |/$$$$$$$ |/$$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$$//$$$$$$$/ / $$ |$$ | $$ |$$ | $$ |$$ | $$/ $$ $$ |$$ \$$ \ /$$$$$$$ |$$ \__$$ |$$ \__$$ |$$ | $$$$$$$$/ $$$$$$ |$$$$$$ | $$ $$ |$$ $$ |$$ $$ |$$ | $$ |/ $$// $$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ $$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ 17299 Sorensen Ave Gowen, MI 49326 $230,000 | 1 Bath | 1456 Sq Ft | Built 1995 Kent County (Jul 2013 - May 2024) __ / | _______ __ __ _____ ____ $$ |____ ______ ______ _______ / \ / | / |/ \/ \ $$ \ / \ / \ / | $$$$$$$ |$$ | $$ |$$$$$$ $$$$ |$$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$$/ $$ | $$ |$$ | $$ |$$ | $$ | $$ |$$ | $$ |$$ $$ |$$ | $$/ $$ \ $$ | $$ |$$ \__$$ |$$ | $$ | $$ |$$ |__$$ |$$$$$$$$/ $$ | $$$$$$ | $$ | $$ |$$ $$/ $$ | $$ | $$ |$$ $$/ $$ |$$ | / $$/ $$/ $$/ $$$$$$/ $$/ $$/ $$/ $$$$$$$/ $$$$$$$/ $$/ $$$$$$$/ (616) 225-1046 - Landline Possible Primary Phone Last reported Apr 2024 Ameritech Michigan (616) 225-7924 - Landline Last reported Apr 2021 Ameritech Michigan (616) 234-0094 - Landline Last reported Jun 2004 Ameritech Michigan (231) 670-2692 - Wireless Last reported Dec 2023 Verizon Wireless (517) 743-1473 - Wireless Last reported Mar 2024 Verizon Wireless (609) 774-0519 - Wireless Last reported Mar 2016 Verizon Wireless __ __ / |/ | ______ _____ ____ ______ $$/ $$ | _______ / \ / \/ \ / \ / |$$ | / | /$$$$$$ |$$$$$$ $$$$ | $$$$$$ |$$ |$$ |/$$$$$$$/ $$ $$ |$$ | $$ | $$ | / $$ |$$ |$$ |$$ \ $$$$$$$$/ $$ | $$ | $$ |/$$$$$$$ |$$ |$$ | $$$$$$ | $$ |$$ | $$ | $$ |$$ $$ |$$ |$$ |/ $$/ $$$$$$$/ $$/ $$/ $$/ $$$$$$$/ $$/ $$/ $$$$$$$/ 587687@yahoo.com amy_beth6092000@yahoo.com __ / | ______ ______ _______ _______ __ __ __ ______ ______ ____$$ | _______ / \ / \ / |/ |/ | / | / | / \ / \ / $$ | / | /$$$$$$ | $$$$$$ |/$$$$$$$//$$$$$$$/ $$ | $$ | $$ |/$$$$$$ |/$$$$$$ |/$$$$$$$ |/$$$$$$$/ $$ | $$ | / $$ |$$ \$$ \ $$ | $$ | $$ |$$ | $$ |$$ | $$/ $$ | $$ |$$ \ $$ |__$$ |/$$$$$$$ | $$$$$$ |$$$$$$ |$$ \_$$ \_$$ |$$ \__$$ |$$ | $$ \__$$ | $$$$$$ | $$ $$/ $$ $$ |/ $$// $$/ $$ $$ $$/ $$ $$/ $$ | $$ $$ |/ $$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ $$$$$/$$$$/ $$$$$$/ $$/ $$$$$$$/ $$$$$$$/ $$ | $$ | $$/ bambam15 fe753acb7986063bb95f0f2bebe8694a2eca02bc f3658**** 0a889170af4e039104c03c0aa5d1a926806fe2d9 zaccy******** d505a779d5b38affe71fa7d30e07e968030f2356 Bamba***** 94341df8c4862d9e9727ed04f5da47a3bd511806 __ / | ______ ______ ______ __ __ $$/ ______ __ __ _______ / \ / \ / \ / \ / |/ | / \ / | / | / | /$$$$$$ |/$$$$$$ |/$$$$$$ |$$ \ /$$/ $$ |/$$$$$$ |$$ | $$ |/$$$$$$$/ $$ | $$ |$$ | $$/ $$ $$ | $$ /$$/ $$ |$$ | $$ |$$ | $$ |$$ \ $$ |__$$ |$$ | $$$$$$$$/ $$ $$/ $$ |$$ \__$$ |$$ \__$$ | $$$$$$ | $$ $$/ $$ | $$ | $$$/ $$ |$$ $$/ $$ $$/ / $$/ $$$$$$$/ $$/ $$$$$$$/ $/ $$/ $$$$$$/ $$$$$$/ $$$$$$$/ $$ | $$ | $$/ 615 W High St, Greenville, MI, 48838-2222 Associated with Tom Trompen (2023) + 8 Period of residence 2015-2017 #2 Previous address 8864 Fieldview Dr, Greenville, MI, 48838-8788 Associated with Pamela L Snyder (2021-2023) + 12 Period of residence 2015 #3 Previous address 219 W Orange St, Greenville, MI, 48838-1723 Associated with Angeline M Harper (2019, 2022-2023) + 6 Period of residence 2013-2019 #4 Previous address 17201 Montcalm Ave NE, Gowen, MI, 49326 No Associated People Period of residence 2013-2016 #5 Previous address 1252 Vining Rd, Greenville, MI, 48838-9282 Associated with Heather M Ferman (2019-2023) + 10 Period of residence 2013 #6 Previous address 10824 16 Mile Rd NE, Cedar Springs, MI, 49319-8755 Associated with Mariano Coronado-vera (2023) + 9 Period of residence 2010-2016 #7 Previous address 719 Veto St NW, Grand Rapids, MI, 49504-6311 Associated with Joshua K Glazier (2021) + 5 Period of residence 2005-2010 #8 Previous address 1252 Vining Rd, Apt G, Greenville, MI, 48838-9282 No Associated People Period of residence 2004-2018 #9 Previous address 1124 Sibley St NW, Grand Rapids, MI, 49504-5460 Associated with Molly R Patrick (2020-2021) + 17 Period of residence 2003-2005 #10 Previous address 1611 Honeybrook Dr, Jenison, MI, 49428-9552 No Associated People Period of residence 2001-2006 #11 Previous address 1 Nettlesworth Way NE, Grand Rapids, MI, 49546-1336 No Associated People Period of residence 2001 #12 Previous address PO Box 3194, Grand Rapids, MI, 49501-3194 No Associated People Period of residence 1997-1999 #13 Previous address PO Box 664, Skillman, NJ, 08558 No Associated People Period of residence 1997 #14 Previous address 777 Cherry Hill Rd, Princeton, NJ, 08540-7610 Associated with Eric R Braverman (2019-2023) + 2 Period of residence 1996-1998 #15 Previous address 2156 Maria Ct, Arcata, CA, 95521-9627 Associated with Mary A Campfield (2015) + 18 Period of residence 1996-1997 #16 Previous address 6585 Balsam Dr, Apt 102, Hudsonville, MI, 49426-9235 Associated with Lynn M Helmke (2022-2023) + 29 Period of residence 1992-2016 #17 Previous address 4406 Tracemeadow Dr, Houston, TX, 77066-4021 Associated with Martha L Menchu Mendoza (2023) + 11 Period of residence 1992-1996 #18 Previous address 6585 Balsam Dr, Apt K102, Hudsonville, MI, 49426-9274 No Associated People Period of residence 1992-1995 #19 Previous address 5412 Deep Forest Dr, Houston, TX, 77092-2327 Associated with Kristine L Gripp (2012) + 13 Period of residence 1991-1996 #20 Previous address 25510 Brookhaven St, Apt 289, Spring, TX, 77386-1328 Associated with Rae A Ingram (2018) + 29 Period of residence 1990-1996 #21 Previous address 4105 Traomeadow Dr, Houston, TX, 77065 No Associated People Period of residence 1990 __ __ __ __ __ / | / |/ |/ | / | $$ | ______ _______ ____$$ |$$ |$$/ _______ ______ _______ __ __ _____ ____ $$ |____ ______ ______ _______ $$ | / \ / \ / $$ |$$ |/ |/ \ / \ / \ / | / |/ \/ \ $$ \ / \ / \ / | $$ | $$$$$$ |$$$$$$$ |/$$$$$$$ |$$ |$$ |$$$$$$$ |/$$$$$$ | $$$$$$$ |$$ | $$ |$$$$$$ $$$$ |$$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$$/ $$ | / $$ |$$ | $$ |$$ | $$ |$$ |$$ |$$ | $$ |$$ $$ | $$ | $$ |$$ | $$ |$$ | $$ | $$ |$$ | $$ |$$ $$ |$$ | $$/ $$ \ $$ |/$$$$$$$ |$$ | $$ |$$ \__$$ |$$ |$$ |$$ | $$ |$$$$$$$$/ $$ | $$ |$$ \__$$ |$$ | $$ | $$ |$$ |__$$ |$$$$$$$$/ $$ | $$$$$$ | $$ |$$ $$ |$$ | $$ |$$ $$ |$$ |$$ |$$ | $$ |$$ | $$ | $$ |$$ $$/ $$ | $$ | $$ |$$ $$/ $$ |$$ | / $$/ $$/ $$$$$$$/ $$/ $$/ $$$$$$$/ $$/ $$/ $$/ $$/ $$$$$$$/ $$/ $$/ $$$$$$/ $$/ $$/ $$/ $$$$$$$/ $$$$$$$/ $$/ $$$$$$$/ (616) 225-1046 Associated with Scott L Holmes (2003, 2012) Seen 2004-2018 (616) 774-0519 Associated with Mark C Hemmes (2016) Seen 2016 (616) 669-8326 No Associated People Seen 2016 (616) 457-0370 Associated with Barbara L Ludden (1993) Seen 2016 (616) 225-7924 Associated with Craig D Rohn (2016), Hannah L Blatt (2014) + 2 Seen 2005-2016 (616) 234-0094 Associated with David M Swacina (2008, 2012), Peter J Swacina (2007, 2017) (616) 225-1046 - Landline Possible Primary Phone Last reported Apr 2024 Ameritech Michigan (616) 225-7924 - Landline Last reported Apr 2021 Ameritech Michigan (616) 234-0094 - Landline Last reported Jun 2004 Ameritech Michigan (231) 670-2692 - Wireless Last reported Dec 2023 Verizon Wireless (517) 743-1473 - Wireless Last reported Mar 2024 Verizon Wireless (609) 774-0519 - Wireless Last reported Mar 2016 Verizon Wireless __ __ __ / | / | / | ______ ______ $$ | ______ _$$ |_ $$/ __ __ ______ _______ / \ / \ $$ | / \ / $$ | / |/ \ / |/ \ / | /$$$$$$ |/$$$$$$ |$$ | $$$$$$ |$$$$$$/ $$ |$$ \ /$$//$$$$$$ |/$$$$$$$/ $$ | $$/ $$ $$ |$$ | / $$ | $$ | __ $$ | $$ /$$/ $$ $$ |$$ \ $$ | $$$$$$$$/ $$ |/$$$$$$$ | $$ |/ |$$ | $$ $$/ $$$$$$$$/ $$$$$$ | $$ | $$ |$$ |$$ $$ | $$ $$/ $$ | $$$/ $$ |/ $$/ $$/ $$$$$$$/ $$/ $$$$$$$/ $$$$/ $$/ $/ $$$$$$$/ $$$$$$$/ Alana Rickard Age 56 Barbara Ludden Age 81 Eric Ludden Age 52 Erica Holmes Age 31 Erica Holmes Age 31 Esther Holmes Age 84 Isaac Holmes Age 27 Jonah Holmes Age 24 Jonah Holmes Age 24 Julie Ludden Age 56 Noah Holmes Age 24 Peter Vanderveen __ __ __ / | / | / | _______ ______ $$/ ______ $$ |____ $$ |____ ______ ______ _______ / \ / \ / | / \ $$ \ $$ \ / \ / \ / | $$$$$$$ |/$$$$$$ |$$ |/$$$$$$ |$$$$$$$ |$$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$$/ $$ | $$ |$$ $$ |$$ |$$ | $$ |$$ | $$ |$$ | $$ |$$ | $$ |$$ | $$/ $$ \ $$ | $$ |$$$$$$$$/ $$ |$$ \__$$ |$$ | $$ |$$ |__$$ |$$ \__$$ |$$ | $$$$$$ | $$ | $$ |$$ |$$ |$$ $$ |$$ | $$ |$$ $$/ $$ $$/ $$ | / $$/ $$/ $$/ $$$$$$$/ $$/ $$$$$$$ |$$/ $$/ $$$$$$$/ $$$$$$/ $$/ $$$$$$$/ / \__$$ | $$ $$/ $$$$$$/ Ken Bissell 16700 Sorensen Ave Patricia A Docter 17260 Sorensen Ave James H Docter 17260 Sorensen Ave Taylor A Docter 17260 Sorensen Ave David D Hernandez 17275 Sorensen Ave Lori Hernandez 17275 Sorensen Ave Carri J Hernandez 17275 Sorensen Ave Zachary D Hernandez 17275 Sorensen Ave Amanda J Allen 17300 Sorensen Ave Penny C Allen 17300 Sorensen Ave Dennis D Allen 17300 Sorensen Ave Linda L Balkema 17701 Sorensen Ave Robert F Post 17701 Sorensen Ave Timothy J Denboer 17701 Sorensen Ave Linda L Denboer 17701 Sorensen Ave Travis Denboer 17701 Sorensen Ave Michael B Milanowski 17701 Sorensen Ave 13 __ __ / | / | _______ ______ _______ $$/ ______ $$ | _______ / | / \ / |/ | / \ $$ | / | /$$$$$$$/ /$$$$$$ |/$$$$$$$/ $$ | $$$$$$ |$$ |/$$$$$$$/ $$ \ $$ | $$ |$$ | $$ | / $$ |$$ |$$ \ $$$$$$ |$$ \__$$ |$$ \_____ $$ |/$$$$$$$ |$$ | $$$$$$ | / $$/ $$ $$/ $$ |$$ |$$ $$ |$$ |/ $$/ $$$$$$$/ $$$$$$/ $$$$$$$/ $$/ $$$$$$$/ $$/ $$$$$$$/ https://www.facebook.com/public/Lisa%20A%20Holmes%20gowen https://www.linkedin.com/pub/dir/?first=lisa&last=holmes __ __ __ / | / |/ | _____ ____ ______ $$ |____ $$/ $$ | ______ / \/ \ / \ $$ \ / |$$ | / \ $$$$$$ $$$$ |/$$$$$$ |$$$$$$$ |$$ |$$ |/$$$$$$ | $$ | $$ | $$ |$$ | $$ |$$ | $$ |$$ |$$ |$$ $$ | $$ | $$ | $$ |$$ \__$$ |$$ |__$$ |$$ |$$ |$$$$$$$$/ $$ | $$ | $$ |$$ $$/ $$ $$/ $$ |$$ |$$ | $$/ $$/ $$/ $$$$$$/ $$$$$$$/ $$/ $$/ $$$$$$$/ (231) 670-2692 Associated with Sarah J Brown (2010, 2018) Seen 2013-2023 (609) 774-0519 Associated with Patricia S Voorhees (2013-2014), Elizabeth A Loomis (1999, 2018) Seen 2016 __ __ / | / | ______ _______ _______ ______ _______ $$/ ______ _$$ |_ ______ _______ / \ / |/ | / \ / |/ | / \ / $$ | / \ / | $$$$$$ |/$$$$$$$//$$$$$$$/ /$$$$$$ |/$$$$$$$/ $$ | $$$$$$ |$$$$$$/ /$$$$$$ |/$$$$$$$/ / $$ |$$ \$$ \ $$ | $$ |$$ | $$ | / $$ | $$ | __ $$ $$ |$$ \ /$$$$$$$ | $$$$$$ |$$$$$$ |$$ \__$$ |$$ \_____ $$ |/$$$$$$$ | $$ |/ |$$$$$$$$/ $$$$$$ | $$ $$ |/ $$// $$/ $$ $$/ $$ |$$ |$$ $$ | $$ $$/ $$ |/ $$/ $$$$$$$/ $$$$$$$/ $$$$$$$/ $$$$$$/ $$$$$$$/ $$/ $$$$$$$/ $$$$/ $$$$$$$/ $$$$$$$/ Alicynne Glazier Age 39 Isaiah Bright Age 25 John Snyder Age 77 Christine Lemming Age 69 Brian Smith Age 65 Gregory Smith Age 48 Jennifer Cilker Age 60 Julie Pelster Age 69 Robert Rickard Age 69 __ __ __ __ __ / | / | / | / |/ | ______ ______ ______ ______ ______ ______ _$$ |_ __ __ ____$$ | ______ _$$ |_ ______ $$/ $$ | _______ / \ / \ / \ / \ / \ / \ / $$ | / | / | / $$ | / \ / $$ | / \ / |$$ | / | /$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$ |/$$$$$$ |$$$$$$/ $$ | $$ | /$$$$$$$ |/$$$$$$ |$$$$$$/ $$$$$$ |$$ |$$ |/$$$$$$$/ $$ | $$ |$$ | $$/ $$ | $$ |$$ | $$ |$$ $$ |$$ | $$/ $$ | __ $$ | $$ | $$ | $$ |$$ $$ | $$ | __ / $$ |$$ |$$ |$$ \ $$ |__$$ |$$ | $$ \__$$ |$$ |__$$ |$$$$$$$$/ $$ | $$ |/ |$$ \__$$ | $$ \__$$ |$$$$$$$$/ $$ |/ |/$$$$$$$ |$$ |$$ | $$$$$$ | $$ $$/ $$ | $$ $$/ $$ $$/ $$ |$$ | $$ $$/ $$ $$ | $$ $$ |$$ | $$ $$/ $$ $$ |$$ |$$ |/ $$/ $$$$$$$/ $$/ $$$$$$/ $$$$$$$/ $$$$$$$/ $$/ $$$$/ $$$$$$$ | $$$$$$$/ $$$$$$$/ $$$$/ $$$$$$$/ $$/ $$/ $$$$$$$/ $$ | $$ | / \__$$ | $$ | $$ | $$ $$/ $$/ $$/ $$$$$$/ Bedrooms N/A Bathrooms 1 Square Feet 1,456 Year Built 1995 Estimated Value $230,000 Estimated Equity $-6,626 Last Sale Amount $151,000 Last Sale Date 12/18/2018 Occupancy Type Owner Occupied Ownership Type Related Land Use Single Family Residential Property Class Residential Subdivision N/A Lot Square Feet 341,075 APN 41-04-02-376-003 School District Lakeview Community Schools __ __ __ __ / | / | / | / | ____$$ | ______ _$$ |_ ______ $$ | ______ ______ $$ | __ _______ / $$ | / \ / $$ | / \ $$ | / \ / \ $$ | / | / | /$$$$$$$ | $$$$$$ |$$$$$$/ $$$$$$ | $$ |/$$$$$$ | $$$$$$ |$$ |_/$$/ /$$$$$$$/ $$ | $$ | / $$ | $$ | __ / $$ | $$ |$$ $$ | / $$ |$$ $$< $$ \ $$ \__$$ |/$$$$$$$ | $$ |/ |/$$$$$$$ | $$ |$$$$$$$$/ /$$$$$$$ |$$$$$$ \ $$$$$$ | $$ $$ |$$ $$ | $$ $$/ $$ $$ | $$ |$$ |$$ $$ |$$ | $$ |/ $$/ $$$$$$$/ $$$$$$$/ $$$$/ $$$$$$$/ $$/ $$$$$$$/ $$$$$$$/ $$/ $$/ $$$$$$$/ {"email": "587687@yahoo.com", "reputation": "high", "suspicious": false, "references": 7, "details": {"blacklisted": false, "malicious_activity": false, "malicious_activity_recent": false, "credentials_leaked": true, "credentials_leaked_recent": false, "data_breach": true, "first_seen": "01/01/2017", "last_seen": "03/04/2020", "domain_exists": true, "domain_reputation": "n/a", "new_domain": false, "days_since_domain_creation": 10719, "suspicious_tld": false, "spam": false, "free_provider": true, "disposable": false, "deliverable": false, "accept_all": false, "valid_mx": true, "primary_mx": "mta5.am0.yahoodns.net", "spoofable": true, "spf_strict": false, "dmarc_enforced": false, "profiles": ["twitter"]}, "logos": ["./assets/img/profiles/twitter-logo.png"], "company_logo": "", "explainer": "Not suspicious. This email is likely not deliverable. This email address has been seen in 7 reputable sources on the internet, including Twitter. It has been seen in data breaches or credential leaks dating back to 01/01/2017, but not since 03/04/2020. We've observed no malicious or suspicious activity from this address. "} Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles Lead Hunter logo Lead Hunter: In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses Onliner Spambot logo Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moÊžuÆŽq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump. Compromised data: Email addresses, Passwords River City Media Spam List logo River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses Verifications.io logo Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses Data Enrichment Exposure From PDL Customer logo Data Enrichment Exposure From PDL Customer: In October 2019, security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data. The exposed data included an index indicating it was sourced from data enrichment company People Data Labs (PDL) and contained 622 million unique email addresses. The server was not owned by PDL and it's believed a customer failed to properly secure the database. Exposed information included email addresses, phone numbers, social media profiles and job history data. Compromised data: Email addresses, Employers, Geographic locations, Job titles, Names, Phone numbers, Social media profiles Lead Hunter logo Lead Hunter: In March 2020, a massive trove of personal information referred to as "Lead Hunter" was provided to HIBP after being found left exposed on a publicly facing Elasticsearch server. The data contained 69 million unique email addresses across 110 million rows of data accompanied by additional personal information including names, phone numbers, genders and physical addresses. At the time of publishing, the breach could not be attributed to those responsible for obtaining and exposing it. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses Onliner Spambot logo Onliner Spambot (spam list): In August 2017, a spambot by the name of Onliner Spambot was identified by security researcher Benkow moÊžuÆŽq. The malicious software contained a server-based component located on an IP address in the Netherlands which exposed a large number of files containing personal information. In total, there were 711 million unique email addresses, many of which were also accompanied by corresponding passwords. A full write-up on what data was found is in the blog post titled Inside the Massive 711 Million Record Onliner Spambot Dump. Compromised data: Email addresses, Passwords River City Media Spam List logo River City Media Spam List (spam list): In January 2017, a massive trove of data from River City Media was found exposed online. The data was found to contain almost 1.4 billion records including email and IP addresses, names and physical addresses, all of which was used as part of an enormous spam operation. Once de-duplicated, there were 393 million unique email addresses within the exposed data. Compromised data: Email addresses, IP addresses, Names, Physical addresses Verifications.io logo Verifications.io: In February 2019, the email address validation service verifications.io suffered a data breach. Discovered by Bob Diachenko and Vinny Troia, the breach was due to the data being stored in a MongoDB instance left publicly facing without a password and resulted in 763 million unique email addresses being exposed. Many records within the data also included additional personal attributes such as names, phone numbers, IP addresses, dates of birth and genders. No passwords were included in the data. The Verifications.io website went offline during the disclosure process, although an archived copy remains viewable. Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addresses Acuity logo Acuity (spam list): In mid-2020, a 437GB corpus of data attributed to an entity named "Acuity" was created and later extensively distributed. However, the source could not be confidently verified as any known companies named Acuity. The data totalled over 14M unique email addresses with each row containing extensive personal information across more than 400 columns of data including names, phone numbers, physical addresses, genders and dates of birth. Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Phone numbers, Physical addresses, Salutations Anti Public Combo List logo Anti Public Combo List (unverified): In December 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Anti Public". The list contained 458 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. Compromised data: Email addresses, Passwords Cit0day logo Cit0day (unverified): In November 2020, a collection of more than 23,000 allegedly breached websites known as Cit0day were made available for download on several hacking forums. The data consisted of 226M unique email address alongside password pairs, often represented as both password hashes and the cracked, plain text versions. Independent verification of the data established it contains many legitimate, previously undisclosed breaches. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Passwords ClearVoice Surveys logo ClearVoice Surveys: In April 2021, the market research surveys company ClearVoice Surveys had a publicly facing database backup from 2015 taken and redistributed on a popular hacking forum. The data included 15M unique email addresses across more than 17M rows of data that also included names, physical and IP addresses, genders, dates of birth and plain text passwords. ClearVoice Surveys advised they were aware of the breach and confirmed its authenticity. Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Passwords, Phone numbers, Physical addresses Collection #1 logo Collection #1 (unverified): In January 2019, a large collection of credential stuffing lists (combinations of email addresses and passwords used to hijack accounts on other services) was discovered being distributed on a popular hacking forum. The data contained almost 2.7 billion records including 773 million unique email addresses alongside passwords those addresses had used on other breached services. Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach. Compromised data: Email addresses, Passwords Data & Leads logo Data & Leads: In November 2018, security researcher Bob Diachenko identified an unprotected database believed to be hosted by a data aggregator. Upon further investigation, the data was linked to marketing company Data & Leads. The exposed Elasticsearch instance contained over 44M unique email addresses along with names, IP and physical addresses, phone numbers and employment information. No response was received from Data & Leads when contacted by Bob and their site subsequently went offline. Compromised data: Email addresses, Employers, IP addresses, Job titles, Names, Phone numbers, Physical addresses Exactis logo Exactis: In June 2018, the marketing firm Exactis inadvertently publicly leaked 340 million records of personal data. Security researcher Vinny Troia of Night Lion Security discovered the leak contained multiple terabytes of personal information spread across hundreds of separate fields including addresses, phone numbers, family structures and extensive profiling data. The data was collected as part of Exactis' service as a "compiler and aggregator of premium business & consumer data" which they then sell for profiling and marketing purposes. A small subset of the exposed fields were provided to Have I Been Pwned and contained 132 million unique email addresses. Compromised data: Credit status information, Dates of birth, Education levels, Email addresses, Ethnicities, Family structure, Financial investments, Genders, Home ownership statuses, Income levels, IP addresses, Marital statuses, Names, Net worths, Occupations, Personal interests, Phone numbers, Physical addresses, Religions, Spoken languages Exploit.In logo Exploit.In (unverified): In late 2016, a huge list of email address and password pairs appeared in a "combo list" referred to as "Exploit.In". The list contained 593 million unique email addresses, many with multiple different passwords hacked from various online systems. The list was broadly circulated and used for "credential stuffing", that is attackers employ it in an attempt to identify other online systems where the account owner had reused their password. For detailed background on this incident, read Password reuse, credential stuffing and another billion records in Have I Been Pwned. Compromised data: Email addresses, Passwords Kayo.moe Credential Stuffing List logo Kayo.moe Credential Stuffing List (unverified): In September 2018, a collection of almost 42 million email address and plain text password pairs was uploaded to the anonymous file sharing service kayo.moe. The operator of the service contacted HIBP to report the data which, upon further investigation, turned out to be a large credential stuffing list. For more information, read about The 42M Record kayo.moe Credential Stuffing Data. Compromised data: Email addresses, Passwords MyFHA logo MyFHA: In approximately February 2015, the home financing website MyFHA suffered a data breach which disclosed the personal information of nearly 1 million people. The data included extensive personal information relating to home financing including personal contact info, credit statuses, household incomes, loan amounts and notes on personal circumstances, often referring to legal issues, divorces and health conditions. Multiple parties contacted HIBP with the data after which MyFHA was alerted in mid-July and acknowledged the legitimacy of the breach then took the site offline. Compromised data: Credit status information, Email addresses, Income levels, IP addresses, Loan information, Names, Passwords, Personal descriptions, Physical addresses MySpace logo MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public. Compromised data: Email addresses, Passwords, Usernames Not Acxiom logo Not Acxiom (unverified): In 2020, a corpus of data containing almost a quarter of a billion records spanning over 400 different fields was misattributed to database marketing company Acxiom and subsequently circulated within the hacking community. On review, Acxiom concluded that "the claims are indeed false and that the data, which has been readily available across multiple environments, does not come from Acxiom and is in no way the subject of an Acxiom breach". The data contained almost 52M unique email addresses. Compromised data: Email addresses, IP addresses, Names, Phone numbers, Physical addresses SC Daily Phone Spam List logo SC Daily Phone Spam List (spam list): In early 2015, a spam list known as SC Daily Phone emerged containing almost 33M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. Read more about spam lists in HIBP. Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses Special K Data Feed Spam List logo Special K Data Feed Spam List (spam list): In mid to late 2015, a spam list known as the Special K Data Feed was discovered containing almost 31M identities. The data includes personal attributes such as names, physical and IP addresses, genders, birth dates and phone numbers. Read more about spam lists in HIBP. Compromised data: Dates of birth, Email addresses, Genders, IP addresses, Names, Physical addresses Unverified Data Source logo Unverified Data Source (unverified): In January 2021, over 11M unique email addresses were discovered by Night Lion Security alongside an extensive amount of personal information including names, physical and IP addresses, phone numbers and dates of birth. Some records also contained social security numbers, driver's license details, personal financial information and health-related data, depending on where the information was sourced from. Initially attributed to Astoria Company, they subsequently investigated the incident and confirmed the data did not originate from their services. Compromised data: Bank account numbers, Credit status information, Dates of birth, Email addresses, Employers, Health insurance information, Income levels, IP addresses, Names, Personal health data, Phone numbers, Physical addresses, Smoking habits, Social security numbers Zynga logo Zynga: In September 2019, game developer Zynga (the creator of Words with Friends) suffered a data breach. The incident exposed 173M unique email addresses alongside usernames and passwords stored as salted SHA-1 hashes. The data was provided to HIBP by dehashed.com. Compromised data: Email addresses, Passwords, Phone numbers, Usernames { "metadata": { "query": "amy_beth6092000@yahoo.com", "timestamp": "2024-05-25T22:33:20.879Z" }, "data": { "visitor": { "hibp": { "found": "21", "leaks": [ "Acuity (2020-06-18)", "Anti Public Combo List (2016-12-16)", "cit0day.in (2020-11-04)", "clearvoicesurveys.com (2015-08-23)", "Collection #1 (2019-01-07)", "datanleads.com (2018-11-14)", "Data Enrichment Exposure From PDL Customer (2019-10-16)", "exactis.com (2018-06-01)", "Exploit.In (2016-10-13)", "Kayo.moe Credential Stuffing List (2018-09-11)" ] }, "chess": true, "google": { "id": "112878110319444915760", "services": { "google_maps": "https://www.google.com/maps/contrib/112878110319444915760", "google_calendar": "https://calendar.google.com/calendar/u/0/embed?src=amy_beth6092000@yahoo.com", "google_plus_archive": "https://web.archive.org/web/*/plus.google.com/112878110319444915760*" } }, "skype": { "accounts": [ { "name": "Amy" } ] } } } } "query","timestamp","pack","module","pointer","value" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/found","21" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/0","Acuity (2020-06-18)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/1","Anti Public Combo List (2016-12-16)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/2","cit0day.in (2020-11-04)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/3","clearvoicesurveys.com (2015-08-23)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/4","Collection #1 (2019-01-07)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/5","datanleads.com (2018-11-14)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/6","Data Enrichment Exposure From PDL Customer (2019-10-16)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/7","exactis.com (2018-06-01)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/8","Exploit.In (2016-10-13)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","hibp","/leaks/9","Kayo.moe Credential Stuffing List (2018-09-11)" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","chess","","true" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","google","/id","112878110319444915760" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","google","/services/google_maps","https://www.google.com/maps/contrib/112878110319444915760" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","google","/services/google_calendar","https://calendar.google.com/calendar/u/0/embed?src=amy_beth6092000@yahoo.com" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","google","/services/google_plus_archive","https://web.archive.org/web/*/plus.google.com/112878110319444915760*" "amy_beth6092000@yahoo.com","2024-05-25T22:33:20.879Z","visitor","skype","/accounts/0/name","Amy" { "metadata": { "query": "587687@yahoo.com", "timestamp": "2024-05-25T22:37:42.638Z" }, "data": { "visitor": { "hibp": { "found": "5", "leaks": [ "Data Enrichment Exposure From PDL Customer (2019-10-16)", "Lead Hunter (2020-03-04)" ] } } } } "query","timestamp","pack","module","pointer","value" "587687@yahoo.com","2024-05-25T22:37:42.638Z","visitor","hibp","/found","5" "587687@yahoo.com","2024-05-25T22:37:42.638Z","visitor","hibp","/leaks/0","Data Enrichment Exposure From PDL Customer (2019-10-16)" "587687@yahoo.com","2024-05-25T22:37:42.638Z","visitor","hibp","/leaks/1","Lead Hunter (2020-03-04)" __ __ __ ______ / | / | / | / \ _______ $$ |____ __ __ ______ _______ $$ |____ $$/ _______ /$$$$$$ |______ / |$$ \ / | / | / \ / |$$ \ / |/ \ $$ |_ $$// \ /$$$$$$$/ $$$$$$$ |$$ | $$ |/$$$$$$ |/$$$$$$$/ $$$$$$$ | $$ |$$$$$$$ |$$ | /$$$$$$ | $$ | $$ | $$ |$$ | $$ |$$ | $$/ $$ | $$ | $$ | $$ |$$ | $$ |$$$$/ $$ | $$ | $$ \_____ $$ | $$ |$$ \__$$ |$$ | $$ \_____ $$ | $$ | $$ |$$ | $$ |$$ | $$ \__$$ | $$ |$$ | $$ |$$ $$/ $$ | $$ |$$ | $$ | $$ |$$ | $$ |$$ | $$ $$/ $$$$$$$/ $$/ $$/ $$$$$$/ $$/ $$$$$$$/ $$/ $$/ $$/ $$/ $$/ $$/ $$$$$$/ this is the church she goes to, LET THEM KNOW THAT LISA HOLMES SON IS A DISGUSTING PEDO!! AND LET THEM KNOW HER DAUGHTERS SUSIE AND ERICA ARE STRIPPERS AND ONLYFANS GIRL!!! church address: 10195 16 Mile Rd NE, Cedar Springs, MI 49319 Phone number: +16166963904 official website: http://www.dioceseofgrandrapids.org/
7 months ago
7 months ago