Foodora Database - Leaked, Download!
by valentin0 - May 19, 2020 at 04:21 AM
#1
Hello RaidForums Community,
Today I have uploaded the Foodora Database for you to download for free, thanks for reading and enjoy!


|Notes|
In 2019 the online food delivery website Foodora was breached which led to 727k users' informations being leaked. Among which are exact location data, passwords and email addresses.

Compromised data: Physical Addresses (With Latitude/Longitude), Email Addresses, First Names, Last Names, Website Activity, Phone Numbers, Passwords

ContentsSpoiler
This download consists of 14 country pairs of SQL files each pair contains a user and addressbook table for that country, passwords in this breach have mixed hashing as some records are bcrypt but others can be 'md5','bcrypt','sha1_lnr','sha512_volo','sha1_otlob','md5_salt_suppertime' as shown by the SQL table Structure. The .7z File's MD5 Hash is C364AC8C8394EF74838AEC4B13382597. Total record count of 727720.
Downloads Hidden Content
You must register or login to view this content.

Reply
#2
Thank you, a fun one.
Mainly western countries.
Reply
#3
total no of emails is approx. 580 k
Reply
#4
Such High Quality
Very thanks!
Reply
#5
thank you. this database is pure gold xD
Reply
#6
Thanks for the share man hope this data is legit
Reply
#7
This thread has been moved to the Official subforum.
This means the data has been verified and compressed by me assuring the smallest possible size furthermore it will be delivered by us and kept online indefinitely.


> Official Database Index <
Reply
#8
Hey, all! WHo has downloaded this? What data is in there?
Reply
#9
(May 31, 2020 at 08:59 AM)xperience Wrote: Hey, all! WHo has downloaded this? What data is in there?

Hi,
I've downloaded it. The directory listing/line count is:

398685 DE_CustomerAddress.sql
250324 DE_Customers.sql
149695 FR_CustomerAddress.sql
129460 AU_CustomerAddress.sql
111330 FR_Customers.sql
79053 AU_Customers.sql
78783 NL_CustomerAddress.sql
69228 CA_CustomerAddress.sql
52453 NO_CustomerAddress.sql
52298 AT_CustomerAddress.sql
49274 CA_Customers.sql
48441 NL_Customers.sql
45490 IT_CustomerAddress.sql
43883 FI_CustomerAddress.sql
41676 SE_CustomerAddress.sql
33213 NO_Customers.sql
31353 IT_Customers.sql
30515 AT_Customers.sql
26817 FI_Customers.sql
24776 SE_Customers.sql
12394 ES_CustomerAddress.sql
10129 ES_Customers.sql
5159 AE_CustomerAddress.sql
4038 HK_CustomerAddress.sql
2935 AE_Customers.sql
2824 HK_Customers.sql
461 SG_CustomerAddress.sql
313 SG_Customers.sql

hope, this answers your question
Reply
#10
(May 19, 2020 at 04:21 AM)valentin0 Wrote:
Hello RaidForums Community,
Today I have uploaded the Foodora Database for you to download for free, thanks for reading and enjoy!


|Notes|
In 2019 the online food delivery website Foodora was breached which led to 727k users' informations being leaked. Among which are exact location data, passwords and email addresses.

Compromised data: Physical Addresses (With Latitude/Longitude), Email Addresses, First Names, Last Names, Website Activity, Phone Numbers, Passwords

ContentsSpoiler
This download consists of 14 country pairs of SQL files each pair contains a user and addressbook table for that country, passwords in this breach have mixed hashing as some records are bcrypt but others can be 'md5','bcrypt','sha1_lnr','sha512_volo','sha1_otlob','md5_salt_suppertime' as shown by the SQL table Structure. The .7z File's MD5 Hash is C364AC8C8394EF74838AEC4B13382597. Total record count of 727720.
[Hidden Content]
really cool! tx


really cool, thanks a lot dude!
Reply
#11
Well this was confronting, seems like I shouldn't have ordered there.
Reply
#12
Great, but I need 8 credits to unlock it even if the author says it's free
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Adobe Database - Leaked, Download! Omnipotent 483 102,247 15 minutes ago
Last Post: bomboloide
Mathway Database - Leaked, Download! ShinyHunters 16 3,681 2 hours ago
Last Post: FuckYouXD
HTHStudios Database - Leaked, Download! Zeroxx 7 1,695 2 hours ago
Last Post: Goddd

 Users browsing this thread: 1 Guest(s)