Anti Public Data Breach
Anti Public Combo List: 1.1 Billion Stolen Email & Password Pairs Used for Credential Stuffing
Risk Interpretation
Extremely high risk of account takeover across multiple services due to password reuse. Enables large-scale automated attacks and identity compromise.
Impact & Downstream Threats
The breach impact was severe because Anti Public turned previously scattered compromised credentials into an immediately operational attack dataset. Have I Been Pwned says the list contained about 458 million unique email addresses, many paired with multiple passwords from different incidents, and that it was broadly circulated for credential stuffing. That made it highly effective for automated account takeover, password reuse exploitation, spam targeting, and follow-on compromise across unrela
- Credential stuffing against reused passwords across other platforms
- Targeted phishing campaigns using exposed email addresses
Threat Vectors
Breach Intelligence
Executive Summary
The Anti Public Combo List was not a breach of a single company but a massive aggregation of stolen credentials compiled from dozens of prior incidents, including breaches at Adobe, Dropbox, LinkedIn, and Yahoo. Assembled and circulated by unknown actors in late 2016, the list contained approximately 458 million unique email addresses, many paired with multiple passwords harvested from different sources. It spread rapidly across hacker forums and dark web marketplaces, making it freely accessible to virtually anyone with malicious intent. The data exposed consisted of email addresses and their associated passwords. Because many people reuse the same password across multiple accounts, a single leaked credential pair can unlock banking portals, email inboxes, social media accounts, and workplace systems simultaneously. The Anti Public list was purpose-built for credential stuffing, an attack method where automated tools test stolen email-password combinations against login pages at scale, often processing millions of attempts per hour. No single organization faced regulatory action tied specifically to this compilation, since it drew from many separate incidents rather than one identifiable source. Have I Been Pwned, the widely used breach notification service, indexed the dataset so individuals could check their own exposure. For affected users, the practical risk remains active today: any account where a listed password is still in use is vulnerable to automated takeover. Changing reused passwords and enabling two-factor authentication are the most effective steps to reduce that risk.
About Anti Public
Anti Public is the name attached to a massive credential compilation and combo-list ecosystem built around aggregating email and password pairs from many prior breaches into a single reusable corpus for validation, resale, and automated abuse.
Why They Hold Your Data
Credential compilations aggregate login pairs from numerous breaches, creating centralized datasets optimized for automated abuse.
Recent Developments
Anti Public is best understood as an early landmark in the industrialization of combo lists rather than as an ongoing organization with a normal corporate lifecycle. Public reporting and later coverage of credential-stuffing markets show how the model it represented evolved into a broader combolist economy, where massive reused credential sets became a routine input for automated account testing and takeover campaigns.
Data Points Exposed
Canonical Fields
email_address, password
Dark Web Verification
- Dataset containing ~1.1B records identified in breach intelligence sources
- Data indexed and searchable across breach notification platforms
- Source: Anti Public Combo List Data Breach;; anti-public-2016
Recommended Actions
⚠️ Do not assume this is low sensitivity.
Protect Yourself
Check If You’re Affected
Enter your email to check if your data appears in this breach.
Get Free Breach Alerts
Be the first to know when new breaches are disclosed.
High-Risk? Get an Exposure Audit
Full-spectrum exposure audits for executives and public figures.
ObscureIQ Advisory
We combine proprietary dark web access with commercial and restricted breach intelligence to verify exposure and assess real-world risk.
- A public-facing individual
- A high-profile executive
- A customer of Anti Public
- Or concerned about credential reuse
Powered by the ObscureIQ Breach Intelligence Database
© 2026 ObscureIQ · All Rights Reserved · Data Licensing
Latest from ObscureIQ
What Is Credit Monitoring? And Do I Want It? (Answer: Not Really)
Lock Down Browsers. Wipe Employee Footprints. Win Breach Wars.
Sextortion Spam
