A decent resource for regional research, but don’t expect high "live" ratios. It is a standard credential-stuffing list that has likely been circulated before.
The "Germany" targeting is accurate, featuring a high density of local providers like T-Online.de, GMX.de, Web.de, and Freenet.de . However, like many public or semi-public leaks of this size (23k), the hit rate is mixed. During a random sample check, approximately 15-20% of the accounts remained active, while many others have since triggered password resets or implemented 2FA (Two-Factor Authentication).
The file is delivered as a standard .txt list, typically formatted in the email:password or user:pass combo style. The data is clean with minimal corruption or duplicate entries, making it easy to import into most verification tools.
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.