Breach Database Statistics
Compromised Sources
How was this data obtained?
Based on documented correspondence, the perpetrators used the term "hacking" to describe their methods. The volume of data obtained (43,308 emails) suggests unauthorized access beyond simple public scraping. The affected sites did not authorize this data collection, which violated both their terms of service and potentially involved unauthorized system access. A whistle-blower made this data available to us so we can help the victims.
Documented Evidence
View the correspondence between Mesika and the hacker Roy Zaltsman
If you've ever registered on any of these trusted magic community sites, your email was likely stolen without permission. Additionally, evidence suggests a major distributor continues to share customer data with Mesika, expanding his database well beyond the initial 2013 breach. This explains any unsolicited marketing you may be receiving.
Secure Email Lookup Tool
Check if your email was compromised in the breach. Use wildcards (*) to maintain privacy - replace any character with * to avoid revealing your full address. The "Anonymize" button will randomly mask a character for you. We do NOT store or log your email!
Try it first with sample addresses:
Take Action
Help protect the magic community. Complain to major distributors and request the removal of products from someone who violated our trust and privacy.
By sending emails through your mail client, you are acting on your own behalf as a concerned consumer. We merely facilitate contact with appropriate business representatives.
Lookup Tool Privacy Protection
Lookup Tool Technical Security
Our privacy-first architecture ensures your searches remain completely anonymous:
- Your actual email address is never stored - only success/failure results are logged
- Rate limiting prevents automated attacks and protects the service
- Wildcard searches processed client-side - partial queries never leave your device
- Anonymous usage statistics help maintain service reliability