Full details on the incident and how to search the breached passwords are provided in the blog post The 773 Million Record "Collection #1" Data Breach.
Compromised data: Email addresses, Passwords

MySpace: In approximately 2008, MySpace suffered a data breach that exposed almost 360 million accounts. In May 2016 the data was offered up for sale on the "Real Deal" dark market website and included email addresses, usernames and SHA1 hashes of the first 10 characters of the password converted to lowercase and stored without a salt. The exact breach date is unknown, but analysis of the data suggests it was 8 years before being made public.
Compromised data: Email addresses, Passwords, Usernames

Pemiblanc (unverified): In April 2018, a credential stuffing list containing 111 million email addresses and passwords known as Pemiblanc was discovered on a French server. The list contained email addresses and passwords collated from different data breaches and used to mount account takeover attacks against other services. Read more about the incident.
Compromised data: Email addresses, Passwords

piZap: In approximately December 2017, the online photo editing site piZap suffered a data breach. The data was later placed up for sale on a dark web marketplace along with a collection of other data breaches in February 2019. A total of 42 million unique email addresses were included in the breach alongside names, genders and links to Facebook profiles when the social media platform was used to authenticate to piZap. When accounts were created directly on piZap without using Facebook for authentication, passwords stored as SHA-1 hashes were also exposed. The data was provided to HIBP by a source who requested it be attributed to "JimScott.Sec@protonmail.com".
Compromised data: Email addresses, Genders, Geographic locations, Names, Passwords, Social media profiles, Usernames, Website activity


Another BBBREACH:

breaches/breched_data/poshmark/Output.csv:35096122:titanic203876@gmail.com:carilynn203876:$2a$10$Vnp.7p1MzC7B4psFSQxTkeWV3CUwib4FeYUutqh72uDJD6UoHBV2i::

breaches/breched_data/poshmark/users.json:9950287:{ "_id" : { "$oid" : "5608982282aadc4bd5060169" }, "aggregates" : { "_id" : { "$oid" : "5608982382aadc4bd5060185" } }, "cover_shot" : { "_id" : { "$oid" : "5608982282aadc4bd506016a" }, "picture_filename" : "5608982282aadc4bd506016a.jpg", "path" : "users/2015/09/27/5608982282aadc4bd5060169/m_5608982282aadc4bd506016a.jpg", "path_small" : "users/2015/09/27/5608982282aadc4bd5060169/s_5608982282aadc4bd506016a.jpg", "path_thumb" : "users/2015/09/27/5608982282aadc4bd5060169/t_5608982282aadc4bd506016a.jpg", "content_type" : "image/jpeg", "created_at" : { "$date" : 1443403810527 } }, "created_at" : { "$date" : 1443403810527 }, "devices" : [ "and1:7186feb8a5526864" ], "email" : "titanic203876@gmail.com", "email_verified" : null, "first_name" : "Cari", "gen" : 0, "gender" : null, "last_name" : "Charnock", "passwd_hash" : "$2a$10$Vnp.7p1MzC7B4psFSQxTkeWV3CUwib4FeYUutqh72uDJD6UoHBV2i", "passwd_upd_at" : { "$date" : 1443403810611 }, "profile" : { "shoe_size" : "7", "dress_size" : "14", "city" : "Erie" }, "pv2" : { "desc" : "Erie" }, "reg_app" : "android", "reg_method" : "email", "seg" : { "sup" : "F" }, "sizes" : { "dr" : [ "14" ], "sh" : [ "7" ] }, "status" : "active", "username" : "carilynn203876" }

breaches/breched_data/poshmark/Output.csv:28413644:carilynn03@live.com:titanic203876:$2a$10$YJmvIES9w190CwuwLBkGeudytz0fVV8fQi2Vuxgu9mTBfBmu0U5m.:2015-12-10 14:22:13:

breaches/breched_data/poshmark/users.json:3998788:{ "_id" : { "$oid" : "54208d8d2d24900f5d1996b8" }, "aggregates" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996ba" } }, "created_at" : { "$date" : 1411419533337 }, "devices" : [ "ios2:00d0cbb995fa79cd091c83e65f114c662caf9f03" ], "eb" : true, "ebat" : { "$date" : 1449786133301 }, "email" : "carilynn03@live.com", "email_verified" : null, "fb_info" : { "_id" : { "$oid" : "54208d8d2d24900f5d1996bc" }, "devices" : [ { "hardware" : "iPhone", "os" : "iOS" } ], "education" : [ { "school" : { "id" : "109610775731916", "name" : "Central