🐟 Fishtank Sam Hyde's Fishtank.live General - Jet Neptune's Little House of Horrors

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
Official KF Fishtank livechat here!

Is it over?

  • Yes, I am sad and need a Ben backrub :(

    Votes: 331 31.9%
  • No, we will be back, autism too strong

    Votes: 526 50.6%
  • Cams down until we roll into Bloodgames 2

    Votes: 182 17.5%

  • Total voters
    1,039
According at people who live at the listed address, Jay is the youngest one that lives there other than his 80 year old dad. There's no fucking way some boomer anti-trump swatted the fishtank house

1751072931660.webp
 
Na na na na, na na na na
Hey hey hey
Gooodbyyyyyye

Jay Cimminn
Powerword: Jay Polson
63 years old, 12/24/1961
Vehicle co owned by DGI INVISUALS
Male

55-1 High Street, Andover, Massachusetts, US
Year Built: 1920
Bedrooms: 1
Baths: 1.00
Building Area: 565
Owner: polson, jay k
Tax Year: 2015
Tax Amount: $2234
Sale Price: $205,900
Home Value: $205
Purchase Price: $205

57 Pelham Street, Methuen, Massachusetts, US

20 Highland Road, Nahant, Massachusetts, US

17 Bellingham Avenue, Revere, Massachusetts, US

165 Bellingham Avenue, Revere, Massachusetts, US

281 Summer Street, Boston, Massachusetts, US

978-475-0024

617-816-2271

978-409-2577

978-685-2215

https://xcancel.com/DGIInvisuals

Vehicle Year


2023


Vehicle Make


SUBA


Vehicle Model


WRX


Registration Details


Registration Number


884TS4


Plate Type


PAN - Passenger Normal Plate


Registration Expiration Date


30-Apr-2026


Registration Status


Active Non-Renew


Registration Status Date


14-Nov-2024


Inspection Details


Last Inspection Date


09-Sep-2024


Last Inspection Results


Pass


Insurance Details
Vehicle Insured By


Arbella Mutual Insurance Company

Edit:

it’s probably the right plate. matched vehicle and there’s this :

View attachment 7567729
coincidence?
IMG_4206.webpIMG_4207.webp
 
is there any real possibility of them returning to the S3 house? i know they were kicked out last time, but do you think they'll even bother trying? they really have no other options lmao.
 
According at people who live at the listed address, Jay is the youngest one that lives there other than his 80 year old dad. There's no fucking way some boomer anti-trump swatted the fishtank house

View attachment 7567749
That’s a MDU with many other tenants. That’s why he’s parcel ID 1. Jay owns #1.

All the other parcel IDs are other owners of other attached town homes (parcel ID 2 is unit 2 , and so on) and have nothing to do with this

Now I’m not equipped to use google street view - can’t/wont install the app but perhaps one of you can triangulate this by seeing if he is indeed in proximity to the fish tank house since you have an outside pic.

I can’t edit my original post anymore but here’s my homework @Osama Bin Laden . Needed to fix it a bit and remove the metadata author and sender info.
 

Attachments

  • report.pdf
    report.pdf
    3.1 MB · Views: 14
  • IMG_7076.webp
    IMG_7076.webp
    75.3 KB · Views: 23
  • IMG_7077.webp
    IMG_7077.webp
    101.8 KB · Views: 23
Last edited:
They should stop trying to run fishtank out of sleepy new england neighborhoods full of wealthy old white people. They don't want any of this ghetto nonsense near them and the cops are bored enough to answer these calls. Too bad Hyde hates seeing brown people
On one of the first few nights with Sam present, someone TTS'd
"Why no MDE shows near Boston?"
He smugly answered "We don't shit where we eat"

Kind of seems like an equally useful principle for the torture houses
 
Credit: @notorietus
1751073533228.webp

{
"8tracks": {
"Data": [
{
"Email": "HxiupoaSpaecin@outlook.com",
"Username": "casesummer36",
"Password(SHA1+Salt)": "dd1fdcc48ddede2c56ddd4f3a3092ce2f05abca8",
"Salt": "b9f0285b994962804d0732b7d2c049bb705108ec"
}
],
"Description": "In June 2017, the online playlist service 8Tracks suffered a leak that affected 18 million accounts. Mail and salted SHA-1 password hashes for most users were made publicly available."
},
"Alien TxtBase": {
"Data": [
{
"Email": "kybgood4u@gmail.com",
"Password": "557Kylome",
"Url": "casesummer.com/login.php"
},
{
"Email": "Robinvrancken17@gmail.com",
"Password": "Habbo!13",
"Url": "casesummer.com/login.php"
},
{
"Email": "Robinvrancken17@gmail.com",
"Password": "pAp3ujHuAhvn53!",
"Url": "casesummer.com/login.php"
},
{
"Email": "hekdoran@azet.sk",
"Password": "casesummer07 "
},
{
"Email": "casesummercorp@gmail.com",
"Password": "cdx25081982 ",
"Url": "paypal.com"
},
{
"Email": "casesummercs@gmail.com",
"Password": "cdx25081982 ",
"Url": "paypal.com"
},
{
"Email": "casesummergo@gmail.com",
"Password": "cdx25081982 ",
"Url": "accounts.google.com"
}
],
"Description": "At the beginning of 2025, a huge collection of logs was published in the ALEN TXTBASE telegram channel. The data in it were collected using stylers - viruses stolen by login and passwords stored in browsers. The data contained 23 billion lines, but among them there were many duplicates, as well as signs of generation. After removing duplicates and notes from NAZ.api and other similar leaks, 2.8 billion records remained. The data contains mail, phones, nicknames, IP addresses, passwords in open form and the name of sites or installed applications in which they were used."
},
"Baihe.com": {
"Data": [
{
"Email": "casesummer@126.com",
"Username": "casesummer",
"Password(MD5)": "25F9E794323B453885F5181F1B624D0B "
},
{
"Email": "casesummer@126.com",
"Login": "casesummer",
"Username": "casesummer",
"Password(MD5)": "25F9E794323B453885F5181F1B624D0B "
}
],
"Description": "In 2011, the Chinese dating site Baihe.com was hacked. The leak contained names, mail, phones, IP addresses and passwords in the form of Hashi MD5. In total, about 20 million records in several tables."
},
"BreachedForum Combolists": {
"Data": [
{
"Email": "casesummercorp@gmail.com",
"Password": "cdx25081982"
},
{
"Email": "casesummercs@gmail.com",
"Password": "cdx25081982"
},
{
"Email": "casesummergo@gmail.com",
"Password": "cdx25081982"
},
{
"Email": "casesummerstore@gmail.com",
"Password": "cdx25081982!"
}
],
"Description": "Breached.vc is the most famous site for publishing various leaks. This database contains all files from the “Combolists” section, downloaded on 02/22/2023. This section had 2200 databases containing 170GB of data (5 billion rows). After deduplication and removal of rows from the collections, only 770 million remained. The data contains only emails and passwords."
},
"Cloudata": {
"Data": [
{
"Email": "casesummercorp@gmail.com",
"Password": "cdx25081982"
},
{
"Email": "casesummercs@gmail.com",
"Password": "cdx25081982"
},
{
"Email": "casesummerstore@gmail.com",
"Password": "Cdx25081982!"
}
],
"Description": "Large collection of email:password. The database was assembled from multiple files on May 18, 2023. Initially, all databases weighed 338 GB (11 billion rows). After removing duplicates and data from the collections, about 2 billion remained."
},
"Collection": {
"Data": [
{
"Collection Numbers": "2,4",
"Email": "casesummerlin@yahoo.com",
"Password": "evelyn09"
}
],
"Description": "In January 2019, a collection of 5 parts appeared on a hacker forum, representing a combination of data from different sites. The collection contained 108 thousand files with a total size of 870GB. These files contained 26 billion lines containing email and password. However, many values were repeated many times, and there were only 4.3 billion unique pairs. And yet this collection is considered the biggest leak in history."
},
"Collection #2": {
"Data": [
{
"Email": "casesummerinstitute@gmail.com",
"Password": "anjuna1"
}
],
"Description": "In January 2019, 5 collections appeared on a popular hacker forum, representing a combination of data from many other leaks. This is the second collection, it was the largest of all and contained 20 thousand files with a total size of 526 GB. These files contained 15.8 billion lines with emails and passwords, but there were only 3.2 billion unique pairs."
},
"DangDang": {
"Data": [
{
"Address": "金穗大道东段新乡学院管理学院",
"Amount": "134.30 ",
"Email": "casesummer@126.com",
"Full Name": "李秋迪",
"Phone": "03713685765",
"Phone2": "13462280561"
},
{
"Address": "金穗大道东段新乡学院管理学院",
"Amount": "79.00 ",
"Email": "casesummer@126.com",
"Full Name": "李秋迪",
"Phone": "03713685765",
"Phone2": "13462280561"
}
],
"Description": "In 2011, Chinese e-commerce site Dangdang suffered a data breach. The incident revealed 4.8 million unique email addresses that were subsequently sold online several years later."
},
"Evite": {
"Data": [
{
"Birth Day": "1977-06-27",
"Country": "US",
"Email": "hekdoran@yahoo.com",
"First Name": "Hope",
"Gender": "F",
"Last Name": "doran",
"Password": "casesummer07",
"Created On": "2012-11-1221:51:10",
"Time Zone": "PST"
}
],
"Description": "In April 2019, social planning website Evite discovered a data breach from 2013. Among them were 101 million email addresses, as well as names, phone numbers, addresses and passwords in clear text."
},
"JD.com": {
"Data": [
{
"Email": "casesummer@126.com",
"Full Name": "李秋迪",
"Username": "casesummer",
"Password(MD5)": "ac97e8d38d71d45672f6d01b838e6b2fd2dffe82",
"Phone": "18010182616"
}
],
"Description": "In 2013 (the exact date is unknown), a leak occurred in the Chinese e-commerce service JD, revealing 13 GB of data containing 77 million unique emails and extensive user data."
},
"LinkPass collection": {
"Data": [
{
"Email": "casesummercorp@gmail.com",
"Link": "https://accounts.google.com/signin/v2/challenge/pwd",
"Password": "cdx25081982"
},
{
"Email": "casesummercorp@gmail.com",
"Link": "https://www.paypal.com/id/signin",
"Password": "cdx25081982"
},
{
"Email": "casesummercs@gmail.com",
"Link": "https://accounts.google.com/signin/v2/challenge/pwd",
"Password": "cdx25081982"
},
{
"Email": "casesummercs@gmail.com",
"Link": "https://www.paypal.com/id/signin",
"Password": "cdx25081982"
},
{
"Email": "casesummergo@gmail.com",
"Link": "https://accounts.google.com/signin/v2/challenge/pwd",
"Password": "cdx25081982"
},
{
"Email": "casesummerstore@gmail.com",
"Link": "https://www.paypal.com/id/signin",
"Password": "Cdx25081982!"
}
],
"Description": "In 2022, a combo player appeared on the Internet containing authorization data for various sites. It was obtained using viruses that steal saved login data in browsers. The leak contained approximately 150 million records. It indicated nicknames, emails and telephone numbers as logins and passwords in plain text, as well as the sites for which they were intended."
},
"MySpace": {
"Data": [
{
"Email": "casesummerinstitute@gmail.com",
"Username": "casesi2007",
"Password": "anjuna1"
}
],
"Description": "Around 2008, MySpace suffered a data breach that exposed nearly 360 million accounts. In May 2016, the data was offered for sale on the dark market website \"Real Deal\" and included email addresses, usernames, and SHA1 hashes of the first 10 characters of the password, converted to lowercase and stored without salt. The exact date of the hack is unknown."
},
"NetEase": {
"Data": [
{
"Email": "casesummer@126.com",
"Password": "03916756373"
}
],
"Description": "In October 2015, the Chinese website NetEase, located at 163.com, was the victim of a data breach that affected 234 million subscribers. The data contains emails and passwords in plain text."
},
"PasswordIndex": {
"Data": [
{
"Emails": "hekdoran@yahoo.com",
"Password": "casesummer07"
}
],
"Description": "This is an inverse index created in March 2023. It allows you to search for all emails associated with a particular password. This index contains 1.3 billion unique passwords and 3.2 billion emails for which they were used. Enter the received emails into the search to get more information."
},
"RockYou 2024": {
"Data": [
{
"Password": "casesummer"
},
{
"Password": "casesummerall"
},
{
"Password": "casesummerinstitute"
},
{
"Password": "casesummerquart"
}
],
"Description": "In the summer of 2024, a new version of the RockYou database was made publicly available; previously similar databases were published in 2021 and 2009. The database is simply a compilation of passwords that have ever been publicly available. It contains about 10 billion records. There is no other data in the leak, but it can still be used to check the strength of passwords, as well as to decrypt hashes from leaks."
},
"Wanelo": {
"Data": [
{
"Email": "casesummer.746@gmail.com",
"Password(bcrypt)": "$2a$10$DDAt/a0xylTHwJeFJ1qyzO5lFqOWuSyi4lxQA22Nzf.4u6o2r34cO"
}
],
"Description": "Around December 2018, the Wanelo digital shopping mall experienced a leak. A total of 23 million unique emails were included in the hack, along with passwords in the form of MD5 or bcrypt hashes."
},
"Xiaomi": {
"Data": [
{
"Email": "28337243@bbs_ml_as_uid.xiaomi.com",
"IP": "218.106.181.97",
"Username": "casesummer",
"Password(MD5+Salt)": "717fedf4ee27c196653b6120fdacb58d:4c7d3d"
}
],
"Description": "In August 2012, the Chinese Xiaomi user forum website suffered a data leak. In total, 7 million email addresses were exposed as a result of the hack. A significant portion of them were numeric aliases in the bbs_ml_as_uid.xiaomi.com domain. Usernames, IP addresses and passwords were also exposed in the form of salted MD5 hashes."
},
"YouTube Parsing 2025": {
"Data": [
{
"Date(UNIX)": "1726679001",
"Username": "CaseSummerfield",
"Text": "Rip 😢",
"YouTubeComment": "youtu.be/watch?v=xQUdmEHZ0hM&lc=UgzaursYBmM_3aLB6Dt4AaABAg"
},
{
"Date(UNIX)": "1579300044",
"Username": "casesummers5338",
"Text": "How old are you",
"YouTubeComment": "youtu.be/watch?v=32G5QkGDC6A&lc=UgxwBDWoKV0UF4oFYWd4AaABAg"
},
{
"Date(UNIX)": "1603480042",
"Username": "casesummers5338",
"Text": "You should deer with that",
"YouTubeComment": "youtu.be/watch?v=hrEqDRHIPiU&lc=UgwP4tNt_1mUGFWyaJd4AaABAg"
},
{
"Date(UNIX)": "1603480063",
"Username": "casesummers5338",
"Text": "You should shoot a deer that",
"YouTubeComment": "youtu.be/watch?v=hrEqDRHIPiU&lc=UgwRxtey3GEpujg5C6V4AaABAg"
},
{
"Date(UNIX)": "1577927545",
"Username": "casesummers5338",
"Text": "Yeet",
"YouTubeComment": "youtu.be/watch?v=pnpJa2IxZI4&lc=UgznJX4cFoIvWN1orXV4AaABAg"
},
{
"Date(UNIX)": "1605041118",
"Username": "casesummers5338",
"Text": "Yes",
"YouTubeComment": "youtu.be/watch?v=uqhYA2pNEJY&lc=Ugz6BKplPH_GA_qVNYF4AaABAg"
}
],
"Description": "In May 2025, about 100 million comments were collected from the YouTube video hosting video hosting. The base contains 48 million unique users, as well as links to their profiles and the comments left, the texts of these comments, the number of likes under it and the date of its spelling. The search can be made by nickname (the one that is written through @), which is useful if you want to find comments left by a specific user."
},
"YouTube Profiles": {
"Data": [
{
"Avatar": "yt3.ggpht.com/6hOTdwaifb2Ab2SbdayJOWRm9lijnFc6i2umYY0Ltm0QI4kYteaEhFnxZE95QlBaOXCmXMaE=s2048",
"Link": "youtube.com/channel/UC7PA8slWgv_b0TysZK68uGQ",
"Username": "CaseSummerfield",
"Total Comments": "1",
"Total Likes": "0"
},
{
"Avatar": "yt3.ggpht.com/ytc/AIdro_nSnrH2BKiWb6v87dbZfwxkNXOtsSvSMOZhFFjtfwV7=s2048",
"Link": "youtube.com/channel/UCktYWQkJjAMSiBgDN5UGEZg",
"Username": "casesummers5338",
"Total Comments": "5",
"Total Likes": "0"
}
],
"Description": "In June 2025, approximately 4 billion comments were collected from the YouTube video hosting with a parsing. This comments left 616 million unique users of the platform and in this database information about them, including nicknames, links to avatars, the total number of left comments, as well as the total number of likes under them. The number of comments takes into account only comments that have fallen into the collected sample, and therefore it can be underestimated."
},
"iDTech": {
"Data": [
{
"First Name": "Matthew",
"Last Active": "2014-04-13T09:14:44.200",
"Last Name": "Wollerman",
"Login": "matthewandgrace@oh.rr.com",
"Password": "CaseSummer17",
"Created On": "2014-04-13T09:14:43.200"
}
],
"Description": "In January 2023, the American portal of children's summer programming training camps “iD Tech” was hacked. The leak contains about a million records with names, nicknames, dates of birth and passwords in plain text."
},
"naz.api": {
"Data": [
{
"Email": "casesummercorp@gmail.com",
"Password": "cdx25081982",
"Url": "https://www.paypal.com/id/signin"
}
],
"Description": "This database was created by extracting data from stealer logs. It contains data on stored logins and passwords in users' browsers. It contains 270 million unique records."
}
}
 

Attachments

From /ftl/, so I can't confirm.
But apparently the redditor was not only a viewer but a paypig as well

1751073670920.webp

Edit:
Since this post was postmarked I'm editing with a correction.
This is most likely fake, just someone that changed their username to roleplay as the redditor.
See this post for more info:
I think the CaseSummer FTL account is fake and gay.
View attachment 7567914
Not only does this account have normal fan TTS, but the biggest giveaway is the account description "Not much is known about Yojimbeauuu...".
This is the default account description when the account is created, so Yojimbeauuu is probably their old username. Most likely someone larping.
 
Last edited:
Back