pull date · 11 apr 2026

Jason Jaime Montanez

Arizona-based target juggling Verizon cell service, a busy Gmail, and a legacy Live.com footprint that keeps bleeding.

5
Tracked lines

Includes Verizon mobile plus four secondary numbers from the handwritten note.

7
Geo reviews

Google Maps drop pins from Las Vegas back through Tolleson and Mesa.

10
Active usernames

TikTok, Google, Microsoft, GitHub, Chess.com, Bible, Rumble, Poshmark.

18
Breach hits

Live.com credentials leak from MySpace (2008) through Synthient feeds (2025).

Document stats

Phone export

export+15204003469

  • Total Registered Modules: 1 · Unique IDs Found: 2
  • Last Seen Events: 1 · Creation Events: 2
  • Total Detailed Modules: 11 · Total Events: 3
  • Unique Names: 4 · Unique Usernames: 4
  • Locations: 4 · Geo Data Locations/Routes: 0
  • Total Breached Modules: 0
Gmail export

13:48 capture

  • Total Registered Modules: 24 · Unique IDs: 6
  • Last Seen Events: 5 · Creation Events: 10
  • Total Detailed Modules: 22 · Total Events: 30
  • Unique Usernames: 10 · Unique Names: 3
  • Locations: 5 · Geo Data Locations: 7 · Routes: 0
  • Total Breached Modules: 3 · Checker status: 24 Registered hits
Gmail export

13:28 capture

  • Total Registered Modules: 23 · Unique IDs: 6
  • Last Seen Events: 5 · Creation Events: 9
  • Total Detailed Modules: 15 · Total Events: 29
  • Unique Usernames: 7 · Unique Names: 2
  • Locations: 4 · Geo Data Locations: 7 · Routes: 0
  • Total Breached Modules: 3 · Checker status: full list Registered
Live.com export

montemonty@live.com

  • Total Registered Modules: 8 · Unique IDs: 2
  • Last Seen Events: 1 · Creation Events: 1
  • Total Detailed Modules: 8 · Total Events: 2
  • Unique Usernames: 3 · Unique Names: 1
  • Locations: 3 · Geo Data Locations: 0 · Routes: 0
  • Total Breached Modules: 18 · Gender: Male: 1

Signals worth ripping apart

Phone module

520-400-3469

  • Tied to TikTok handle jason.re.bourne, creation + last seen 18 Feb 2024.
  • Fetch Rewards ID 67f0d1c750c3282cd9a3bc93 created 05 Apr 2025 (Tucson AZ).
  • Carrier: Verizon Wireless · upgrade status NOT_ELIGIBLE.
Gmail export

montanezj1997@gmail.com

  • 24 registered services · 10 creation events · 5 last-seen entries.
  • Google user ID 109360438965559710176 active 10 Apr 2026 (Photos/Maps/Meet).
  • Platform spread: Microsoft, GitHub, Bible app, Chess.com, Rumble, Fetch Rewards.
Live.com

montemonty@live.com

  • 18 breach corpuses (MySpace 2008 → Synthient 2025).
  • Poshmark profile montemonty registered 05 Jun 2016 · last seen 01 Apr 2018.
  • LinkedIn slug jason-montanez-b3018b136 claiming Dysart High School.
Residences

Five confirmed

  • 1404 N Riverview Blvd Apt G, Tucson AZ.
  • 2100 N 145th Ave Apt 1097, Goodyear AZ 85395.
  • 9914 W Riverside Ave, Tolleson AZ 85353.
  • 919 N Stone Ave Apt 4201, Tucson AZ 85705.
  • 8072 E El Toro Cir Apt 501 (AZ complex).

Documents & pulls

PDF

Gmail intelligence report

25 pages covering geo reviews, checker hits, usernames, and all Microsoft / GitHub activity.

PDF

Gmail intelligence report (earlier)

Companion 22-page capture (13:28 UTC) with the same modules for cross validation.

PDF

Phone OSINT packet

+1 520 400 3469 with TikTok timestamps and Fetch Rewards timeline.

PDF

Live.com breach ledger

Compact 10-page stack of breach datasets, Poshmark activity, and Facebook/Tumblr IDs.

Notes

Raw briefing note

Original phone list, email list, addresses, and LinkedIn URL pulled before the exports.

Breakdowns

Identity ledger

Phones, inboxes, handles, and living spaces are stacked by category.

Contacts data →

Event stream

Every login, registration, and review sits in chronological order.

Digital trail →

Ground truth

Google review quotes plus map links and coordinates.

Locations →

Exposure stack

All eighteen breach corpuses listed with the exact data types hit.

Breaches →