Includes Verizon mobile plus four secondary numbers from the handwritten note.
pull date · 11 apr 2026
Jason Jaime Montanez
Arizona-based target juggling Verizon cell service, a busy Gmail, and a legacy Live.com footprint that keeps bleeding.
- Primary cell: +1 520 400 3469 · Verizon · TikTok alias
jason.re.bourne· Fetch Rewards registration 05 Apr 2025 - Inbox cluster: montanezj1997@gmail.com · montemonty@live.com · jayroc82783@gmail.com · jmontanez@ztsystems.com
- Residences hit: Tucson (Riverview Blvd + Stone Ave), Tolleson (Riverside Ave), Goodyear (Adiamo Palm Valley), Peoria (Bell Rd)
- Handles in play: JasonMon97 · montemonty · JasonMontanez213 · jasomontane_2 · montanezj · JasonMontanez
Google Maps drop pins from Las Vegas back through Tolleson and Mesa.
TikTok, Google, Microsoft, GitHub, Chess.com, Bible, Rumble, Poshmark.
Live.com credentials leak from MySpace (2008) through Synthient feeds (2025).
Document stats
export+15204003469
- Total Registered Modules: 1 · Unique IDs Found: 2
- Last Seen Events: 1 · Creation Events: 2
- Total Detailed Modules: 11 · Total Events: 3
- Unique Names: 4 · Unique Usernames: 4
- Locations: 4 · Geo Data Locations/Routes: 0
- Total Breached Modules: 0
13:48 capture
- Total Registered Modules: 24 · Unique IDs: 6
- Last Seen Events: 5 · Creation Events: 10
- Total Detailed Modules: 22 · Total Events: 30
- Unique Usernames: 10 · Unique Names: 3
- Locations: 5 · Geo Data Locations: 7 · Routes: 0
- Total Breached Modules: 3 · Checker status: 24 Registered hits
13:28 capture
- Total Registered Modules: 23 · Unique IDs: 6
- Last Seen Events: 5 · Creation Events: 9
- Total Detailed Modules: 15 · Total Events: 29
- Unique Usernames: 7 · Unique Names: 2
- Locations: 4 · Geo Data Locations: 7 · Routes: 0
- Total Breached Modules: 3 · Checker status: full list Registered
montemonty@live.com
- Total Registered Modules: 8 · Unique IDs: 2
- Last Seen Events: 1 · Creation Events: 1
- Total Detailed Modules: 8 · Total Events: 2
- Unique Usernames: 3 · Unique Names: 1
- Locations: 3 · Geo Data Locations: 0 · Routes: 0
- Total Breached Modules: 18 · Gender: Male: 1
Signals worth ripping apart
520-400-3469
- Tied to TikTok handle
jason.re.bourne, creation + last seen 18 Feb 2024. - Fetch Rewards ID 67f0d1c750c3282cd9a3bc93 created 05 Apr 2025 (Tucson AZ).
- Carrier: Verizon Wireless · upgrade status NOT_ELIGIBLE.
montanezj1997@gmail.com
- 24 registered services · 10 creation events · 5 last-seen entries.
- Google user ID 109360438965559710176 active 10 Apr 2026 (Photos/Maps/Meet).
- Platform spread: Microsoft, GitHub, Bible app, Chess.com, Rumble, Fetch Rewards.
montemonty@live.com
- 18 breach corpuses (MySpace 2008 → Synthient 2025).
- Poshmark profile
montemontyregistered 05 Jun 2016 · last seen 01 Apr 2018. - LinkedIn slug
jason-montanez-b3018b136claiming Dysart High School.
Five confirmed
- 1404 N Riverview Blvd Apt G, Tucson AZ.
- 2100 N 145th Ave Apt 1097, Goodyear AZ 85395.
- 9914 W Riverside Ave, Tolleson AZ 85353.
- 919 N Stone Ave Apt 4201, Tucson AZ 85705.
- 8072 E El Toro Cir Apt 501 (AZ complex).
Documents & pulls
Gmail intelligence report
25 pages covering geo reviews, checker hits, usernames, and all Microsoft / GitHub activity.
Gmail intelligence report (earlier)
Companion 22-page capture (13:28 UTC) with the same modules for cross validation.
Phone OSINT packet
+1 520 400 3469 with TikTok timestamps and Fetch Rewards timeline.
Live.com breach ledger
Compact 10-page stack of breach datasets, Poshmark activity, and Facebook/Tumblr IDs.
Notes
Raw briefing note
Original phone list, email list, addresses, and LinkedIn URL pulled before the exports.
Breakdowns
Identity ledger
Phones, inboxes, handles, and living spaces are stacked by category.
Contacts data →Event stream
Every login, registration, and review sits in chronological order.
Digital trail →Ground truth
Google review quotes plus map links and coordinates.
Locations →Exposure stack
All eighteen breach corpuses listed with the exact data types hit.
Breaches →