Assuming you visit the real one, it's THE most well known site to check if your email address is found in 1 of numerous data leaks. Answer from Ch3vr0n on reddit.com
🌐
Reddit
reddit.com › r/techsupport › is the site haveibeenpwned a legit page?
r/techsupport on Reddit: Is the site haveibeenpwned a legit page?
September 16, 2022 -

today ive been trying to keep my account secure over scam anti virus software that I have installed. someone recommended me this site to see if any personal info of mines has been leaked. ran a scan and everything seems to be good for now? i then also did a scan for the site itself after words on virus total and it gave me a message saying "1 security vendor flagged this URL as malicious". not sure if I should be concerned abt that information and hopefully this site isn't a scam innit of itself

🌐
Have I Been Pwned
haveibeenpwned.com › PwnedWebsites
Have I Been Pwned: Who's Been Pwned
Every breached website added to Have I Been Pwned appears here on the Who’s Been Pwned page. As of today, there are 929 breached sites listed.
🌐
Reddit
reddit.com › r/privacy › haveibeenpwned.com passwords
r/privacy on Reddit: HaveIBeenPwned.com Passwords
January 26, 2022 -

I know this website is safe to check your email addresses. I noticed that there is a 'Passwords' section and you can enter your passwords in there to see if they have been breached.

This might sound like a stupid question, but is it actually safe to enter your password here to check to see if it has been breached?

🌐
Reddit
reddit.com › r/cybersecurity › haveibeenpwned - new feature _very_ expensive
r/cybersecurity on Reddit: Haveibeenpwned - new feature _very_ expensive
February 26, 2025 -

So in the latest HIBP blog post about a new upload of breaches -
Troy Hunt: Processing 23 Billion Rows of ALIEN TXTBASE Stealer Logs

it turns out a long winded way of Troy and Co to end up saying 'sign up for an enterprise value subscription in order to get anything useful out of the latest alerts'.

urgh.

I happily paid for the previous cost that allowed our business to be kept up to date with breaches and allow us to search, even though that feature somewhat superseded by our password manager having the same functionality.

Then HIBP introduced an API to check for log items in Jan, which was great!

But now they've taken that away from our current sub level (the only one that existed at the time I think) and essentially 12x'd the price on that feature.

It feels like the latest breach information email and corresponding blog post feels extortionate - 'hey, this latest alert that you got informed of, pay us that 12x a cost to find out what it means'.

We aren't an enterprise level business, so don't have the budget to pay for such a niche feature which is really on an 'as needed' basis. The other frustrating thing is now the cost is comparable with a fully featured SAAS application, which HIBP is not. It's janky as.

Be keen to know if anyone thinks the same and has some alternatives.

Find elsewhere
🌐
Reddit
reddit.com › r/technews › have i been pwned adds 183 million more emails from major new breach
r/technews on Reddit: Have I Been Pwned adds 183 million more emails from major new breach
October 25, 2025 - YSK: HaveIBeenPwned will tell you if your email address and passwords have ever been compromised, so change them right now if they have!
🌐
Reddit
reddit.com › r/hacking › how dangerous are data breach warnings from haveibeenpwned?
r/hacking on Reddit: How dangerous are data breach warnings from haveibeenpwned?
February 29, 2024 - YSK HaveIBeenPwned is a website that can tell you if your sensitive information (email, password, address) can be found in data leaks.
🌐
Reddit
reddit.com › r/cybersecurity_help › explanation for everyone asking about the haveibeenpwned alien txtbase
r/cybersecurity_help on Reddit: Explanation for everyone asking about the haveibeenpwned ALIEN TXTBASE
January 27, 2025 -

I came across a few posts about people failing to understand the notification from haveibeenpwned.com regarding the recent ALIENT TXTBASE dump, while also being overly concerned as I was last night until reading up on it more this morning. Luckily I think most people shouldn't be concerned, here's why.

First off here's how to see what passwords were supposedly "leaked" since many people seem to be confused:

  1. Go to haveibeenpwned.com

  2. Click "Notify Me" up top

  3. Enter your email address

  4. Click on the "View my email address status" button in the received email; this will now bring you to a page where you can see exactly what info of yours was in this leak.

  5. Scroll all the way to the bottom until you see "Stealer log entries"

Now what's most important is the "Domain" list. Each domain listed here is the website in which your password for that website was supposedly leaked for. This domain is not your email's domain; a common misconception I'm seeing, even though it could be an email website like gmail.com which I'll get to. Again, it is the domain of the website of which your password is for. The email address you entered in the steps above would be the username/login email for each website listed here.

If you only see gmail.com you should not stress. Change your password for gmail.com of course and run a few virus scans on your machine (Windows Defender, MalwareBytes, Norton Power Eraser, HitManPro, and Emsisoft Emergency Kit are what I ran). They'll probably come back clean, and here's why:

The most likely case here is someone with an infected machine was trying to log into gmail accounts (or other email providers) using known email addresses and other older leaked passwords related to those email accounts from other leaks. The second likely case is the leakers of ALIEN TXTBASE included a ton of data from old leaks, either passwords related to websites other than gmail or completely made up passwords, to inflate their numbers increasing their chances of selling this data. They did include real passwords confirmed by Troy Hunt, however that doesn't mean anything. Do you really think that ~284 million machines were compromised? That would be a defcon 1 level type of malware. So relax, your chances of actually being compromised in this case are slim to none.

If you see more domains than gmail.com the probability of your data being accurate is much greater. Change all of those passwords after scanning your machines. If you get any detections, reinstall the OS completely and format all drives.

🌐
Reddit
reddit.com › r/techsupport › i saw my email address has been breached on haveibeenpwned.com. what does this mean?
r/techsupport on Reddit: I saw my email address has been breached on haveibeenpwned.com. What does this mean?
June 27, 2017 -

I can't for the life of me figure out if just my email address was leaked, or the password as well? And I hear people say that its not a big deal. How can that be? They can see all my emails.

Top answer
1 of 19
141

Sites listed on HIBP have been hacked, and their user list stolen. Usually these lists have your email address and a representation of a password called a hash. In some cases, where the person who programmed the website is a complete idiot not following best practices, it may be a weak hash or it may be in clear text. In those cases the hackers (and anyone with the database) has access to your password for that website.

This affects you in two ways:

1: On that website. If they can log in as you and get access to things like your full name, address, parts of your credit card number they can use that to compromise your identity further to steal from you or use you to steal from others. This is why it's important that hacks are disclosed publicly quickly.

2. On any other website you use that password on. They're going to try your email + password combo everywhere. If you used the same password on your account for Bob's Pizza and for your bank account, that may mean someone now has access to your online banking.

The big takeaway from this - the #1, I'm going to put in big letters rule is:

NEVER EVER EVER RE-USE PASSWORDS

ESPECIALLY bank and email accounts! Use a password management tool, use a notepad, use mnemonic tricks but never use the same password in two places.

Regarding your email address / email account, being on HIBP doesn't mean anyone has or ever had access to your email - unless one of the sites listed there had the same password as your email account.

2 of 19
19

I can't for the life of me figure out if just my email address was leaked, or the password as well?

It tells you in the info for the breach what was leaked, at least on most of them.

They can see all my emails.

Only if they somehow got into your email account.

If you mean email address then that's nothing to worry about, email addresses are not private.


Either way the basic guidelines for passwords are:

  • NEVER re-use the same password, every site/service needs a unique strong random password.

  • Use 2FA on important things like your email.

  • Use a password manager, there's no way to remember all your passwords otherwise.

  • Use 2FA on your password manager, use a very strong master password, and make backups of your passwords periodically and store them in an encrypted format.

On sites that let me I aim for a 30 character password randomly generated by my password manager.

Ironically the only sites that don't allow passwords that long are pretty much all of my banking/financial services.

🌐
Reddit
reddit.com › r/information_security › haveibeenpwned alternative that shows passwords
r/Information_Security on Reddit: HaveIBeenPwned Alternative that Shows Passwords
April 18, 2025 -

I've used HaveIBeenPwned a bunch of times to check if my email has been in a data breach, but it doesn't show the actual leaked passwords, it just tells me there was a breach.

Are there any good alternatives to HIBP that let you see more detailed breach info, like the actual leaked credentials?

🌐
Reddit
reddit.com › r/cybersecurity › haveibeenpwned malicious purposes
r/cybersecurity on Reddit: HaveIBeenPwned malicious purposes
June 29, 2024 -

I believe many of you are familiar with the website haveibeenpwned.com. I recently checked it using an old email of mine and discovered that my address appeared in 11 data breaches 😅. This got me thinking:

Is haveibeenpwned.com not an ideal tool for blackhats? If someone is trying to find a victim's credentials, they could use this site to identify which breaches to target. From there, wouldn't it be relatively straightforward to obtain some hashes? Or is locating these data breaches the challenging part?

🌐
Reddit
reddit.com › r/techsupport › my email appeared on haveibeenpwned.com.
r/techsupport on Reddit: My email appeared on haveibeenpwned.com.
September 12, 2023 -

Hey guys. So today I found out about this site and wanted to see if I have any data breaches. And it turned out that my account was one of the 140 million pwned accounts on Canva on May 2019 which was a huge data breach if you remember it. So it's been 4 years and today I changed my Canva password and enabled 2 factor authentication. Is there anything else I can do in this situation? And why when I run my email through the site, it still shows that I got pwned? And it's the same thing, the canva breach. How do I remove it completely from that tab? Or is it supposed to? And also I wanted to point out that I don't actually really use the app, I used it like two times when I needed it. So maybe the best thing for me to do will be deleting the Canva account itself? Will it disappear then?

🌐
Reddit
reddit.com › r › HaveIBeenPwned
r/HaveIBeenPwned
December 6, 2016 - A subreddit to discuss databreaches and pwnings on haveibeenpwned.com