🌐
Have I Been Pwned
haveibeenpwned.com › FAQs
Have I Been Pwned: Frequently Asked Questions
The breached accounts sit in Windows Azure table storage which contains nothing more than the email address or username and a list of sites it appeared in breaches on. If you're interested in the details, it's all described in Working with 154 ...
API
This work is licensed under a Creative Commons Attribution 4.0 International License. In other words, you're welcome to use the public API to build other services, but you must identify Have I Been Pwned as the source of the data. Clear and visible attribution with a link to haveibeenpwned.com should be present anywhere data from the service is used including when searching breaches or pastes and when representing breach descriptions. It doesn...
Notify Me
Get notified if your email address appears in a future data breach. Have I Been Pwned will alert you when we find your email address is exposed.
Passwords
Pwned Passwords is a huge corpus of previously breached passwords made freely available to help services block them from being used again.
Who's Been Pwned
Every breached website added to Have I Been Pwned appears here on the Who’s Been Pwned page. As of today, there are 929 breached sites listed.
🌐
Have I Been Pwned
haveibeenpwned.com › About
Have I Been Pwned: Who, What & Why
Learn about Have I Been Pwned, why it was created, who runs it, and how it helps people discover if their personal data has been exposed in data breaches.
People also ask

Is "Have I Been Pwned" safe to use?
Yes, it is a highly respected and trusted security resource used by governments and Fortune 500 companies. It does not store the email addresses you search for.
🌐
teampassword.com
teampassword.com › blog › have-i-been-pwnd-what-to-do-when-it-happens
TeamPassword | What to Do if You've Been Pwned: A Complete Guide
Can a password manager be hacked?
Reputable password managers like TeamPassword use state-of-the-art, end-to-end encryption (often called zero-knowledge), meaning the company itself cannot see your passwords. A breach of their servers would only reveal encrypted gibberish. The biggest risk is a weak master password, which is why using a strong one and enabling 2FA is crucial.
🌐
teampassword.com
teampassword.com › blog › have-i-been-pwnd-what-to-do-when-it-happens
TeamPassword | What to Do if You've Been Pwned: A Complete Guide
If my email is found, does that mean my computer has a virus?
Not necessarily. A data breach happens on a company's servers (e.g., LinkedIn, Adobe). It means your data was stolen from them, not directly from your device. However, a breach can lead to phishing emails that could try to install malware on your computer.
🌐
teampassword.com
teampassword.com › blog › have-i-been-pwnd-what-to-do-when-it-happens
TeamPassword | What to Do if You've Been Pwned: A Complete Guide

consumer security website and email alert system

The homepage of haveibeenpwned.com. The website features white text on a black background. Prominently centered is the site's logo in a white and blue gradient. Below the logo is a search box labeled "email address" with a button beside it labeled "Check". Below the search box is a series of statistics about the size of the website's database.
Have I Been Pwned? (HIBP) is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The site has been widely touted as a … Wikipedia
Factsheet
Type of site Internet security
Created by Troy Hunt
URL haveibeenpwned.com
Factsheet
Type of site Internet security
Created by Troy Hunt
URL haveibeenpwned.com
🌐
Wikipedia
en.wikipedia.org › wiki › Have_I_Been_Pwned
Have I Been Pwned? - Wikipedia
1 month ago - Have I Been Pwned? (HIBP) is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The site has been widely touted as a valuable resource for Internet users wishing to protect their own security and privacy.
🌐
Have I Been Pwned
haveibeenpwned.com
Have I Been Pwned: Check if your email address has been exposed in a data breach
Have I Been Pwned allows you to check whether your email address has been exposed in a data breach.
🌐
1Password
1password.com › haveibeenpwned
Have I Been Pwned | 1Password
Instead, attackers will try common words, phrases, or previously-leaked passwords from a predefined list. Once the hacker finds a match, they can attempt to use the now-unscrambled password to access the associated account, or check whether ...
🌐
Wikihow
wikihow.com › computers and electronics › internet › website application instructions › how to use have i been pwned: a complete guide
How to Use Have I Been Pwned: A Complete Guide
August 27, 2019 - If your email address was found in a breach, then you will see red screen with the message saying, "Oh no - Pwned!" You can scroll down to see the list of data breaches and pasts that you were involved in. If your email address was not involved in a data breach, then you will see a green screen that says, "Good news - no pwnage found!" Just because your email address was not found does not necessarily mean that it was never involved in a data breach, it just means that it was not found in Have I Been Pwned.[1] X Research source
🌐
Malwarebytes
malwarebytes.com › home › “have i been pwnd?”– what is it and what to do when you *are* pwned
"Have I been pwnd?"-- What is it and what to do when you *are* pwned
May 18, 2021 - You use Have I Been Pwned (HIBP) to check if your data has been compromised. What you do next when pwned takes a couple of steps.
Find elsewhere
🌐
Reddit
reddit.com › r/privacy › how safe is haveibeenpwned.com?
r/privacy on Reddit: How safe is haveibeenpwned.com?
April 7, 2023 -

Is it safe to use haveibeenpwned.com? Do they store the e-mail/phone number you search? Those who understand back-end processing, please enlighten me on the site.

Top answer
1 of 6
26
The site is run by a white hat hacker, Troy Hunt. It allows you to search any email address, which is already in the database of hacked accounts. Nothing is stored, and even if it was, nothing particularly useful would come of it. The only exception is for sensitive breaches, like Ashley Madison for example. In that case, you need to verify the email address is yours before information is returned regarding it. I can't quite remember the details why. Signing up for breach alerts is another option, which many other services already offer. But that stuff is made very clear. It's a bit of a paradox, that a site like that looks much scarier than the initial sites that breached to the data to begin with. LinkedIn looks safer than HIBP. Looks can be deceiving.
2 of 6
15
Troy Hunt is a renowned security expert, working for Microsoft. He did consider to give someone else the responsibility for this site some years back. But he got cold feet when realising those willing to take that task didn't necessarily have the purest intentions with the site data, and it would not be in the best interest of its users. Not too long after, he started selling the API access to sites wanting to query if usernames, e-mail addresses, etc was comprised. I believe this service can also do API callbacks when their users is caught in a compromise. This service offering mostly funds HIBP, in addition to other donations. I have several of my own domains listed there, and occasionally I do get some warnings when new breaches are registered. That often explains quite well when an e-mail address is getting a lot more unexpected spam or phishing attempts.
🌐
Consumer Reports
consumerreports.org › electronics & computers › how to use 'have i been pwned' to see if your data was compromised
How to Use 'Have I Been Pwned' to See If Your Data Was Compromised via @ConsumerReports
October 24, 2022 - Hunt says one of the best uses for Have I Been Pwned is to learn about how much information you’re sharing online. “There’s a little bit of data minimization that almost everybody can practice,” he says. “For example, do you need to give your date of birth to a site that asks for it? What is the value proposition for you as an individual handing out your date of birth?” · If the site doesn’t really need a piece of information to provide you with the service you want, consider withholding it, he says.
🌐
TeamPassword
teampassword.com › blog › have-i-been-pwnd-what-to-do-when-it-happens
TeamPassword | What to Do if You've Been Pwned: A Complete Guide
When your account is "pwned," it means your login information has been exposed in a data breach and is likely in the hands of malicious actors. HIBP allows you to quickly check if your email addresses or phone numbers have appeared in any of ...
🌐
DMARC Report
dmarcreport.com › blog › have-i-been-pwned-check-data-breaches-simple-way
Have I Been Pwned? A Simple Way to Check for Data Breaches – DMARC Report
September 17, 2025 - Launched by security expert Troy Hunt in 2013, the site was designed to empower individuals concerned about their online security. It works like this: when you visit the website, all you need to do is enter your email address.
🌐
Clean Email
clean.email › have-you-been-pwned
Have I Been Pwned? What It Means And How To Protect Your Email
January 12, 2020 - Instead, it means your email address, password, or personal data was exposed in a data breach. This use of the term reflects the fact that hackers have "owned" or compromised your information.
Top answer
1 of 8
416

Disclaimer: I am the author, creator, owner and maintainer of Have I Been Pwned and the linked Pwned Passwords service.

Let me clarify all the points raised here:

The original purpose of HIBP was to enable people to discover where their email address had been exposed in data breaches. That remains the primary use case for the service today and there's almost 5B records in there to help people do that.

I added Pwned Passwords in August last year after NIST released a bunch of advice about how to strengthen authentication models. Part of that advice included the following:

When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised. For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses.

That's what Pwned Passwords addresses: NIST advised "what" you should do but didn't provide the passwords themselves. My service addresses the "how" part of it.

Now, practically, how much difference does it make? Is it really as you say in that it's just like a one in a million front door key situation? Well firstly, even if it was, the IRL example breaks down because there's no way some anonymous person on the other side of the world can try your front door key on millions of door in a rapid-fire, anonymous fashion. Secondly, the distribution of passwords is in no way linear; people choose the same crap ones over and over again and that puts those passwords at much higher risks than the ones we rarely see. And finally, credential stuffing is rampant and it's a really serious problem for organisations with online services. I continually hear from companies about the challenges they're having with attackers trying to login to people's accounts with legitimate credentials. Not only is that hard to stop, it may well make the company liable - this popped up just last week: "The FTC’s message is loud and clear: If customer data was put at risk by credential stuffing, then being the innocent corporate victim is no defence to an enforcement case" https://biglawbusiness.com/cybersecurity-enforcers-wake-up-to-unauthorized-computer-access-via-credential-stuffing/

Having seen a password in a data breach before is only one indicator of risk and it's one that each organisation using the data can decide how to handle. They might ask users to choose another one if it's been seen many times before (there's a count next to each one), flag the risk to them or even just silently mark the account. That's one defence along with MFA, anti-automation and other behavioural based heuristics. It's merely one part of the solution.

And incidentally, people can either use the (freely available) k-Anonymity model via API which goes a long way to protecting the identity of the source password or just download the entire set of hashes (also freely available) and process them locally. No licence terms, no requirement for attribution, just go and do good things with it :)

2 of 8
73

This answer refers solely to the original HIBP part of Troy's site, before the question was updated. Please read Troy's post for specifics on the Pwned Passwords section of it.

That is not at all what it is for. It isn't actually even an indication if it has been used - just an indication that it has been leaked.

Its use comes in knowing that attackers are likely to have your email address and password...

Which they can then use anywhere you have used that set of credentials. And it is an amazingly successful attack technique.

Obviously, if you only ever use a password on one particular site, and it bears no relationship to passwords used on other sites, then once you change that password you are as safe as you can be. In fact, the general guidance is that the key trigger for password change should be suspicion of a breach.

You do that, right?

🌐
YouTube
youtube.com › burton kelso, the technology expert
How To Use Have I Been Pwned to See If Your Data Was Compromised - YouTube
If you're wondering if your information has been compromised, you need to immediately use Have I Been Pwned? This website created by Troy Hunt was designed f...
Published   December 5, 2023
Views   1K
🌐
Cisco
cisco.com › products › security › technical alliance partners
Cisco Security and Have I Been Pwned - Cisco
The module adds context around a compromised email and username associated with that email and context about a user for an environment. If Cisco Secure Email Appliance module is enabled, then it returns that this SHA256 has been sent to identified ...
🌐
SlashGear
slashgear.com › 1826787 › have-i-been-pwned-legit-safety-concerns-explained
Is 'Have I Been Pwned' Legit? Here's How The Website Works - SlashGear
April 8, 2025 - How it handles the data is what makes Have I Been Pwned so legit: The site doesn't even log search queries, and everything is transmitted over encrypted connections.
🌐
Have I Been Pwned
haveibeenpwned.com › Passwords
Have I Been Pwned: Pwned Passwords
The Pwned Passwords service is made possible by Cloudflare's generous support. They provide the global infrastructure to serve billions of requests securely and efficiently. ... Use a password manager to generate and store strong, unique passwords for all your accounts. 1Password helps protect your data with industry-leading security. ... Have I Been Pwned is a free resource for the entire community.
🌐
F-Secure
f-secure.com › us-en › articles › have-i-been-pwned-4-steps-to-take-if-your-email-has-been-compromised
Have I been pwned? 4 steps to take if your email has been compromised | F‑Secure
May 16, 2024 - And when it comes to the question “Have I been pwned?”, “pwned” means that someone has taken control of your email address, or a user profile that has been created with it.
🌐
Quora
quora.com › How-does-haveubeenpwned-com-get-its-data
How does haveubeenpwned.com get its data? - Quora
Troy Hunt, security expert and author. HIBP gets its data from many sources. This data has to be sorted through and verified as not all data from breaches are legitimate as even hackers can provide manipulated data for...