🌐
Have I Been Pwned
haveibeenpwned.com › Passwords
Have I Been Pwned: Pwned Passwords
... Use a password manager to generate and store strong, unique passwords for all your accounts. 1Password helps protect your data with industry-leading security. ... Have I Been Pwned is a free resource for the entire community.

consumer security website and email alert system

The homepage of haveibeenpwned.com. The website features white text on a black background. Prominently centered is the site's logo in a white and blue gradient. Below the logo is a search box labeled "email address" with a button beside it labeled "Check". Below the search box is a series of statistics about the size of the website's database.
Have I Been Pwned? (HIBP) is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The site has been widely touted as a … Wikipedia
Factsheet
Type of site Internet security
Created by Troy Hunt
URL haveibeenpwned.com
Factsheet
Type of site Internet security
Created by Troy Hunt
URL haveibeenpwned.com
🌐
Have I Been Pwned
haveibeenpwned.com
Have I Been Pwned: Check if your email address has been exposed in a data breach
This email address wasn't found in any of the data breaches loaded into Have I Been Pwned. That's great news! ... Oh no — pwned! This email address has been found in multiple data breaches. Review the details below to see where your data was exposed. Get notified when your email appears in future data breaches ... Use a password manager to generate and store strong, unique passwords for all your accounts.
Discussions

HaveIBeenPwned.com Passwords
its not a stupid question. id rather not do it by password. More on reddit.com
🌐 r/privacy
10
17
January 26, 2022
Is "Have I Been Pwned's" Pwned Passwords List really that useful? - Information Security Stack Exchange
My understanding of Have I Been Pwned is that it checks your password to see if someone else in the world has used it. This really doesn't seem that useful to me. It seems equivalent to asking if ... More on security.stackexchange.com
🌐 security.stackexchange.com
February 26, 2018
Does it really make sense to use Have I Been Pwned?
Your the only one that will have your own unique email - otherwise your mail would never arrive. When YOUR user name password combo is breached it's better to know than to not, so you can decide what's best for you. Better still - use unique passwords over every website for prevention. More on reddit.com
🌐 r/Passwords
14
10
March 29, 2025
Is the site haveibeenpwned a legit page?
If you suspect you may have malware on your computer, or are trying to remove malware from your computer, please see our malware guide Please ignore this message if the advice is not relevant. I am a bot, and this action was performed automatically. Please contact the moderators of this subreddit if you have any questions or concerns. More on reddit.com
🌐 r/techsupport
91
189
September 16, 2022
🌐
Have I Been Pwned
haveibeenpwned.com › FAQs
Have I Been Pwned: Frequently Asked Questions
It's typically used to imply that someone has been controlled or compromised, for example "I was pwned in the Adobe data breach". A "breach" is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient ...
🌐
Data Breach Lookup
databreach.com
Data Breach Lookup | Check If Your Information Was Exposed
Find out if your personal information was compromised in data breaches. Search your email on DataBreach.com to see where your data was leaked and learn how to protect yourself.
🌐
Reddit
reddit.com › r/privacy › haveibeenpwned.com passwords
r/privacy on Reddit: HaveIBeenPwned.com Passwords
January 26, 2022 -

I know this website is safe to check your email addresses. I noticed that there is a 'Passwords' section and you can enter your passwords in there to see if they have been breached.

This might sound like a stupid question, but is it actually safe to enter your password here to check to see if it has been breached?

🌐
Forbes
forbes.com › forbes homepage › innovation › cybersecurity
FBI Confirms 630 Million Stolen Passwords — How To Check Yours Now
2 days ago - ForbesMicrosoft Worm Attack Warning — Act Rapidly And Change Passwords NowBy Davey Winder · Troy Hunt, the creator of the ingenious Have I Been Pwned and Pwned Passwords services, has confirmed that the Federal Bureau of Investigation has handed over a staggering list of 630 million compromised passwords to add to the HIBP database of 17 billion compromised accounts.
🌐
Have I Been Pwned
haveibeenpwned.com › PwnedWebsites
Have I Been Pwned: Who's Been Pwned
Breached websites that have been loaded into Have I Been Pwned ... A "breach" is an incident where a site's data has been illegally accessed by hackers and then released publicly. Review these breaches to see what personal information was compromised and take appropriate action, such as changing passwords...
Find elsewhere
🌐
Password Manager
passwordmanager.com › home › have i been pwned?
Have I Been Pwned? | Password Manager
May 5, 2023 - Disclosure: PasswordManager.com earns a commission from referring visitors to some products and services using affiliate partnerships. ... Find out if your email or phone has been pwned, which means being involved in a data breach.
🌐
Troy Hunt
troyhunt.com › 2-billion-email-addresses-were-exposed-and-we-indexed-them-all-in-have-i-been-pwned
Troy Hunt: 2 Billion Email Addresses Were Exposed, and We Indexed Them All in Have I Been Pwned
November 14, 2025 - The two passwords against one person's name were both in Pwned Passwords (albeit only once each), yet it's entirely possible that neither of them had been used by this specific individual before.
Top answer
1 of 8
416

Disclaimer: I am the author, creator, owner and maintainer of Have I Been Pwned and the linked Pwned Passwords service.

Let me clarify all the points raised here:

The original purpose of HIBP was to enable people to discover where their email address had been exposed in data breaches. That remains the primary use case for the service today and there's almost 5B records in there to help people do that.

I added Pwned Passwords in August last year after NIST released a bunch of advice about how to strengthen authentication models. Part of that advice included the following:

When processing requests to establish and change memorized secrets, verifiers SHALL compare the prospective secrets against a list that contains values known to be commonly-used, expected, or compromised. For example, the list MAY include, but is not limited to: Passwords obtained from previous breach corpuses.

That's what Pwned Passwords addresses: NIST advised "what" you should do but didn't provide the passwords themselves. My service addresses the "how" part of it.

Now, practically, how much difference does it make? Is it really as you say in that it's just like a one in a million front door key situation? Well firstly, even if it was, the IRL example breaks down because there's no way some anonymous person on the other side of the world can try your front door key on millions of door in a rapid-fire, anonymous fashion. Secondly, the distribution of passwords is in no way linear; people choose the same crap ones over and over again and that puts those passwords at much higher risks than the ones we rarely see. And finally, credential stuffing is rampant and it's a really serious problem for organisations with online services. I continually hear from companies about the challenges they're having with attackers trying to login to people's accounts with legitimate credentials. Not only is that hard to stop, it may well make the company liable - this popped up just last week: "The FTC’s message is loud and clear: If customer data was put at risk by credential stuffing, then being the innocent corporate victim is no defence to an enforcement case" https://biglawbusiness.com/cybersecurity-enforcers-wake-up-to-unauthorized-computer-access-via-credential-stuffing/

Having seen a password in a data breach before is only one indicator of risk and it's one that each organisation using the data can decide how to handle. They might ask users to choose another one if it's been seen many times before (there's a count next to each one), flag the risk to them or even just silently mark the account. That's one defence along with MFA, anti-automation and other behavioural based heuristics. It's merely one part of the solution.

And incidentally, people can either use the (freely available) k-Anonymity model via API which goes a long way to protecting the identity of the source password or just download the entire set of hashes (also freely available) and process them locally. No licence terms, no requirement for attribution, just go and do good things with it :)

2 of 8
73

This answer refers solely to the original HIBP part of Troy's site, before the question was updated. Please read Troy's post for specifics on the Pwned Passwords section of it.

That is not at all what it is for. It isn't actually even an indication if it has been used - just an indication that it has been leaked.

Its use comes in knowing that attackers are likely to have your email address and password...

Which they can then use anywhere you have used that set of credentials. And it is an amazingly successful attack technique.

Obviously, if you only ever use a password on one particular site, and it bears no relationship to passwords used on other sites, then once you change that password you are as safe as you can be. In fact, the general guidance is that the key trigger for password change should be suspicion of a breach.

You do that, right?

🌐
Wikipedia
en.wikipedia.org › wiki › Have_I_Been_Pwned
Have I Been Pwned? - Wikipedia
1 month ago - (HIBP) is a website that allows Internet users to check whether their personal data has been compromised by data breaches. The site has been widely touted as a valuable resource for Internet users wishing to protect their own security and privacy.
🌐
1Password
1password.com › haveibeenpwned
Have I Been Pwned | 1Password
Discovered your data was breached? Learn about Have I Been Pwned and how 1Password can secure your online accounts and sensitive information.
🌐
YouTube
youtube.com › burton kelso, the technology expert
How To Use Have I Been Pwned to See If Your Data Was Compromised - YouTube
If you're wondering if your information has been compromised, you need to immediately use Have I Been Pwned? This website created by Troy Hunt was designed f...
Published   December 5, 2023
Views   1K
🌐
New Scientist
newscientist.com › article › 2485098-your-passwords-have-probably-been-stolen-and-sold-on-the-dark-web
Your passwords have probably been stolen and sold on the dark web | New Scientist
June 20, 2025 - Hattingh begins by showing me a website called Have I Been Pwned (a slang term meaning that your data has been compromised), which compiles usernames and passwords shared on the dark web into a single searchable database.
🌐
Have I Been Pwned
haveibeenpwned.com › breach › Cit0day
Have I Been Pwned: Cit0day Data Breach
Independent verification of the ... you haven’t already changed the password affected by this breach, do so immediately on every account where it was used....
🌐
Clean Email
clean.email › have-you-been-pwned
Have I Been Pwned? What It Means And How To Protect Your Email
1 month ago - Instead, it means your email address, password, or personal data was exposed in a data breach. This use of the term reflects the fact that hackers have "owned" or compromised your information.
🌐
GitHub
github.com › HaveIBeenPwned › PwnedPasswordsDownloader
GitHub - HaveIBeenPwned/PwnedPasswordsDownloader: A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API
haveibeenpwned-downloader is a dotnet tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API.
Starred by 1.1K users
Forked by 109 users
Languages   C#
🌐
Home Assistant
home-assistant.io › more-info › pwned-passwords
Pwned passwords and secrets - Home Assistant
. Your secrets are hashed, the first 5 characters of the hash result are used to query Have I Been Pwned. Have I Been Pwned returns the results of possible password hashes that match, we check the last part of the password hash against this ...