What is Have I Been Pwned? How to Check if You're Breached
What Is Have I Been Pwned?
Have I Been Pwned (HIBP) is a free service created by security researcher Troy Hunt that lets you check whether your personal data has been exposed in known data breaches. Since its launch in 2013, it has become the definitive resource for breach notification, cataloging billions of breached records from thousands of data breaches.
The name comes from internet slang — “pwned” means compromised or owned, originating from gaming culture. If your email appears in the database, your account data has been exposed in at least one breach.
How Data Breaches Happen
Data breaches occur when attackers gain unauthorized access to a company’s database. Common attack vectors include:
- SQL injection — Exploiting vulnerabilities in web applications to extract database contents.
- Credential stuffing — Using leaked username and password pairs from one breach to access other services.
- Phishing — Tricking employees into revealing login credentials.
- Misconfigured databases — Databases accidentally exposed to the public internet without authentication.
- Supply chain attacks — Compromising a third-party vendor to gain access to a larger target.
Major breaches have affected billions of accounts. LinkedIn, Adobe, MyFitnessPal, Canva, and countless other services have been breached, often exposing email addresses, passwords (sometimes in plaintext or weakly hashed), names, phone numbers, and other personal data.
What Gets Exposed in a Breach
The specific data varies by breach, but commonly includes:
- Email addresses — Almost always included and used as the primary identifier.
- Passwords — Sometimes hashed, sometimes in plaintext. Weak hashes (MD5, SHA-1 without salt) can be cracked quickly.
- Names and usernames — Often included in the account record.
- Phone numbers — Frequently stored for account recovery or two-factor authentication.
- Physical addresses — Common in e-commerce and service breaches.
- Financial data — Credit card numbers or bank details in severe cases.
- IP addresses and device info — Can reveal location and browsing habits.
How to Check Your Email
Using Have I Been Pwned
- Visit haveibeenpwned.com
- Enter your email address in the search box
- Click “pwned?” to see results
The site will list every known breach that includes your email address, along with the date, the types of data exposed, and a brief description of the incident.
Subscribe to Notifications
HIBP offers a free notification service. Enter your email address on the notification page, verify it, and you will receive an automatic alert whenever your email appears in a newly added breach. This is one of the most valuable security measures you can take.
How to Check Your Passwords
Checking passwords requires extra care because you should never type your actual password into a third-party website. HIBP’s password check uses a clever privacy-preserving technique called k-anonymity:
- Your password is hashed locally using SHA-1
- Only the first 5 characters of the hash are sent to the API
- The API returns all known breached hashes that share those 5 characters
- Your device checks locally whether the full hash appears in the returned list
This means your actual password and even its full hash are never transmitted. The API cannot determine which hash you are checking.
The passforge Breach Checker implements this same k-anonymity approach directly in your browser. Enter a password, and it checks against the HIBP Pwned Passwords database without ever sending your password over the network.
What to Do If You Are Breached
Step 1: Change Affected Passwords Immediately
If a breached service used a password you also use elsewhere (and you should not be reusing passwords), change it on every site where it was used. Use the passforge Password Generator to create a unique, strong password for each account.
Step 2: Enable Two-Factor Authentication
Add 2FA to every breached account and all other important accounts (email, banking, social media). This ensures that even if an attacker has your password, they cannot access your account without the second factor.
Step 3: Monitor Financial Accounts
If financial data was exposed, monitor your bank and credit card statements for unauthorized transactions. Consider placing a credit freeze with the major credit bureaus (Equifax, Experian, TransUnion) to prevent new accounts from being opened in your name.
Step 4: Watch for Phishing
After a breach, attackers often send targeted phishing emails using the breached data to appear legitimate. Be extra cautious about emails claiming to be from the breached service, especially those asking you to “verify your account” or “reset your password” via a link.
Step 5: Use a Password Manager
If this breach revealed that you reuse passwords, now is the time to adopt a password manager. Generate unique passwords for every account so a single breach never cascades across your digital life.
Breach Statistics
The scale of data breaches is staggering. HIBP has cataloged over 700 breached sites and over 12 billion compromised accounts. Some notable breaches include:
- Collection #1 — 773 million unique email addresses from aggregated breach data
- LinkedIn (2012/2021) — 700+ million records scraped and sold
- Adobe (2013) — 153 million records with poorly encrypted passwords
- MyFitnessPal (2018) — 150 million accounts
These numbers underscore why unique passwords and breach monitoring are essential, not optional.
Check Your Security Now
Start by checking your email on Have I Been Pwned, then use the passforge Breach Checker to verify that your current passwords have not appeared in any known breaches. Follow up with the Password Strength Checker to ensure your passwords meet modern security standards.