About 57 results
Open links in new tab
  1. Have I Been Pwned: Check if your email address has been exposed …

    Have I Been Pwned allows you to check whether your email address has been exposed in a data breach.

  2. Pwned Passwords - Have I Been Pwned

    The best way to get the most up-to-date passwords is via the API. Alternatively, use the free and open source Pwned Passwords downloader to take the entire corpus offline and run it yourself.

  3. Sign In to Your Dashboard - Have I Been Pwned

    Sign in to access your Have I Been Pwned dashboard, where you can search sensitive breaches, view stealer logs, manage domains, and access subscription features.

  4. Have I Been Pwned: Frequently Asked Questions

    Find answers to frequently asked questions about Have I Been Pwned, including data sources, breach handling, notification services, and account security.

  5. Get Breach Notifications - Have I Been Pwned

    Get notified if your email address appears in a future data breach. Have I Been Pwned will alert you when we find your email address is exposed.

  6. Have I Been Pwned: Data Troll Stealer Logs Data Breach

    Aug 13, 2025 · Get Aura for identity theft and credit protection. Keep your assets safe with fast fraud alerts, instant credit lock, and $1,000,000 identity theft insurance. Speak to a U.S. based …

  7. API Documentation - Have I Been Pwned

    The Pwned Passwords API is freely accessible without the need for a subscription and API key. Each password is stored as both a SHA-1 and an NTLM hash of a UTF-8 encoded password.

  8. Opt-Out - Have I Been Pwned

    Remove your email address from public search results on Have I Been Pwned. Opting out ensures it won’t be publicly visible via the breach lookup service.

  9. Subscriptions - Have I Been Pwned

    Subscribe to unlock advanced features in Have I Been Pwned, including domain monitoring, API access, and email breach alerts. Choose a plan that fits your needs.

  10. Internet Archive Data Breach - Have I Been Pwned

    Get Guardio for real-time protection after a breach. Guardio blocks AI-generated scam sites, fake login pages, and malicious pages designed to exploit leaked information.