Password Breach Checker
Check if a password appeared in known data breaches using k-anonymity. Only the first 5 SHA-1 hash characters are sent — your password never leaves your browser.
Your password never leaves your browser
We use k-anonymity — only the first 5 characters of a SHA-1 hash are sent to the Have I Been Pwned API. Your full password is never transmitted to any server.
Not found in any known data breaches
This password has not appeared in any of the data breaches indexed by Have I Been Pwned. This does not guarantee it is secure — always use a unique password for each account.
Found in data breaches
This password has been seen 0 times in known data breaches. You should change it immediately and avoid reusing it anywhere.
Check failed
—
Enter a password above and click Check to see if it has appeared in any known data breaches.
How to use Password Breach Checker
-
Enter your password
Type or paste the password you want to check into the secure input field. Click the eye icon to toggle visibility.
-
Click Check
Press the Check button. The password is hashed with SHA-1 locally and only the first 5 hex characters are sent to the Have I Been Pwned API.
-
Review the breach result
See whether the password appears in any known breach database and, if so, how many times it has been seen. Even one occurrence is cause for concern.
-
Check the strength meter
Review the strength indicator for additional context on the password's entropy and complexity independently of its breach status.
-
Generate a new password if needed
If your password was found in breaches or is weak, use the Password Generator to create a strong replacement.
Password Breach Checker FAQ
Is my password sent to a server?
Is this tool safe to use?
Are inputs sent to a server?
What does k-anonymity mean?
Should I change my password if it appears in a breach?
Why does this use SHA-1 if SHA-1 is considered weak?
What is the Have I Been Pwned database?
Does 'not found' mean my password is secure?
How often is the HIBP database updated?
Background
Verify whether a password has been exposed in any known data breach using the Have I Been Pwned Pwned Passwords API — the industry standard for breach database lookups with over 800 million compromised passwords.
How k-anonymity works: Your password is hashed locally with SHA-1 via the WebCrypto API. Only the first 5 hex characters of that hash are sent to the HIBP API. The API returns all hashes matching that prefix (typically 500–1000 entries). Your browser then checks locally whether the full hash appears in the returned list. Your password and full hash never leave your device.
What the results mean:
- Found N times — the password appears in breach databases. Even one occurrence means attackers include it in credential-stuffing attacks. Change it immediately and use a unique password for every account.
- Not found — the password has not been seen in indexed breaches. This does not guarantee it is unguessable — also check the strength meter.
Strength meter: A built-in entropy-based strength indicator evaluates password complexity independently of breach status.
Privacy: Your password is never transmitted. The k-anonymity model makes it mathematically infeasible to reconstruct your password from the 5-character prefix sent to the API.
Related tools
Password Generator
Generate cryptographically secure passwords with custom length (8–128), character sets, entropy display, and exclude-ambiguous option. Runs in your browser.
Hash Generator
Generate MD5, SHA-1, SHA-256, and SHA-512 hashes from text or files instantly in your browser.
SHA-256 Hash Generator
Generate SHA-256 hashes from text instantly. WebCrypto hardware-accelerated, real-time output. Used in Bitcoin, TLS, and digital signatures. Zero uploads.
Bcrypt Hash Generator
Generate bcrypt hashes with configurable cost factor (4–31). Auto-salted, rainbow-table resistant, fully browser-based. Recommended for secure password storage.
Learn more
How Long Does It Take to Crack a Password in 2026?
See real password crack times by length and character set, from 4 to 20 characters, plus the defenses that actually matter.
securityPasskeys vs Authenticator App vs SMS: Best 2FA in 2026
Passkeys, authenticator apps, SMS, push, and security keys compared. See phishing resistance, SIM-swap risk, and the best 2FA choice for each account.