Password Breach Checker
Check if your password has appeared in known data breaches using the Have I Been Pwned database. Uses k-anonymity so your full password is never transmitted.
How K-Anonymity Protects Your Password
This tool uses the Have I Been Pwned k-anonymity model. Your full password (or its full hash) is never sent to any server. Here is exactly what happens:
Sent to API: 5BAA6 | Kept local: 1E4C9B93F3F...68FD8
What To Do If Your Password Was Breached
• Change the password immediately on every account where you use it.
• Use a unique, randomly generated password for each account. A password manager makes this easy.
• Enable two-factor authentication (2FA) wherever possible — even a breached password is useless without the second factor.
• Check haveibeenpwned.com to see if your email appears in any known breaches.
• Never reuse passwords across services. Credential stuffing attacks rely on password reuse.
Password hashed locally using the Web Crypto API — produces a 40-character hex digest
First 5 characters of the hash become the API query — the remaining 35 characters stay local
HIBP Pwned Passwords API returns ~500 hash suffixes matching the prefix — your full hash is never sent
Your browser compares the remaining 35 characters against the returned list — entirely client-side
If a match is found, the password has appeared in known breaches — the count indicates how many times
Spec: Have I Been Pwned Pwned Passwords API v3, NIST SP 800-63B (Digital Identity Guidelines)