- Pwned Passwords - Have I Been Pwned
This password wasn't found in any of the Pwned Passwords loaded into Have I Been Pwned That doesn't necessarily mean it's a good password, merely that it's not indexed on this site
- Sign In to Your Dashboard - Have I Been Pwned
Sign in to access your Have I Been Pwned dashboard, where you can search sensitive breaches, view stealer logs, manage domains, and access subscription features
- Frequently Asked Questions - Have I Been Pwned
Find answers to frequently asked questions about Have I Been Pwned, including data sources, breach handling, notification services, and account security
- Who, What Why - Have I Been Pwned
Learn about Have I Been Pwned, why it was created, who runs it, and how it helps people discover if their personal data has been exposed in data breaches
- Have I Been Pwned: Free Data Breach
© 2025 Have I Been Pwned All rights reserved The content on this page was tailored for United States
- API Documentation - Have I Been Pwned
In other words, you're welcome to use the public API to build other services, but you must identify Have I Been Pwned as the source of the data Clear and visible attribution with a link to haveibeenpwned com should be present anywhere data from the service is used including when searching breaches or pastes and when representing breach
- Subscriptions - Have I Been Pwned
Subscribe to unlock advanced features in Have I Been Pwned, including domain monitoring, API access, and email breach alerts Choose a plan that fits your needs
- What stealer log information can we see with a Pwned 5 subscription . . .
A Pwned 5 (or higher) subscription enables you to see the websites email addresses in stealer logs were entered against For example, if jane@yourdomain com entered her email address and password into Netflix and Spotify and they were obtained by an info stealer, you could use the API to get all stealer log email aliases for an email domain to return Jane's alias along with netflix com and
|