Password Breach Checker
A privacy-preserving password breach checker built on the Have I Been Pwned k-anonymity API. Your password is hashed locally with SHA-1; only the first 5 hex characters of the hash leave your device. Have I Been Pwned returns every leaked hash sharing that prefix (~500 of them), and your browser compares the remaining 35 characters locally. The full hash — and therefore the password — never leaves your machine.
How to use
Click the field and type or paste. The check runs on submit, not on every keystroke.
The browser hashes the password with SHA-1, sends only the first 5 hex characters of that hash to HIBP, receives ~500 candidate suffixes back.
Either "not found" or "seen N times". If found, change the password everywhere it is reused.
Use our password generator or passphrase generator for a unique, strong replacement.
Find out if your password has leaked, without sending it to anyone
Features
FAQ
Does my password leave my device?
No. Only the first 5 hex characters of its SHA-1 hash are sent to HIBP. That prefix is consistent with about 500 different passwords, so HIBP cannot determine which one you checked.
What is k-anonymity?
A privacy model where a query is mixed in with k other indistinguishable queries. Sending a 5-character SHA-1 prefix means your query is indistinguishable from ~500 others, so the server cannot uniquely identify what you looked up.
Why SHA-1, isn't it broken?
SHA-1 is broken for collision resistance (the SHAttered attack), but k-anonymity does not depend on that. The prefix only needs to spread real passwords evenly across buckets, which SHA-1 does fine.
Where does the breach data come from?
Troy Hunt's Have I Been Pwned project (haveibeenpwned.com). It aggregates publicly-disclosed breaches and curated lists. 800+ breaches; 13+ billion compromised credentials.
My password is not in the database — is it strong?
Not necessarily. It just means it has not appeared in any leaked database yet. A short or predictable password can still be cracked by online or offline brute force. Always test strength separately.
What should I do if it is breached?
Immediately stop using it. Generate a unique replacement for every site where the password was reused. Switch to a password manager. Enable 2FA wherever possible.
We can — and it's free! Just send us a quick message with your idea. If you'd like to discuss it in detail, leave your email and we'll get back to you. You can stay anonymous.