Data Breach Lookup Website

Have I Been Pwned

Have I Been Pwned is a security website where people check whether email addresses, phone numbers, passwords, or domains appear in known data breaches, pastes, stealer logs, or exposed credential datasets.

Official site
haveibeenpwned.com is the main public website for Have I Been Pwned.
Creator
The official About page identifies Troy Hunt as the creator of Have I Been Pwned.
Core use
Users search for accounts, passwords, domains, or breach records to understand whether exposed data may require password changes, alerts, or account-hardening steps.
Have I Been Pwned helps people check whether personal data has appeared in known breaches and exposed credential datasets.View logo on Wikimedia Commons

What Have I Been Pwned is

Have I Been Pwned official site is a data breach lookup website. It lets people check whether an email address, phone number, password, or domain appears in breach-related datasets that have been loaded into the service.

Account breach search

The main search experience answers a practical question: has this account identifier appeared in a known breach? A result does not automatically mean someone is currently inside the account, but it does mean the user should review the listed incident, change reused passwords, turn on stronger authentication, and watch for follow-on abuse such as phishing.

Pwned Passwords

Pwned Passwords is the part of HIBP focused on passwords that have appeared in data breaches. The site explains that password checks use k-anonymity so a full password, or a full password hash, does not need to be sent to the service. This makes the feature useful for users, password managers, and developers who want to block or warn about already-exposed passwords.

Breach catalog

HIBP also publishes a breached-sites catalog. Each breach entry can summarize what happened, when the incident occurred or was added, and which data classes were exposed. That context matters because an email-only exposure, a password exposure, and a full identity-data exposure require different levels of follow-up.

APIs and integrations

The API documentation describes REST endpoints for breach, paste, domain, stealer log, and password workflows. Developers use these interfaces to add breach monitoring, password screening, and organizational domain checks to security tools, account systems, and password managers.

Who uses HIBP

HIBP is used by everyday internet users, security teams, domain owners, help desks, journalists, researchers, developers, and password-manager vendors. A consumer might check a personal email address, while an organization might monitor verified domains so it can respond when employee addresses appear in new breach data.

Important limits

HIBP is a warning and lookup service, not a complete identity-protection system. It cannot prove that an account is safe, list every breach that has ever occurred, or remove exposed data from the internet. Its most useful role is to turn breach awareness into action: unique passwords, password managers, multi-factor authentication, account recovery review, and phishing caution.

Why it matters

Data breaches turn old usernames, emails, phone numbers, and passwords into raw material for credential stuffing and targeted scams. Have I Been Pwned matters because it gives people and organizations a plain-language signal that their data has appeared somewhere it should not have, making it easier to respond before attackers reuse the information.

WHOIS domain data

Data pulled: May 23, 2026View current WHOIS record

Domain
haveibeenpwned.com
IP address
104.16.123.33
Registrar
1API GmbH
WHOIS server
whois.1api.net
Referral URL
http://www.1api.net
Created
November 13, 2013
Updated
November 23, 2025
Expires
November 13, 2026
Nameservers
rob.ns.cloudflare.com (108.162.193.140); leah.ns.cloudflare.com (173.245.58.129)
Domain status
clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Contact privacy
Registrant contact details are redacted for privacy; the record lists Queensland, AU as the registrant location.