Email Breach Checker
Check if your email or password has appeared in a known data breach. Powered by XposedOrNot — free, open-source breach monitoring with risk scoring.
Check if your email appeared in a known data breach. Powered by XposedOrNot — open-source, free breach monitoring. Your email is proxied through our server and never stored.
Add a VPN for complete protection
A VPN prevents your ISP and network from seeing which sites you log into, adding an extra layer of defence even when credentials have been exposed.
Get LimeVPN — From $5.99/moQuick Answer
Enter your email to check against billions of records from thousands of known data breaches. The password check uses k-anonymity — only the first 5 characters of your SHA-1 hash are sent to the API, so your actual password is never transmitted. Powered by XposedOrNot.
- • Data breach records cover billions of accounts from Yahoo, LinkedIn, RockYou, Adobe and thousands more
- • Risk score (0–100): 100 = multiple breaches with plain-text passwords
- • k-anonymity: your password hash is never sent — only a 5-char prefix
- • Change breached passwords immediately + enable 2FA on affected accounts
What Is a Data Breach?
A data breach occurs when an attacker gains unauthorised access to a company's database and extracts user records. The stolen data — emails, passwords, names, phone numbers, credit card details — is typically sold on dark web markets or dumped publicly. Billions of records have been exposed in breaches from companies like Yahoo, LinkedIn, Adobe, RockYou, and hundreds of others.
Even if you don't recognise a breached service, your email may have been included if you ever used that service, or if an aggregator purchased data containing your address.
Why Password Reuse Is Dangerous
Attackers use "credential stuffing" — automatically trying breach credentials against hundreds of sites. If you used the same email and password on LinkedIn in 2012 as you use on your bank today, a credential stuffing attack could compromise your bank account using 10-year-old stolen data.
The solution is a password manager (Bitwarden, 1Password, Proton Pass) that generates a unique, random 20+ character password for every service you use. With a password manager, a breach of one service cannot compromise any other.
The k-Anonymity Password Check Model
The password check uses a model designed to be completely private. Here's exactly what happens:
Your password is SHA-1 hashed in browser
The hashing runs entirely in your browser using JavaScript — for example, "password123" becomes "CBFDAC6008F9CAB4083784CBD1874F76618D2A97". Nothing is sent yet.
Only first 5 characters sent to API
Only the first 5 hex characters of the SHA-1 hash (e.g., "CBFDA") are sent to the HaveIBeenPwned Pwned Passwords API. Your password and its full hash remain on your device.
API returns all matching hash suffixes
The API responds with thousands of hash suffixes that begin with those 5 characters — all the breached passwords in that prefix range. The API cannot tell which one you're looking for.
Browser checks your full hash in that list
Your browser compares the full hash of your password against the returned list locally. If it matches, the password has been seen in a breach. This comparison never leaves your device.
Your password/full hash never transmitted
This model was designed by Troy Hunt and Cloudflare and is open source. Cloudflare themselves cannot see which password you checked. Neither can we.
Protect Your Accounts with LimeVPN
Even with strong passwords, a VPN prevents your ISP and network from seeing which sites you log into. LimeVPN adds a critical layer of account security.
Get LimeVPN — From $5.99/moAES-256 Encryption · No-Logs Policy · 30+ Locations · Kill Switch
Frequently Asked Questions
What is XposedOrNot? ▼
Is it safe to enter my email here? ▼
How is the password check private? ▼
What should I do if my email is in a breach? ▼
What does the risk score mean? ▼
My password wasn't found — does that mean it's safe? ▼
More Privacy Tools
Data Broker Check
Find which data brokers hold your personal information and how to opt out.
VPN Connection Check
Instantly verify your VPN is working — IP, IPv6, WebRTC, and DNS in one test.
Site Privacy Scanner
Scan any website for security headers, HTTPS status, and third-party trackers.
LimeVPN Security Features
Kill switch, DNS protection, AES-256 encryption explained.