How to Check If Your Password Has Been Leaked (Step-by-Step)

Over 12 billion credentials have been exposed in data breaches. Chances are, at least one of your passwords is floating around the dark web right now. Here's how to find out — and what to do about it.

Why You Need to Check for Leaked Passwords

Data breaches happen constantly. In 2024 alone, over 3,200 publicly reported breaches exposed more than 8 billion records worldwide. These stolen credentials don't just sit idle — they're actively traded on dark web marketplaces, compiled into massive "combo lists," and used in automated credential stuffing attacks within hours of a breach.

Here's the alarming part: most people don't know they've been breached. Companies sometimes take months or years to disclose breaches (if they disclose them at all). Meanwhile, attackers are testing your email and password combination against every major service — your bank, your email provider, your social media, your Amazon account.

If you've ever reused a password (and 65% of people do, according to Google's 2024 security survey), a single breach at one service can compromise every account that shares that password.

Understanding Breach Databases

When a company gets breached, the stolen data typically follows this path:

  1. Exfiltration: Attackers copy databases containing usernames, email addresses, passwords (sometimes hashed, sometimes in plain text), and other personal data.
  2. Private sale: The data is sold on dark web forums to the highest bidder, often within days of the breach.
  3. Combo list compilation: Buyers combine data from multiple breaches into massive lists sorted by email address or username.
  4. Credential stuffing: Automated tools test these email/password pairs across hundreds of popular websites at scale — sometimes millions of login attempts per hour.
  5. Public release: Eventually, many breach datasets become freely available, appearing on paste sites, forums, and aggregator databases.

Security researchers monitor these channels and compile breach data into searchable databases so you can check whether your credentials have been exposed. The most trusted of these is HaveIBeenPwned.

Step 1: Check Your Email on HaveIBeenPwned

HaveIBeenPwned (HIBP), created by security researcher Troy Hunt, is the gold standard for breach checking. It aggregates data from over 800 breached sites and 14 billion compromised accounts.

  1. Go to haveibeenpwned.com
  2. Enter your email address in the search bar.
  3. Click "pwned?" to check.
  4. Review the results. You'll see a list of every known breach that included your email address, along with what data was exposed (passwords, phone numbers, addresses, etc.).

Repeat this for every email address you use. Most people have 2-3 email addresses, and each may appear in different breaches.

Key Insight: HIBP is safe to use. Troy Hunt is a Microsoft Regional Director and trusted security professional. The site does not store or log your email queries, and it's used by governments and enterprises worldwide, including the FBI, which contributes seized breach data to HIBP's database.

Step 2: Check If a Specific Password Was Leaked

HIBP also lets you check individual passwords — and it does this without ever seeing your actual password.

  1. Go to haveibeenpwned.com/Passwords
  2. Enter the password you want to check.
  3. The site will tell you how many times that password has appeared in breach datasets.

How This Works (Safely)

HIBP uses a technique called k-anonymity to check your password without transmitting it:

The result: the HIBP server never sees your full password or its complete hash. The check is mathematically safe.

Step 3: Set Up Breach Notifications

Checking manually is good, but automated monitoring is better. Here's how to set up continuous alerts:

Key Insight: 1Password's Watchtower checks every password in your vault against HIBP's database of 900+ million compromised passwords. It also flags weak passwords, reused passwords, sites missing 2FA, and expiring credit cards — giving you a comprehensive security dashboard, not just breach alerts.

Automate Your Breach Monitoring

Stop checking manually. Let a password manager watch your credentials 24/7.

See Our #1 Pick: 1Password See NordPass (Best Value)

Step 4: What to Do If Your Password Was Leaked

Don't panic — but act quickly. Here's your action plan:

Immediate Actions (Do These Now)

  1. Change the compromised password immediately. Log into the breached service and update your password. Use your password manager to generate a random 20+ character password.
  2. Change the password everywhere you reused it. This is the critical step most people skip. If you used the same password on your email, bank, or social media, change all of them. Your password manager can identify reused passwords instantly.
  3. Enable two-factor authentication (2FA) on the breached account and all accounts that share the old password. Use an authenticator app (Google Authenticator, Authy) rather than SMS.
  4. Check for unauthorized activity. Review the breached account for unfamiliar logins, changes to settings (especially recovery email/phone), or unauthorized transactions.
  5. Revoke active sessions. Most services have a "sign out of all devices" option in security settings. Use it to kick out anyone who may have accessed your account.

Follow-Up Actions (Do These Within 48 Hours)

How Password Managers Prevent This Problem

The entire leaked password crisis exists because of one behavior: password reuse. If every account has a unique password, a breach at one service affects only that one service. Here's how password managers solve this systematically:

Unique Passwords for Every Account

Password managers generate random, complex passwords (e.g., "k8$mP2x!vR9nQ4wL") for every site. You never reuse a password again, so a breach at one service never cascades.

Automatic Breach Monitoring

Features like 1Password Watchtower continuously scan your entire vault against breach databases and alert you the moment a credential is compromised — no manual checking needed.

One-Click Password Updates

When a breach is detected, you can generate a new password and update the credential in your vault in seconds. No trying to remember what your old password was.

Phishing Protection

Password managers auto-fill credentials based on the exact domain. They won't fill your Google password on "go0gle.com," effectively blocking phishing attacks that trick humans.

Other Breach Checking Tools Worth Knowing

For most people, HIBP combined with a password manager's built-in monitoring provides comprehensive coverage without needing specialized tools.

How to Stay Protected Going Forward

  1. Use a password manager — make every password unique and let Watchtower monitor for breaches automatically.
  2. Enable 2FA on all important accounts — even if a password leaks, 2FA blocks unauthorized access.
  3. Subscribe to HIBP notifications — free alerts whenever your email appears in a new breach.
  4. Use email aliases — services like 1Password's email masking or SimpleLogin let you use a unique email address for every service, making it harder to link your accounts across breaches.
  5. Never reuse passwords — this is the single behavior that turns a minor breach into a catastrophe.
Key Insight: According to Google's 2024 security research, users who adopt a password manager and enable 2FA reduce their risk of account takeover by 99.4%. These two steps alone eliminate the vast majority of credential-based attacks.

Frequently Asked Questions

Is HaveIBeenPwned safe to use?

Yes. HaveIBeenPwned (HIBP) was created by Troy Hunt, a respected security researcher and Microsoft Regional Director. When checking passwords, HIBP uses a k-anonymity model — your full password is never transmitted. Only the first 5 characters of a SHA-1 hash are sent, and you receive back a list of matching hashes to check locally. Your actual password never leaves your device.

How often should I check if my passwords have been leaked?

Rather than manually checking periodically, the best approach is to use a password manager with built-in breach monitoring (like 1Password's Watchtower) that continuously scans your credentials against breach databases and alerts you automatically. If you prefer manual checks, quarterly is a reasonable frequency for HaveIBeenPwned email checks.

My email was in a breach but I already changed my password. Am I safe?

Changing the password on the breached site is a good first step, but you're only fully protected if you also changed that password everywhere else you used it. Credential stuffing attacks test stolen email/password combinations across hundreds of sites. If you reused the breached password anywhere, those accounts are also at risk. A password manager ensures every account has a unique password, limiting breach damage to a single site.

Never Worry About Leaked Passwords Again

A password manager generates unique passwords, monitors for breaches, and alerts you instantly. Set it up once, stay protected forever.

Try 1Password Free for 14 Days See NordPass Plans (Best Value)