TOOLS / HIBP CHECK
Have I Been Pwned — Password Check
Check whether a password appears in known data breaches using HIBP’s k-anonymity API. We SHA-1 the password in your browser and only send the first 5 chars of the hash — your password and full hash never leave the page.
What it does
Have I Been Pwned (HIBP) maintains a database of 800 million+ passwords seen in real-world data breaches. The k-anonymity API lets you check a password without ever transmitting it: hash the password with SHA-1, send only the first 5 characters of the hash to HIBP, and HIBP returns every hash starting with those 5 chars plus a breach count. You compare locally. Even HIBP doesn’t know which password you checked. Our implementation does the SHA-1 in your browser via WebCrypto, so the full hash and the password itself never leave your tab.
How to use it
- Type or paste a password. Click "Check".
- Your browser hashes it locally with SHA-1.
- Only the first 5 hex chars of the hash are sent to HIBP’s range API.
- HIBP returns a list of all matching suffixes with their breach counts.
- Your browser scans the list for your specific suffix and reports the count.
Common use cases
Frequently asked questions
Is the password sent to HIBP? +
What if the password is "not found"? +
How fresh is the data? +
What about email-based pwnage check? +
Related tools
Related coverage on Ciphers Security
- CISA Contractor Leaked AWS GovCloud Keys on GitHub for Six Months
- CVE-2026-9082: Critical Drupal SQL Injection Under Attack on Thousands of Sites
- Kali365 PhaaS Kit Bypasses Microsoft 365 MFA via Device Code Phishing — FBI Warning
- Megalodon: Supply Chain Attack Backdoors 5,561 GitHub Repos in Six Hours via CI/CD Workflow Injection
- Stolen Gemini API Keys and AI Fraud: How 'Quantum Patriot' Drained Crypto Wallets via Fake QAnon Content
Free for everyone, no signup required. Tool runs at /tools/hibp-check/ — bookmark or share.