How to Check If Your Email Has Been Compromised

Learn how to check if your email address has appeared in a data breach, what the results mean, and exactly what steps to take based on what was exposed.

Table of Contents

Your email address is the common thread that connects nearly all of your online accounts. It serves as your username, your recovery mechanism, and your primary point of contact – which makes it the single most important identifier to check when a data breach occurs. If your email appears in a breach database, it means your credentials at that service were exposed, and the downstream risks depend on what other data was taken alongside it.

This guide walks you through the process of checking whether your email has been compromised, interpreting the results, and taking the right actions based on what you find.

Why Your Email Address Matters So Much

When attackers breach a database, the email address is almost always included in the stolen data. It is the universal identifier that links your accounts together, and it is the starting point for several types of attacks:

Credential stuffing: If a password was stolen alongside your email, attackers will automatically try that email-password combination at hundreds of other services. With 94% of passwords reused or duplicated, this works far more often than it should. Our guide on credential stuffing explains the mechanics in detail.

Phishing: Knowing your email address and that you had an account at a specific service gives attackers the context they need to craft convincing phishing emails. “We noticed unusual activity on your [breached service] account” is far more believable when you actually have an account there.

Account takeover: If the breached service uses email-based password resets (most do), and the attacker can access your email account, they can reset passwords at any connected service.

How to Check: Step by Step

Step 1: Use Have I Been Pwned

The most comprehensive and widely trusted breach-checking service is Have I Been Pwned (HIBP), created by security researcher Troy Hunt. Visit haveibeenpwned.com and enter your email address.

HIBP searches its database of over 14 billion breached records and tells you which breaches include your email. For a deeper dive into HIBP and similar tools, see our dedicated guide to breach-checking tools.

What the results show: Each breach listing includes the service that was breached, the date of the breach, the number of accounts exposed, and the categories of data that were compromised (e.g., email addresses, passwords, phone numbers, physical addresses).

Step 2: Check All Your Email Addresses

Most people have more than one email address – a personal address, a work address, perhaps an older address from a previous provider. Check every email address you have ever used to sign up for online services. Breaches from years ago remain relevant because the stolen data persists on dark web marketplaces indefinitely.

Step 3: Check for Password Exposure

HIBP also offers a Pwned Passwords feature that lets you check whether a specific password has appeared in any known breach. This does not tell you which breach – it simply tells you whether the password exists in a database of compromised credentials.

Important security note: HIBP uses a k-anonymity model for password checks. Your full password is never sent to the server. The tool hashes your password locally, sends only the first five characters of the hash, and receives a list of matching hashes to compare against locally. This is safe to use.

If any password you currently use appears in the Pwned Passwords database, change it immediately at every service where you use it. Better yet, use a password manager to generate and store unique passwords for every account.

Step 4: Check with Your Email Provider

Major email providers offer their own breach-related tools:

  • Google: The Google Security Checkup at myaccount.google.com reviews your saved passwords for known breaches and shows recent security events on your account.
  • Apple: If you use iCloud Keychain or the Apple Passwords app, it automatically monitors your saved passwords against known breach databases and alerts you through Security Recommendations in Settings.
  • Mozilla: Firefox Monitor (monitor.mozilla.org) uses HIBP’s database and integrates with your Firefox account to provide ongoing monitoring.

Step 5: Check Your Password Manager’s Audit Feature

Most modern password managers include a security audit or health check feature that scans your stored credentials against known breach databases:

  • 1Password: Watchtower
  • Bitwarden: Vault Health Reports
  • PanicVault: Integrates with the Apple ecosystem’s security monitoring to flag compromised credentials stored in your KeePass database
  • KeePassXC: HIBP integration in the database menu

Run this audit regularly, not just when you hear about a breach. Many breaches are not publicly reported for months or years after they occur.

Interpreting Your Results

“No Breaches Found”

This does not guarantee your data has never been exposed. It means your email does not appear in HIBP’s database, which – while comprehensive – does not include every breach that has ever occurred. Some breaches are never publicly reported. Others involve data that has not yet been shared with HIBP.

Action: No immediate action required, but set up notifications for future breaches (see below) and continue using strong, unique passwords with two-factor authentication.

“Found in 1-3 Breaches”

Common for anyone who has been online for more than a few years. Review the specific breaches to understand what was exposed.

If only your email was exposed: The risk is increased phishing and spam. Be more vigilant about suspicious emails claiming to be from the breached services.

If your email and password were exposed: Change the password at the breached service immediately, and at every other service where you used the same password. This is the scenario where credential stuffing becomes a direct threat.

Action: Change affected passwords, enable two-factor authentication on the breached accounts, and consider this a prompt to adopt a password manager if you are not using one.

“Found in 4+ Breaches”

You have significant exposure. Multiple breaches across different services mean attackers have a rich profile of your email address – and potentially multiple passwords associated with it.

Action: Treat this as a wake-up call. Systematically change every password in your digital life to a unique, randomly generated one. A password manager makes this manageable even with 250+ accounts. Enable two-factor authentication everywhere. Consider identity theft monitoring if breaches include sensitive personal information.

Sensitive Breaches

HIBP flags certain breaches as “sensitive” – these include adult websites, dating services, and sites that could cause social or professional harm if association were known. These breaches are not publicly searchable; they are only shown through verified email notification.

Setting Up Ongoing Monitoring

Checking once is not enough. New breaches are discovered constantly, and data from breaches that occurred months or years ago may only now be circulating publicly.

HIBP Email Notification

Register your email addresses at haveibeenpwned.com/NotifyMe to receive automatic notifications when your email appears in newly loaded breaches. This is free and is one of the most valuable security measures you can set up in under a minute.

Browser Integration

Firefox and some Chromium-based browsers integrate breach monitoring directly into the browser experience, alerting you when saved passwords match known breaches.

Password Manager Monitoring

If your password manager supports ongoing breach monitoring – checking your credentials against breach databases periodically rather than only on demand – enable it. This gives you the earliest possible warning when credentials need to be changed.

Dedicated Monitoring Services

For more comprehensive coverage, identity theft monitoring services and dark web monitoring go beyond email breach checks to scan for your personal information across a broader range of sources, including dark web forums and marketplaces where stolen data is traded.

What If Your Email Account Itself Was Hacked?

There is a difference between your email appearing in a breach of another service and your email account itself being compromised. If you suspect someone has unauthorized access to your actual email account:

  1. Change your email password immediately using a device you trust.
  2. Enable two-factor authentication on the email account if not already active.
  3. Review connected apps and devices – revoke access for anything you do not recognize.
  4. Check forwarding rules and filters – attackers often set up silent forwarding to maintain access even after you change your password.
  5. Review sent mail and trash – look for messages sent from your account that you did not write.
  6. Check other accounts that use this email for password resets. If the attacker had access to your email, they may have reset passwords at other services.

A compromised email account is a Tier 1 emergency because it potentially gives the attacker access to every account that uses that email for password recovery. Act immediately, and follow the complete breach response checklist.

Building a Breach-Resistant Email Strategy

Beyond checking and monitoring, you can structure your email usage to limit breach impact:

Use email aliases or plus addressing: Many email providers support aliases (yourname+sitename@gmail.com). Using a unique alias for each service helps you identify which service was breached when you start receiving spam to a specific alias.

Separate your recovery email: Use a dedicated, rarely-shared email address as the recovery address for your primary email account. This email should not be used to sign up for other services, reducing its exposure to breaches.

Use a password manager for all credentials: With a password manager generating unique passwords for every account, a breach at one service cannot cascade to others through credential stuffing. Tools like PanicVault store your encrypted database locally in the KeePass format, meaning your credential vault itself is not exposed to cloud-based breaches – even if PanicVault as a company were compromised, your data lives on your devices and your iCloud Drive, not on PanicVault’s servers.

Protect Your Passwords with PanicVault

A secure, offline-first password manager using the open KeePass format. Your passwords, your file, your control.

Download on the App Store