Public Breach Archive

TRACED public data breach archive

KNOWN BREACHES. ON THE RECORD.

CASE FILES
955
·
EXPOSED ACCOUNTS
16.0B
·
DATA TYPES EXPOSED
155
·
CRITICAL
827

TRACED turns public Have I Been Pwned breach records into readable case files. It is built for quick research, password hygiene, and privacy-aware review, with no accounts, analytics, or server-side password collection. Use it to compare breach dates, exposed data classes, incident severity, and password exposure risk before deciding which accounts need rotation, passkeys, or closer monitoring.

FIELD BRIEFING HOW TO READ THESE FILES
QUICK REFERENCE
CRITICAL

Passwords, financial data, or government IDs were exposed. If you had an account there, change your password and check whether you reused it anywhere else.

UNSOLVED

Happened within the last 5 years. If you had an account with the affected service, treat it as compromised and review anything tied to it.

COLD CASE

Older breach, generally lower-risk data. Less urgent, but still useful context if you want the full history on a service.

CASE FILE

Each breach gets its own page with dates, exposed data types, and how long it took to become public. Same HIBP data, just easier to browse. 955 total.

DISCOVERY GAP

The gap between when a breach happened and when it became public. Sometimes that window lasted months or years.

DATA SOURCE

All of this comes from Have I Been Pwned, Troy Hunt's public breach database. This site just presents that data in a different format.

Breach Archive