TRACED public data breach archive
KNOWN BREACHES. ON THE RECORD.
- CASE FILES
- 955
- EXPOSED ACCOUNTS
- 16.0B
- DATA TYPES EXPOSED
- 155
- CRITICAL
- 827
TRACED turns public Have I Been Pwned breach records into readable case files. It is built for quick research, password hygiene, and privacy-aware review, with no accounts, analytics, or server-side password collection. Use it to compare breach dates, exposed data classes, incident severity, and password exposure risk before deciding which accounts need rotation, passkeys, or closer monitoring.
Passwords, financial data, or government IDs were exposed. If you had an account there, change your password and check whether you reused it anywhere else.
Happened within the last 5 years. If you had an account with the affected service, treat it as compromised and review anything tied to it.
Older breach, generally lower-risk data. Less urgent, but still useful context if you want the full history on a service.
Each breach gets its own page with dates, exposed data types, and how long it took to become public. Same HIBP data, just easier to browse. 955 total.
The gap between when a breach happened and when it became public. Sometimes that window lasted months or years.
All of this comes from Have I Been Pwned, Troy Hunt's public breach database. This site just presents that data in a different format.