Data Breach Case Files

TRACED

EVERY BREACH. EVERY RECORD. FULLY EXPOSED.

940 CASES ON FILE
·
15.9B ACCOUNTS COMPROMISED
·
155 DATA TYPES STOLEN
·
814 CRITICAL
FIELD BRIEFING HOW TO READ THESE FILES
QUICK REFERENCE
CRITICAL

Passwords, financial data, or government IDs were in this one. If you had an account there, it's worth changing your password and checking if you reused it elsewhere.

UNSOLVED

Happened within the last 5 years. The data is likely still floating around. If you had an account with the affected service, consider it compromised.

COLD CASE

Older breach, lower-stakes data. Good historical context — usernames, email addresses, that kind of thing. Less urgent, but worth knowing about.

CASE FILE

Each breach gets its own page with dates, what data was taken, and how long it sat undiscovered. It's the same data HIBP has — just presented in a way that makes it more interesting to browse. 940 total.

DISCOVERY GAP

How long between when a breach happened and when anyone found out. Some went years. That's the window where the data was out there and nobody was warned.

DATA SOURCE

All of this comes from Have I Been Pwned, Troy Hunt's free breach database. This site is just a different way to look at data he's already made public.

INCIDENT FREQUENCY — 0 RECORDED EVENTSCRITICALUNSOLVEDCOLD CASE

Breach Archive

LOADING CASE FILES...