• Bulgarian

    bulgaria

  • Corsican

    korsika

  • Czech

    tšekki

  • Welsh

    kymri

  • Danish

    tanska

  • German

    saksa

  • Lower Sorbian

    alasorbi

  • Greek

    kreikka

  • English

    englanti

  • Canadian English

    kanadanenglanti

  • British English

    britannianenglanti

  • Argentinian Spanish

    argentiinanespanja

  • Chilean Spanish

    chilenespanja

  • Spanish

    espanja

  • Mexican Spanish

    meksikonespanja

  • Persian

    persia

  • Finnish

    suomi

  • French

    ranska

  • Western Frisian

    länsifriisi

  • Upper Sorbian

    yläsorbi

  • Hungarian

    unkari

  • Interlingua

    interlingua

  • Indonesian

    indonesia

  • Icelandic

    islanti

  • Italian

    italia

  • Japanese

    japani

  • Lao

    lao

  • Korean

    korea

  • Dutch

    hollanti

  • Occitan

    oksitaani

  • Punjabi

    pandžabi

  • Polish

    puola

  • Portuguese

    portugali

  • European Portuguese

    euroopanportugali

  • Russian

    venäjä

  • Slovak

    slovakki

  • Slovenian

    sloveeni

  • Albanian

    albania

  • Swedish

    ruotsi

  • Thai

    thai

  • Turkish

    turkki

  • Ukrainian

    ukraina

  • Vietnamese

    vietnam

  • Simplified Chinese

    kiina (yksinkertaistettu)

  • Traditional Chinese

    kiina (perinteinen)

  • Albania

    Albania

  • Tirana

    Tirana

  • Australia

    Australia

  • Adelaide

    Adelaide

  • Brisbane

    Brisbane

  • Mozilla Monitor

    Mozilla Monitor

  • Monitor

    Monitor

  • Firefox

    Firefox

  • Have I Been Pwned

    Have I Been Pwned

  • Firefox Account

    Firefox Account

  • Pocket

    Pocket

  • Firefox Lockwise

    Firefox Lockwise

  • Firefox

    Firefox

  • Monitor

    Monitor

  • Mozilla Monitor

    Mozilla Monitor

  • Mozilla

    Mozilla

  • Premium

    Premium

  • Monitor Premium

    Monitor Premium

  • Mozilla Foundation

    Mozilla Foundation

  • GitHub

    GitHub

  • Mozilla VPN

    Mozilla VPN

  • Firefox Relay

    Firefox Relay

  • Mozilla Monitor

    Mozilla Monitor

  • Monitor Plus

    Monitor Plus

  • This email address is not subscribed to { -product-name }.

    This email address is not subscribed to { -product-name }.

  • Too many connections to { -brand-HIBP }.

    Too many connections to { -brand-HIBP }.

  • Error connecting to { -brand-HIBP }.

    Error connecting to { -brand-HIBP }.

  • Invalid Email

    Invalid Email

  • You are monitoring the maximum number of email addresses.

    You are monitoring the maximum number of email addresses.

  • This email has already been added to { -product-name }.

    This email has already been added to { -product-name }.

  • Another verification email cant be sent this quickly. Please try again later.

    Another verification email cant be sent this quickly. Please try again later.

  • Something went wrong adding another email address. Please try again later.

    Something went wrong adding another email address. Please try again later.

  • Something went wrong removing an email address. Please try again later.

    Something went wrong removing an email address. Please try again later.

  • Verification token is required.

    Verification token is required.

  • Compromised data:

    Compromised data:

  • Breach data provided by { $hibp-link }

    Breach data provided by { $hibp-link }

  • Show All

    Show all

  • Sign Out

    Sign Out

  • Manage { -brand-fxa }

    Manage { -brand-fxa }

  • Preferences

    Preferences

  • Home

    Home

  • Security Tips

    Security Tips

  • More about this breach

    More about this breach

  • Monitor several emails

    Monitor several emails

  • Website Breach

    Web Site Breach

  • Sensitive Website Breach

    Sensitive Web Site Breach

  • Data Aggregator Breach

    Data Aggregator Breach

  • What data was compromised:

    What data was compromised:

  • How does { -product-name } treat sensitive sites?

    How does { -product-name } treat sensitive sites?

  • { -product-name } only reveals accounts associated with these types of breaches after an email address has been verified. This means youre the only person who can see if your information was in this breach (unless someone else has access to your email account).

    { -product-name } only reveals accounts associated with these types of breaches after an email address has been verified. This means youre the only person who can see if your information was in this breach (unless someone else has access to your email account).

  • Why did it take so long to report this breach?

    Why did it take so long to report this breach?

  • It can sometimes take months or years for credentials exposed in a data breach to appear on the dark web. Breaches get added to our database as soon as they have been discovered and verified.

    It can sometimes take months or years for credentials exposed in a data breach to appear on the dark web. Breaches get added to our database as soon as they have been discovered and verified.

  • { -product-name } warns you if your email address has been exposed in an online data breach. See if your information has been exposed, learn how to better protect your online accounts, and get alerted if your email address appears in a new breach.

    { -product-name } warns you if your email address has been exposed in an online data breach. See if your information has been exposed, learn how to better protect your online accounts, and get alerted if your email address appears in a new breach.

  • What is a data aggregator?

    What is a data aggregator?

  • Data aggregators, or data brokers, collect information from public records and buy it from other companies. They compile this data to sell it to companies for marketing purposes. Victims of these breaches are less likely to experience financial fraud, but hackers could use this data to impersonate or profile them.

    Data aggregators, or data brokers, collect information from public records and buy it from other companies. They compile this data to sell it to companies for marketing purposes. Victims of these breaches are less likely to experience financial fraud, but hackers could use this data to impersonate or profile them.

Bulgarian

bulgaria