Password Checker

Password Checker - How Secure Is My Password?

With the Password Checker, you can find out how secure your password is. Once input, we also calculate the average time a computer needs to crack the password you've entered and check whether the password has been made public through a data leak or a hacker attack.

To start, simply enter your password in the field above. After this, three boxes will appear containing the following information:

Time needed to crack the password
In the first box, we show you how much time a modern computer would need to crack your password. Good passwords should require at least a few thousand years to crack.

Was your password leaked?
We check whether your password has been part of any datasets made public in the wake of leaks or hacker attacks. If your password was leaked, you should cease using it immediately.

Improve your password
In the last box, we'll provide you with some suggestions for how you can improve your password. We'll check your password for frequently used combinations, numbers, and special characters.


What makes a password secure?
When creating a password, two factors are decisive, namely, its length and its uniqueness. Your password should consist of at least 8 characters, but those containing 12 or 16 characters are better. By using both upper and lower case letters, numbers, and special characters, the time it takes to crack a password by brute force increases. Our password checker examines the length of your password, as well as the usage of special characters to calculate how long a computer would need to crack it.

How accurate is the estimate?
We calculate how long it takes a computer to crack the password you've input by brute force. We assume that an attacker can check 40 billion combinations per second. Since, in reality, this number can vary, our estimate should only be used as an approximation.

What should I do if my password has been leaked?
If your password has been compromised through a data leak, you should refrain from using it when creating new accounts, and if possible, change it for any existing accounts that are secured by it. In general, it's good to use a different password for each account you create or use. To easily keep track of these, you can store such sensitive data in a password manager.

Data Protection & Privacy

Since passwords are security-critical data, we take their protection very seriously. The following measures ensure that testing your password with our tool doesn't create any additional risks.

Local computation
The estimates for password security (time needed to crack the password as well as the amount of numbers and special characters) are performed directly in your browser. No passwords are sent to our server and as a result, none can be intercepted.

k-anonymity model
To check if your password has been compromised in any data leaks, we query the Have I Been Pwned database. We do not transfer passwords that you input to the server, but use a k-anonymity model to determine whether your password is contained in the database we consult. First, we form an SHA-1 hash of your password but only transmit its first five characters. The server then responds with around 500 potential matches, which we subsequently check in your browser. Additional information about this procedure can be found here.

Other languages:
Deutsch Italiano Français 
More about IT-Security
Cyber Attacks - 3 Current Threats and Countermeasures
HDD and SSD - How to Safely Wipe Your Hard Drive
Phishing: Recognizing the Threat
Data Theft: What Is It? How Can I Protect Myself?
Best Password Manager - 12 Tools Reviewed
How To Remove Junk Files From Your Windows PC
VPN Leak Test - Is Your Private IP Public?
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Best VPN - Review of 22 VPN Providers
Internet Censorship - Site Blocked in China, Russia or Turkey?
Password Generator - Generate a Secure Password
Browser Privacy Check - Which Traces Do I Leave on the Web?
Darknet - What Is It and How Can I Access It?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Internet Pitfalls - The 7 Biggest Dangers Online
Data Recovery - Restoring Deleted Files
Secure Messengers - The 5 Best Alternatives to WhatsApp
Anonymous Search Engines - 3 Alternatives to Google
Doxing - What It Is and How You Can Protect Yourself
Privacy Browsers: The Best Browsers for Maximum Security
Two-Factor Authentication - This is how you secure your accounts
Ad Blocker - How to Protect Yourself From Annoying Ads
Secure Password - What Makes a Strong Password?
Do Not Track - What It Is and How It Can Protect You
Manage Passwords - Best Way to Store Passwords
Anonymity Online: Tor and the Tor Browser
Identity Theft on The Web – How To Protect Yourself
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 11 Programs Reviewed
How To Change Your IP Address - 3 Simple Ways
Email hacked? How To Find Out if Your Email Has Been Hacked
Anonymous Browsing - How to Surf Anonymously Online
Hide IP - How to Hide My IP Address