: Use a Password Manager to ensure every account has a strong, unique password.

: Turn on Multi-Factor Authentication (MFA) on all sensitive accounts (email, banking, social media). This provides a critical second layer of defense even if an attacker has your password.

A combo list (Compilation of Multiple Breaches) is a text file that aggregates millions or billions of email and password pairs.

: Avoid downloading any "combo list" .zip or .exe files, as they are high-risk sources of malware.

: Downloading such files is extremely dangerous. They are often "weaponized" with malware—such as Remote Access Trojans (RATs) —that infect the downloader's own computer. Security Recommendations

: These files are often formatted simply as email:password . While some lists contain old or "recycled" data, modern versions may include fresh credentials harvested directly from infostealer malware like RedLine or Lumma.

If you have received a notification that your information is on a combo list or if you have encountered this file:

arrow-down

Explore Fonts

Buy this font family from one of our official partners

Not sure which license fits your project, or have questions about usage?
Contact us for tailored advice or to request a custom license for your company.
You can also visit our licensing page for more details.

Download 548k Combo List — Update Zip

: Use a Password Manager to ensure every account has a strong, unique password.

: Turn on Multi-Factor Authentication (MFA) on all sensitive accounts (email, banking, social media). This provides a critical second layer of defense even if an attacker has your password.

A combo list (Compilation of Multiple Breaches) is a text file that aggregates millions or billions of email and password pairs.

: Avoid downloading any "combo list" .zip or .exe files, as they are high-risk sources of malware.

: Downloading such files is extremely dangerous. They are often "weaponized" with malware—such as Remote Access Trojans (RATs) —that infect the downloader's own computer. Security Recommendations

: These files are often formatted simply as email:password . While some lists contain old or "recycled" data, modern versions may include fresh credentials harvested directly from infostealer malware like RedLine or Lumma.

If you have received a notification that your information is on a combo list or if you have encountered this file: