Hash Identifier
Paste a hash or Hashcat/John formatted hash. Get ranked candidates (high → low).
Try Sample Hashes
Copy or “Use” a sample, then click Submit above.
MD5
MD5("password")
5f4dcc3b5aa765d61d8327deb882cf99
SHA-1
SHA1("password")
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
SHA-256
SHA256("password")
5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
SHA-512
SHA512("password")
b109f3bbbc244eb82441917ed06d618b9008dd09b3befd1b5e07394c706a8bb980b1d7785e5976ec049b46df5f1326af5a2ea6d103fd07c95385ffab0cacbc86
NTLM
Common demo for "password"
8846f7eaee8fb117ad06bdd830b7586c
bcrypt
Valid bcrypt sample
$2b$10$CwTycUXWue0Thq9StjUM0uJ8q1cP3lH4iigIvuXvYDn8KX2HFqRSa
Common Use Cases
A hash identifier estimates the most likely hashing algorithm by matching patterns such as length, prefixes, character set, and common format markers. Use it to quickly confirm the hash type before verification or analysis.
- Identify whether a value looks like MD5, SHA-1, SHA-256, SHA-512, NTLM, bcrypt, etc.
- Validate formats from exports, logs, or authentication artifacts
- Speed up triage during investigations and forensic review
- Pick the correct algorithm for verification workflows
FAQ
Can a hash identifier be 100% accurate?
Not always. Some hash algorithms share the same length and character set, so the tool returns ranked candidates with confidence and reasons.
Does it support Hashcat/John formats?
Yes. Pasting the full formatted string (prefix/salt/markers) usually improves accuracy.
Why do I see multiple candidates?
Because many formats overlap. The ranked list helps you pick the best match and confirm with context.
Is it safe to paste hashes here?
Avoid pasting real sensitive hashes on shared devices. Treat hashes as sensitive data.