Hash Identifier

Identify hash algorithms from a hash string. Detects MD5, SHA-1, SHA-256, bcrypt, Argon2, and more. Shows confidence level and character analysis.

Hash string

Why Identify Hash Algorithms?

When you encounter a hash string in logs, configs, or databases, knowing the algorithm helps you verify it, crack it (for authorized testing), or integrate with the right library. Different systems use different hashes — MD5 for checksums, SHA-256 for TLS, bcrypt for passwords.

Common Hash Formats

MD5 and SHA-1 produce hex strings (0-9, a-f). MD5 is 32 chars; SHA-1 is 40; SHA-256 is 64; SHA-512 is 128. bcrypt and Argon2 use a special format with $ delimiters. NTLM hashes look like MD5 (32 hex). CRC32 is 8 hex chars.

Limitations

Identification is heuristic. Two algorithms can produce the same-length hex output. Truncated or modified hashes may not match. For critical use, verify with the system that produced the hash or try common algorithms and compare outputs.

Frequently Asked Questions

Related Tools

Explore More Tools

Find this tool useful? Buy us a coffee to keep DuskTools free and ad-light.