Hash Identifier
Paste an unknown hash and instantly see which algorithm(s) could have produced it.
How Hash Identification Works
Hash functions produce a digest of a fixed length. Because most hash algorithms have a distinct output length and character set, it's often possible to narrow down the algorithm from the hash string alone. For example, a 32-character lowercase hex string is almost certainly MD5 or RIPEMD-128. A 64-character hex string could be SHA-256, SHA3-256, BLAKE2b-256, or RIPEMD-256. Password hashing functions like bcrypt and Argon2 include version and parameter metadata in the hash string, making them uniquely identifiable.
Recognised Algorithms
The identifier covers MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, RIPEMD-128/160/256/320, BLAKE2b-256/512, bcrypt ($2a$/$2b$/$2y$), Argon2 (id/i/d), scrypt (PHC format), CRC32, and Adler-32.
Limitations
Identification is based solely on length and format, not cryptographic analysis. Hashes with the same length and character set (e.g. SHA-256 and BLAKE2b-256) will both appear as matches. The tool cannot definitively identify the algorithm — it provides a list of candidates. If the hash is Base64-encoded rather than hex, decode it first before identifying.
Related Tools
- SHA Hash GeneratorGenerate SHA-1, SHA-256, SHA-384 and SHA-512 hashes.Open tool
- MD5 Hash GeneratorGenerate MD5 hashes for checksums and legacy use cases.Open tool
- HMAC GeneratorGenerate HMAC signatures using SHA-256 or SHA-512.Open tool
- RSA Key Pair GeneratorGenerate 1024, 2048 or 4096-bit RSA public/private key pairs.Open tool