DevGizmo

Hash Identifier

Paste an unknown hash and instantly see which algorithm(s) could have produced it.

How Hash Identification Works

Hash functions produce a digest of a fixed length. Because most hash algorithms have a distinct output length and character set, it's often possible to narrow down the algorithm from the hash string alone. For example, a 32-character lowercase hex string is almost certainly MD5 or RIPEMD-128. A 64-character hex string could be SHA-256, SHA3-256, BLAKE2b-256, or RIPEMD-256. Password hashing functions like bcrypt and Argon2 include version and parameter metadata in the hash string, making them uniquely identifiable.

Recognised Algorithms

The identifier covers MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, RIPEMD-128/160/256/320, BLAKE2b-256/512, bcrypt ($2a$/$2b$/$2y$), Argon2 (id/i/d), scrypt (PHC format), CRC32, and Adler-32.

Limitations

Identification is based solely on length and format, not cryptographic analysis. Hashes with the same length and character set (e.g. SHA-256 and BLAKE2b-256) will both appear as matches. The tool cannot definitively identify the algorithm — it provides a list of candidates. If the hash is Base64-encoded rather than hex, decode it first before identifying.