liminfo

Hash Identifier

Free web tool: Hash Identifier

Hash Type Length Reference

HashLengthNotes
CRC328 charsChecksum
MD532 charsLegacy, vulnerable
SHA-140 charsLegacy, vulnerable
SHA-25664 charsCurrent standard
SHA-38496 charsHigh security
SHA-512128 charsHighest security
bcrypt60 charsStarts with $2
Argon2Variable charsStarts with $argon2

About Hash Identifier

The Hash Identifier is a browser-based tool that analyzes a hash string and identifies which cryptographic algorithm produced it. It works by matching the input against 15 regex patterns covering the most common hash formats: MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, bcrypt, scrypt, Argon2, NTLM, MySQL 4.1+, CRC32, SHA3-256, RIPEMD-160, and Base64. The tool displays all possible matches ranked by likelihood, with the most probable type highlighted.

Security researchers, penetration testers, and developers frequently encounter unidentified hash strings — in database dumps, config files, or API responses — and need to quickly determine the algorithm before deciding how to crack or verify them. This tool eliminates guesswork by checking format, length, and prefix patterns simultaneously, returning results as you type without requiring any button click.

The identification logic relies on well-known structural properties: MD5 produces exactly 32 hex characters, SHA-256 produces 64, bcrypt always starts with $2a$, $2b$, or $2y$, Argon2 with $argon2i$, $argon2d$, or $argon2id$, and MySQL hashes begin with an asterisk followed by 40 uppercase hex digits. When multiple algorithms share the same length (e.g. SHA-256 and SHA3-256 both produce 64-character hex), the tool lists all candidates so you can disambiguate using context clues.

Key Features

  • Identifies 15 hash types: MD5, SHA-1/224/256/384/512, SHA3-256, bcrypt, scrypt, Argon2, NTLM, MySQL 4.1+, CRC32, RIPEMD-160, Base64
  • Real-time detection — results update instantly as you type with no submit button needed
  • Multi-match display — lists all possible algorithms when a hash length is ambiguous, ranked by likelihood
  • "Most Likely" badge highlights the single best candidate at the top of results
  • Built-in reference table showing hash type, output length in characters, and security notes
  • Flags legacy/weak algorithms (MD5, SHA-1) and strong modern ones (SHA-256, bcrypt, Argon2)
  • 100% client-side — your hash string is never sent to any server or stored anywhere
  • Dark mode support and responsive layout for use on any device

Frequently Asked Questions

How does the Hash Identifier determine which algorithm was used?

The tool tests the input against 15 regular expression patterns. Each hash algorithm has distinct structural properties — a specific output length in hexadecimal characters, a specific character set, or a recognizable prefix. For example, SHA-256 always produces exactly 64 lowercase hex characters, while bcrypt hashes always start with $2a$, $2b$, or $2y$ followed by a cost factor.

Why does the tool show multiple possible hash types?

Some algorithms produce hashes with identical lengths. For instance, SHA-256 and SHA3-256 both output 64 hex characters, and SHA-1 and RIPEMD-160 both output 40 hex characters. Without knowing the system that generated the hash, you cannot distinguish them by appearance alone. The tool lists all candidates so you can use context (the source system, application version, or prefix) to make the final determination.

What is the difference between MD5, SHA-1, and SHA-256?

MD5 produces a 128-bit (32 hex char) hash and is considered cryptographically broken — collisions can be generated deliberately. SHA-1 produces a 160-bit (40 hex char) hash and is also deprecated for security-sensitive use. SHA-256 produces a 256-bit (64 hex char) hash and remains the current standard for integrity verification and digital signatures.

What makes bcrypt and Argon2 different from SHA-256?

SHA-256, MD5, and similar algorithms are general-purpose hash functions designed to be fast. This makes them unsuitable for password storage because fast = easy to brute-force. bcrypt and Argon2 are password hashing functions specifically designed to be slow and memory-intensive, making large-scale password cracking computationally infeasible.

Can this tool crack or reverse a hash?

No. Hash functions are one-way: you cannot mathematically reverse them to recover the original input. This tool only identifies the algorithm type. To verify a password against a hash, you would rehash the candidate password using the identified algorithm and compare outputs.

What is NTLM and how is it different from MD5?

NTLM (NT LAN Manager) is the password hashing scheme used by Windows for local and network authentication. Structurally, an NTLM hash is a 32-character hex string, identical in format to MD5. Without context (e.g., knowing it came from a Windows SAM database), you cannot distinguish NTLM from MD5 by appearance — both will appear as possible matches.

What does the CRC32 hash type indicate?

CRC32 (Cyclic Redundancy Check 32) is an 8-character hex checksum algorithm. It is not a cryptographic hash — it is designed for error detection in data transmission, not security. If you see a CRC32, it likely comes from a file integrity check or a network protocol, not a password system.

Is it safe to paste sensitive hashes into this tool?

Yes. The tool runs entirely in your browser. Your hash string is processed only by JavaScript running locally on your device and is never transmitted to any server, stored in any database, or logged in any way.