Skip to content
browserutils

Hash Identifier

Identify hash algorithms from hash strings

Hash Identifier is a free online tool from BrowserUtils that identify hash algorithms from hash strings. It runs entirely in your browser — your data never leaves your device. No account required.

Hash Input

Paste a hash above to identify its algorithm.

Supports MD5, SHA-1, SHA-256, SHA-384, SHA-512, bcrypt, Argon2, scrypt, CRC32, NTLM, and more.

How to use Hash Identifier

  1. 1 Paste or type your input into the editor above.
  2. 2 The tool processes your data instantly — right in your browser, with nothing sent to a server.
  3. 3 Copy the result with one click or continue editing your input.

About Hash Identifier

Free online hash identifier. Paste a hash string and identify the likely algorithm — MD5, SHA-1, SHA-256, SHA-512, bcrypt, argon2, and more. This tool runs entirely in your browser — your data is never sent to a server. Just paste your input, get instant results, and copy with one click. No sign-up or installation required.

Hash Identifier specs

Runtime
100% client-side (browser)
Built on
Web Crypto API (SubtleCrypto) for hashing and crypto.getRandomValues for secure randomness
Cost
Free — no account, no rate limits, no usage caps
Browser support
Chrome 90+, Firefox 88+, Safari 14+, Edge 90+
Part of
299 developer tools on BrowserUtils (100% client-side)

Questions

How does hash identification work?
The tool analyzes the hash length, character set, and format prefix to determine likely algorithms. For example, 32 hex characters suggests MD5, 64 hex characters suggests SHA-256, and $2b$ prefix indicates bcrypt.
Can it identify the exact algorithm?
Some hashes have unique prefixes (like bcrypt or argon2) that allow exact identification. For others like MD5 and NTLM that share the same length, the tool lists all possible matches with confidence levels.
What hash formats can be identified?
The tool recognizes MD5, SHA-1, SHA-256, SHA-512, bcrypt ($2a$, $2b$), argon2 ($argon2id$), NTLM, CRC32, and many other common hash formats.
Can I identify a hash from a database breach?
Yes, paste the hash and the tool will suggest the likely algorithm. This helps determine what hashing scheme was used, which is useful for security auditing and incident response.
Is the hash identifier safe for sensitive data?
Yes, the identification runs entirely in your browser by analyzing the format of the hash string. No data is sent to any server.
Why does the tool show multiple possible algorithms?
Some hash formats are ambiguous. For example, a 32-character hex string could be MD5, NTLM, or MD4 since they all produce 128-bit hashes. The tool lists all possibilities ranked by likelihood.
Embed this tool

Copy this code to embed the tool on your website. Adjust the height to fit your layout.

<iframe src="https://www.browserutils.dev/embed/hash-identifier" width="100%" height="500" frameborder="0" title="Hash Identifier"></iframe>

Related tools

More Hashing & Crypto

View all Hashing & Crypto tools