Tiny Online Tools logoTiny Online ToolssearchПоиск инструментов…grid_viewВсе инструменты
Главнаяchevron_rightИнструменты безопасностиchevron_rightОпределитель хешаОпределитель хеша

Определитель хеша

Определяйте вероятные алгоритмы хеширования по шаблону хеш-строки.

Похожие инструменты

Генератор MD5

Генератор MD5

Быстрая генерация MD5-хэшей.

Генератор Bcrypt

Генератор Bcrypt

Генерация хэшей паролей bcrypt.

Скрытие PDF

Скрытие PDF

Рисуйте черные прямоугольники поверх конфиденциальных областей страниц PDF прямо в браузере.

INI в JSON

INI в JSON

Преобразование файлов конфигурации INI в JSON и обратно с выводом типа.

PNG в WebP

PNG в WebP

Конвертируйте PNG в оптимизированный формат WebP.

текст разница проверка

текст разница проверка

сравнить two texts и highlight differences.

слово счетчик

слово счетчик

Count слова, characters, и sentences in text.

apps

Больше инструментов

Просмотрите нашу полную коллекцию бесплатных онлайн-инструментов.

Hash Identifier

When you encounter a hash string in a database dump, configuration file, or log, you often need to know what algorithm Создаетd it. Hash lengths vary dramatically: MD5 is 32 characters, SHA-256 is 64 characters, bcrypt hashes begin with $2a$, and other algorithms have distinctive patterns. This tool identifies likely hash types by analyzing the string length and Форматирует, giving you insights into how the hash was Генерируетd and what security considerations apply.

Why hash identification matters

If you're reviewing a database migration, auditing security of legacy systems, or analyzing a leaked password dump, you need to understand what you're looking at. A 32-character hex string is likely MD5 (insecure), while a 64-character hex string is probably SHA-256 (modern). A string starting with $2b$ is definitely bcrypt. Identifying the algorithm helps you understand the security posture and plan upgrades.

Common hash patterns

The tool recognizes hashes by their distinctive characteristics: MD5 produces exactly 32 hexadecimal characters, SHA-1 produces 40, SHA-256 produces 64, SHA-384 produces 96, and SHA-512 produces 128. Bcrypt hashes follow the pattern $2a$, $2b$, or $2y$ followed by cost rounds and a salt. These patterns are fairly reliable heuristics for identifying hash types.

Limitations of pattern matching

While length and pattern matching are effective, they are not foolproof. A bcrypt hash is unambiguous, but a 32-character hex string could theoretically be a truncated hash or some other Форматирует. The tool makes educated guesses based on common algorithms—if it returns "Unknown," the hash might be in a non-standard Форматирует, Шифруетed rather than hashed, or salted with a structure the tool doesn't recognize.

Next steps after identification

Once you know the hash type, you can research the algorithm's security status and choose appropriate migration paths. MD5 hashes should be rehashed with SHA-256 or bcrypt. Legacy SHA-1 should be upgraded to SHA-256. If you find unsalted hashes, migrating to salted and slower algorithms like bcrypt is critical.