Tool to identify a hash (hash fingerprint) automatically and recognize the algorithm(s) potentially used. Identifier/Analyzer for 350+ hashes online.
Hash Identifier - dCode
Tag(s) : Modern Cryptography, Informatics
dCode is free and its tools are a valuable help in games, maths, geocaching, puzzles and problems to solve every day!
A suggestion ? a feedback ? a bug ? an idea ? Write to dCode!
A hash identifier is a tool used to identify the hash function that likely generated a given hash. A hash function is a deterministic application that associates an arbitrary input with a fixed-length output, called a hash or digest.
There are several hundred hashing algorithms. The resulting hash is a sequence of bits, usually represented in hexadecimal (base 16), sometimes in Base64 or other formats.
Identification relies primarily on structural clues: hash length, the alphabet used, and the possible presence of specific prefixes or separators.
This identification remains probabilistic: several algorithms can produce hashes of the same length and format.
Indicate the character string that serves as a fingerprint. Take care not to add unnecessary elements, such as a space or a stop at the end, as these irrelevant characters could confuse the detector.
Example: e9837d47b610ee29399831f917791a44 is a hash of the MD5 algorithm (32 hexadecimal characters)
Sometimes there are many other algorithms that have the same hash format, impossible to know which function was used without testing them all.
The identifier compares the provided hash to known patterns corresponding to the formats produced by different hash functions. The analysis focuses primarily on: character length, the alphabet used (hexadecimal, Base64, specific characters), and the presence of prefixes or particular structures.
This is not a cryptographic analysis of the content, but rather a format signature recognition.
The tool relies on a database of algorithm formats called Haiti, developed by Orange Cyberdefense (here MIT license) and maintained by noraj.
This database contains several hundred hash format signatures.
The identifier does not verify whether the hash actually corresponds to a valid output of a given algorithm, only whether its format is compatible.
dCode retains ownership of the "Hash Identifier" source code. Any algorithm for the "Hash Identifier" algorithm, applet or snippet or script (converter, solver, encryption / decryption, encoding / decoding, ciphering / deciphering, breaker, translator), or any "Hash Identifier" functions (calculate, convert, solve, decrypt / encrypt, decipher / cipher, decode / encode, translate) written in any informatic language (Python, Java, PHP, C#, Javascript, Matlab, etc.) or any database download or API access for "Hash Identifier" or any other element are not public (except explicit open source licence). Same with the download for offline use on PC, mobile, tablet, iPhone or Android app.
Reminder: dCode is an educational and teaching resource, accessible online for free and for everyone.
The content of the page "Hash Identifier" and its results may be freely copied and reused, including for commercial purposes, provided that dCode.fr is cited as the source (Creative Commons CC-BY free distribution license).
Exporting the results is free and can be done simply by clicking on the export icons ⤓ (.csv or .txt format) or ⧉ (copy and paste).
To cite dCode.fr on another website, use the link:
In a scientific article or book, the recommended bibliographic citation is: Hash Identifier on dCode.fr [online website], retrieved on 2026-02-22,