nitrxgen
MD5 Database

This is a look-up tool for typical unsalted MD5 cryptographic hashes. The database currently contains 1.1+ trillion passwords.

To use this service, please use the the dedicated API.


Recently Found Passwords

Hash Value
Password
Hits
Found By
When
3d88c25a396877e8299341b42d683e13
CHRISTMAS
151
nitrxgen
1 sec ago
9ce44f88a25272b6d9cbb430ebbcfcf1
pikachu
23K
nitrxgen
2 secs ago
915336d69efe115f636e9a64500335b9
julka5
302
nitrxgen
4 secs ago
eaeda39d99e47ac15405a5dbbef4e063
gaskarth2010
2
nitrxgen
10 secs ago
8bc6715470ab1a22a37cfb76f8dcfb65
07142128
125
nitrxgen
12 secs ago
9a3d458322d70046f63dfd8b0153ece4
1193
316
nitrxgen
15 secs ago
a2ed4dedacf1c4fe285dbb06ac055d8d
tb1977
2
nitrxgen
16 secs ago
8ff0aeb4fe37695364cfaff03ff6c326
984758
6
nitrxgen
18 secs ago
13590575c9eb9bfbc6d24eaa4aecf296
54417719
11
nitrxgen
20 secs ago
229e5b1363be0591e674cd57b3bb8645
roberta
21K
nitrxgen
22 secs ago
6e082d1c74fe4138d40e47029e47fdc4
vues04cz
3
nitrxgen
25 secs ago
75a26bcdca04639f3b6e7a87907de563
wampam
2
nitrxgen
28 secs ago
439b3a25b555b3bc8667a09a036ae70c
unity
545
nitrxgen
30 secs ago
94d1b7ab88c6a662394bc611b6cc1bc7
21452145
552
nitrxgen
31 secs ago
3e21ab62fb17400301d9f0156b6c3031
gateway
13K
nitrxgen
32 secs ago
34e856053d94a4a3163d27fb8e136e93
dukeman
322
nitrxgen
35 secs ago
e0202de562c05c9fba6b8d1472cc902d
stuart007
44
nitrxgen
36 secs ago
ce323b11b2e18fc9c1db1da870bacaa8
sector
5.1K
nitrxgen
39 secs ago
44c949fd6c031820079421c414622806
420511
15
nitrxgen
43 secs ago
5d3cc64a1475dd81e4d1bbef901d3128
catimmy
2
nitrxgen
44 secs ago

 


Statistics

Not currently live! It will be soon!

There is a grandtotal of 1,488,531,271 user hash requests made to this database, 294,488,472 are of unique hashes (about 19% of grandtotal). Out of the grandtotal number of requests, 1,101,813,947 were successful or cracked (about 74%). Regardingly only unique hashes, 189,902,938 were successful or cracked (about 64%).

Information

Main article: MD5 Database — Information
Main article: MD5 Database — API

Regular visitors may notice results showing in the table above as being found by "nitrx-gpu", these are cracked locally by GPU power in real time. When a hash you submit is not found, it will be queued for GPU cracking at some point in the future. Only when it is cracked by GPU will your unfound hash become found for the next time it's requested. The moment it gets cracked, it will appear in the table above. Similarly with passwords as "# NOT MD5 #" means the hash was cracked but not using the MD5 algorithm and will not be displayed.

The only data stored as a result of using this tool is the MD5 hash you willingly submit. Invalid form/API inputs are stored for the sake of monitoring unknown/malicious behaviour. Such things like IP addresses, cookies, HTTP headers, anything about you, your client or your connection, etc. are NOT stored.

Do not contact me about hacking or accessing online accounts for any reason. Do not ask to access the list of passwords or hashes users submit. I do not condone any illegal or malicious activity; do not use this tool if that is your intention. Read more in the main article links above.

This page loads an external script from Google called reCAPTCHA v3 which is used to collect behavioural information of requests to determine if they're real users or bots. This information will eventually be used in new and upcoming features to combat automated requests from bots as it may place unwanted load on the server. For more information about Google's reCAPTCHA, please view Google's Privacy Policy and Terms of Service.

© Copyright 2008-2024: Nitrxgen, all rights reserved.
Not XHTML 1.0 valid or CSS3 valid.
Source last modified 487 days ago.