This is a look-up tool for typical unsalted MD5 cryptographic hashes. The database currently contains 1.1+ trillion passwords.
To use this service, please use the the dedicated API.
Future of this Tool
It's November 2022, this tool has been around for over a decade now. The site is far more stable now compared to the first few years. Not only do I operate this tool/website without revenue but it costs me to keep it running. The MD5 Database currently
runs at reduced capacity due to some of the drives requiring replacement and generally running old hardware. The data is not lost and I still plan to get everything fully functional in the future with plans to expand and improve things to continue running free of charge or restrictions
to users.
Currently, my interests are also elsewhere and have a lot going on in my personal life but I will always try to keep the service up and running in some way. This message was inspired by the fact one of the critical drives to the project somehow unmounted itself
for 20 days without me realising and without causing errors, it reminded me of my inattention and thoughts on the future of the project.
Should anything happen to this tool, please check out HashMob, which, quite honestly, is much better than my service with a vast number of collorators.
Not currently live! It will be soon!
There is a grandtotal of 9,452,520,872,364 user hash requests made to this database, 232,124,125 are of unique hashes (about 0% of grandtotal). Out of the grandtotal number of requests, 261,243,011,770 were successful or cracked (about 2%). Regardingly only unique hashes, 175,555,571 were successful or cracked (about 75%).
Information
Main article: MD5 Database — Information
Main article: MD5 Database — API
Regular visitors may notice results showing in the table above as being found by "nitrx-gpu", these are cracked locally by GPU power in real time. When a hash you submit is not found, it will be queued for GPU cracking at some point in the future. Only when it is cracked by GPU will your unfound hash become found for the next time it's requested. The moment it gets cracked, it will appear in the table above. Similarly with passwords as "# NOT MD5 #" means the hash was cracked but not using the MD5 algorithm and will not be displayed.
The only data stored as a result of using this tool is the MD5 hash you willingly submit. Invalid form/API inputs are stored for the sake of monitoring unknown/malicious behaviour. Such things like IP addresses, cookies, HTTP headers, anything about you, your client or your connection, etc. are NOT stored.
Do not contact me about hacking or accessing online accounts for any reason. Do not ask to access the list of passwords or hashes users submit. I do not condone any illegal or malicious activity; do not use this tool if that is your intention. Read more in the main article links above.
This page loads an external script from Google called reCAPTCHA v3 which is used to collect behavioural information of requests to determine if they're real users or bots. This information will eventually be used in new and upcoming features to combat automated requests from bots as it may place unwanted load on the server. For more information about Google's reCAPTCHA, please view Google's Privacy Policy and Terms of Service.