nitrxgen SCHEDULED DOWNTIME ON WEDNESDAY 3RD APRIL APPROX. 10:00 GMT FOR 12 HOURS
MD5 Database

This is a look-up tool for typical unsalted MD5 cryptographic hashes. The database currently contains 1.1+ trillion passwords.

To use this service, please use the the dedicated API.


Recently Found Passwords

Hash Value
Password
Hits
Found By
When
da70b54c4f91c36df292b3a1e6623374
160182ki
137
nitrxgen
12 mins ago
da18e34875c1b550761500f85fd2ac0d
sachsenring601
136
nitrxgen
12 mins ago
da16db8aeacf893a87fa4ade456c1f0b
-kimi2001-
136
nitrxgen
12 mins ago
da0c3e0bcc7e345813abc33f7c9b0a9f
Kessi2008
136
nitrxgen
12 mins ago
d9fa7c5b96cf13514ac3ddeae2b031fd
cbmarine
171
nitrxgen
12 mins ago
d9f0f1b69c0bf0c8667c9436c2aaf649
130560gabi
137
nitrxgen
12 mins ago
d9ee5e9c2cef5bbea9aeae9bffcccbd9
8779magkev
138
unleashme69
12 mins ago
d9e3694f866089185cbc565e42a9777e
1latitude
140
nitrxgen
12 mins ago
d9dc3f64bcdba530a365a297632bc866
leon1604
139
nitrxgen
12 mins ago
d9d8ac476027180b3138e8805407c711
10Kabelratte86
137
nitrxgen
12 mins ago
d9b64a47e840febc5ddcd02e4e2a6363
abbylynn1
150
nitrxgen
12 mins ago
d9b076e8fde3f701c53504e7ca20d647
emmy2010
159
nitrxgen
12 mins ago
d9afce2d1b482d37b2e9aecdae435fc2
s22b300
138
nitrxgen
12 mins ago
d9a27b757e3a710637cde505aba454eb
Volker58
136
nitrxgen
12 mins ago
d98c790c9b907815434aa9a13ebaa3f8
leutascher
136
nitrxgen
12 mins ago
d939b09a48615ed2f2068daf1c621cdf
oase1000
138
nitrxgen
13 mins ago
d92a9d5b7df196e549a849e5ef8b0d80
030209bitterfeld
137
nitrxgen
13 mins ago
d904210952be4ff861f993e618510310
ninatillnick
138
nitrxgen
13 mins ago
d8f54b99c9cdacb6d61fbaf884397ee6
michael1968
173
nitrxgen
13 mins ago
d8e7c0aa7e57ae5045a86be9d968d440
Dymon01
135
nitrxgen
13 mins ago

 


Statistics

Not currently live! It will be soon!

There is a grandtotal of 1,488,531,271 user hash requests made to this database, 294,488,472 are of unique hashes (about 19% of grandtotal). Out of the grandtotal number of requests, 1,101,813,947 were successful or cracked (about 74%). Regardingly only unique hashes, 189,902,938 were successful or cracked (about 64%).

Information

Main article: MD5 Database — Information
Main article: MD5 Database — API

Regular visitors may notice results showing in the table above as being found by "nitrx-gpu", these are cracked locally by GPU power in real time. When a hash you submit is not found, it will be queued for GPU cracking at some point in the future. Only when it is cracked by GPU will your unfound hash become found for the next time it's requested. The moment it gets cracked, it will appear in the table above. Similarly with passwords as "# NOT MD5 #" means the hash was cracked but not using the MD5 algorithm and will not be displayed.

The only data stored as a result of using this tool is the MD5 hash you willingly submit. Invalid form/API inputs are stored for the sake of monitoring unknown/malicious behaviour. Such things like IP addresses, cookies, HTTP headers, anything about you, your client or your connection, etc. are NOT stored.

Do not contact me about hacking or accessing online accounts for any reason. Do not ask to access the list of passwords or hashes users submit. I do not condone any illegal or malicious activity; do not use this tool if that is your intention. Read more in the main article links above.

This page loads an external script from Google called reCAPTCHA v3 which is used to collect behavioural information of requests to determine if they're real users or bots. This information will eventually be used in new and upcoming features to combat automated requests from bots as it may place unwanted load on the server. For more information about Google's reCAPTCHA, please view Google's Privacy Policy and Terms of Service.

© Copyright 2008-2024: Nitrxgen, all rights reserved.
Not XHTML 1.0 valid or CSS3 valid.
Source last modified 388 days ago.