nitrxgen
MD5 Database

This is a look-up tool for typical unsalted MD5 cryptographic hashes. The database currently contains 1.1+ trillion passwords.

To use this service, please use the the dedicated API.


Recently Found Passwords

Hash Value
Password
Hits
Found By
When
71da7c2405fff905484218265a424391
springrusher
132
nitrxgen
3 secs ago
2147a8ed9fe8e8e7513cfe15b1926dce
pitcherplant
135
nitrxgen
10 secs ago
3ef26054169b51e7390d30411f6d56cf
bambie
1.0K
nitrxgen
15 secs ago
c3d6ea737f64521567ec7e69efaf0ad5
chancesare
151
nitrxgen
17 secs ago
98235f7b05bb51250f6593f91ab2c878
missnf
131
nitrxgen
19 secs ago
15258246257fe55e4d3302be16022422
tonydebbie
134
nitrxgen
21 secs ago
e70454498c19252f0ecfba5b1275790d
7d60b1a675a332f931536cb80dd95d4dr:\
6
nitrxgen
24 secs ago
1eccb60cf9f3a327e036799ccee976ab
Braeden
214
nitrxgen
26 secs ago
571b6c7da802252fa8ec79cb68d2af0b
Willncl123.
6
nitrxgen
28 secs ago
f9d0024bd93808f83e4be324575f2afe
campderp
129
nitrxgen
35 secs ago
55ddea804e0775016bfdbf32f8a38548
expe3dition
131
nitrxgen
39 secs ago
fff8568c31a7c50b348d80fd6cbcf204
okpihvptob
98
nitrxgen
44 secs ago
f601f39448a779907b37273b3cd7c6b5
mon28972
98
nitrxgen
46 secs ago
f2258a17c8fd496dc7beef10f94083d0
wisa2919
97
nitrxgen
50 secs ago
e33291e3edb54bf854f0f16316a25bfb
jUMJUM#17
101
tychotithonus
55 secs ago
de0cd0cafb83347aff0511f8d5a28436
ppjj0316
97
nitrxgen
57 secs ago
dc87ab991abeabef57196ae5119d9a42
klover07
96
nitrxgen
1 min ago
4c3bca56b44a242fe2dd87d9e10cda90
979bf8440678e87fa4e9a589c576dc404=:
6
nitrxgen
1 min ago
d4a1f140aed5c060b4945fc5fdad2fd4
pear210232
99
nitrxgen
1 min ago
d3923788849275116a3e0d0ef73d13f1
ChaiWee2810
103
nitrxgen
1 min ago

 


Statistics

Not currently live! It will be soon!

There is a grandtotal of 1,488,531,271 user hash requests made to this database, 294,488,472 are of unique hashes (about 19% of grandtotal). Out of the grandtotal number of requests, 1,101,813,947 were successful or cracked (about 74%). Regardingly only unique hashes, 189,902,938 were successful or cracked (about 64%).

Information

Main article: MD5 Database — Information
Main article: MD5 Database — API

Regular visitors may notice results showing in the table above as being found by "nitrx-gpu", these are cracked locally by GPU power in real time. When a hash you submit is not found, it will be queued for GPU cracking at some point in the future. Only when it is cracked by GPU will your unfound hash become found for the next time it's requested. The moment it gets cracked, it will appear in the table above. Similarly with passwords as "# NOT MD5 #" means the hash was cracked but not using the MD5 algorithm and will not be displayed.

The only data stored as a result of using this tool is the MD5 hash you willingly submit. Invalid form/API inputs are stored for the sake of monitoring unknown/malicious behaviour. Such things like IP addresses, cookies, HTTP headers, anything about you, your client or your connection, etc. are NOT stored.

Do not contact me about hacking or accessing online accounts for any reason. Do not ask to access the list of passwords or hashes users submit. I do not condone any illegal or malicious activity; do not use this tool if that is your intention. Read more in the main article links above.

This page loads an external script from Google called reCAPTCHA v3 which is used to collect behavioural information of requests to determine if they're real users or bots. This information will eventually be used in new and upcoming features to combat automated requests from bots as it may place unwanted load on the server. For more information about Google's reCAPTCHA, please view Google's Privacy Policy and Terms of Service.

© Copyright 2008-2023: Nitrxgen, all rights reserved.
Not XHTML 1.0 valid or CSS3 valid.
Source last modified 246 days ago.