Tools to decode / decrypt / reverse lookup SHA1 hashes

This tool searches multiple SHA1 rainbow tables for matches to a large number of SHA1 hashes. SHA1 is a hashing algorithm and therefore is technically not encryption, but hashes can be resolved and reversed using lookup rainbow tables. The database contains millions of SHA1 hashes and matching sources. Hashes have been generated from a large number of sources, including procedural generation using multiple UTF-8 charsets, common dictionary lists and also sets of raw binary data. Most hashes are also stored with their double hash or treble hash, along with binary versions.

Other links

To perform reverse lookups on alternative hashes there are sites for MD5, MD2, SHA1, SHA256, SHA512 and CRC32

Hash generators are available for MD5, MD2, SHA1, SHA256, SHA512 and CRC32

Enter 40 character SHA1 hash to decode or decrypt

Enter 40 digit SHA1 hash:
Enter 4 digit security code:

Recent SHA1 reverse lookups

axgbzbohpfllh
sha1:54ade8a65be0627755d618f40c468f67b26f647a
1529599631655701032
sha1:d4eefd471a4d3cd180c788e28bf81d45a39fcccf
NzYALlSAsUs
sha1:2b58d4810a5ccca31931fd2939083fd23036514f
abqotysx.p-eiu
sha1:4be099b2d420b510fba5a5b1fa8788b53e04cb09
.36993346840324.50
sha1:e2fb14fd8bd2e0a4197259339375de0a0fd5b9c3
–®›Ñ¸§ÒÒ
sha1:6a750030565b25528748e68fb27ebfabd26056d5
VRRVECKOKCMOI
sha1:d2c35494ae02b07a0d89054a88a09eb1ab87e30b
­–йÐÐÐÐ
sha1:90a03ebd36d91b98b5b9881765070179928aa166
15//325/249994034/7
sha1:469aed26fdcbcd09db3cef50e90a997c933765e4
ØØ´¶°‚Ù¬ƒØØ
sha1:02539bcb25cbc6551a11b7ae9e4a3b9919c995ad
37661//62392750003
sha1:e75afe1a4d3db83b426e3185879b2112f6463d26
FMVFSSBZEHQMQ
sha1:8b60bf1c8ab3e9d6e64504b9f24fd687166c70f1
16343168937.3.93376
sha1:1da81d3d38050c53a1b8662b7e94f2ca13be5710
alcarvhnylenlm
sha1:d6906c2892967aa8a047cbc8ad9c7e13d1ceb219
adkyfwllbooyyq
sha1:504215d7bb175d90ea4bea757c04aee573932102
¸ˆØبرƒ±ØÙ
sha1:9ce5c77786f2312767d6576eb741f3b172ec2caf
S*mA)!w&g"
sha1:cd13dbe572bb54dbd7d7cfc64d6abfeed914a2c3
ÞCî“ë 
sha1:acb68978b01104428fccdbcf4d512b9a14a620f4
adujsohmzfoeam
sha1:6f73ec55864d3d78dc2b1381c59705273d4de7f1
935479642432621/5
sha1:f29e9cc83ca274f6e8d0fb6d38593053098d258a
AECGDUCWPNBQRK
sha1:3f57d83dab48fd0c0f8b127f6b247246330069be
YYGSSV-OEKGME
sha1:d5771995ece361cf0262d2fdf5e96c7bd0105c11
ƒ†ÓÓÓÓ§ÒÓ
sha1:fe77d7f0c829111b08eed3d9ee1ce3e1541ee7a4
44473013812820866
sha1:d60a08cf6d87a380c6b27607bb36fa3f0a0dc656

About SHA1 hashes

"SHA-1 forms part of several widely used security applications and protocols, including TLS and SSL, PGP, SSH, S/MIME, and IPsec. Those applications can also use MD5; both MD5 and SHA-1 are descended from MD4. Revision control systems such as Git, Mercurial, and Monotone use SHA-1 not for security but to identify revisions and to ensure that the data has not changed due to accidental modification.

Other decoders: MD5 | SHA1 | SHA256 | SHA512 | CRC32

A complete set of encoders is available at the tools page.

Daily hash hit and miss logs.