A hash is a unique fingerprint for any piece of data — files, passwords, and messages all produce one. Paste any hash to identify its algorithm (MD5, SHA-256, bcrypt, NTLM, and more). Used by analysts to verify file integrity, identify credential formats in breach dumps, and assess the strength of password storage.