Verify Bcrypt password hashes with our free online tool. Compare plaintext passwords against their hashed versions to verify matches. All processing happens in your browser - your data never leaves your device.
How to Use the Bcrypt Verifier
Verifying Bcrypt Hashes
To verify a bcrypt hash:
- Enter the original plain text password in the first input field
- Enter the bcrypt hash to verify against in the second input field
- The tool will automatically verify if the hash matches the password
- Enable "Show detailed output" to see the hash components
Understanding the Output
The verifier will show one of these results:
- Match: The plain text matches the hash
- No Match: The plain text does not match the hash
- Error: Invalid input or hash format
With detailed output enabled, you'll also see:
- Hash version (2a, 2b, or 2y)
- Cost factor (number of rounds)
- Salt value used in the hash
- The actual hash portion
Valid Hash Format
A valid bcrypt hash should look like this:
$2a$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
The hash must:
- Start with $2a$, $2b$, or $2y$
- Include a two-digit cost factor (10-31)
- Contain 53 characters in total