
Quick tools to verify DNS, email settings and more. 176 tools in total.
Check how a DNS record has propagated across global servers.
Advanced tool to query detailed DNS records for a domain.
Simple tool to retrieve DNS records for a domain or IP.
Test if a host is reachable and measure network response time.
Shows the network hops a packet takes to reach its destination.
Check if the port is open and accessible for external connections.
Detect and display your current public IP address.
Show the approximate geographic location of an IP address.
Allows you to query and analyze IP addresses in the global RIPE database.
Quickly and easily check whether an IP address is public or private.
Query this WHOIS service to look up internet domain name information.
Check if an IP is listed on anti-spam DNS blacklists.
Detect your download and upload speed from our server.
This utility obtains information about the browser's network connection, including connection type, estimated download speed, latency, and online status.
Converts an IPv4 address in dotted decimal format ('A.B.C.D') to a 32-bit integer. Useful for efficiently comparing, storing, or manipulating IP addresses in systems and databases.
Converts a 32-bit integer to its representation in IPv4 address format using dotted decimal notation ('A.B.C.D'). Allows readable IP addresses to be reconstructed from stored or calculated values.
Calculates complete information about an IPv4 subnet from a CIDR-formatted address. Obtains the network address, broadcast address, first and last available host, and total number of usable hosts, using binary operations for accurate and efficient results.
Can inspect and validate the SPF settings for your domain. We'll test the record against all requirements from the SPF standard.
Can inspect and validate a DMARC record placed under your domain. We'll test the record against all requirements from the DMARC standard.
Can inspect and validate a DKIM record placed under your domain. We'll test the record against all requirements from the DKIM standard.
Can inspect and validate MTA-STS implementation for your domain. We'll test all required DNS settings, as well as the policy server.
Can inspect and validate if TLS-RPT & SMTP TLS reporting is configured correctly for your domain.
Can inspect and validate a Brand Indicators for Message Identification (BIMI) DNS record. We'll test all requirements against the current BIMI draft: BIMI-10.
This tool will make email headers human readable by parsing them according to RFC 822.
Converts text to Base64 for secure transmission or storage.
Decodes Base64 text back to its original form.
Verifies whether a string is valid Base64, checking format and length to avoid errors.
Displays an image from a base64 string, creating and displaying the element.
Easily preview base64 PDF files directly in your browser.
Convert a PNG image to JPG with a white background and adjustable compression.
Convert a JPG to PNG while preserving transparency and original quality.
Convert any image to the optimized, lighter WebP format.
Insert the image into an SVG file using base64.
Encode an image in Base64 to embed it in HTML, CSS, or JSON.
Convert an image to ICO format compatible with application and website icons.
Rotate an image to a specific angle while maintaining its size and quality.
Extraction of image data to obtain information such as EXIF, GPS, and metadata.
Invert the RGB values of the image.
Encodes special characters in URLs to make them web-safe.
Decodes encoded URLs and displays the original text.
Fetch and display HTTP headers from a web page.
Instantly check a domain's SSL certificate: issuer, validity, expiration, and key details.
Translates cron expressions into a human-readable date and time format.
Compress JSON code by removing unnecessary spaces and comments.
Compress JavaScript code by removing unnecessary spaces and comments.
Compress CSS code by removing unnecessary spaces and comments.
Compress XML code by removing unnecessary spaces and comments.
Formats and organizes JSON to make it more readable.
Formats and organizes JavaScript to make it more readable.
Formats and organizes CSS to make it more readable.
Formats and organizes XML to make it more readable.
Validates whether a text is valid JSON, checking its syntax before processing it.
Validates whether a text is valid JavaScript, checking its syntax before processing it.
Validates whether a text is valid CSS, checking its syntax before processing it.
Validates whether a text is valid XML, checking its syntax before processing it.
Validates whether the XML file is a SitemapIndex with valid URLs for other sitemaps.
Validates whether the XML file is a URLSet Sitemap with valid URLs.
Verify that the code contains exactly 2 numeric digits and complies with the standard format of an EAN-2 supplement, used as an extension of EAN-13 codes for additional information.
Quickly and automatically create valid 2-digit EAN-2 barcodes. They are used as supplements to other EANs to add extra information, such as edition numbers or supplements.
Check that the code has 5 numeric digits and complies with the standard format of the EAN-5 supplement, used as an informative extension of an EAN-13.
Generate 5-digit EAN-5 codes quickly and easily. They are ideal for books or publications, indicating price or additional information, with an automatically calculated check digit.
Verify that the code has 8 numeric digits, including a valid check digit, in accordance with the EAN-8 standard.
Quickly create valid 8-digit EAN-8 codes. Perfect for small products, they automatically include the check digit to ensure validity.
Verify that the code has 13 numeric digits and that the check digit complies with the EAN-13 standard algorithm.
Quickly and automatically create valid 13-digit EAN-13 barcodes. These are used to uniquely identify products, with the check digit calculated automatically to ensure validity.
Verify that the code has 12 digits and a correct check digit.
Quickly and automatically create valid 12-digit UPC-A barcodes. These are primarily used on consumer products to uniquely identify them, with the check digit calculated automatically.
Verify that the code has 6 digits and can be converted to a valid UPC-A with the correct check digit.
Generate 6-digit UPC-E codes quickly and easily. This is the compressed version of the UPC-A, ideal for small products, and the check digit is automatically calculated to ensure validity.
ITF-14 is a 14-digit barcode used primarily to identify logistics units (such as boxes or pallets) in supply chains. The last digit of the code is a check digit calculated using the standard modulo 10 algorithm.
Quickly create valid 14-digit ITF-14 barcodes. Used for product packaging and logistics, ensuring code validity through automatic calculation of the check digit.
SSCC-18 is an 18-digit barcode used to uniquely identify containers, pallets, or logistics units in the supply chain. The last digit of the code is a check digit calculated using the GS1 standard algorithm (modulo 10).
Quickly and automatically generate valid 18-digit SSCC-18 codes. These are used to identify logistics units such as pallets and shipments, with a check digit calculated automatically to ensure validity.
Verify whether a 13-digit GLN (Global Location Number) is valid. The GLN uniquely identifies physical locations, companies, or entities within the supply chain, and the last digit is a check digit that ensures the number has no transcription errors.
Generate 13-digit GLN-13 codes quickly and easily. They are used to uniquely identify companies, locations, or commercial entities, including the automatic check digit.
Verify whether a GLN-14 (14-digit Global Location Number) is valid. The GLN-14 is used to uniquely identify locations, companies, or entities in the supply chain.
Quickly create valid 14-digit GLN-14 codes. These codes are used to identify logistics units or extended locations, ensuring validity through automatic calculation of the check digit.
Code 39 verification allows you to confirm that a barcode complies with the standard format before it is processed. This process validates that the code contains only permitted characters, that it includes the start and end characters (*), and that, if applicable, the checksum digit is correct.
Generates Code 39 codes automatically, using the standard character set and checksum calculation to ensure valid and readable codes.
Quickly and reliably validates Pharmacode codes. This tool verifies that the value complies with the standard permitted range (3 to 131070), ensuring that the code is valid for use in control and verification systems within the pharmaceutical industry.
Automatically generates valid Pharmacode codes, respecting the standard range and ensuring compatibility with pharmaceutical verification systems.
Check the validity of a Codabar code by verifying start/stop (A–D) and that all characters are from the set allowed by the standard.
Generates Codabar codes automatically, ensuring correct start/stop characters and valid characters according to the standard, ideal for testing and system development.
Verify that an MSI code ends with a Mod 10 (Luhn) check digit. Calculate the Mod 10 on the base digits and compare with the last digit.
Generates an 8-digit number and calculates a Mod 10 (Luhn) check digit. Returns 9 digits in total.
Verify that an MSI code ends with a Mod 11 check digit. Calculate Mod 11 using cyclic weights 2–7 on the base digits and compare with the final digit.
Generate an 8-digit number and calculate a Mod 11 check digit with cyclic weights 2–7. Return 9 digits.
Verify codes with two Mod 10 check digits. Calculate the first Mod 10 on the base digits and the second on the base + first digit. Both must match the last two digits of the code.
Generate 8 digits and apply double Mod 10: first on the base number (dv1), then on base+dv1 (dv2). Return 10 digits.
Verify codes with Mod 11 check digit followed by Mod 10. Calculate Mod 11 based on the first digit and Mod 10 based on the base + first digit for the second digit, and compare with the last two digits of the code.
Generates 8 digits, calculates Mod 11 (dv1) and then Mod 10 on base+dv1 (dv2). Returns 10 digits.
This function allows you to interpret complete GS1 codes, correctly separating each field according to its AI and length.
Generate GS1 codes quickly and automatically. GS1 is the international standard system that groups EAN, UPC, SSCC, and GLN, ensuring unique identification of products, shipments, and locations.
Validator of Official Identifiers of the European Union.
Validate card numbers and find out if they are Visa, Mastercard, AmEx, or Discover.
Quickly and securely verify whether an IBAN is valid.
Converts integers between 1 and 3999 to their Roman numeral representation. The function validates that the input is an integer within the allowed range and returns an error message if it is invalid. Useful for historical calculations, numbering in documents, or educational systems.
Converts valid Roman numerals (I, V, X, L, C, D, M) to their equivalent in Arabic numerals. The function validates the syntax of the Roman numeral and reports errors in case of incorrect formats, preventing incorrect results due to invalid inputs.
Convert any text string into its binary representation using 8-bit ASCII codes per character. Includes input validation and separates bytes with spaces for better readability.
Converts binary strings into readable text, validating that each byte has exactly 8 bits and contains only 0 or 1. Ideal for decoding binary messages securely and reliably.
Converts letters and numbers in a text to their representation in the NATO phonetic alphabet. Keeps non-alphabetic characters unchanged and allows messages to be encoded in a clear and understandable way for verbal or phonetic communication.
Converts a message written in NATO phonetic alphabet words to its original text. Each word corresponding to a letter or number is translated, while unrecognized characters or words remain unchanged, facilitating the decoding of phonetic messages.
Converts each character in a text into its Unicode representation in \uXXXX format. Allows content to be displayed and stored in a standardized format that is compatible with systems requiring Unicode encoding.
Converts Unicode sequences in \uXXXX format back to readable text. Validates the format of each code and reconstructs the original message securely and reliably.
Convert any text to Morse code, transforming letters and numbers into dots and dashes. It maintains word separation using / for clear and reversible reading. Ideal for encoding messages in a simple and educational way.
Converts strings in Morse code back to readable text, respecting the word separation indicated by /. Correctly converts letters and numbers, allowing encrypted messages to be decoded quickly and accurately.
Convert color between the different formats (hex, rgb, hsl and css name)
Applies ROT13 encryption to text, rotating each letter 13 positions in the alphabet. Only affects letters; numbers, spaces, and symbols remain unchanged. It is reversible by applying the same function. Ideal for hiding light messages or teaching basic encryption concepts.
Decrypt a text encoded with ROT13. Since ROT13 is symmetric, applying the same function returns the original text. It allows you to decode hidden messages quickly and easily.
This set of functions implements the classic ROT-N cryptographic algorithm based on monoalphabetic substitution. The function applies a circular shift of n positions to ASCII alphabetic characters (A–Z, a–z), preserving case by using Unicode codes.
This set of functions implements the classic ROT-N cryptographic algorithm based on monoalphabetic substitution. The function allows for the reversibility of the encryption by applying the complementary shift (26 − n), which makes it possible to recover the original text.
Generate encrypted passwords to protect your paths on Apache servers with .htpasswd.
128-bit hash algorithm designed for limited systems, now obsolete.
Fast 128-bit hash, based on MD5, but with known vulnerabilities.
128-bit hash widely used, but no longer secure against modern collisions.
Truncated MD5: only half of the hash to reduce size, maintaining partial uniqueness.
Encryption applied twice with MD5 for greater data security complexity.
160-bit hash, used in the past; now vulnerable to collision attacks.
Secure 256-bit hash, widely used in cryptography and blockchain.
Extended version of SHA-2 with 384-bit output for greater security.
High-security hash with 512-bit output, ideal for sensitive data.
Fast hash with 224-bit output based on SHA-512, secure and efficient.
SHA-512 version with 256-bit output, more secure than SHA-256 in 64-bit.
Compact hash from the SHA-3 family, offering modern 224-bit security.
256-bit SHA-3 hash, a secure and modern alternative to SHA-2.
384-bit hash based on Keccak, ideal for secure applications.
More robust version of SHA-3 with 512-bit output for maximum security.
128-bit hash, a less commonly used alternative to MD5 with a similar structure.
More secure 160-bit version, used as an alternative to SHA-1.
256-bit hash, longer length but no clear improvement in security.
Extended to 320 bits, parallel design for greater resistance.
Tiger 128-bit, 3 rounds, fast and efficient for small data.
Tiger 160-bit, 3 rounds, balance between speed and security.
Tiger 192 bits, 3 rounds, high resistance for secure hashing.
128-bit Tiger, 4 rounds for greater security and resistance.
Tiger 160 bits, 4 rounds, improves protection against attacks.
Tiger 192 bits, 4 rounds, maximum security in the Tiger family.
Extended version of Snefru with 256-bit output for greater robustness.
GOST symmetric encryption algorithm, used in Russian standards.
GOST-Crypto implements Russian cryptography in accordance with GOST R 34.10 and 34.11.
Adler-32 combines byte sum and modulus 65521 to generate a 32-bit checksum.
32-bit checksum used to detect errors in files and transmissions.
Big-endian variant of CRC32, common in PHP and network formats.
Optimized version of CRC32 with improved error detection, used in networks and disks.
Fast non-cryptographic hash used in hash tables and games such as GTA.
Fast 32-bit hash, ideal for structures such as hash tables.
128-bit version for x86, balance between speed and dispersion.
128-bit version optimized for x64 architectures.
Fast and simple 32-bit FNV-1 hash, ideal for hash tables.
32-bit FNV-1a version, better distribution than FNV-1.
64-bit FNV-1 hash, useful in large key spaces.
64-bit FNV-1a version, with improved dispersion and reduced collisions.
32-bit non-cryptographic hash, uses multiplicative mixing and rotations.
64-bit version of XXHash; high speed and good bit distribution.
Modern algorithm with SIMD and strong avalanche; optimized successor to xxh64.
128-bit hash based on xxh3; high performance with improved dispersion quality.
Generates the WHIRLPOOL hash of any text, ideal for verifying data integrity.
128-bit hash, 3 rounds, fast but vulnerable to collisions.
160-bit hash, 3 rounds; high speed, low security.
192-bit hash, 3 rounds, high performance, limited resistance.
224-bit hash, 3 rounds; not recommended due to weak security.
256-bit hash, 3 rounds; large size, but insufficient security.
128-bit hash, 4 rounds; moderate improvement over 3 rounds.
160-bit hash, 4 rounds; greater resistance to attacks than the 3-round version.
192-bit hash, 4 rounds, balanced compromise between security and speed.
224-bit hash, 4 rounds, reasonable security for non-critical environments.
256-bit hash, 4 rounds, good length, but less secure than 5 rounds.
128-bit hash, 5 rounds, minimum acceptable configuration for security.
160-bit hash, 5 rounds, suitable for general use with good performance.
192-bit hash, 5 rounds, good resistance, and acceptable speed.
224-bit hash, 5 rounds, high collision and preimage resistance..
256-bit hash, 5 rounds, maximum security in HAVAL, ideal for strong integrity.
Generates the MySQL5 hash of any text, ideal for verifying data integrity.
Blowfish is a fast and secure symmetric encryption algorithm used in bcrypt to protect passwords.