
Quick tools to verify DNS, email settings and more.
Check how a DNS record has propagated across global servers.
Advanced tool to query detailed DNS records for a domain.
Simple tool to retrieve DNS records for a domain or IP.
Test if a host is reachable and measure network response time.
Shows the network hops a packet takes to reach its destination.
Check if the port is open and accessible for external connections.
Detect and display your current public IP address.
Show the approximate geographic location of an IP address.
Allows you to query and analyze IP addresses in the global RIPE database.
Query this WHOIS service to look up internet domain name information.
Check if an IP is listed on anti-spam DNS blacklists.
Detect your download and upload speed from our server.
Can inspect and validate the SPF settings for your domain. We'll test the record against all requirements from the SPF standard.
Can inspect and validate a DMARC record placed under your domain. We'll test the record against all requirements from the DMARC standard.
Can inspect and validate a DKIM record placed under your domain. We'll test the record against all requirements from the DKIM standard.
Can inspect and validate MTA-STS implementation for your domain. We'll test all required DNS settings, as well as the policy server.
Can inspect and validate if TLS-RPT & SMTP TLS reporting is configured correctly for your domain.
Can inspect and validate a Brand Indicators for Message Identification (BIMI) DNS record. We'll test all requirements against the current BIMI draft: BIMI-10.
This tool will make email headers human readable by parsing them according to RFC 822.
Converts text to Base64 for secure transmission or storage.
Decodes Base64 text back to its original form.
Verifies whether a string is valid Base64, checking format and length to avoid errors.
Displays an image from a base64 string, creating and displaying the element.
Easily preview base64 PDF files directly in your browser.
Encodes special characters in URLs to make them web-safe.
Decodes encoded URLs and displays the original text.
Fetch and display HTTP headers from a web page.
Instantly check a domain's SSL certificate: issuer, validity, expiration, and key details.
Translates cron expressions into a human-readable date and time format.
Compress JSON code by removing unnecessary spaces and comments.
Compress JavaScript code by removing unnecessary spaces and comments.
Compress CSS code by removing unnecessary spaces and comments.
Compress XML code by removing unnecessary spaces and comments.
Formats and organizes JSON to make it more readable.
Formats and organizes JavaScript to make it more readable.
Formats and organizes CSS to make it more readable.
Formats and organizes XML to make it more readable.
Validates whether a text is valid JSON, checking its syntax before processing it.
Validates whether a text is valid JavaScript, checking its syntax before processing it.
Validates whether a text is valid CSS, checking its syntax before processing it.
Validates whether a text is valid XML, checking its syntax before processing it.
Validates whether the XML file is a SitemapIndex with valid URLs for other sitemaps.
Validates whether the XML file is a URLSet Sitemap with valid URLs.
Generate encrypted passwords to protect your paths on Apache servers with .htpasswd.
128-bit hash algorithm designed for limited systems, now obsolete.
Fast 128-bit hash, based on MD5, but with known vulnerabilities.
128-bit hash widely used, but no longer secure against modern collisions.
Truncated MD5: only half of the hash to reduce size, maintaining partial uniqueness.
Encryption applied twice with MD5 for greater data security complexity.
160-bit hash, used in the past; now vulnerable to collision attacks.
Secure 256-bit hash, widely used in cryptography and blockchain.
Extended version of SHA-2 with 384-bit output for greater security.
High-security hash with 512-bit output, ideal for sensitive data.
Fast hash with 224-bit output based on SHA-512, secure and efficient.
SHA-512 version with 256-bit output, more secure than SHA-256 in 64-bit.
Compact hash from the SHA-3 family, offering modern 224-bit security.
256-bit SHA-3 hash, a secure and modern alternative to SHA-2.
384-bit hash based on Keccak, ideal for secure applications.
More robust version of SHA-3 with 512-bit output for maximum security.
128-bit hash, a less commonly used alternative to MD5 with a similar structure.
More secure 160-bit version, used as an alternative to SHA-1.
256-bit hash, longer length but no clear improvement in security.
Extended to 320 bits, parallel design for greater resistance.
Tiger 128-bit, 3 rounds, fast and efficient for small data.
Tiger 160-bit, 3 rounds, balance between speed and security.
Tiger 192 bits, 3 rounds, high resistance for secure hashing.
128-bit Tiger, 4 rounds for greater security and resistance.
Tiger 160 bits, 4 rounds, improves protection against attacks.
Tiger 192 bits, 4 rounds, maximum security in the Tiger family.
Extended version of Snefru with 256-bit output for greater robustness.
GOST symmetric encryption algorithm, used in Russian standards.
GOST-Crypto implements Russian cryptography in accordance with GOST R 34.10 and 34.11.
Adler-32 combines byte sum and modulus 65521 to generate a 32-bit checksum.
32-bit checksum used to detect errors in files and transmissions.
Big-endian variant of CRC32, common in PHP and network formats.
Optimized version of CRC32 with improved error detection, used in networks and disks.
Fast non-cryptographic hash used in hash tables and games such as GTA.
Fast 32-bit hash, ideal for structures such as hash tables.
128-bit version for x86, balance between speed and dispersion.
128-bit version optimized for x64 architectures.
Fast and simple 32-bit FNV-1 hash, ideal for hash tables.
32-bit FNV-1a version, better distribution than FNV-1.
64-bit FNV-1 hash, useful in large key spaces.
64-bit FNV-1a version, with improved dispersion and reduced collisions.
32-bit non-cryptographic hash, uses multiplicative mixing and rotations.
64-bit version of XXHash; high speed and good bit distribution.
Modern algorithm with SIMD and strong avalanche; optimized successor to xxh64.
128-bit hash based on xxh3; high performance with improved dispersion quality.
Generates the WHIRLPOOL hash of any text, ideal for verifying data integrity.
128-bit hash, 3 rounds, fast but vulnerable to collisions.
160-bit hash, 3 rounds; high speed, low security.
192-bit hash, 3 rounds, high performance, limited resistance.
224-bit hash, 3 rounds; not recommended due to weak security.
256-bit hash, 3 rounds; large size, but insufficient security.
128-bit hash, 4 rounds; moderate improvement over 3 rounds.
160-bit hash, 4 rounds; greater resistance to attacks than the 3-round version.
192-bit hash, 4 rounds, balanced compromise between security and speed.
224-bit hash, 4 rounds, reasonable security for non-critical environments.
256-bit hash, 4 rounds, good length, but less secure than 5 rounds.
128-bit hash, 5 rounds, minimum acceptable configuration for security.
160-bit hash, 5 rounds, suitable for general use with good performance.
192-bit hash, 5 rounds, good resistance, and acceptable speed.
224-bit hash, 5 rounds, high collision and preimage resistance..
256-bit hash, 5 rounds, maximum security in HAVAL, ideal for strong integrity.
Generates the MySQL5 hash of any text, ideal for verifying data integrity.
Blowfish is a fast and secure symmetric encryption algorithm used in bcrypt to protect passwords.