Add hashes responsibly
HashCheck accepts hash submissions to improve file safety workflows. Submit only hashes that you have a lawful, good-faith reason to report. Do not upload files or file contents.
Add hashes online
{ "status": true, "data": {} }
Online user submissions accept up to 3 valid hashes per request and are limited to one request every 15 minutes.
Validator API Endpoint
GET https://hashcheck.xexle.com/api/add?hashes=hash1,hash2&validator=VALIDATOR_TOKEN
API submissions require a validator token. Validator submissions are intended for trusted server-side integrations and are not subject to the online user submission limit of 3 hashes per 15 minutes.
Submission Rules
- Do not add hashes without a reasonable basis.
- Do not submit hashes for harassment, false reporting, competitor abuse, reputation attacks or testing evasion.
- Do not submit hashes from restricted datasets unless you are legally permitted to submit them to this service.
- Do not treat user-submitted hashes as proof that a file is illegal or harmful.
Abuse Consequences
If abuse is detected, access may be blocked and hashes submitted from the abusive source may be removed. Xexle may also restrict future submissions, invalidate related validator access, or preserve operational records when needed for security, compliance or lawful process.
Data Recorded With Submissions
In addition to the hash values, HashCheck may record operational data such as IP address, request time, cooldown status, block status, validator identifier, technical logs and abuse-prevention metadata. This data may be used for moderation, security, service integrity, legal compliance and audit purposes.
Government and Legal Requests
When required or permitted by applicable law, Xexle may preserve or provide relevant operational data and submitted hashes in response to lawful requests from competent government authorities, courts or law-enforcement agencies.
Trusted Validator Access
Organizations that need trusted submission access can request a validator key through Xexle support. See Validators for details. Validator keys are reviewed manually and must be kept private on secure server-side systems.