###### Geocaching Quick Search

In this section, you may search for a First To Find (FTF) by entering a state, province or country in the box and clicking the search button. It will open a new window showing geocaches sorted by "last found date" which will
give you FTF's first and then loneliest geocaches next. Not all locations on the Geocaching website are listed. If your area is not on here, reach out to me and I'll see if I can get it
added.

You may also see recently published caches near your current location. Because this uses your devices current location, you will need to grant browser location access in order to proceed.

**Note:** It may take a few seconds to locate your device. If you are on mobile, you may have to click the buttons twice.

###### Tools

#####
Map Tools

**Coordinate Conversion**- Convert multiple coordinate formats into other formats quickly. Allows you to map these coordinates in a variety of maps and view a custom Geocache search.**Distance & Midpoint Calculator**- Takes a variety of coordinate inputs and calculates the distance between them and the midpoint. It gives you the bearing and distance in both feet and meters.**Projection Calculator**- Allows you to project a waypoint from a given location with bearing and distance. The midpoint will be given as well.**Incomplete Coordinate Calculator**- If you have a set of coordinates that are missing values, this tool will calculate all of the missing coordinate spots and show them on a map. You can also download coordinates into a CSV file or view them in a list.**Batch Convert Coordinates**- This tool accepts 10 different coordinate notation types and converts all recognized coordinates into the notation of your choosing.**Map Coordinates List**- This tool allows you to map a list of coordinates and get the distance between each point. Enter each of your coordinates on a new line, choose what format you want them converted into and click calculate to see them on a map.**Intersection of 2 Circles**- This tool allows you to calculate the intersection of 2 circles and show them on a map. You can also add a moveable marker to see coordintes in a certain location.**Intersection of 3 Circles**- This tool allows you to calculate the intersection of 3 circles and show them on a map. You can also add a moveable marker to see coordintes in a certain location.**Circle Through 3 Points**- This tool allows you to calculate the center point and radius of a circle through 3 points. You can also add a moveable marker to see coordintes in a certain location.**Center of a Triangle**- This tool allows you to calculate the center, area, and perimeter of a triangle. You can also add a moveable marker to see coordintes in a certain location.**Trianglation**- This tool allows you to calculate an unknown point when 2 points with a bearing are known. You can also add a moveable marker to see coordinates in a certain location.**Intersection of a Line and a Circle**- This tool allows you to calculate the intersection of a line and a circle and show them on a map. You can also add a moveable marker to see coordintes in a certain location.**Intersection of 2 Lines**- This tool allows you to calculate the intersection of 2 lines at a bearing and show them on a map. You can also add a moveable marker to see coordintes in a certain location.**Intersection of Line Between 4 Points**- This tool allows you to calculate the intersection of lines between 4 points and show them on a map. Calculations will be from Coordinates A to B and C to D. If the lines do not connect based on entered coordinates, the tool will check to see if they would connect if extended. If so, "virtual" intersection coordinates will be provided. You can also add a moveable marker to see coordintes in a certain location.**Cache Placement Helper**- Tool that allows you to get your current coordinate readings and view them on a map. You can move the pin around to narrow the results. Offers a variety of coordinate formats and helpful links to quickly create a cache page or view maps in Google.

#####
Code Tables (190+)

**Code Tables**- Over 190 codes tables, the majority of which are interactive and allow you to type out your own custom phrases. This list is growing periodically so check back often.**View All Examples**- This page allows you to type in a message and see that message displayed using all of the compatible monoalphabetic code tables. Useful for finding which code you're looking for or for creators to see which code looks the best for their message.

###### Quick Translate

#####
Code Tools

**Abaddon Code**- This code consists of three characters ¥, µ, and þ and covers the letters A to Z and a space for a total of 27 characters. It is named after the biblical angel of the abyss.**Backslash Code**- Tool to convert letters to and from backslash code. Uses groups of three characters consisting of \ | /.**Baudot-Murray**- Converts text Baudot code.**Brainf*ck & Ook! Code**- This tool converts text to and from the programming language Brainf*ck and variants of this called Ook! and Short Ook!.**Chinese Code**- This code uses dashes and pipes to represent vowels and consonents. Go to Codes --> Chinese Code for an image version.**Clock Code**- This code encrypts plaintext using numbers on a 12/24-hour clock. A colon (:) separates each letter and two zeros separates each word (00).**Colored Squares Code**- This code is a simple substitution code in disguise. Each colored square is worth a certain value. Add up the values within each 2 x 2 block (colors are always shown highest to lowest value) and then convert the total to the corresponding letter (A=1, Z=26).**Cow Code**- The COW programming language is an esoteric programming language created by Sean Heber in 2003. It is a Brainf*ck variant.**Decabit Code**- The Decabit code consists of 10 characters of "+" and "-" that directly translate to numbers from 0 to 126. These values are mapped to the corresponding ASCII characters/numbers.**Dvorak Qwerty**- This tool converts text between a Qwerty keyboard and a Dvorak keyboard.**Enclosed Areas**- Tool that counts the enclosed areas of uppercase, lowercase, and numbers. Example = 3 (a, p, and e).**Five Needle Telegraph**- Substitution cipher using the characters \ | / in sets of 5 characters. Also known as the Cooke and Wheatstone telegraph.**GoldBug Code**- Converts text GoldBug Code.**Hodor**- Based off the character from Game of Thrones, this tool translates upper and lower case letters from an esoteric language named after Hodor.**Kenny Code**- Converts text Kenny Code.**Letters Numbers**- Allows you to convert letters to and from numbers.**Morse Code**- Tool to convert text Morse Code.**Nak Nak (Duckspeak)**- This tool allows you to convert human language to and from duckspeak so you may converse with your little feathered friend.**NATO Alphabet**- Tool to convert text the NATO Phonetic Alphabet.**Number Pad Lines**- Tool that uses lines drawn between the numbers on a keypad to make letters and numbers with the shape.**Quadoo**- Quadoo consists of 6 lines on a grid that translates to text, intended for the visually impaired. This tool converts those lines to numbers from text. See Quadoo code for a visual representation in images.**Qwerty Coordinates**- This tool allows you to convert QWERTY letters to their coordinate location on the keyboard by rows and columns. The number returned will first look for which row from the top of the keyboard and then which column from the left the character appears. You will have 3 different versions from which to choose.**Qwerty Shifter**- This tool allows you to shift letters on a qwerty keyboard right or left. You can shift up to 47 slots if you include special characters and up to 36 if you exclude them.**Slash and Pipe Code**- Substitution cipher using the characters \ | /.**Tap (Knock) Code**- Converts characters between letters, numbers and dots via a polybius square. This is said to be used by prisoners to communicate with each other.**Tomtom Code**- Substitution cipher using the characters \ | /.**T9 Code Solver**- Tool to solve the phone pad's T9 code using a large dictionary.**Vanity Code**- Code that uses the numbers/letters on a phone pad. Four methods included.

#####
Cipher Tools

**Additive Cipher**- Similar to a Caesar cipher, each character of the alphabet is assigned a value and a key number within the alphabet is chosen. Each character is added with this key number and the corresponding letter is substituted (mod 26).**ADFGX Cipher**- Tool to convert text using the ADFGX cipher and a custom alphabet.**ADFGVX Cipher**- Tool to convert text using the ADFGVX cipher and a custom alphabet.**Affine Cipher**- Tool to convert text using the Affine cipher and a custom alphabet.**Albam Cipher**- Simple substitution cipher that swaps letters in the alphabet with a different letter in a second alphabet. Similar to Atbash.**ASCII-85**- This coding system (AKA Base 85) was created by Adobe Systems and uses 5 ASCII characters to code 4 bytes similar to base64.**Atbash Cipher**- Tool to convert text into Atbash cipher which flips the text from A-Z to Z-A.**Autokey Cipher**- This cipher is a polyalphabetic substitution cipher.**Bacon Cipher**- Converts text Bacon Cipher. Able to decrypt A/B, 0/1, Uppercase/Lowercase, and Atbash style A-M/N-Z encryptions.**Beaufort Cipher**- This is a polyalphabetic substitution cipher that is similar to the Vigenère cipher, only that instead of adding letter values, it calculates the cipherletter by taking the keyletter minus the plaintextletter.**Variant Beaufort Cipher**- This is a polyalphabetic substitution cipher that is similar to the Vigenère cipher. The key differences is the encryption is performed like decryption in the Vigenère and decryption is performed like the encryption in the Vigenère.**Bifid Cipher**- This cipher combines the Polybius square with transposition and uses fractionation to achieve diffusion.**Burrows-Wheeler Transform**- The Burrows–Wheeler transform rearranges a character string into runs of similar characters. This is useful for compression and more importantly, the transformation is reversible, without needing to store any additional data except the position of the first original character.**Caesar Box Cipher**- The Caesar Box is a cipher that is based on a transposition method. The cipher is encrypted by writing the text in columns (padding with extra characters to make them even) and then reading off the text by rows. This is not a Caesar cipher.**Carbonaro Cipher**- Simple substitution cipher used by a secret society in Naples called the Carboneria. Similar to Atbash.**Chaocipher**- This encryption uses two rotating disks on which is written a custom alphabet. The two disks are identical and linked with a kind of gearing (ratio 1:1) that if a disk is turned clockwise, the other turns counter-clockwise.**Columnar Transposition Cipher**- This tool writes text out in rows based off of a keyword and then reads the text off in columns.**Double Transposition**- The double transposition cipher (AKA double columnar transposition) was used by military forces in World War I and II. It is basically a columnar transposition followed by another columnar transposition. It is considered one of the most secure ciphers that can be performed by hand.**Enigma (M3) Cipher**- This Enigma tool is an accurate simulation of the M3 Enigma cipher machine used by the German Navy during the Second World War.**Foursquare Cipher**- This tool encrypts pairs of letters (like playfair) using four 5 by 5 matrices arranged in a square.**Fractionated Morse Cipher**- Converts plaintext to morse code and then enciphers fixed size blocks of morse back into letters. You can also use a keyword to further increase the security of the cipher.**Gronsfeld Cipher**- The Gronsfeld cipher is a polyalphabetic cipher (a series of Caesar ciphers) where the shift is determined by numbers. It is similar to the Vigenère cipher, but the key uses digits instead of letters.**Hill Cipher**- The Hill cipher is a polygraphic substitution cipher based on linear algebra. It uses matrices and matrix multiplication to encrypt/decrypt the text.**Kamasutra Cipher**- The Kamasutra (Vatsyayana) cipher is a simple substitution cipher where the 26 letters of the alphabet are organized into 13 pairs of characters.**Keyed Caesar Cipher**- The Keyed Caesar cipher is a variation to the standard Caesar cipher (shifting the letters by 13). In a keyed version, the alphabet is "keyed" by using a word and those letters are moved to the front of the alphabet and the rotation is performed.**Multiplicative Cipher**- In a Multiplicative cipher, each character of the alphabet is assigned a value and a coprime key to the length of the alphabet is chosen. Each character is multiplied with this key and the corresponding letter is substituted.**One Time Pad Cipher**- The one time pad is, theoretically, an unbreakable cipher. In order for it to work, a pre-shared key of the same length as the message must be shared with the intended recipient.**Pizzini Cipher**- The Pizzini cipher is very similar to the classic Caesar cipher where the alphabet is shifted three letters (A => D, B => E, etc). The difference is the Pizzini cipher assigns those letters to numbers so A = 4, etc.**Playfair Cipher**- This cipher encrypts pairs of letters (digraphs), instead of single letters as in the simple substitution cipher.**Porta Key Cipher**- This cipher is a polyalphabetic substitution cipher similar to the Vigenère. Where the Vigenère cipher uses 26 alphabets, the Porta only uses 13 alphabets.**Pollux Cipher**- This cipher is a super-encryption system based on Morse code and replaces the dots, dashes and space by alphanumeric characters. When encrypting, a corresponding character is randomly selected from the list of possibilities; therefore every encryption will be almost certainly be different each time.**Polybius Square Cipher**- This cipher is a polyalphabetic substitution cipher and is essentially identical to the simple substitution cipher, except that each plaintext character is enciphered as 2 ciphertext characters.**Qwerty Cipher**- This simple substitution cipher maps the keys of a QWERTY keyboard layout to letters like this: QWERTY = ABCDEF.**Rail Fence Cipher**- The railfence cipher is a transposition cipher that follows a simple rule for mixing up the characters in the plaintext to form the ciphertext.**Rotation/Caesar Cipher**- Also known as a caesar cipher, this allows you to rotate numbers (Rot 5), letters (Rot 13), letters and numbers (Rot 18), all ASCII characters (Rot 47), or show all rotations from 0 to 25 either encrypted or decrypted.**Rotation Grid**- The cipher takes text written in a grid, rotates them by 90° and reads the text back out.**Rotation Special**- This special version of the**Rot Cipher**takes a set of characters and rotates them each in incremental order where each character is rotated by +1 from the last rotation.**Route Transposition Cipher**- The route transposition cipher rearranges the plaintext letters based on a shape of an imaginary path drawn on a grid, which contains all the message letters.**Running Key Cipher**- This polyalphabetic substitution cipher has the same internal workings as the Vigenère cipher. The difference lies in how the key is chosen; the Vigenère cipher uses a short key that repeats, whereas the running key cipher uses a long key such as an excerpt from a book.**Scytale Cipher**- The Scytale is a cipher that is based on a transposition method. A stretch of leather with letters on it was wound upon a piece of wood with the correct diameter and the encoded message could then be read.**Straddle Checkerboard Cipher**- Substitution cipher using a variable length alphabet.**Substitution Cipher**- Allows you to create your own version of an alphabet as a substitution.**Trifid Cipher**- The Trifid cipher uses three tables to fractionate letters into trigrams, mixes the parts of the trigrams and then uses the table to convert the trigrams back to letters again.**Trithemius Cipher**- This cipher uses a tableau (tabula recta) to encrypt/decrypt a message. A custom alphabet can also be created to make it a little more secure.**Übchi Transposition Cipher**- The Übchi Transposition Cipher was used by the Germans during World War 1 and is a double columnar transposition cipher.**Vigenère Cipher**- The Vigenère Cipher is a polyalphabetic substitution cipher.

#####
Number Tools

**ASCII, Decimal, Binary, Hex, Octal**- Converts characters between ASCII, Decimal, Binary, Hex and Octal.**How To Read A Barcode (Tool included)**- Describes how a barcode is comprised and includes a tool to convert numbers 0-9 to a barcode code numbers.**Base Conversion**- Converts numbers from one base to another. Works from 2 to 62.**Base64**- Converts text Base64.**Clock Angle Calculator**- This tool will calculate the angles between hour to minute hands and minute to hour hands in a clockwise manner. It will accept hours in either 12 or 24 hour format.**Digital Root**- Calculates the digital root value of your text.**Euler-Mascheroni Constant (γ) Searcher**- Four tools to search through 10 million digits of γ.**Euler Number (e) Searcher**- Four tools to search through 10 million digits of*e*.**Fibonacci Sequence**- Allows you to see the fibonacci sequence up to a certain requested number. Desktop Chrome/Firefox users can calculate with high precision any number their browser can handle (over 1 million iterations easily).**Fraction Approximator**- Tool to approximate fractions to a high degree.**GC Number GC ID**- Tool that allows you to translate the GC Number the GC ID using a custom base 31 conversion.**Golden Ratio (φ) Searcher**- Four tools to search through 10 million digits of φ.**Lucas Numbers**- Allows you to see the Lucas Numbers (closely related to the fibonacci sequence) up to a certain requested number. Desktop Chrome/Firefox users can calculate with high precision any number their browser can handle (over 1 million iterations easily).**Numbers To Words**- Converts numbers entered into their word form. Handles up to a nonillion.**Pi (π) Searcher**- Four tools to search through 10 million digits of π.**Prime Numbers**- Allows you to see if a number is a prime number, show all prime factors, and to return all prime numbers up to a requested number.**Pythagoras's Constant (√2) Searcher**- Four tools to search through 10 million digits of √2.**Roman Numerals**- Allows you to convert numbers to and from Roman numerals.**Scrabble Scorer**- Tool to convert letters to numbers and sum them for you using scrabble values.**Shadoks Number System**- Tool to convert decimal to the base 4 Shadoks numbers.**Temperature Converter**- Convert temperature between Celcius, Fahrenheit and Kelvin.**Theodorus' Constant (√3) Searcher**- Four tools to search through 10 million digits of √3.**Triangle Calculator**- Tool to calculate missing sides or angles of a triangle.**UTF-8 Tool**- UTF-8 (8-bit Unicode Transformation Format) is a variable length character encoding that can encode any of the valid Unicode characters.**Unit Converter**- Tool to convert units for volume, weight, length, time and temperature.**Vanity Values**- Tool to convert letters to numbers and sum them for you using vanity letter values from a phone pad.**Word Value**- Tool to convert letters to numbers and sum them for you.

#####
Miscellaneous Tools

**Reverse Wherigo**- This tool allows you to decode the 3 six-digit codes in a Reverse Wherigo. You can also create your own from a set of coordinates.**Text Manipulator**- Tool to manipulate text in a large variety of ways. Uppercase, lowercase, reverse text, upside down text, rotation, etc. Full screen version here.**Frequency Analysis**- Tool that analyzes a group of text for letter, number and misc character frequencies.**Exif Reader**- Exif reader that supports reading exif data from JPEG, PNG, WebP, TIFF, HEIC/HEIF.**Spelling with Elements**- Spell out a word using the elements on the periodic table!**Resistor Color Code**- Tool to calculate the resistance and tolerance of the color bands on electronic resistors, capacitors, inductors and other electrical components.**DNA Translator**- This tool encodes or decodes a message using letters in the DNA code (A, C, G, and T).**ISBN Tool**- Tool to convert ISBN-10 ISBN-13. You can also lookup the ISBN via Open Library, Amazon and Google.**Draw A Stickman Solver/Creator**- This tool allows you to solve "Episode 1" of the Draw A Stickman puzzles. You can also create your own from a custom message as well.**Sudoku Solver**- HTML based sudoku solver that is mobile compatible. Easy to use with instructions.**Elemental (Periodic Table)**- Converts characters between periodic table of elements. Displays numbers, symbols and names.**Hash Functions**- This tool allows you to generate a variety of hash functions using the Forge crypto library.**Pig Latin Encoder**- This tool allows you to encode a message of your choice in Pig Latin.**Flip A Coin**- Simple way to flip a coin. Keeps track of your choices and win/loss counts.**Roll The Dice**- Simple way to roll the dice. Choose up to 10 dice at a time or do a random roll.**Bookmarklets**- Several javascript bookmarklets to shortcut common geocaching functions such as coordinate conversion, gc/tb lookup, keyword search, user search, etc.**Cache Page Creation Helper**- Example page to show you how to spruce up your cache creation pages.**QR Code Scanner**- Allows you to scan a QR code image.**QR Code Generator**- Allows you to create a QR code with custom colors and density.**Barcode Generator**- Tool to create a barcode in Format 39, Format 128, and EAN13.**Logical Solver**- Tool to solve logical puzzles. Works on both mobile and desktop.**Circular Gallifreyan Creator**- Tool that allows you to create circular Gallifreyan. Works on both mobile and desktop.

#####
Text Manipulator

###### Nothing to show.

###### Replace Any Chararacter(s)

###### Coordinate Converter & Map Links

###### Coordinate Conversion:

**Automatic Conversion:** This choice is the most flexible option. You may enter a wide variety of coordinate types and it will attempt to recognize and convert them __automatically__. Below is a list of
coordinate notations that the automatic option currently supports. At the bottom are more notation types that are available via the dropdown above.**If your coordinates entered are not converting correctly,** try
choosing that coordinate notation type from the dropdown and you may have better luck.

Example: Big Ben in London, UK

**Degree Decimal Minutes (DDM):**

N51° 30.042 W000° 7.476**Decimal Degrees (DD):**

51.500700, -0.124600**Degrees, Minutes & Seconds (DMS):**

N51° 30' 2.52" W0° 7' 28.56"**What3Words (W3W):**

gums.clubs.terms**Reverse Wherigo -Waldmeister-**

015301 506204 068070**Military Grid Reference System (MGRS):**

30U XC 99567 09427**Universal Transverse Mercator (UTM):**

30 U 699567.54 5709427.56**Plus Codes (Plus):**

9C3XGV2G+75J525**Mercator (XY):**

X: -13870.40855284189,

Y: 6710344.259782706**Geohash (GH):**

gcpuvpmm2d79**GeoHex (GX):**

QE01666112473272870570**Natural Area Code (NAC):**

GZNMMH RKH34G**Mapcode (MC):**

VHGQZ.SJHX-6W9**British National Grid (OSGB):**

TQ 30270 79641

Additional notations in the dropdown that are not available with the automatic conversion selection.

**Geo3x3 (G3):**

W9633932282187272119

###### Degree Decimal Minutes:

###### Decimal Degrees:

###### Degrees, Minutes & Seconds:

###### Elevation:

If the coordinates are located in the continental USA, Hawaii, or parts of Alaska, the elevation data pulls from USGS 10m with 10 meter accuracy. All other locations use NASA Aster 30m with 30 meter accuracy.

###### What3Words:

###### Antipode:

###### Plus Code:

###### MGRS:

###### UTM:

###### Reverse Wherigo -Waldmeister-:

###### Mercator:

###### Maidenhead:

###### Geohash:

###### GeoHex:

###### Geo3x3:

###### Natural Area Code:

###### Mapcode:

###### British National Grid (OSGB):

###### Custom View Nearby Geocaches:

###### Convert Coords Bookmarklet:

Visit the **bookmarklet** section to add a handy bookmarklet to help you convert coordinates from any webpage.