Your example seems to use a unique number. If value
is not unique then duplicates will show up in the hash field. In that case an attacker could possibly request you to hash a specific value and check if there is a duplicate somewhere.
This is why you generally should use a hash or - even better, password hash - that stores a unique or large random salt in addition of having access to a pepper.