To sum up what's generally mentioned in the comments:
- Security through obscurity is not protection. For one, if your hash database leaks, chances are your source code may be accessible as well. If it's not, people can experiment and may be able to reverse engineer the algorithm. If you could think it up, so can anybody else.
- A hash must have a large enough key space to avoid collisions as much as possible. You've got that covered apparently judging from the size of the alphabet, but how collision resistant your algorithm is we don't know.
- A hash must be expensive enough to make it infeasible to hash a large number of values quickly. We have no idea about that in your case, but since you didn't explicitly highlight that as a feature, I expect it's fast. That means an attacker will try to hash all possible passwords as fast as he can. Notice that it's irrelevant here how large the alphabet of your hash values is; only the number of values to be hashed times the time it takes to hash one value is relevant.
- A hash must not have vulnerabilities that allow shortcuts that further reduce the hash time or even allow targeted reverse-engineering of values. We have no idea about this from the information you provide about the hash.
Having said that, if your site is very low profile, it's probably enough to be okay simply by the fact that it's obscure (oops, security by obscurity) and nobody cares. If one day a sufficiently skilled attacker takes an interest in your particular site and hashing algorithm though, you're probably screwed.