UUID Generator
Generate UUIDs (v1–v5) and draft/experimental formats (v6, v7, v8) locally in your browser. No server-side calls — fully private.
UUID Generator
Generate UUID v1 (time-based) and v4 (random) instantly in your browser. Professional UUID generator for developers, testing, and database identifiers. Completely offline with bulk generation support.
Examples
About UUID versions
v1 — Time-based (MAC or node + timestamp). Implemented via the uuid library's v1 function.
v3 — Name-based (MD5) using a namespace + name. Implemented via uuid.v3; enter a Name and Namespace to generate.
v4 — Random. Implemented via uuid.v4 (cryptographically-random bytes).
v5 — Name-based (SHA-1) using a namespace + name. Implemented via uuid.v5; enter a Name and Namespace to generate.
v6 — Draft time-ordered variant. This tool provides a best-effort fallback by encoding the timestamp into the high bytes and marking the version nibble as 6.
v7 — Draft timestamp-then-random UUID. Implemented by writing the 48-bit millisecond timestamp into bytes 0..5, filling remaining bytes with secure randomness, then setting version/variant bits.
v8 — Experimental/custom: this tool generates a random 128-bit payload and sets the version nibble to 8 (application-defined semantics).
Note: v6–v8 are draft/experimental; browser implementations vary. This tool implements v7/v8 locally using Web Crypto and a v6 best-effort fallback without changing project build targets.
Key Features
Professional-grade tool designed for speed, security, and simplicity
Complete UUID Support
Generate all UUID versions: v1 (time-based), v3 (MD5), v4 (random), v5 (SHA-1), plus experimental v6, v7, v8 formats.
Name-Based UUIDs
Create deterministic UUIDs using namespace (DNS, URL, OID, X.500) and custom names for v3 and v5 generation.
Instant & Offline
All UUID generation happens locally using Web Crypto API. No server calls, works completely offline.
UUID Versions & Formats
RFC 4122 Standard
v1 (time-based with MAC), v3 (MD5-based), v4 (random), v5 (SHA-1-based) - fully compliant with RFC 4122 specification
Experimental Versions
Draft v6 (time-ordered), v7 (timestamp + random), v8 (custom) - cutting-edge formats for future applications
Output Formats
Standard hyphenated format (8-4-4-4-12) compatible with all programming languages and databases
How UUID Generation Works
Understanding different UUID generation methods and their applications
Select UUID Version
Choose v1 for time-based UUIDs, v4 for random, v3/v5 for name-based, or experimental v6-v8 for specialized use cases.
Configure Parameters
For v3/v5: enter a name and select namespace (DNS, URL, OID, X.500). For others, just click generate.
Generate Instantly
UUID is created using cryptographically secure methods - Web Crypto API for randomness, precise timestamps for time-based.
Copy & Integrate
One-click copy to clipboard. Use in databases, APIs, file systems, or any application requiring unique identifiers.
Common UUID Applications
Database Primary Keys
Perfect for distributed databases where auto-increment IDs cause conflicts during replication or merging
API Development
Track requests, sessions, and resources across microservices and distributed systems
File & Asset Management
Unique identifiers for files, media, and digital assets in storage and content management systems
Technical Information
Processing Method
Uses standard uuid library for v1-v5 and custom Web Crypto API implementation for v6-v8. All generation is cryptographically secure.
Requirements
Modern web browser with JavaScript and Web Crypto API support. Works on all platforms including mobile devices.
Compatibility
Generated UUIDs are RFC 4122 compliant (v1-v5) and compatible with all major programming languages, databases, and systems.
Performance
Instant generation with no network delays. Can generate hundreds of UUIDs per second locally.
Security & Privacy
Data Handling
No UUIDs are stored, logged, or transmitted anywhere. All generation happens entirely in browser memory and is discarded when you leave the page.
Privacy Protection
UUID v4 provides maximum privacy with cryptographically secure randomness. v1 includes MAC address and timestamp. v3/v5 are deterministic based on input.
Security Recommendations
Use v4 for most applications requiring unpredictable unique IDs. Use v1 when you need time-ordering. Use v3/v5 for deterministic UUIDs from known inputs.
Similar Tools
Tools for generating various types of data and files.