UUID Generator
Generator Settings
Configure UUID generation parameters
Min: 1, Max: 2000
Random UUIDs are cryptographically secure and unpredictable. Most commonly used.
Generated UUIDs
Your generated UUIDs will appear here
Generated UUIDs will appear here
UUID Version Information
Learn about different UUID versions and their use cases
UUID v1 (Time-based)
Based on timestamp and MAC address. Good for chronological ordering but may reveal device information.
- • Time-based generation
- • Includes timestamp
- • Good for ordering
- • May reveal device info
UUID v3 (MD5 based)
Generated using MD5 hash of a namespace UUID and name. Deprecated due to MD5 vulnerabilities.
- • Deterministic generation
- • Based on namespace + name
- • MD5 hash algorithm
- • Deprecated (use v5 instead)
UUID v4 (Random)
Generated using random or pseudo-random numbers. Most commonly used and recommended for general purposes.
- • Cryptographically secure
- • Completely random
- • No predictable pattern
- • Most widely used
UUID v5 (SHA-1 based)
Generated using SHA-1 hash of a namespace UUID and name. Deterministic for the same inputs.
- • Deterministic generation
- • Based on namespace + name
- • SHA-1 hash algorithm
- • Recommended over v3
UUID v6 (Reordered timestamp)
Similar to v1 but with reordered timestamp fields for better sorting performance.
- • Time-based generation
- • Better sorting than v1
- • Modern alternative to v1
- • Good for databases
UUID v7 (Unix-time ordered)
Uses Unix timestamp with additional randomness. Recommended for new applications.
- • Unix timestamp based
- • Excellent sorting
- • Recommended for new apps
- • Future-proof design