A step-by-step guide to generating UUIDs with our tool
Choose the UUID version you need from the available options (v1 to v7). Each version has different characteristics and use cases. Refer to the UUID Versions section for more information.
Configure how many UUIDs you want to generate. You can generate up to 100 UUIDs at once.
Customize the format of your generated UUIDs by selecting from the available options.
If you selected v3 or v5 (Name-Based UUIDs), you need to provide a predefined namespace (DNS, URL, OID, X.500) and a name.
UUIDs will be automatically generated based on the configuration.
Learn about the different UUID versions and their use cases
Generated from a timestamp and MAC address. Guarantees uniqueness but may reveal temporal and spatial information.
Similar to v1 but includes POSIX UID/GID information. Rarely used outside of legacy systems.
Generated from a namespace UUID and a name using MD5 hashing. Deterministic (same input produces same UUID).
Generated using cryptographically secure random numbers. Most commonly used UUID version for general purposes.
Similar to v3 but uses SHA-1 hashing. More secure than v3 and recommended for name-based UUIDs.
A new version that reorders the v1 timestamp to improve database performance while maintaining temporal order.
Uses Unix epoch time for better interoperability with other systems and improved entropy.
Find answers to common questions about UUIDs
The choice of UUID version depends on your use case:
The security of a UUID depends on its version:
For security-critical applications, use v4 UUIDs and ensure proper entropy sources.
Each UUID version has a different generation mechanism:
See the UUID Versions section for detailed comparisons.
While no system can provide absolute certainty, UUIDs are designed to have an extremely low probability of collision. For example:
For practical purposes, UUIDs can be considered unique.