JSON Formatter
Format, validate, minify, or sort JSON data with configurable indentation. Instantly check for syntax errors, view node count and nesting depth — free, no sign-up required.
Generate UUID v1, v4, v5, or Nil identifiers in bulk. Validate any UUID and detect its version. Copy instantly — no signup required.
UUID Version
Randomly generated using a cryptographically secure random number generator. The most widely used UUID type — suitable for any general-purpose unique identifier.
Options
Letter Case
Results
Choose a version and click
Generate
UUID Generator is part of the Developer collection. If you want a broader view of similar workflows, open the Developer category page or browse all QuickTools categories.
Common next steps after this tool include JSON Formatter, QR Code Generator and Base64 Encoder / Decoder.
A UUID (Universally Unique Identifier), also known as a GUID (Globally Unique Identifier), is a 128-bit label defined by RFC 4122. It is represented as 32 hexadecimal digits grouped in the pattern xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx — for example, 550e8400-e29b-41d4-a716-446655440000.
UUIDs are the industry-standard way to generate unique identifiers without a central authority. They are used everywhere: primary keys in databases, session tokens, transaction IDs, file names, API keys, distributed system correlation IDs, and anywhere an identifier must be unique across multiple machines or services without coordination.
This tool supports four UUID types: v1 (time + MAC address), v4 (pure random), v5 (name-based, deterministic), and the special Nil UUID. You can generate up to 100 at once, toggle uppercase/lowercase, and download the full list as a .txt file. The built-in validator checks any UUID for RFC 4122 compliance and identifies its version.
550e8400…) and uppercase (550E8400…) to match your codebase convention.| Version | Algorithm | Deterministic? | Best For |
|---|---|---|---|
| v1 | Timestamp + MAC address | No (time-varying) | Time-ordered DB records, event logs, auditing |
| v4 | Cryptographic random | No (random) | General-purpose keys, session tokens, primary keys |
| v5 | SHA-1(namespace + name) | Yes | Stable IDs for known entities (URLs, users, products) |
| Nil | All zeros | Yes (always same) | Sentinel / null / default UUID value |
Database primary key
v4INSERT INTO orders (id) VALUES ('550e8400-e29b-41d4-a716-446655440000')REST API resource identifier
v4GET /api/users/f47ac10b-58cc-4372-a567-0e02b2c3d479
Deterministic product ID
v5uuid.v5('https://shop.com/product/123', namespace.URL)Correlation ID in logs
v4{ "correlationId": "1b9d6bcd-bbfd-4b2d-9b5d-ab8dfbbd4bed" }Time-ordered event ID
v1INSERT INTO events (id, ts) VALUES (uuid_generate_v1(), NOW())
Null / absent UUID sentinel
Nilif (user.avatarId === '00000000-0000-0000-0000-000000000000') …
All UUIDs share the same 128-bit / 32-hex-character structure: time_low – time_mid – time_hi_and_version – clock_seq – node. The variant bits at position 8 and the version nibble at position 13 distinguish one type from another.
crypto.randomBytes in Node.js). The version nibble is set to 4 and two variant bits are set to 10 per RFC 4122. The probability of collision is astronomically low — approximately 1 in 5.3×1036.What is the difference between a UUID and a GUID?
They are the same concept. GUID (Globally Unique Identifier) is Microsoft’s name for UUID (Universally Unique Identifier). Both refer to the RFC 4122 128-bit identifier format. Microsoft GUIDs follow the same structure and are fully interchangeable with standard UUIDs.
Can two v4 UUIDs ever be the same?
Theoretically yes, but practically no. A UUID v4 has 122 random bits, giving 2¹²² ≈ 5.3×10³⁶ possible values. To have a 50% chance of a collision you would need to generate approximately 2.7×10¹⁸ UUIDs. For any real application the risk is safely negligible, which is why UUID v4 is used as a primary key in databases serving billions of records.
Should I use UUID v1 or v4 for database primary keys?
v4 is the safe default. v1 leaks the generating machine’s MAC address and precise timestamp, which is a privacy concern. However, v1 has an advantage in time-ordered B-tree indexes (like InnoDB) because monotonically increasing keys cause fewer index page splits — improving write throughput on very high-volume tables. For most applications, v4 is preferred; use v1 or ULID only when insert performance at scale is a priority.
When should I use UUID v5?
Use v5 when you need a stable, repeatable identifier for a known entity. Example: you want to assign UUID primary keys to product catalogue items that are identified by URL. Instead of storing a mapping table, you compute uuid.v5(productUrl, NS_URL) at runtime — the same URL always gives the same UUID. v5 is also used in content-addressable systems and for generating deterministic test fixtures.
Is UUID v5 cryptographically secure?
No. v5 uses SHA-1 which has known collision weaknesses. It is not intended for security applications. For a UUID that acts as a secret token, always use v4 (random). Use v5 only when you need deterministic, reproducible identifiers from known, non-secret inputs.
Are UUIDs case-sensitive?
No. RFC 4122 defines UUIDs as case-insensitive. 550E8400-E29B-41D4-A716-446655440000 and 550e8400-e29b-41d4-a716-446655440000 refer to the same UUID. Most implementations output lowercase. Systems accepting UUID input should normalise to lowercase before comparison.
What does UUID validation check?
A valid UUID must be exactly 36 characters in the format 8-4-4-4-12 hex digits separated by hyphens. The validator checks: correct total length, correct hyphen positions, all characters are hexadecimal, the variant bits (position 8) are set to 10xx₂ (RFC 4122 variant), and reads the version nibble (position 13) to report the UUID version (1–5, or 0 for Nil).
Format, validate, minify, or sort JSON data with configurable indentation. Instantly check for syntax errors, view node count and nesting depth — free, no sign-up required.
Generate QR codes for URLs, text, Wi-Fi credentials, vCards, and more. Customise foreground and background colour, error correction level, margin, and download as SVG or PNG — free and instant.
Encode any text to Base64 (standard, URL-safe, or MIME) or decode any Base64 string back to plain text. Instant, free, no sign-up required.
Generate MD5, SHA-1, SHA-224, SHA-256, SHA-384 & SHA-512 hashes from any text. Supports hex, Base64, and Base64URL output, plus HMAC signing. Free and instant.
Convert short MP4, WebM, MOV, AVI, MKV, and other video clips into GIFs online with trim controls, frame-rate options, and private in-browser processing.
Create animated GIFs from a sequence of images online with per-frame delay, output width, loop count, and private in-browser processing — no upload required.
Convert an animated GIF into a compact MP4 or WebM video file online with output width, duration, and FPS controls — processed entirely in your browser, no upload required.
Convert an animated GIF into a compact WebM video file online using VP9 or VP8 — output width, duration, and FPS controls with private in-browser processing, no upload required.