広告が嫌いですか? 行く 広告なし 今日

アイデンティコン/アバター生成器

データ開発者画像
Any string — same input always produces the same identicon.

ガイド

Identicon / Avatar Generator

アイデンティコン/アバター生成器

Turn any string — a username, email, user ID, or wallet address — into a unique visual avatar. The Identicon / Avatar Generator hashes the input deterministically, so the same text always renders the exact same image. No upload, no account, no server round-trip: the avatar is drawn entirely in your browser from the hash and can be downloaded as a crisp PNG or SVG.

使用方法

  1. Type or paste any string into the input field — a username, email, commit SHA, or anything else.
  2. Pick a style: GitHub-style 5×5 grid, chunkier Retro 8×8 pixel art, or Geometric shapes.
  3. Leave the color on “From hash” for a deterministic color per user, or switch to “Custom” to pick a brand color.
  4. Adjust the background color, output size, and padding until the preview looks right.
  5. Copy the SVG markup, copy the Base64 data URI, or download the image as PNG or SVG.

機能

  • 決定論的出力 – Same input always produces the same avatar, built on a synchronous FNV-1a hash.
  • Three visual styles – GitHub 5×5 grid, Retro 8×8 pixel art, and a geometric shape grid with circles, squares, triangles, and diamonds.
  • Auto or custom color – Derive a vivid color from the hash or override with your own brand color via the color picker.
  • PNG and SVG export – Download a crisp SVG for any size, or a rasterized PNG at the exact pixel dimensions you set.
  • Base64 data URI – Copy a ready-to-paste data URI for inline use in CSS, HTML, or React components.
  • Pure client-side – No uploads, no tracking, no server processing. Everything runs in your browser.

よくある質問

  1. What is an identicon?

    An identicon is a visual representation of a hash value that is used as an avatar. It was popularized by GitHub and Gravatar as a way to give every user a recognizable, unique image without requiring them to upload one. Because the image is derived deterministically from the input, the same user always sees the same identicon across services that use the same algorithm.

  2. Why are identicons deterministic?

    Deterministic generation means the algorithm always produces the same output for the same input. This is valuable for avatars because it removes the need to store the image: the service only needs the underlying string (like an email or user ID) and can regenerate the avatar on demand. It also means users do not have to configure anything to get a recognizable picture.

  3. How does a hash become a picture?

    A hash function maps an arbitrary input to a fixed-size sequence of bytes. Identicon algorithms interpret those bytes as drawing instructions: some bits decide whether a pixel is on or off, other bits pick a color or a shape. Because the hash output is uniformly distributed, visually distinct inputs produce visually distinct images with very low probability of collision in practice.

  4. Are identicons safe to use for sensitive data?

    Identicons are not a substitute for cryptographic verification. Non-cryptographic hashes like FNV-1a are fine for visual fingerprints because a visual clash is harmless, but they must not be used to authenticate identity or detect tampering. For security use cases such as SSH key visual fingerprints, a cryptographic hash (for example SHA-256) and a stricter collision model are required.

広告なしで楽しみたいですか? 今すぐ広告なしで

拡張機能をインストールする

お気に入りのブラウザにIOツールを追加して、すぐにアクセスし、検索を高速化します。

に追加 Chrome拡張機能 に追加 エッジ拡張 に追加 Firefox 拡張機能 に追加 Opera 拡張機能

スコアボードが到着しました!

スコアボード ゲームを追跡する楽しい方法です。すべてのデータはブラウザに保存されます。さらに多くの機能がまもなく登場します!

ニュースコーナー 技術ハイライト付き

参加する

価値ある無料ツールの提供を継続するためにご協力ください

コーヒーを買って