不喜欢广告? 无广告 今天

UUID Validator & Decoder

数据开发人员安全
广告 移除?

Decoded Details

财产 价值
结果将显示在这里

批量结果

# 唯一唯一标识符 Valid 版本 笔记
结果将显示在这里
广告 移除?

指导

UUID Validator & Decoder

UUID Validator & Decoder

Paste any UUID and instantly see whether it is valid, which version it follows (v1 through v8, plus the special Nil and Max UUIDs), and what metadata is hidden inside its bits. The tool decodes v1, v6, and v7 timestamps to a human-readable date, extracts the node ID / MAC fragment from time-based UUIDs, and reports the variant exactly as defined by RFC 4122 and RFC 9562. Paste a single UUID for full details, or one UUID per line to validate a whole batch at once.

如何使用

  1. Paste a UUID into the input box. For batch validation, enter one UUID per line.
  2. The summary box shows whether the input is valid and which version it uses.
  3. The Decoded Details table breaks down every field of the first UUID, including timestamps and node IDs where applicable.
  4. The Batch Results table appears when more than one UUID is provided so you can scan a whole list at a glance.
  5. 点击 尝试一个示例 to load a mix of v1, v3, v4, v7, and Nil UUIDs to see how each version is decoded.

特征

  • Full RFC coverage – Detects UUID versions v1 through v8 plus Nil and Max UUIDs as defined in RFC 4122 and RFC 9562.
  • Timestamp decoding – Converts v1 and v6 100-nanosecond Gregorian timestamps and v7 millisecond Unix timestamps to ISO and UTC dates.
  • Node ID inspection – Pulls the 48-bit node field, formats it like a MAC address, and flags multicast or locally administered addresses.
  • Variant detection – Reports the UUID variant (RFC 4122, NCS, Microsoft, or future) from the variant bits.
  • 批量模式 – Validate dozens of UUIDs at once with a clean per-row verdict, version, and notes.
  • 100% 客户端 – Bit-level parsing runs in your browser. Nothing is sent to a server, so private identifiers never leave your machine.

常问问题

  1. What is a UUID and how is it structured?

    A UUID (Universally Unique Identifier) is a 128-bit value usually written as 32 hexadecimal characters in the canonical 8-4-4-4-12 form. The 128 bits are split into well-defined fields: a time / random portion, a 4-bit version field that identifies how the UUID was generated, a 2- or 3-bit variant field that identifies which UUID specification the value follows, and remaining bits that may carry a clock sequence, node ID, or random data depending on the version.

  2. What is the difference between UUID v1, v4, and v7?

    UUID v1 encodes the current time (in 100-nanosecond intervals since 1582-10-15) plus a node ID derived from a MAC address, which makes it sortable by time but reveals the host that generated it. UUID v4 is almost entirely random — 122 random bits with 6 fixed bits for version and variant — so it is unpredictable but not sortable. UUID v7, defined in RFC 9562, takes the best of both: the first 48 bits are a Unix millisecond timestamp followed by random bits, giving you values that are time-sortable, indexable, and still unguessable.

  3. What is the UUID variant field and why does it matter?

    The variant field is a small group of high bits inside the 9th byte of the UUID. It tells parsers which UUID specification the value conforms to: NCS backwards compatibility (top bit 0), the modern RFC 4122 / RFC 9562 layout (top bits 10), Microsoft's legacy GUID layout (top bits 110), or reserved for future use (top bits 111). Decoders must read the variant before the version, because the position of the version nibble is only meaningful for RFC 4122-style variants.

  4. Are the Nil UUID and Max UUID actually valid?

    Yes. The Nil UUID (00000000-0000-0000-0000-000000000000) is defined in RFC 4122 §4.1.7 as a special, all-zero UUID that is used to represent an unknown or empty value. The Max UUID (ffffffff-ffff-ffff-ffff-ffffffffffff) was added in RFC 9562 §5.10 as the all-ones counterpart, often used as a sentinel upper bound in databases. Both are syntactically valid UUIDs but do not carry any decoded fields like a timestamp or node ID.

  5. Can a v3 or v5 UUID be reversed back to its original name?

    No. UUID v3 and v5 are name-based: the implementation hashes a namespace UUID together with an input name using MD5 (v3) or SHA-1 (v5) and uses the resulting digest, with the version and variant bits overwritten, as the UUID. Because cryptographic hash functions are designed to be one-way, you cannot recover the original namespace and name from the resulting UUID — you can only verify that a candidate name plus a known namespace produces the same UUID.

想要享受无广告的体验吗? 立即无广告

安装我们的扩展

将 IO 工具添加到您最喜欢的浏览器,以便即时访问和更快地搜索

添加 Chrome 扩展程序 添加 边缘延伸 添加 Firefox 扩展 添加 Opera 扩展

记分板已到达!

记分板 是一种有趣的跟踪您游戏的方式,所有数据都存储在您的浏览器中。更多功能即将推出!

广告 移除?
广告 移除?
广告 移除?

新闻角 包含技术亮点

参与其中

帮助我们继续提供有价值的免费工具

给我买杯咖啡
广告 移除?