UUID VersionDescription
v1This version combines a timestamp with a type of device identifier.
This allows for the rapid generation of many IDs, but it can sometimes reveal information about the generating system.

Typical use cases: older systems, distributed applications that require sortable IDs.
v4This version is based almost entirely on random values ​​and is currently the most widely used kind of UUIDs.
It is simple, secure, and universally applicable.

Typical uses: database IDs, session tokens, API objects, files—virtually everywhere.
v5A UUID with a more modern hashing algorithm.
The rule here is: Same name → same UUID.

Typical use case: stable, reproducible IDs for resources derived from text.
v6A further invented version of v1, but arranged so that IDs can be sorted chronologically without the privacy concerns associated with the old MAC address.

Typical use cases: Databases, event streams, logs — anywhere chronological sorting is important.
v7A combination of timestamps and random elements, optimized for modern databases and high load. It offers good sortability while remaining privacy-friendly.

Typical uses: modern web backends, microservices, distributed systems.
v8This version has a flexible scope: You can incorporate your own data structures as long as certain rules are followed.

Typical use case: Special cases where you need UUID-like IDs with custom additional information.
Loading UUID tool…