Terms of Service

LEGAL DISCLAIMER
  1. Risks related to the user of this Wallet Generator

    This Wallet Generator will not be responsible for any losses, damages or claims arising from events falling within the scope of the following five categories:

    (1) Mistakes made by the user of any cryptocurrency-related software or service, e.g., forgotten passwords, payments, sent to wrong coin addresses, and accidental deletion of accounts.

    (2) Software problems with the app and/or any cryptocurrency-related software or services, e.g., corrupted wallet files, incorrectly constructed transactions, unsafe cryptographic libraries, cryptocurrency-related software or service.

    (3) Technical failures in the hardware of the user of any cryptocurrency-related software or service, e.g., data loss due to a faulty or damaged storage device.

    (4) Security problems experienced by the user of any cryptocurrency-related software or service, e.g., unauthorized access to users' accounts.

    (5) Actions or inactions of third parties and/or events experienced by third parties, e.g., the bankruptcy of service providers, information security attacks on service providers, and fraud conducted by third parties.

  2. No warranties

    The app is provided on an "as is" basis without any warranties of any kind regarding the app and/or any content, data, materials and/or services provided on the app.

  3. Limitation of liability

    Unless otherwise required by law, in no event shall the owners of, or contributors to, the app be liable for any damages of any kind, including, but not limited to, loss of use, loss of profits, or loss of data arising out of or in any way connected with the use of the app. In no way are the owners of, or contributors to, the app responsible for the actions, decisions, or other behavior taken or not taken by you in reliance upon the app.

  4. Arbitration

    The user of the app agrees to arbitrate any dispute arising from or in connection with the app or this disclaimer, except for disputes related to copyrights, logos, trademarks, trade names, trade secrets or patents.

  5. Last amendment

    This disclaimer was amended for the last time on April 10th, 2018.

Memory Wallet

Use a Passphrase to generate Monero and BIP39 (Bitcoin, Etherium, Litecoin, etc ) wallets.

Mnemonic Code Converter

v1.0.0.7

Use a BIP39 12 or 24 word Mnemonic seed (Bitcoin, Etherium, Litecoin, etc ) to generate a 25 word Monero Mnemonic seed.

If you use Salt, enter that Salt in "Expert Options" above BEFORE entering your BIP39 Mnemonic.



Derivation Path


For more info see the BIP44 spec.

The account extended keys can be used for importing to most BIP44 compatible wallets, such as mycelium or electrum.

The BIP32 derivation path and extended keys are the basis for the derived addresses.


For more info see the BIP32 spec

Use path m/0'/0' with hardened addresses.

For more info see the Bitcoin Core BIP32 implementation

Use path m/0'/0. For change addresses use path m/0'/1.

For more info see MultiBit HD

Use path m/44'/0'/0'. Only enter the xpub extended key into block explorer search fields, never the xprv key.

Can be used with: blockchain.info


For more info see the BIP49 spec.

The account extended keys can be used for importing to most BIP49 compatible wallets.

The BIP32 derivation path and extended keys are the basis for the derived addresses.


For more info see the BIP141 spec


For more info see the BIP84 spec.

The account extended keys can be used for importing to most BIP84 compatible wallets.

The BIP32 derivation path and extended keys are the basis for the derived addresses.


Derived Addresses

Note these addresses are derived from the BIP32 Extended Key

Enabling BIP38 means each key will take several minutes to generate.
Path  
Address  
Public Key  
Private Key  
    
    
    
    
    
Show starting from index (leave blank to generate from next index)

More info

BIP39 Mnemonic code for generating deterministic keys

Read more at the official BIP39 spec

BIP32 Hierarchical Deterministic Wallets

Read more at the official BIP32 spec

See the demo at bip32.org

BIP44 Multi-Account Hierarchy for Deterministic Wallets

Read more at the official BIP44 spec

BIP49 Derivation scheme for P2WPKH-nested-in-P2SH based accounts

Read more at the official BIP49 spec

BIP85 Deterministic Entropy From BIP32 Keychains

Read more at the official BIP85 spec

Entropy

Entropy values should not include the BIP39 checksum. This is automatically added by the tool.

Entropy values must be sourced from a strong source of randomness. This means flipping a fair coin, rolling a fair dice, noise measurements etc. Do NOT use phrases from books, lyrics from songs, your birthday or street address, keyboard mashing, or anything you think is random, because chances are overwhelming it isn't random enough for the needs of this tool.

Do not store entropy.

Storing entropy (such as keeping a deck of cards in a specific shuffled order) is unreliable compared to storing a mnemonic. Instead of storing entropy, store the mnemonic generated from the entropy. Steganography may be beneficial when storing the mnemonic.

The random mnemonic generator on this page uses a cryptographically secure random number generator. The built in random generator can generally be trusted more than your own intuition about randomness. If cryptographic randomness isn't available in your browser, this page will show a warning and the generate button will not work. In that case you might choose to use your own source of entropy.

You are not a good source of entropy.

Card entropy has been implemented assuming cards are replaced, not drawn one after another. A full deck with replacement generates 232 bits of entropy (21 words). A full deck without replacement generates 225 bits of entropy (21 words). Card entropy changed significantly from v0.4.3 to v0.5.0. The old version can be accessed at https://github.com/iancoleman/bip39/releases/tag/0.4.3 or https://web.archive.org/web/20201018232020/https://iancoleman.io/bip39/

PBKDF2

What is PBKDF2 (Password Based Key Derivation Function 2) ?

Please refer to this wikipedia article for more detail. Mail about PBKDF2 security here.

Wallet software that implement BIP39 only use 2048 iterations as a norm. Increasing this parameter will increase security against brute force attack, but you will need to store this new parameter. However, as long as you back up your BIP39 seed there will not be risk to lost your fund. To access them with custom PBKDF2 iterations, use this file (or other) to compute your targeted BIP39 seed.

Using less than 2048 PBKDF2 iterations is insecure without strong optional BIP39 Passphrase.

License

Please refer to the software license for more detail.

The software is provided "as is", without warranty of any kind, express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose and noninfringement. In no event shall the authors or copyright holders be liable for any claim, damages or other liability, whether in an action of contract, tort or otherwise, arising from, out of or in connection with the software or the use or other dealings in the software.


Alternative Tools

This tool is interoperable with any BIP39 wallet.

Some similar tools to this one (ie not consumer wallets) are

https://bip32jp.github.io/english/


Offline Usage

You can use this tool without having to be online.

In your browser, select file save-as, and save this page as a file.

Double-click that file to open it in a browser on any offline computer.

Alternatively, download the file from the latest GitHub release - https://github.com/iancoleman/bip39/releases/latest/


This project is 100% open-source code

Get the source code from the repository - https://github.com/iancoleman/bip39

Libraries

BitcoinJS - https://github.com/bitcoinjs/bitcoinjs-lib

jsBIP39 - https://github.com/iancoleman/jsbip39

sjcl - https://github.com/bitwiseshiftleft/sjcl

jQuery - https://jquery.com/

Twitter Bootstrap - http://getbootstrap.com/

Loading...