Free utility for testing and learning

BIP39 Mnemonic Generator & Validator

Generate or validate BIP39 mnemonic phrases of 12 to 24 words. Browser only, for testing and learning. A web tool must never produce the mnemonic that secures real funds.

No loginRuns in browserTesting only
BIP39 mnemonic flowRandom entropy is mapped to a 12 to 24 word phrase via the BIP39 wordlist with a checksum.entropy128–256 bitsBIP392048 word listmnemonicabandon abilityabout above ...

Testing and learning use only

Mnemonics generated by any web tool, including this one, must never be used to secure real funds. A wallet you control is the only safe source for production keys. Use this tool for testing, examples, and learning the BIP39 standard.

How BIP39 works

BIP39 maps random entropy bytes to a sequence of words from a fixed 2048 word list, plus a checksum derived from SHA256 of the entropy. 12 words encode 128 bits of entropy plus a 4 bit checksum; 24 words encode 256 bits of entropy plus an 8 bit checksum. The mnemonic is then converted to a wallet seed via PBKDF2-HMAC-SHA512 with the optional passphrase.

About this tool

What this tool answers

The BIP39 Mnemonic Generator & Validator helps engineers create test phrases for wallet integrations and validate phrases that may have been typed by hand. It implements the standard BIP39 algorithm with the English wordlist, the same one used by MetaMask, Ledger, Trezor, and most modern wallets.

Because the entire flow happens in your browser, the mnemonic never leaves the page. That is exactly why this tool must not be used to generate the mnemonic that secures real funds. Real wallet phrases must come from a hardware wallet or a clean device you control.

How to use it

In Generate mode, pick a word count (12, 15, 18, 21, or 24) and click Generate. The tool returns a fresh mnemonic backed by 128 to 256 bits of cryptographic entropy. Copy the phrase into your testing environment and treat it as throwaway data.

In Validate mode, paste any mnemonic and the tool checks the word count, the membership of every word in the BIP39 English wordlist, and the embedded checksum. Each failure mode returns a specific error: wrong word count, unknown word, or checksum mismatch. The reason makes hand correction much faster than guessing.

How BIP39 works

BIP39 takes random entropy bytes, appends a SHA256 derived checksum, splits the result into 11 bit chunks, and maps each chunk to a word from the 2048 word English list. Validation reverses the process: parse words back to indices, recover entropy plus checksum, and verify that the checksum still matches the entropy.

The implementation here uses the audited @scure/bip39 library and Web Crypto's crypto.getRandomValues for entropy. The entire flow happens in the page; nothing is sent or stored.

Where mnemonic handling usually goes wrong

The most dangerous mistake is using a web generated mnemonic for real funds. A page can be malicious, a browser extension can read the DOM, and the device may already be compromised. The mnemonic that secures real funds must come from a hardware wallet generated offline.

The most common operational mistake is one missing or misspelled word in a hand typed phrase. The BIP39 checksum exists to catch this. The validator returns a specific reason so the user can fix the offending word rather than retyping the whole phrase.

When this tool is the right one and when it is not

Use this tool for unit tests, integration tests, wallet UI demos, education, and reproducible bug reports. Anything where the mnemonic is throwaway data.

Do not use this tool to back up an existing wallet, to generate a mnemonic for a new mainnet wallet, or to run any flow involving real funds. For those, use a hardware wallet (Ledger, Trezor) or a wallet that generates the mnemonic on a clean device offline.

Building wallet flows that touch real funds?

Mnemonic and key handling are the highest leverage security boundary in any crypto product. Bring the integration for a focused review.

Book a wallet security review

Frequently asked questions

Is it safe to use a mnemonic generated by this tool?
No. A mnemonic generated by any web tool, including this one, must never secure real funds. Production mnemonics must come from a hardware wallet or a wallet you trust on a clean device. Use this tool for testing, examples, learning, and integration tests only.
Why generate a mnemonic in the browser at all?
Engineers building wallets, contracts, and tooling need test mnemonics constantly. Foundry and Hardhat both ship default test mnemonics for this reason. A web tool that generates fresh test mnemonics on demand is faster than copying from a config file and easier to share for reproducible bug reports.
What is BIP39?
BIP39 (Bitcoin Improvement Proposal 39) defines how a random number is mapped to a memorable sequence of words and back. The standard uses a 2048 word list and adds a checksum so typed mnemonics can be validated. Almost every modern wallet (MetaMask, Ledger, Trezor, Phantom) uses BIP39 for backup phrases.
What is the difference between 12 and 24 word mnemonics?
12 words encode 128 bits of entropy plus a 4 bit checksum. 24 words encode 256 bits of entropy plus an 8 bit checksum. Both are practically uncrackable today. 24 words have a much larger safety margin against future attacks. The tradeoff is harder to memorise and write down.
Why does my hand typed mnemonic fail validation?
Almost always one word is wrong: a typo, a substitution, or a missing word. The BIP39 checksum is designed to catch these. The validator returns a specific reason: word not in the BIP39 list, wrong word count, or checksum mismatch. Compare against the original source carefully.
Are the words really random?
The tool uses crypto.getRandomValues from Web Crypto, which is the browser standard for cryptographically secure randomness. Same source as the random calls inside production wallets. The randomness is good enough for testing but, again, the mnemonic must never secure real funds.
Is the mnemonic stored or sent anywhere?
No. Generation and validation run entirely in your browser. The mnemonic never leaves the page. There is no analytics, no logging, no third party request. Open DevTools and watch the network tab to confirm. Refresh the page and the generated phrase is gone.

Related services and reading

Wallet, key, and address fundamentals.

Author: Mudassir Khan. Last updated May 9, 2026. Implementation backed by audited @scure/bip39.