Generate a BIP39 mnemonic from entropy
Pick a language, generate secure entropy, and copy values instantly — all in your browser

This BIP39 Passphrase Generator creates and validates BIP39 mnemonics in multiple languages. It’s useful when you need a test mnemonic for development, you want to confirm a mnemonic is valid for a specific wordlist, or you’re comparing outputs across languages.
Security note: a real seed phrase is sensitive. Treat it like a password you can’t reset. Avoid generating or pasting real wallet mnemonics on an untrusted device.
Who is this for?
If you’re working with tokens, hashes, or encoded values, you might also like our Hash Text tool, bcrypt (for password hashing demos), or Encrypt / Decrypt Text.
Pick a language wordlist
Choose the wordlist that matches your target wallet or ecosystem. A mnemonic that is valid in one language wordlist is typically not valid in another.
Generate entropy and a mnemonic
Click the refresh icon to generate fresh entropy. The mnemonic updates automatically when the entropy is valid.
Paste a mnemonic to validate it
You can edit the mnemonic field directly. If it’s valid for the selected language, the tool derives the corresponding entropy.
Copy only what you need
Use the copy buttons next to each field. If you share a link, consider turning off “include results”.
Terminology tip
Many people say “passphrase generator” when they mean “mnemonic generator”. In BIP39, a separate optional “passphrase” (sometimes called the 25th word) may also exist. This tool generates the mnemonic phrase, not the optional passphrase.
Example 1: why a 12-word mnemonic is common
A standard BIP39 mnemonic is derived from entropy plus a checksum. If you start with bits of entropy:
In this calculator, entropy is entered as hex. Because hex character is bits, a 128-bit entropy value corresponds to hex characters.
Example 2: 24 words from 256-bit entropy
If you use bits (64 hex characters), then bits. Total bits:, and words.
Practical takeaway: the “number of words” is determined by the entropy size. If you paste a 24-word mnemonic, this tool derives the matching entropy (if valid for the selected language).
1) Creating deterministic test fixtures
Background: you’re writing a wallet import flow and need stable test data.
Inputs: pick a language, then paste a mnemonic from a known test vector.
Result: the tool derives entropy and confirms the mnemonic is well-formed. You can then hash derived keys with our Hash Text tool for debugging.
2) Checking language wordlists
Background: a user reports “my seed phrase is rejected” in a specific UI.
Inputs: choose the suspected language and paste the mnemonic.
Result: if it fails here, the phrase likely contains a word outside that wordlist, wrong spacing (common with Japanese), or an invalid checksum.
3) Learning how mnemonics encode entropy
Background: you want intuition for how “random words” are structured.
Inputs: generate entropy, then toggle words by changing entropy characters.
Result: you’ll see the mnemonic change in ways consistent with the checksum and 11-bit word indices.
4) Preparing safe demo content
Background: you’re recording a tutorial video and need a fake mnemonic that looks real.
Inputs: generate a new mnemonic in your chosen language.
Result: you get a syntactically valid phrase. If you later need to demonstrate encoding or hashing text, pair it with Encrypt / Decrypt Text.
Quickly verify if a mnemonic is structurally valid for a specific language wordlist.
Confirm the mnemonic’s words belong to the intended wordlist (especially when users copy across apps).
Generate safe, random mnemonics for unit tests, then validate round-trip conversions.
Create a realistic mnemonic for tutorials and product demos without exposing real funds.
Copy entropy or mnemonic cleanly and consistently when moving between tools.
Confirm entropy looks correct (hex-only, correct length) before feeding it into another library.
When this tool may not be appropriate:
BIP39 converts entropy into a list of words by appending a checksum and then splitting the bitstring into-bit chunks. Each chunk is an index into a 2048-word list.
Key relationships
Where is the entropy size in bits, and is the checksum size in bits.
Hex input interpretation
In this calculator you enter entropy as a hex string. That corresponds to bits via. So a 32-hex entropy value is bits, and a 64-hex entropy value is bits.
Mnemonic vs seed vs passphrase
Where BIP39 fits
BIP39 covers the mnemonic encoding step. Wallets usually combine it with BIP32 (HD keys) and BIP44 (derivation paths). If your goal is to generate addresses, you’ll need those additional layers.
No. A mnemonic encodes entropy plus a checksum. Wallets derive a seed and then keys from that.
Because each language has its own 2048-word list. If even one word isn’t in that list, validation fails.
Entropy must be hex, between and characters, and a multiple of .
Only share disposable test mnemonics. Never share a phrase that protects real funds.
No. It generates the mnemonic phrase. The optional passphrase is a separate input used later during seed derivation.
Important safety note
Use a simple chronometer (stopwatch) to track elapsed time down to milliseconds. Runs locally in your browser.
Normalize email addresses to a standard format for easier comparison. Useful for deduplication and data cleaning. Runs locally in your browser.
Estimate the time needed to consume a total amount at a constant rate, and get an expected end time. Runs locally in your browser.
Parse and decode your JSON Web Token (JWT) and display its content. All computation runs locally in your browser.
Know which file extensions are associated to a MIME type, and which MIME type is associated to a file extension. Includes a full MIME types table.
Generate random Lorem Ipsum placeholder text with customizable paragraphs, sentences, and word counts. Runs locally in your browser.