HD wallets: BIP39 mnemonics, BIP32/BIP44 paths, and account discovery

Learn BIP39 mnemonics and BIP44 paths for Ethereum: discovery rules, hardened indices, and production pitfalls for wallet teams building with IBEx. Use IBEx.

5 min read

Who this is for

  • Wallet client engineers
  • Custody platform developers
  • Security reviewers auditing backups

Pros / cons

ProsCons
  • One backup can regenerate many accounts deterministically
  • Standard paths improve interoperability across wallets
  • Hardened derivations reduce certain child-key leak scenarios
  • Users can lose funds with a wrong path or passphrase variant
  • Phrase handling UX is fragile under stress and translation
  • Non-standard paths complicate support and rescues

Key takeaways

  • Publish and test the exact paths your product uses
  • Run gap limits and discovery scans compatible with your UX
  • Treat passphrases as first-class secrets with explicit UI

Mnemonics, entropy, and checksum words in BIP39

This section explains mnemonics, entropy, and checksum words in bip39 in the context of eoa-hd-wallets-bip39-bip44 for teams shipping wallet infrastructure with IBEx Network. Architects should read it alongside threat models for phishing, supply chain compromise, and operational key handling. Engineering leads scrutinize wordlist validation and typo resistance because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize mapping entropy length to phrase length because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize PBKDF2 iteration choices on constrained devices because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Standards evolve, but the underlying requirement remains honest mapping between user intent, displayed previews, and the bytes that reach the network. Use staged rollouts, canary cohorts, and synthetic signing exercises to validate changes before they reach your entire base. Train product, support, and compliance staff continuously on phishing, malicious signing prompts, and recovery social engineering. Internal playbooks for escalation when a user reports drained funds or stuck transactions reduce harmful improvisation. Prepared communications outperform ad-hoc threads during stressful incidents. When integrations touch DeFi liquidity, document stablecoin issuers, oracle dependencies, and smart contract counterparties so risk models match user-facing copy. Advanced users appreciate transparency while newcomers avoid magical thinking about yields. Stress scenarios become testable instead of purely narrative.

BIP32 chains: extended keys, hardened versus normal children

This section explains bip32 chains: extended keys, hardened versus normal children in the context of eoa-hd-wallets-bip39-bip44 for teams shipping wallet infrastructure with IBEx Network. Architects should read it alongside threat models for phishing, supply chain compromise, and operational key handling. Engineering leads scrutinize why hardened indices protect parent keys because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize xpub exposure risks for hot receive-only servers because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize serialization formats and cross-library compatibility because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Standards evolve, but the underlying requirement remains honest mapping between user intent, displayed previews, and the bytes that reach the network. Use staged rollouts, canary cohorts, and synthetic signing exercises to validate changes before they reach your entire base. When integrations touch DeFi liquidity, document stablecoin issuers, oracle dependencies, and smart contract counterparties so risk models match user-facing copy. Advanced users appreciate transparency while newcomers avoid magical thinking about yields. Stress scenarios become testable instead of purely narrative. For fiat on- and off-ramps, align marketing copy, contractual SLAs, and measured latency distributions. Funnel metrics for KYC should be shared with compliance so local optimizations do not create control gaps. Smooth resume flows after user interruption often move conversion more than marginal UI polish alone.

BIP44 purpose, coin type, and Ethereum account fields

This section explains bip44 purpose, coin type, and ethereum account fields in the context of eoa-hd-wallets-bip39-bip44 for teams shipping wallet infrastructure with IBEx Network. Architects should read it alongside threat models for phishing, supply chain compromise, and operational key handling. Engineering leads scrutinize coin type 60 and L2 mental models for users because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize account and index increments in large vaults because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize multisig and contract wallets versus derived EOAs because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Standards evolve, but the underlying requirement remains honest mapping between user intent, displayed previews, and the bytes that reach the network. Use staged rollouts, canary cohorts, and synthetic signing exercises to validate changes before they reach your entire base. For fiat on- and off-ramps, align marketing copy, contractual SLAs, and measured latency distributions. Funnel metrics for KYC should be shared with compliance so local optimizations do not create control gaps. Smooth resume flows after user interruption often move conversion more than marginal UI polish alone. Smart accounts and ERC-4337 infrastructure shift complexity into bundlers, paymasters, and validation logic: monitor them with the same rigor as core APIs. Budget gas sponsorship explicitly and cap exposure per cohort to prevent abuse from consuming margins. Dashboards that split organic usage from subsidized traffic keep finance aligned with growth.

Account gap scans, imports, and migration strategies

This section explains account gap scans, imports, and migration strategies in the context of eoa-hd-wallets-bip39-bip44 for teams shipping wallet infrastructure with IBEx Network. Architects should read it alongside threat models for phishing, supply chain compromise, and operational key handling. Engineering leads scrutinize gap limit policies when users skip account indices because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize import flows from competitor wallets because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Engineering leads scrutinize upgrade paths when you must deprecate a path because small mistakes become user-visible loss events or stuck funds. Documentation, tests, and signer policies must reflect the same assumptions the UI promises. Standards evolve, but the underlying requirement remains honest mapping between user intent, displayed previews, and the bytes that reach the network. Use staged rollouts, canary cohorts, and synthetic signing exercises to validate changes before they reach your entire base. Smart accounts and ERC-4337 infrastructure shift complexity into bundlers, paymasters, and validation logic: monitor them with the same rigor as core APIs. Budget gas sponsorship explicitly and cap exposure per cohort to prevent abuse from consuming margins. Dashboards that split organic usage from subsidized traffic keep finance aligned with growth. Tokenization programs should keep prospectus-level disclosures, investor communications, and on-chain enforcement consistent. Regulators and sophisticated LPs compare narratives; divergence invites scrutiny. Prefer chains and custody models that satisfy those constraints before chasing novelty.

Frequently asked questions

Why do two wallets show different balances for the same phrase?

Different derivation paths, passphrase extensions, or coin type settings yield different addresses. Align path, passphrase handling, and network before comparing.

Should we let users pick arbitrary paths?

Power users may want it, but arbitrary paths explode support load. Prefer guided paths with advanced overrides and strong warnings.

Is a 12-word phrase always weaker than 24 words?

All else equal, longer mnemonics encode more entropy. Operational security and phishing resistance often dominate practical safety more than marginal entropy.