— JWT Decoder

Free JWT Token Decoder

Quick Tips

  • This tool runs entirely in your browser - your data stays private.
  • Press Ctrl+V (Cmd+V on Mac) to quickly paste text.
  • Use the Copy button to save your result to clipboard.
  • Bookmark this page for quick access!

Decode and inspect JSON Web Tokens (JWT) to view header and payload.

Your Recent Tools

Examples

Input
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c
Output
Header: {alg: HS256, typ: JWT}
Payload: {sub: '1234567890', name: 'John Doe', iat: 1516239022}

Why Use This Tool?

What problems does this solve?

When debugging authentication issues, you need to inspect JWT contents quickly. This tool decodes tokens to reveal claims, expiration times, and structure without writing code or using browser developer tools.

Common use cases:

  • Debugging authentication failures by checking token claims
  • Verifying token expiration and issued-at timestamps
  • Inspecting user information and permissions in tokens
  • Understanding JWT structure for learning purposes
  • Analyzing tokens during security assessments

Who benefits from this tool?

Frontend and backend developers debugging authentication. Security engineers auditing token contents. Anyone learning about JWT-based authentication.

Privacy first: All decoding happens locally in your browser. Your tokens never leave your device.

Frequently Asked Questions

Yes, JWTs are only signed, not encrypted. The payload is Base64-encoded and readable by anyone. Never put sensitive information (passwords, secrets) in JWT payloads.

This tool decodes the payload for inspection but does not verify signatures. Signature verification requires the secret key or public key, which should never be shared with client-side tools.

The exp (expiration time) claim is a Unix timestamp indicating when the token becomes invalid. If current time exceeds exp, the token is expired and should be rejected.

The three dot-separated parts are: header (algorithm and token type), payload (claims/data), and signature (cryptographic verification). The signature prevents tampering with the header or payload.

HS256 uses a shared secret key for signing and verification (symmetric). RS256 uses a private key for signing and public key for verification (asymmetric). RS256 is better when the verifier should not be able to create tokens.

Yes, all decoding happens locally in your browser. Your JWT is never sent to any server. However, remember that anyone with the token can decode its payload, so never share JWTs publicly.