What this tool does
Decode JWT header and payload segments in the browser so you can inspect claims without sending tokens to a server.
Decode JWT header and payload claims instantly. This tool does not verify signatures.
// Header and payload will appear here
Decode JWT header and payload segments in the browser so you can inspect claims without sending tokens to a server.
Paste a JWT to decode the header and payload, inspect claims, and review token time fields without sending the token anywhere.
Inspect access-token claims during auth debugging without leaving the browser. Check exp, iat, and nbf timestamps quickly while investigating token issues. Review copied JWT payloads from logs or dashboards without verifying signatures elsewhere.
Inspect access-token claims during auth debugging without leaving the browser.
Check exp, iat, and nbf timestamps quickly while investigating token issues.
Review copied JWT payloads from logs or dashboards without verifying signatures elsewhere.
eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjMiLCJyb2xlIjoiYWRtaW4iLCJleHAiOjE3NzM0NDkzMDF9.signature
Header and payload are pretty-printed separately, with token time fields shown as ISO timestamps when available.
No. It decodes the header and payload for inspection only, which is useful for debugging but not for trust validation.
No. The decoder runs locally in the browser, so copied tokens stay on your device unless you choose to share them.
Yes. JWT Decoder works in the browser so you can enter data, review the result, and copy the output without needing a separate desktop app.
Found a bug, hit a confusing edge case, or want another tool? Send quick feedback about JWT Decoder.