No trackingRuns locally100% free

JWT Decoder

Decode and inspect JWTs

Paste a JSON Web Token to read its header, payload, and common claims without sending data to a server.

JWT decodedCharacters: 200Segments: 3Signature present

Header

{
  "alg": "HS256",
  "typ": "JWT"
}

Payload

{
  "sub": "davilabs-user",
  "name": "DaviLabs Demo",
  "iat": 1715520000,
  "exp": 1893456000,
  "roles": [
    "admin",
    "editor"
  ]
}

Claims

Subject
davilabs-user
Issued at
May 12, 2024, 7:20:00 AM
Expires at
Dec 31, 2029, 6:00:00 PM

Signature

Signature detected, but not verified.

ZGVtby1zaWduYXR1cmU

What this tool does

JWT Decoder decodes JSON Web Tokens so you can inspect the header, payload, common claims, expiration dates, and signature status.

Privacy note

Your input is processed locally in your browser and is not uploaded to a server.

Common use cases

  • Review authentication claims during development.
  • Inspect token expiration or issued-at dates.
  • Read the JWT header and declared algorithm.
  • Debug session payloads without exposing tokens outside the browser.

FAQ

Does this verify the JWT signature?

No. It decodes the header and payload and shows whether a signature exists, but it does not cryptographically verify the token.

Is my token uploaded?

No. Decoding happens locally in your browser.

What parts of a JWT can I inspect?

You can view the header, payload, common claims such as sub, iss, aud, iat, exp, nbf, and the signature segment.

Can I decode expired tokens?

Yes. An expired token can still be decoded; the tool displays the expiration date when present.