⚙️ Developer Tools

JWT Decoder

Paste a JWT token to decode and inspect its header, payload claims and signature. Everything runs in your browser — tokens never leave your device.

⚠️ This token has
Advertisement

Free JWT Decoder — Decode JSON Web Tokens Online

Our free JWT decoder decodes JSON Web Tokens to show the header, payload and claims in readable format. Instantly see algorithm, expiration time and user claims — no server or library needed.

🔓 Decode Header
View algorithm (alg) and token type (typ).
📋 Decode Payload
See all claims: sub, exp, iat, iss and custom.
⏱ Expiry Check
Shows if the token is expired or still valid.
🔒 Private
JWT decoded locally — never sent to any server.

How to Use — Step by Step

1
Paste your JWT
Copy your JWT token (the eyJ... string) and paste it in.
2
Read decoded data
Header and payload are shown as formatted JSON with expiry in human-readable format.
3
Check expiry
Shows whether the token is currently valid, expired, or not yet active.

Frequently Asked Questions

For dev/test JWTs yes — decoding is local with no server call. For production JWTs containing sensitive data, decode on your local machine or server instead.
This tool decodes header and payload only — it does NOT verify the cryptographic signature. Signature verification needs the secret key and must be done server-side.
Three Base64URL-encoded parts separated by dots: header.payload.signature. Header and payload are JSON; the signature verifies authenticity.
Expiration time — a Unix timestamp after which the token is invalid. iat (issued at) and nbf (not before) are similar. Always check exp server-side.
Session tokens are opaque strings looked up server-side per request. JWTs are self-contained — payload carries claims, signature proves authenticity. No server-side storage needed (stateless).