Search tools...

JWT Decoder

Decode and inspect JWT tokens — header, payload, expiry and claims.

Updated Mar 2026100% Private — runs in browser
JWT Token
🟢 Token ValidIssued: 1/18/2018, 1:30:22 AMExpires: 11/20/2286, 5:46:39 PMAlgorithm: HS256
Header
{
  "alg": "HS256",
  "typ": "JWT"
}
Payload
{
  "sub": "1234567890",
  "name": "John Doe",
  "iat": 1516239022,
  "exp": 9999999999
}
SignatureCannot be verified client-side without secret
SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c

How to Use JWT Decoder

  1. 1

    Paste your JWT token into the input.

  2. 2

    View the decoded Header (purple) section.

  3. 3

    View the decoded Payload (blue) with all claims.

  4. 4

    Check the validity status bar for expiry info.

  5. 5

    Copy sections individually using the copy buttons.

About JWT Decoder

Paste any JSON Web Token and instantly decode it with our free JWT decoder online. View the header, payload claims, issued-at and expiry dates, and a color-coded validity badge — all in your browser without sending your token anywhere.

Key Features

  • Full Claim Inspection: Displays all standard and custom claims (sub, name, iat, exp, iss, aud, etc.).
  • Expiry Status: Compares the "exp" claim to current time — shows green "Valid" or red "Expired" badge.
  • Color-Coded Sections: Header (purple), Payload (blue), and Signature clearly separated.
  • Algorithm Display: Shows the signing algorithm (HS256, RS256, ES256, etc.).

Who Is This For?

Backend and frontend developers debugging authentication flows, security engineers inspecting token claims, and anyone troubleshooting JWT-based API access issues without needing a full development environment.

Privacy & Security

Runs 100% in your browser — your token is never sent to any server. No signup, no data stored.

Frequently Asked Questions about JWT Decoder

Related Tools