Decode and inspect JWT header, payload, and signature without a secret. Displays claims, expiry, algorithm, and validates structure. Works entirely in your browser.
Paste a JWT and click Decode
The header, payload claims, and signature will be displayed here. Supports HS256/384/512 · RS256/384/512 · PS256/384/512 · ES256/384/512.
JSON Web Tokens (JWTs) are compact, URL-safe tokens widely used for authentication and information exchange. This decoder reveals the base64url-decoded header and payload instantly, helping developers debug authentication flows, inspect claims, and verify token structure—without needing the signing secret.
QDoes decoding verify the signature?
No. Decoding only base64url-decodes the header and payload. Signature verification requires the secret or public key and should only be done server-side.
QIs it safe to paste my JWT here?
JWTs contain user claims—avoid pasting production access tokens. The tool runs entirely client-side, but best practice is to use test tokens when exploring.
QWhy are some claims showing numbers?
Registered claims like 'exp' and 'iat' are Unix timestamps (seconds since 1970-01-01). The decoder converts these to human-readable date/time strings.