Cookie preferences
We use cookies for analytics. Privacy Policy You can accept or decline non-essential tracking.
> Decode JWT header and payload locally in your browser.
> Inspect exp, iat, and nbf claims without sending bearer tokens to third-party sites.
This tool decodes header and payload locally. It does not verify the signature or prove the token is trustworthy.
// Decoded JSON appears here...
// Decoded JSON appears here...
// Signature segment appears here...
Explore the most common scenarios for JWT Decoder below. Each page is a focused calculator with worked examples and edge-case guidance.
Paste any JSON Web Token to instantly decode and read its header algorithm, payload claims, expiration time, and issued-at fields without a secret key.
Decode JWTDecode your JWT token to instantly find the expiration date from the exp claim and check how much time remains before the token becomes invalid.
Check ExpirationRead the JWT header section to identify the signing algorithm (HS256, RS256, ES256) and token type — essential for debugging signature verification failures.
Read HeaderDecode and understand JWT standard claims: sub (subject), iss (issuer), aud (audience), iat (issued-at), nbf (not-before), and jti (JWT ID).
Decode Claims