Decode JWT header and payload locally, inspect common claims, and catch expiration or audience mistakes without sending tokens to an API.
Decode only. This does not verify the JWT signature, issuer, audience or trust level.
Decoded JWT
How to use this tool
- Paste a JWT token into the input field.
- Decode the header and payload locally in the browser.
- Review exp, iat, nbf, iss, aud and sub claims.
- Verify the signature on your server or with a trusted library before trusting the token.
Common mistakes
- Treating decoded JWT content as trusted without signature verification.
- Pasting production user tokens into untrusted pages.
- Ignoring timezone and expiration differences when debugging auth failures.
FAQ
Does this verify JWT signatures?
No. It decodes header and payload only. Signature verification requires the correct secret or public key.
Is the token sent to a server?
No. The decode runs locally in your browser.
Why do exp values look like numbers?
JWT time claims are usually Unix timestamps in seconds. The tool converts common claims to readable dates.
Related tools
Related guides and fixes
Last updated: May 17, 2026