jwt decoder
Decode JWT header and payload locally in your browser
Inspect JWT tokens without sending them to a server. The header and payload are decoded client-side so you can read claims quickly.
This tool decodes the token only. It does not verify the signature.
JWT token
Decoded result
Review the header, payload, and common claim timestamps like exp and iat.
Claim summary
exp: 4/7/2024, 11:40:00 AM
iat: 4/7/2024, 10:40:00 AM
Need a broader toolbox around remote access and debugging?
DartShell complements browser-side helpers with SSH access, file transfer, and database workflows on Mac.
What this JWT decoder helps with
Read claims quickly
Check fields like sub, aud, iss, exp, or custom claims without opening a separate API tool.
Keep tokens local
Decoding happens in the browser, which is better suited for quick inspection of internal or temporary tokens.
Separate decode from verification
This page is for inspection only, so you can review structure and timestamps without implying trust.
Common examples
Inspect expiration time
Paste a token and read its exp claim as both JSON and a local timestamp.Debug custom claims
Decode payload fields like role, tenant, scope, or user metadata.