jwt decoder

Decode JWT header and payload locally in your browser

Inspect JWT tokens without sending them to a server. The header and payload are decoded client-side so you can read claims quickly.

This tool decodes the token only. It does not verify the signature.

JWT token

Decoded result

Review the header, payload, and common claim timestamps like exp and iat.

Claim summary

exp: 4/7/2024, 11:40:00 AM

iat: 4/7/2024, 10:40:00 AM

Need a broader toolbox around remote access and debugging?

DartShell complements browser-side helpers with SSH access, file transfer, and database workflows on Mac.

What this JWT decoder helps with

Read claims quickly

Check fields like sub, aud, iss, exp, or custom claims without opening a separate API tool.

Keep tokens local

Decoding happens in the browser, which is better suited for quick inspection of internal or temporary tokens.

Separate decode from verification

This page is for inspection only, so you can review structure and timestamps without implying trust.

Common examples

Inspect expiration time

Paste a token and read its exp claim as both JSON and a local timestamp.

Debug custom claims

Decode payload fields like role, tenant, scope, or user metadata.