What is the JWT Decoder?
A JWT (JSON Web Token) is a compact, URL-safe token made of three Base64url-encoded parts separated by dots: header.payload.signature. The JWT Decoder reads the header and payload parts and displays them as readable JSON — without needing the secret key.
Note: decoding is not the same as verification. This tool reads the claims but does not check the signature. Signature verification must happen server-side using your application's secret key.
The Three Parts of a JWT
"typ": "JWT") and the signing algorithm ("alg": "HS256" or "RS256", etc.).sub (subject/user ID), exp (expiry timestamp), iat (issued at), aud (audience) and custom claims.How to Use It
Copy your JWT
Find the JWT in your application — in a request's Authorization: Bearer ... header, a cookie, or browser DevTools Network tab.
Paste into the decoder
Open Encode / Decode and paste the JWT into the JWT Decoder field. It looks like eyJ...eyJ...xxx.
Inspect the parts
Read the decoded Header (algorithm) and Payload (claims) displayed as formatted JSON.
Check expiry
The exp claim is a Unix timestamp. Use the Unix Timestamp Converter to read it as a human-readable date.
Pro Tips
exp claim is a Unix timestamp in seconds. Convert it with the Timestamp Converter to check if the token is expired.eyJ is a standard compact JWT — eyJ is the Base64url encoding of {" (the start of a JSON object).HS256, RS256) tells you how the signature was created. HS256 = HMAC-SHA256 (symmetric). RS256 = RSA-SHA256 (asymmetric).Frequently Asked Questions
header.payload.signature. Header contains algorithm info; payload contains claims; signature proves authenticity.sub (subject/user ID), exp (expiry Unix timestamp), iat (issued at), aud (audience), iss (issuer), plus any custom application claims.Decode your JWT now
Open the JWT Decoder and inspect any token instantly — no login, no server, no secret key needed.
Open JWT Decoder →