🔑 JWT Decoder

Paste a JWT token to decode and inspect the header, payload, and signature.

FAQ

Does this verify the JWT signature?
No. Signature verification requires the secret key or the RSA/ECDSA public key, which the tool never has. The decoder only base64url-decodes the header and payload, which is safe and useful for inspecting contents without needing the key.
Is it safe to paste a real JWT here?
The decoding happens entirely in your browser — nothing is sent to a server. That said, JWTs can carry access tokens. Treat them like passwords: paste production tokens only in a trusted environment, and rotate any you paste into a public or shared machine.
What do the colour-coded token segments mean?
Red is the header (algorithm and type), purple is the payload (claims), and blue is the signature — the same colour convention used by jwt.io.
What is exp / nbf / iat?
exp (expiration) is the Unix timestamp after which the token is no longer valid. nbf (not before) is the earliest it should be accepted. iat (issued at) is when it was created. All three are rendered as human-readable UTC dates alongside the raw epoch value.
Does the tool support JWE or nested JWTs?
JWS compact serialisation (the common 3-part JWT) is supported. JWE (encrypted tokens, 5 parts) and nested JWTs are not decoded automatically — paste the inner token separately if needed.

More tools

JSON

Code

Ornaments

Image

Web / SEO

Generators

PDF