🪙
JWT Decoder
Inspect JWT tokens instantly
About JWT Decoder
A raw JWT looks like three random strings glued together with dots. This tool splits them apart and decodes each section so you can read the actual contents.
Header shows the algorithm. Payload shows the claims — user ID, roles, issued-at, expiry. The signature stays encoded because verifying it requires the secret key, which you should not paste anywhere online.
The expiry check is the most-used feature: if the `exp` claim is in the past, the token is flagged as expired so you do not have to do the Unix timestamp math yourself.
Common Use Cases
- →Checking what claims are actually inside a token during auth debugging
- →Verifying expiry when a request is unexpectedly rejected with 401
- →Inspecting the algorithm used when switching between HS256 and RS256
- →Understanding JWT structure when learning how auth flows work