ToolVS
Find Your ToolTH
Independently funded. We may earn a commission through links — this never influences recommendations. Our methodology

JWT Decoder

Paste a JWT token to decode its header, payload, and check expiration. 100% client-side — your token never leaves your browser.

Valid JWT StructureExpiredHS256
Header
{
  "alg": "HS256",
  "typ": "JWT"
}
Payload (6 claims)
sub
Subject
1234567890
name
Name
John Doe
iat
Issued At
1516239022
2018-01-18T01:30:22.000Z (4336415 minutes ago)
exp
Expiration
1730000000
2024-10-27T03:33:20.000Z (773732 minutes ago)
EXPIRED
role
Role
admin
email
Email
john@example.com
Signature
SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c

Signature verification requires the secret/public key and cannot be done client-side safely.

Frequently Asked Questions

What is a JWT?

JWT (JSON Web Token) is a compact, URL-safe token format used for authentication and authorization. It has three parts separated by dots: header (algorithm), payload (claims/data), and signature (verification). JWTs are used by OAuth, OpenID Connect, and most modern APIs.

Is it safe to decode JWTs in the browser?

Decoding is safe — JWT payloads are only Base64-encoded, not encrypted. Anyone with the token can read the payload. The signature prevents tampering but does not hide data. Never put sensitive data (passwords, credit cards) in JWT payloads. This tool runs 100% client-side; your token never leaves your browser.

What does the expiration (exp) claim mean?

The exp claim is a Unix timestamp indicating when the token expires. After this time, the token should be rejected by the server. Common expiration times are 15 minutes (access tokens) to 7 days (refresh tokens). If exp is in the past, the token is expired.

Can I verify the signature here?

This tool decodes and inspects JWTs but does not verify signatures, as that requires the secret key or public key which should never be shared publicly. For signature verification, use your server-side code with the appropriate key.

What are common JWT claims?

Standard claims: iss (issuer), sub (subject/user ID), aud (audience), exp (expiration), nbf (not before), iat (issued at), jti (JWT ID). Custom claims can contain any data like roles, permissions, or user info.

More Free Tools

Base64 Encoder/DecoderHash GeneratorJSON FormatterTimestamp Converter

ToolVS is reader-supported. When you buy through links on our site, we may earn a commission.