Dev Tools Samoe neobhodimoe

JWT Reader

Decode header and payload, show exp/iat/nbf dates. No backend.

Waiting - parts: 0 - alg: - - Ctrl+Enter - decode
About this JWT tool
Fast - local - privacy-first
Decode JWT header and payload locally to inspect claims, algorithms, and timestamps during debugging.
The tool shows common fields like exp, iat, and nbf as human-readable dates and calculates relative time.
No signature verification is performed. To verify a JWT you need the secret or public key and the algorithm.
  • Decode header and payload as JSON
  • Inspect exp/iat/nbf and other standard claims
  • Copy parts with one click for troubleshooting
  • Everything runs locally - no token uploads
Input
Paste a JWT
JWT
Options
Result
Header, payload and signature
Header
{}
Payload
{}
Signature

            
Meta
FAQ
Common questions
Does this tool verify the JWT signature?
No. It only decodes and displays the token contents. Verification requires a key and algorithm.
Is my token sent to a server?
No. Decoding runs locally in your browser. Nothing is uploaded.
Why are exp/iat/nbf shown as dates?
These claims are Unix timestamps. The tool converts them to readable dates and also shows time remaining.
Does it work offline?
Yes. After the first load, the page can work offline thanks to browser caching.
Notes
Important

This page reads JWT without verifying the signature. To verify you need a secret/public key and the algorithm.

About
Service Overview
JWT decoder and viewer that works fully in your browser. Decode header and payload, inspect claims and expiration instantly. No token uploads, no backend.
Related tools
You may also find these tools useful