Decode and inspect JSON Web Tokens instantly. View header, payload, and signature with expiration status. Everything runs in your browser.
alg:none — it is accepted unsigned. This is a known attack vector (CVE-2015-9235). Do not trust this token for authentication.
Paste any JWT token into the input field. The tool automatically detects the three-part structure (header.payload.signature).
The header and payload are Base64-decoded and displayed as formatted JSON with syntax highlighting and color-coded sections.
Timestamp claims (exp, iat, nbf) are automatically converted to human-readable dates, and expiration status is shown at a glance.