A comprehensive JWT inspection tool for developers with real-time decoding and claim analysis.
Complete Privacy
All decoding happens in your browser. Your tokens never leave your device — no server requests are made.
Claim Analysis
Automatically identifies and formats registered JWT claims like iss, sub, aud, exp, iat, and nbf.
Token Timeline
Visual timeline showing token issuance, validity window, and expiration status at a glance.
Formatted Output
View decoded header and payload as beautifully formatted JSON with syntax highlighting.
Frequently Asked Questions
Find answers to the most common questions.
A JSON Web Token (JWT) is a compact, URL-safe token format used for securely transmitting information between parties. It consists of three Base64-encoded parts: a header (algorithm and type), a payload (claims/data), and a signature.
Yes, with our tool it is completely safe. All decoding happens in your browser using JavaScript — no data is sent to any server. However, never share JWT tokens that contain sensitive information in tools that do not guarantee client-side processing.
This tool decodes and inspects the JWT structure, but does not verify signatures. Signature verification requires the secret key or public key, which should never be entered into a web-based tool for security reasons.
Common registered claims include: iss (issuer), sub (subject), aud (audience), exp (expiration time), nbf (not before), iat (issued at), and jti (JWT ID). Custom claims can also be added to the payload.
When a JWT token expires (the current time exceeds the "exp" claim), it should no longer be accepted by the server. This is a security mechanism to limit the window of token misuse. Expired tokens need to be refreshed or a new login is required.