Utility Workspace

JWT Debugger

Decode JWT header and payload locally to inspect claims, expiry, and issuer fields.

Decode JWT header and payload locally in the browser. Signature verification is not performed.

Quick checks

  • Issued at: 01/01/2024, 05:30:00
  • Expires at: 18/05/2033, 09:03:19
  • Token status: active

Paste, type, or adjust source content here.

Review the generated result and copy it when ready.

Header { "alg": "HS256", "typ": "JWT" } Payload { "sub": "1234567890", "name": "Dev User", "iat": 1704067200, "exp": 1999999999 } Insights - Issued at: 01/01/2024, 05:30:00 - Expires at: 18/05/2033, 09:03:19 - Token status: active

36TDevTools

Daily-use browser utilities for developers who want fewer tabs, faster outputs, and less repetitive busywork.

© 2026 36TDevTools. All Rights Reserved.

Workspace Active
#4ae517f4
Saved just now
Last opened: jwt-debugger