JWT Decoder Online — Decode & Inspect JSON Web Tokens

Decode, inspect, and understand JSON Web Tokens without installing anything.

What Is a JWT?

A JSON Web Token (JWT) is the most common token format for web authentication in 2026. When you log into a modern web app, chances are a JWT is being passed between your browser and the server to prove your identity.

A JWT looks like this:

eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkpvaG4gRG9lIiwiaWF0IjoxNTE2MjM5MDIyfQ.SflKxwRJSMeKKF2QT4fwpMeJf36POk6yJV_adQssw5c

Those three sections separated by dots are:

  1. Header — Algorithm and token type (e.g., HS256, JWT)
  2. Payload — Claims (data): user ID, expiration time, roles, etc.
  3. Signature — Verification that the token hasn't been tampered with

How to Decode a JWT

Each section is simply Base64URL encoded. To decode manually:

// JavaScript
const [header, payload, signature] = jwt.split('.');
const decodedHeader = JSON.parse(atob(header));
const decodedPayload = JSON.parse(atob(payload));
console.log(decodedHeader);  // {"alg": "HS256", "typ": "JWT"}
console.log(decodedPayload); // {"sub": "1234567890", "name": "John Doe", ...}

Common JWT Claims

JWT Security Best Practices

JWT vs Session Tokens

Traditional session tokens are random strings stored in a server-side database. JWTs are self-contained — the server doesn't need to look anything up. This makes JWTs ideal for:

The tradeoff: JWTs can't be revoked individually (without a blocklist), and they're larger than simple session IDs.

🔧 Decode JWTs Instantly

Use our free Base64 decoder to inspect JWT headers and payloads.

Open Base64 Tool →

Recommended Tools & Resources

Level up your workflow with these developer tools:

Auth0 Free Tier → Clerk.dev Auth → Web Application Security →

Dev Tools Digest

Get weekly developer tools, tips, and tutorials. Join our developer newsletter.