Link Tools Dereferer Hide Referrer Link URL Shortener Affiliate Cloaker PayPal Links Privacy Tools Password Generator Cloudflare Resolver My Referrer Torrent Tools Magnet → Torrent Torrent → Magnet Torrent Editor Pirate Bay Proxies Movierulz Proxies ExtraTorrent Proxies Dev Tools Base64 Encoder Hash Generator HTTP Headers Disposable Email Checker Company Blog About Us Contact Anonymize Free
General

JWT Decoder: Understanding JSON Web Tokens and How to Debug Them

JAY
Author
May 15, 2026 ·3 min read ·0 views
JWT Decoder: Understanding JSON Web Tokens and How to Debug Them

JWTs are everywhere in modern authentication — but they can be confusing to debug. This guide explains exactly what a JWT contains, how to decode it, and how to fix the most common JWT errors.

What Is a JWT?

A JSON Web Token (JWT) is a compact, URL-safe way to transmit information between two parties as a digitally signed JSON object. They are widely used in modern authentication systems — when you log into an app, it often gives you a JWT that you send with every subsequent request to prove who you are.

Decode any JWT instantly: JWT Decoder

The Three Parts of a JWT

A JWT looks like this: xxxxx.yyyyy.zzzzz

Three Base64url-encoded sections separated by dots:

1. Header

Contains the token type and signing algorithm:

{"alg": "HS256", "typ": "JWT"}

Common algorithms: HS256 (HMAC-SHA256), RS256 (RSA-SHA256), ES256 (ECDSA).

2. Payload (Claims)

Contains the actual data — who the user is and what they can do:

{"sub": "user_12345", "name": "John Doe", "role": "admin", "iat": 1715688000, "exp": 1715774400}

Standard claims:

ClaimMeaning
subSubject — the user ID
issIssuer — who created the token
audAudience — who the token is for
expExpiry time (Unix timestamp)
iatIssued at time (Unix timestamp)
nbfNot before — token invalid before this time
jtiJWT ID — unique identifier for the token

3. Signature

Cryptographically signs the header and payload so the server can verify they have not been tampered with. The signature cannot be verified without the secret key or public key.

How to Decode a JWT

  1. Go to JWT Decoder
  2. Paste your JWT token into the input field
  3. The header, payload and all claims are decoded instantly
  4. Check the expiry — the tool shows whether the token is still valid and how much time remains
  5. Review the algorithm, issuer and subject claims

Common JWT Errors and Fixes

TokenExpiredError

The exp claim is in the past. The token has expired. Fix: request a new token by logging in again or refreshing with a refresh token.

JsonWebTokenError: invalid signature

The token was signed with a different secret than the one being used to verify it. Or the token was modified after signing. Fix: ensure the same secret key is used on both sides.

NotBeforeError

The nbf claim is in the future — the token is not yet valid. Fix: check server clock synchronisation.

jwt malformed

The token does not have three dot-separated sections or the Base64url encoding is invalid. Fix: check you are not accidentally truncating the token or adding extra characters.

Security Best Practices

Related Tools

# General
Share on X
Rate this article
Your rating is stored anonymously. You can rate once per post.
Written by
JAY
Writer at Anonymiz

Related Articles

Diff Checker: How to Compare Files and Find Changes Instantly
May 15, 2026 · JAY
CSV to JSON: How to Convert Spreadsheet Data for APIs and Databases
May 15, 2026 · JAY
HEX, RGB, HSL: The Complete Guide to Web Color Formats in 2026
May 15, 2026 · JAY
← Back to Blog
Done!