User Agent Parser

Parse a user-agent string directly in your browser and get a best-effort breakdown of the likely browser, rendering engine, operating system, device type, architecture, and product tokens. User-agent strings can be spoofed, but this helps you inspect what the string is claiming without sending it to the server.

Paste a user-agent string or load your current browser, then parse it.

What this tool does

It parses a user-agent string and gives a best-effort view of the claimed browser, engine, OS, device type, and token structure.

Why it is private

The parser runs entirely in your browser, so user-agent strings are never uploaded, logged by the tool, or stored in server memory.

What it is useful for

  • Inspecting browser or bot strings during debugging.
  • Checking whether a string looks like a browser, bot, WebView, or HTTP client library.
  • Understanding what an analytics log or request header appears to be claiming.

Important note

User-agent parsing is inherently approximate. A string can be outdated, misleading, or intentionally spoofed, so treat the results as a best-effort interpretation rather than a guaranteed identity check.