OSINT Timestamp Decoder Free

Extract and decode hidden timestamps from web pages, URLs, APIs, and online content.
Paste source code, upload files, or enter values — all processing happens in your browser.

100% Client-Side ProcessingNo Data Sent to Any ServerComplete Privacy
info3 of 3 free uses remaining· Sign up free for 100 uses/month — no credit card required
|
Try:
Ctrl+Enter to decode
cloud_uploadDrag & drop file hereor
.pdf.docx.txt.json.html

Ctrl+K or / to focus · Ctrl+Enter to decode

Finding Timestamps in OSINT Investigations

Timestamps are hidden throughout web content, URLs, and API responses. Here's where to look and how to use this tool to extract them.

Google Search URLs

The "ei" parameter in Google URLs contains a base64-encoded Unix timestamp recording when the search results were served. This parameter does not appear in the main search bar URL — it is found in click-through URLs when you click a search result, or in navigation links (e.g., switching to the Images tab, clicking page 2). Right-click a search result link and "Copy link address" to find it, or inspect network requests in browser DevTools.

Example:ei=ZKhkZYqLDqKn5NoP-IeAqAc

Twitter/X Posts

Every tweet has a Snowflake ID that encodes a millisecond-precision timestamp. Copy the numeric ID from the tweet URL and paste it here to determine exactly when the post was created.

Example:twitter.com/user/status/1760000000000000000

Webpage Source Code

View the page source (Ctrl+U) and look for JSON-LD data, meta tags, and data attributes. Copy the entire source and paste it here — the tool auto-extracts all numeric timestamps.

Look for:datePublished, data-timestamp, created_at

API Responses

REST and GraphQL APIs frequently include Unix timestamps (seconds or milliseconds) in their JSON responses. Copy the API response and paste it to decode all timestamp fields at once.

Common fields:timestamp, created_at, updated_at

Email Headers

"Received:" headers in emails contain delivery timestamps showing when each mail server processed the message. These help trace the actual timing of email communication.

Tip: View full headers in your email client and paste them here.

Social Media Post IDs

Twitter, Discord, and other platforms use epoch-based IDs that encode creation timestamps. Even if a post is deleted, the ID reveals when it was originally created.

Platforms: Twitter/X Snowflake, Discord Snowflake, UUID v1

Wayback Machine

Wayback Machine URLs contain 14-digit timestamps (YYYYMMDDHHmmss) indicating when a page was captured. This tells you exactly when a snapshot was taken.

Format:web.archive.org/web/20231114120000/example.com

Browser History & Cookies

Chrome, Edge, and Brave store timestamps as Chrome/WebKit microseconds in their SQLite databases. If you encounter 17-digit numbers from browser artifacts, decode them here.

Example: 17-digit value like 13350247892000000

How to Use This Tool for OSINT

Whether you have a single value from a URL or an entire page source, this tool identifies and converts timestamps in seconds.

  1. 1

    Right-click a Webpage and View Source

    Press Ctrl+U or right-click and select "View Page Source." Copy the entire source code and paste it into the input field above. The tool scans the text and extracts every potential timestamp automatically.

  2. 2

    Copy URLs with Suspicious Parameters

    Copy URLs containing numeric parameters, Google EI values, or social media post IDs. Paste the full URL or just the numeric value — the tool handles both.

  3. 3

    Upload Saved Files

    Upload saved HTML pages, text files, JSON API responses, or PDF reports from your investigation. The tool parses file content locally and extracts all timestamps.

  4. 4

    Review Results with Confidence Scoring

    Web-relevant formats are shown first with confidence scoring. Forensic-only formats (Windows FILETIME, FAT/DOS, etc.) are available in a collapsible section below.

  5. 5

    Export and Share

    Copy individual values, export as CSV for your investigation report, or share a URL with colleagues that auto-decodes the same value.

Why Timestamps Matter in OSINT Investigations

Hidden timestamps in web content provide crucial evidence for establishing when events occurred, verifying claims, and building investigation timelines.

timeline

Timeline Reconstruction

Establish when content was created, modified, or accessed. Correlate timestamps across multiple platforms to build a comprehensive timeline of online activity.

verified

Authenticity Verification

Cross-reference claimed dates with embedded timestamps. A post claiming to be from last year may have a Snowflake ID revealing it was created yesterday.

hub

Cross-Platform Attribution

Link activity across platforms using correlated timestamps. Matching creation times across accounts can reveal connections between seemingly unrelated profiles.

save

Evidence Preservation

Document temporal context before content is deleted. Decode and record all embedded timestamps as part of your evidence collection process.

Supported Timestamp Formats (21)

Reference guide for all supported formats. Web formats appear first.

Web Formats

Forensic Formats

These formats are typically found in disk forensics, mobile device extractions, and system artifacts. For full forensic analysis, visit forensicnotes.com/tools/timestamp-decoder.

OSINT Timestamp Decoder: Frequently Asked Questions

menu_book

Learn More: Timestamp Forensics — How Hidden Timestamps Reveal Online Activity

A deep dive into finding and decoding hidden timestamps in platform IDs, URLs, file metadata, and email headers. Covers Unix epochs, Twitter Snowflakes, Discord IDs, timeline reconstruction, and manipulation detection.

Read the Full Guide arrow_forward

Start Your OSINT Investigation

This free tool is brought to you by Forensic OSINT, the evidence-grade web capture platform for OSINT investigators. Take your workflow to the next level.

Minimum Requirements:

  • 8 Characters
  • 1 Upper
  • 1 Lower
  • 1 Digit