Timestamps are embedded in almost every digital artifact — files, URLs, database records, platform IDs, and API responses. Many of these timestamps are not displayed to users but can be extracted and decoded by investigators. Understanding how to find and interpret hidden timestamps is a core skill in digital forensics and OSINT investigations.
Timestamp Decoder
Paste any value, URL, or code snippet to automatically detect and decode Unix epochs, Windows FILETIME, Twitter Snowflakes, Discord IDs, and more.
Open Timestamp DecoderWhy Timestamps Matter in Digital Investigations
Every investigation has a timeline. Establishing when events occurred — and in what order — is fundamental to understanding what happened. Timestamps provide this temporal scaffolding.
In digital investigations, timestamps help answer:
- When was an account created? — establishing how long a persona has existed
- When was a post published? — placing statements or content in temporal context
- What was the sequence of events? — determining whether action A preceded action B
- Are the claimed times consistent? — identifying discrepancies between what is claimed and what the data shows
- Was evidence backdated or planted? — detecting manipulation through timestamp anomalies
Where Hidden Timestamps Live
Timestamps exist in places that most users never look. The most common sources include:
- File system metadata — creation, modification, and access times stored by the operating system
- EXIF data — capture timestamps embedded in photo and video files
- Platform-generated IDs — unique identifiers on social media platforms that encode creation timestamps
- URL parameters — query strings and path segments that contain encoded dates or timestamps
- HTTP headers — server response headers that include timestamps for caching, modification, and generation
- Email headers — routing timestamps that record when a message was received at each hop
- API responses — JSON or XML data from platform APIs that include precise timestamps
- Database exports — data dumps that contain row-level timestamps for creation and modification
Platform IDs as timestamps: Most platforms encode creation timestamps in their unique IDs. Twitter Snowflakes, Discord IDs, and Instagram media IDs all contain hidden timestamps that reveal exactly when a post, account, or message was created — even if the platform does not display this information publicly.
Common Timestamp Formats Explained
Timestamps are stored in many different formats. Recognizing the format is the first step to decoding the value:
- Unix epoch (seconds) — seconds since January 1, 1970 00:00:00 UTC (e.g.,
1706745600) - Unix epoch (milliseconds) — same concept but with millisecond precision (e.g.,
1706745600000) - ISO 8601 — human-readable format:
2024-01-31T12:00:00Z - Windows FILETIME — 100-nanosecond intervals since January 1, 1601 (used in Windows file systems and Active Directory)
- Mac absolute time — seconds since January 1, 2001 (used in macOS and iOS)
- Chrome/WebKit time — microseconds since January 1, 1601 (used by Chrome, Chromium-based browsers, and Google services)
- LDAP/Active Directory — 100-nanosecond intervals since January 1, 1601 (similar to FILETIME)
- GPS time — seconds since January 6, 1980 (no leap seconds)
A 10-digit number starting with 17 is almost certainly a Unix epoch in seconds (dates in the 2020s). A 13-digit number starting with 17 is the millisecond variant. An 18-digit number is likely a Windows FILETIME or Chrome time.
Decode any timestamp format with Forensic OSINT. Paste a raw value, URL, or source code snippet into the free Timestamp Decoder to automatically detect and convert Unix epochs, Windows FILETIME, Twitter Snowflakes, Discord IDs, and more — all processed in your browser with no data sent to any server.
Unix Epochs and Why They Are Everywhere
The Unix epoch — the number of seconds since January 1, 1970 — is the most widely used timestamp format in computing. It appears in:
- Server logs and database records
- API responses from web services
- Cookie expiration dates
- JWT tokens (the
iat,exp, andnbfclaims are Unix epochs) - URL parameters for cache-busting or session tracking
- File naming conventions in automated systems
The Unix epoch is popular because it is timezone-agnostic (it represents a single moment in UTC), compact, easy to compare mathematically, and supported by virtually every programming language and operating system.
Platform-Specific Timestamps
Major social media platforms embed timestamps in their unique identifiers:
Twitter/X Snowflake IDs: Twitter assigns a unique 64-bit integer to every tweet, user, and direct message. The first 41 bits encode the number of milliseconds since Twitter's custom epoch (November 4, 2010 01:42:54.657 UTC). Extracting these bits reveals the exact creation time to the millisecond.
Discord Snowflake IDs: Discord uses the same Snowflake concept but with a different epoch (January 1, 2015 00:00:00 UTC). Every message, user, channel, and server has a Snowflake ID that contains a precise creation timestamp.
Instagram Media IDs: Instagram's media IDs (the numeric portion) can be decoded to extract creation timestamps, though the encoding has changed over time.
Reddit Post IDs: Reddit uses a base-36 encoded ID system, and post metadata in the API includes Unix epoch creation timestamps.
YouTube Video IDs: While YouTube video IDs do not directly encode timestamps, the video's page source and API responses contain precise upload timestamps.
URL-Embedded Timestamps
Many URLs contain timestamps that are not immediately obvious:
- Google search URLs — the
eiparameter in Google search result URLs contains an encoded timestamp - Wayback Machine URLs — the numeric path segment is a timestamp in
YYYYMMDDHHmmssformat (e.g.,web.archive.org/web/20240131120000*/example.com) - CDN URLs — content delivery networks often include cache timestamps or version numbers that correspond to upload times
- Image hosting URLs — many image hosts embed upload timestamps in the file path or filename
- API pagination — some APIs use cursor-based pagination where the cursor value encodes a timestamp
Building a Timeline from Multiple Sources
The investigative value of timestamps increases dramatically when you combine them from multiple sources to build a coherent timeline:
- Collect timestamps from all available sources — files, platform IDs, URLs, headers, metadata
- Normalize to a single timezone — convert all timestamps to UTC to enable direct comparison
- Identify the timeline boundaries — what is the earliest and latest event?
- Map events chronologically — arrange all timestamped events in order
- Look for correlations — do events cluster? Do actions on one platform coincide with actions on another?
- Identify gaps and anomalies — are there periods of unexplained inactivity? Do any timestamps fall outside the expected range?
Key Point: Always verify the timezone. A timestamp without a timezone is ambiguous — the same number could represent different moments depending on interpretation. UTC is the safest normalization target because it avoids daylight saving time complications.
Timestamp Manipulation and Anomaly Detection
Timestamps can be modified, and detecting manipulation is an important investigative skill:
- Inconsistent timestamps — a file's creation date is later than its modification date, or a photo's EXIF timestamp contradicts the file system date
- Impossible sequences — events appear in an order that is not physically or logically possible
- Clock skew — timestamps from the same system show slight inconsistencies, suggesting the system clock was changed during the period in question
- Round numbers — fabricated timestamps often use round numbers (e.g., exactly on the hour) rather than the irregular times typical of real activity
- Platform ID vs. displayed time — the timestamp encoded in a platform ID cannot be changed after creation, so it serves as a ground truth against displayed dates that may have been edited
Platform-generated timestamps (like those in Snowflake IDs) are particularly valuable for anomaly detection because they cannot be modified by users.
Best Practices for Timestamp Evidence
- Record the source and format — document where you found each timestamp and what format it was in
- Always note the timezone — state whether the timestamp is in UTC, local time, or another timezone
- Use multiple timestamp sources — a single timestamp can be wrong or manipulated; multiple independent timestamps provide corroboration
- Preserve the raw value — save the original numeric or string value, not just the human-readable conversion
- Document your conversion method — record what tool or formula you used to decode the timestamp so the conversion is reproducible
- Account for clock accuracy — device clocks can drift; server clocks may be synchronized via NTP or may not be
- Be explicit about precision — state whether your timestamp is accurate to the second, millisecond, or only to the day
Key Takeaway
Hidden timestamps are embedded throughout the digital landscape — in platform IDs, URLs, file metadata, and email headers. Extracting and decoding these timestamps enables investigators to reconstruct timelines, verify claims, and detect manipulation. The key disciplines are: always note the timezone, normalize to UTC for comparison, use multiple independent sources, and preserve the raw values alongside your conversions.

