About LoRa Packet Decoder
The LoRa Packet Decoder Online is a professional-grade tool designed for IoT engineers, developers, and network administrators. It allows you to instantly parse raw data packets from LoRaWAN sensors and gateways. Whether you are debugging a new device, verifying network connectivity, or analyzing frame counters, this tool provides a clear, visual breakdown of the LoRaWAN PHYPayload.
Unlike other tools, this decoder runs entirely in your browser (client-side), ensuring your data never leaves your device. It supports both Hexadecimal and Base64 formats, automatically detecting the input type for a seamless experience.
How to Use
- Step 1: Copy the raw payload from your LoRaWAN Network Server (TTN, Helium, ChirpStack, etc.).
- Step 2: Paste the string into the input box above. The tool accepts both Hex (e.g.,
40F1...) and Base64 (e.g.,QPF9...). - Step 3: Click "Decode Packet". The tool will break down the packet into its constituent parts: MHDR, DevAddr, FCnt, and more.
- Step 4: Hover over the colored byte blocks to see which part of the raw data corresponds to each field.
Key Features
- Visual Byte Map: Interactive color-coded view of the raw packet bytes.
- Auto-Detection: Smartly identifies Hex or Base64 inputs.
- Deep Analysis: Extracts Message Type (MType), Direction, Frame Control flags (ACK, ADR), and Frame Counter.
- Privacy First: No server-side processing; your keys and data stay private.
- Shareable: Generate a permalink to share specific packet breakdowns with your team.
Frequently Asked Questions
Uplink messages are sent from the end-device (sensor) to the network server. Downlink messages are sent from the network server to the end-device. This tool identifies the direction based on the Message Type (MType).
LoRaWAN uses AES-128 encryption to secure data. The FRMPayload is encrypted with the AppSKey. This tool displays the encrypted payload. To see the actual sensor values, you must decrypt it using your specific Application Session Key.
MIC stands for Message Integrity Code. It is a 4-byte signature at the end of the packet used to verify that the message has not been tampered with during transmission.
Read Also: