Chrome on macOS
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Chrome/120 Safari/537.36
Chrome, macOS, desktop.
Security Tools
Parse browser, operating system, device, and bot hints from user-agent strings.
Loading browser tool.
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 Chrome/120 Safari/537.36
Chrome, macOS, desktop.
Use this user agent parser page when you need to parse browser, OS, device, and bot hints from user-agent strings quickly during debugging, review, migration, or documentation work and want to keep raw input in your browser session.
If your task shifts, JWT Decoder and Regex Tester are usually the next useful tools.
User-agent strings can be incomplete, spoofed, or reduced by modern browsers. Treat parsed results as helpful hints, not verified identity.
For privacy-sensitive data, keep using the tool in a trusted browser session and avoid pasting secrets into shared screens, screenshots, browser extensions, or remote support sessions.
No. This user agent parser runs in your browser and does not send your input to ByteBench servers.
Use clean common user-agent tokens input and run the example first when you want a known-good baseline. If your pasted data came from logs or docs, remove accidental wrappers before validating or converting.
Review the status message, compare output with expected behavior, and run one quick edge-case check. ByteBench helps with utility work, but production-critical output should still be verified in your project pipeline.