User Agent Parser
Parse a user agent string to see browser, OS, and device. Uses your current UA by default.
Try it with this example
Paste a User-Agent string to see browser, OS, and device. Or use the sample to try.
What is this tool?
Every HTTP request includes a User-Agent string—a line of text that identifies the browser, operating system, and sometimes the device. Servers use it for analytics, content adaptation, and bot detection. This User-Agent Parser takes any UA string and breaks it down: which browser, which version, which OS, and whether it looks like a bot or crawler. Paste a UA string and see the parsed result in plain language.
User-Agent strings are long and cryptic. A typical one might read: "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36." The parser extracts: Chrome 120, Windows 10, 64-bit. It handles mobile UAs (iOS Safari, Android Chrome), bots (Googlebot, Bingbot), and legacy formats. You can paste a string from logs, from a "what's my user agent" site, or from a client that sends custom UAs.
Use it when debugging: "Why does our site look different for this user?" Check their UA. Use it when writing server logic: "Serve mobile layout for mobile UAs." Use it when reviewing analytics: "What browsers are hitting our API?" The tool is for inspection only—it doesn't validate or modify UAs. It helps you understand what a given string means.
User-Agent sniffing has limits. UAs can be spoofed; many browsers allow customization. Don't rely on UA alone for security or critical decisions. For layout, analytics, and general compatibility checks, it's still useful. The parser runs in your browser. Paste and parse—no data sent elsewhere.
Handy for developers, support teams, and anyone curious what's behind a UA string.