URL Encode/Decode
Use Encode URL to easily encode texts for URL addresses so you can use in internet addresses or querystring variables.
Use URL decoding for the reversed way of encoding, exchanging the replaced characters with Latin originals.
What can our URL Encode/Decode Tool do?
A two-step technique is required to map the huge range of characters used throughout the globe into the 60 or so allowable characters in a URL:
- Using the UTF-8 encoding, convert the character string into a series of bytes.
- Convert each non-ASCII letter or digit byte to percent HH, where HH is the byte's hexadecimal value.
Which Characters Are Allowed in URL Encode/Decode?
The characters that can be used in a URI are classified as reserved or unreserved (or a percent character as part of a percent-encoding). Reserved characters are ones that have a specific meaning on occasion, whereas unreserved characters do not. Characters that would normally be forbidden are represented by authorized characters when employing percent-encoding. With each version of the standards that govern URIs and URI schemes, the sets of reserved and unreserved characters, as well as the situations under which particular reserved characters have special significance, have altered slightly.
The characters in a URL must come from a defined set of unreserved and reserved ASCII characters, according to RFC 3986. A URL cannot include any additional characters.
The characters that aren't reserved can be encoded, but they shouldn't be. The characters who are unreserved are:
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z a b c d e f g h i j k l m n o p q r s t u v w x y z 0 1 2 3 4 5 6 7 8 9 - _ . ~Only in rare cases are reserved characters need to be encoded. The following characters are reserved:
! * ' ( ) ; : @ & = + $ , / ? % # [ ]Safe and secure with our URL Encode/Decode Tool
Secure SSL encrypted connections are used for all communications with our services. We promptly erase submitted files from our servers after processing them, and the resulting downloadable file is destroyed after the first download attempt or 15 minutes of inactivity (whichever is shorter). The contents of the supplied data or uploaded files are not kept or inspected in any manner. For additional information, please see our privacy policy.