Decode Any Obfuscated Email
The Email Deobfuscator is the inverse of obfuscation: paste in HTML entities, Base64 strings, [at]/[dot] text, ROT13, reversed text, or a full HTML snippet, and the tool tries every decoding strategy and returns the emails it recovers.
Supported Inputs
- Plain text —
[email protected]in any surrounding text. - HTML —
<a href="mailto:...">snippets, with tags stripped. - HTML entities —
co...orco.... - [at] / [dot] substitutions —
contact [at] example (dot) com,user at domain dot com. - Base64-wrapped — looks for long base64 tokens anywhere in the input and tests whether decoding yields a valid email.
- ROT13 — tries the ROT13 transform on the input.
- Reversed — tries reversing the entire string.
How It Reports Results
Each match is shown with a label of the method that exposed it. The same email may appear more than once under different methods — that's fine; it confirms the decoding is robust.
Common Uses
- Recover contact addresses from copied web pages
- Test that your own obfuscation holds up against simple decoders
- Inspect suspicious messages that try to hide addresses from filters
- Audit scraped datasets for embedded PII
Limitations
- Multi-layer obfuscation (entities inside Base64, for example) is handled when the patterns compose cleanly; unusual stacking may still require a manual step.
- Custom per-site JavaScript decoders are not executed — paste the rendered DOM text if you can, or the raw string fed to the decoder.
Privacy
Runs entirely in your browser. Input is never logged or uploaded.
Tiny Online Tools







