Image Safety Checks Before You Share

Free EXIF Metadata Viewer — Your File Never Leaves Your Browser

Read EXIF, GPS, IPTC, and XMP metadata from any photo or PDF instantly — with GPS shown on a map, privacy risk scoring per field, and JSON/CSV export. Everything runs in your browser. Your file never leaves your device.

Last updated:

Upload Files

Select files to begin. Processing runs locally in your browser.

Result Preview

No preview yet.

Result

No processed file yet.

    Download

    Process files to enable download actions.

    Privacy Note

    All metadata reading runs entirely in your browser using the FileReader API and the exifr library. No file data is sent to any server. GPS reverse geocoding sends only latitude and longitude coordinates to OpenStreetMap Nominatim — your file itself never leaves your device.

    Website assets are served from hosting/CDN. Private file processing stays local in your browser.

    Common Use Cases

    • Check what GPS coordinates, author name, and camera serial a photo reveals before posting it on Instagram, classified listings, or social media.
    • Audit a received image or PDF to see who created it, when, and with which software before accepting it as authentic.
    • Verify that a file contains no GPS or personal data before attaching it to a legal document or press release.
    • Inspect AI-generated images for embedded generation prompts, C2PA provenance data, or Stable Diffusion workflow fields.
    • Check iPhone HEIC photos for embedded GPS, face detection flags, and Live Photo references before sharing.
    • Export a metadata report as JSON or CSV for a GDPR audit trail or legal submission.

    How to Use

    1. Drop an image or PDF onto the tool, or click Browse file to select one.
    2. The tool reads all metadata fields and displays them grouped and colour-coded by privacy risk level.
    3. Review the plain-English risk summary to understand what information the file exposes.
    4. If GPS is present, the coordinates are shown on an interactive map with a reverse-geocoded street address.
    5. Export the report as JSON or CSV, or click Remove Metadata to clean the file.

    Practical Examples

    Check an iPhone photo before sharing online

    Input A HEIC photo taken on an iPhone with Location Services enabled.
    Output GPS coordinates shown on a map, reverse-geocoded to a street address, camera model, iOS version, date and time — all risk-scored with an overall Privacy Exposure rating.

    Audit a received PDF for author data

    Input A PDF document submitted by a third party.
    Output Author name, creator application, creation and modification dates displayed with risk colour coding and a JSON export button.

    Inspect an AI image for embedded prompts

    Input A PNG exported from Stable Diffusion with generation parameters in tEXt chunks.
    Output The prompt, negative prompt, seed, model name, and other AI generation fields shown under the AI Metadata category.

    When to Use This Tool

    • Use this tool when you want to see exactly what metadata a file contains before deciding whether to remove it.
    • Use Metadata Remover instead when you already know you want to strip all or specific metadata fields.
    • Use this tool for compliance or legal audit purposes when you need an exportable metadata report.

    Limitations

    • RAW camera formats (CR2, NEF, ARW, DNG) can be read by the underlying library but results vary by camera brand and model.
    • Very large files (over 50 MB) are not supported due to browser memory limits.
    • Encrypted or password-protected PDFs may return no metadata.
    • MakerNote proprietary camera data is intentionally excluded as it is not human-readable without manufacturer-specific decoders.

    Quality and Accuracy Notes

    • GPS reverse geocoding depends on the OpenStreetMap Nominatim service. If the service is unavailable, coordinates are still shown but the human-readable address may not load.
    • Some cameras embed GPS in non-standard EXIF segments that exifr may not detect.
    • PNG files can contain AI metadata in non-standard text chunks that are detected on a best-effort basis.

    Format Support

    Direction Format Support Notes
    Input JPEG / JPG ✓ Full Full EXIF, GPS, IPTC, XMP and thumbnail data read.
    Input PNG ✓ Full EXIF in eXIf chunk, XMP, and AI tEXt/iTXt chunks read.
    Input WebP ✓ Full EXIF and XMP metadata read.
    Input HEIC / HEIF ✓ Full EXIF and GPS data read from iOS and Android HEIC files.
    Input GIF ◑ Partial XMP metadata block read when present; GIF has no EXIF standard.
    Input AVIF ◑ Partial EXIF container read; field coverage depends on encoder.
    Input TIFF / BMP ◑ Partial EXIF fields read; coverage varies by file origin.
    Input PDF ✓ Full DocInfo fields (author, title, creator, dates) read via pdf-lib.
    Output JSON report ✓ Full All metadata fields exported with key, label, value, category, and risk level.
    Output CSV report ✓ Full Flat CSV suitable for spreadsheet import or audit logging.

    Input formats: JPEG, PNG, WebP, HEIC, HEIF, GIF, AVIF, TIFF, BMP, PDF

    Output formats: JSON, CSV

    Explore More

    FAQ

    Does viewing EXIF data online require uploading my photo?
    Not with this tool. All metadata reading runs locally in your browser using the FileReader API and the exifr library. Your images are never transmitted to any server. Most other online EXIF viewers do upload your files to their servers — this tool does not. The only external request made is a GPS reverse-geocode query to OpenStreetMap Nominatim, which receives only your GPS coordinates, not your file.
    Can someone find my location from a photo I posted online?
    Yes — if the photo still contains GPS metadata. Smartphones embed precise GPS coordinates into every photo by default. Tools like this one can reverse-geocode those coordinates to a street address in seconds. Use this tool to check whether your photo contains GPS data, then use Metadata Remover to strip it before posting.
    What metadata is in a JPEG photo?
    JPEGs can contain hundreds of fields including GPS coordinates (latitude, longitude, altitude), device make and model, camera serial number, date and time the photo was taken, software used to edit it, copyright notice, author name, lens information, and full camera settings like aperture, shutter speed, and ISO. This tool reads and displays all of them with risk colour coding.
    How do I view EXIF data from an iPhone HEIC photo?
    Drop your HEIC file onto the tool. Unlike most online EXIF viewers which do not support HEIC, this tool reads HEIC and HEIF files from iPhone and Android cameras. It extracts all embedded GPS, camera model, iOS version, and live photo flags without converting or uploading the file.
    What is the difference between EXIF, IPTC, and XMP metadata?
    EXIF is camera and technical data written automatically by the device — GPS, shutter speed, ISO, lens model. IPTC is editorial metadata added manually — caption, copyright, creator, byline, city, country. XMP is Adobe's extensible format used for editing history, derived-from references, and creative rights. This tool reads and displays all three standards separately, with risk labels on each field.
    What does the privacy risk colour coding mean?
    Red (High Risk) fields contain GPS location, author name, or device serial numbers that could identify you or your location. Yellow (Medium Risk) includes timestamps, camera make and model, and editing software. Blue (Low Risk) includes camera settings like aperture and focal length. Green (Safe) includes technical rendering data like image dimensions and colour space. An overall Privacy Exposure score summarises the combined risk.

    Users Also Use