EXIF data is hidden information embedded in every photo taken with a digital camera or smartphone. Here's how to read it from any image — completely free and without installing any software.
What You Can Find in EXIF Data
Before we start, here's what EXIF data typically contains:
Camera Information
- Device make and model (e.g., "Apple iPhone 16 Pro")
- Lens model and specifications
- Camera serial number
- Firmware/software version
Shooting Settings
- Shutter speed (e.g., 1/125 sec)
- Aperture (e.g., f/1.8)
- ISO sensitivity (e.g., ISO 100)
- Focal length (e.g., 26mm)
- Flash status
- White balance mode
- Metering mode
Location & Time
- GPS latitude and longitude
- GPS altitude
- Date and time the photo was taken
- Time zone information
Color & Technical
- Color space (sRGB, Adobe RGB, Display P3)
- ICC color profile
- Image dimensions
- Bit depth
- Compression type
How to Read EXIF Data Online
Step 1: Open the tool
Go to pngmetadataviewer.online. No account needed, nothing to install.
Step 2: Upload your image
Either:
- Drag and drop the image directly onto the page
- Click the upload area and browse for the file
Supported formats: JPEG, PNG, WebP, GIF, BMP, TIFF.
Step 3: Read the results
The tool organizes metadata into clear categories:
Image Properties (top section)
- File name, size, format
- Dimensions, color type, bit depth
- Compression ratio, alpha channel
GPS / Location (if present)
- Latitude, longitude, altitude
- Red "High Risk" badges warn you about privacy-sensitive fields
Identity (if present)
- Camera owner name
- Serial number
- Artist, copyright info
Timestamps
- Date photo was taken
- Date digitized
- Last modification date
EXIF / Camera Data
- All shooting settings
- Camera make and model
- Lens information
ICC Color Profile
- Embedded color profile name and type
Each field shows:
- The field name
- Its value
- A risk level badge (High Risk, Medium, Low, Info)
- A plain-English description of what the field means
Step 4: Take action
If you find sensitive data (especially GPS or personal info), click "Remove All Metadata" to strip everything. Then use the Verify tab to confirm the cleaned file is clean.
Reading EXIF Data from Different Sources
From a photo you took
Upload directly from your phone's camera roll or your computer's photo folder. These will have the most complete metadata.
From a photo someone sent you
Photos received via email or direct message usually retain full metadata. Upload to check what the sender's device embedded.
From a downloaded image
Images downloaded from websites often have metadata stripped. But images from forums, marketplaces, and cloud storage links usually retain metadata.
From a screenshot
Screenshots contain very little EXIF data — usually just dimensions and sometimes the software used. No GPS or camera data.
Understanding What You See
If you see GPS data
This is the highest privacy risk. The coordinates show exactly where the photo was taken. You should strip this before sharing.
If you see a camera serial number
This is a unique identifier for a specific device. It can link multiple photos to the same camera/phone, which can link them to the same person.
If you see timestamps
These show when the photo was taken and last modified. On their own they're moderate risk, but combined with GPS data they reveal exactly where you were at a specific time.
If you see "No metadata found"
The image has already been cleaned, or it was created by a tool that doesn't embed metadata (like a design application or screenshot).
Tips for Reading EXIF Data
- JPEG files have the most metadata — always check photos
- PNG files from cameras may have EXIF; screenshots usually don't
- WebP files can contain EXIF data, especially from Android devices
- Multiple images can be uploaded at once for batch checking
- Everything runs locally — your images never leave your browser
After Reading: Your Options
Once you've seen the metadata:
- Keep it — If it's a personal photo you're archiving
- Strip it — If you're sharing the photo online
- Strip selectively — Not possible with our tool (we strip everything for maximum privacy), but ExifTool can remove specific fields
For most people, the answer is simple: read it, strip it, share the clean version.
Try It Now
View, remove, and verify image metadata — free and 100% private.
Open PNG Metadata Viewer