Back to Blog
NFC Basics

Can You Clone NFC Tags? (Definitive Answer for 2026)

·Updated
NT
NAX Tech
NFC Tools Developer

> Key Takeaway: Yes, you can clone NDEF data from NFC tags using an Android phone and a free app like NFC Clone. However, hardware-level identifiers (UIDs) and encrypted data cannot be duplicated with standard consumer devices.

Yes, you can clone NDEF data from NFC tags using an Android phone and an app like NFC Clone. The process takes seconds: tap the source tag to read its data, then tap a blank target tag to write the data. No rooting, no special hardware, and no technical expertise required.

However, not everything on an NFC tag can be cloned. Here is exactly what you can and cannot duplicate.

What CAN Be Cloned

Data TypeExampleClonable?Notes
NDEF URLsWebsite linksYesFully supported
NDEF TextPlain text recordsYesFully supported
NDEF vCardsContact informationYesFully supported
NDEF WiFi recordsNetwork credentialsYesFully supported
NDEF Smart PostersRich link recordsYesFully supported
NDEF MIME dataCustom app dataYesFully supported
Unencrypted MIFARE sectorsRaw data blocksYesPartial on some tags

What CANNOT Be Cloned

Data TypeWhy NotWorkaround
UID (Unique Identifier)Burned into hardware at factory, read-onlyNone with standard Android phones
MIFARE Classic encrypted sectorsProprietary encryption, keys requiredUse MIFARE Classic Tool with known keys
DESFire encrypted dataAES encryptionNone with consumer devices
HID iCLASS credentialsProprietary protocolNone
Secure Element dataHardware-protectedNone
Locked/read-only sectorsWrite protection enabledNone once locked

How to Clone an NFC Tag (Quick Steps)

  • Download NFC Clone from Google Play (free, no root required)
  • Open the app and select Read Tag
  • Hold your source NFC tag against the back of your Android phone
  • Wait for the read to complete (usually 1-2 seconds)
  • Tap Clone/Write in the app
  • Place your blank target tag on the back of your phone
  • Done — verify by scanning the new tag
  • For a detailed walkthrough with screenshots, see our complete guide to cloning NFC tags.

    Limitations to Be Aware Of

    • Target tag must have equal or larger memory than the source tag. You cannot clone an NTAG216 (888 bytes) to an NTAG213 (144 bytes).
    • Tag types should match for best results. Clone NTAG to NTAG, MIFARE Ultralight to MIFARE Ultralight.
    • UID-based access systems will not accept clones because the UID is different on every tag and cannot be changed.
    • Some tags are write-protected and cannot be used as targets.
    • Your phone needs NFC hardware — most Android phones since 2015 include it.

    Legal Considerations

    NFC tag cloning is legal when:

    • You own the tag you are cloning
    • You have explicit permission from the tag owner
    • You are creating backups of your own access cards or key fobs
    • You are using it for testing, development, or educational purposes

    NFC tag cloning may be illegal when:

    • You clone access credentials without authorization
    • You duplicate tags to bypass security systems
    • You copy commercially protected content

    Always obtain proper authorization before cloning tags that are part of access control systems. NFC Clone is designed for legitimate backup and duplication purposes.

    Ready to Clone Your First NFC Tag?

    Download NFC Clone free on Google Play and clone your first NFC tag in under 30 seconds. The app supports NTAG213, NTAG215, NTAG216, MIFARE Ultralight, and all NDEF-compatible tags. No root required.

    Ready to Clone Your NFC Tags?

    Download NFC Clone for free — the easiest NFC tag copier for Android.