Skip to main content
Free Tool

HTTP Header
Inspector

Inspect HTTP response headers, check security grades, trace redirect chains, and spot server information leaks for any URL.

No sign-up required
Works with any URL
Instant results
Enter URL
Fetch Headers
Grade Security
View Report

Inspect Headers

Enter a URL to check its HTTP response headers and security configuration

Fetching headers...

Security Headers

All Response Headers

What Does the HTTP Header Inspector Check?

Every time a browser loads a web page, the server sends HTTP response headers before the page content arrives. These headers control caching, security policies, redirects, and more. This tool fetches all response headers from any URL and grades six security headers against best practices: Strict-Transport-Security (HSTS), Content-Security-Policy (CSP), X-Content-Type-Options, X-Frame-Options, Referrer-Policy, and Permissions-Policy.

It also follows redirect chains from start to finish, showing every hop. HTTP to HTTPS, www to non-www, custom redirects. If your server leaks its software version through headers like X-Powered-By or Server, the tool flags that too.

Who Is This Tool For?

Web developers checking security header configuration. Site owners who want to know their server's security posture. SEO professionals auditing redirect chains before a migration. If you've seen an A-to-F security header grade on a competitor's report and want to check your own site, paste the URL above.

FAQ

Frequently Asked Questions

Enter the URL into this tool and it traces every redirect hop, showing each 301 and 302 with its target. A redirect loop happens when URL A redirects to URL B, which redirects back to A. Common causes include conflicting redirect rules in .htaccess, WordPress settings not matching your actual domain, or your CDN and server both adding a www or HTTPS redirect. The chain view shows exactly where the loop occurs.

HTTP security headers are your first line of defence. This tool checks your site for all eight major headers: Strict-Transport-Security (forces HTTPS), Content-Security-Policy (prevents XSS), X-Frame-Options (blocks clickjacking), X-Content-Type-Options (stops MIME sniffing), Referrer-Policy, Permissions-Policy, Cross-Origin-Opener-Policy, and Cross-Origin-Resource-Policy. Each header is graded and the overall score runs from A+ to F.

Quite likely. This tool shows your Cache-Control, ETag, Expires, and Vary headers. If Cache-Control is set to no-cache or no-store, browsers re-download everything on every visit. A properly configured caching policy lets browsers store static assets locally, so repeat visitors load pages much faster without unnecessary network requests.

One redirect is normal (HTTP to HTTPS, or non-www to www). Two is acceptable. Three or more starts hurting performance and can confuse search engines. Every redirect adds 50-200ms of latency. Google follows up to 10 redirects but recommends keeping chains as short as possible. If you see 3+ hops, consolidate them into a single redirect from the original URL to the final destination.

Yes. Headers like Server: Apache/2.4.52 or X-Powered-By: PHP/8.2 tell attackers exactly what software to target. This tool flags exposed version information. To fix it: in Apache, add ServerTokens Prod. In Nginx, add server_tokens off. For PHP, set expose_php = Off in php.ini. Your hosting provider may also offer this as a control panel setting.

HSTS (Strict-Transport-Security) tells browsers to always connect over HTTPS, even if someone types http://. Without it, the first request to your site goes over plain HTTP before redirecting, which creates a window for man-in-the-middle attacks. This tool checks whether your site sends the HSTS header and shows the max-age value. If it's missing, your HTTPS setup has a gap.

CSP tells the browser which sources of content are trusted on your page. Without it, your site is more vulnerable to cross-site scripting (XSS) attacks. A basic policy like default-src 'self' only allows content from your own domain. You add it via your server config, CDN settings, or a WordPress security plugin. Start with a report-only policy first to avoid accidentally breaking your site. This tool checks for CSP and it carries the most weight in the security grade.

A 301 is permanent: it tells search engines the page has moved for good, and link authority passes to the new URL. A 302 is temporary: search engines keep the original URL indexed. Use 301 for permanent moves (HTTP to HTTPS, domain changes, restructured URLs). Use 302 only for genuinely temporary situations like A/B tests. This tool labels every redirect in the chain so you can check the correct type is being used.

Each of the eight security headers carries a weighted score based on how much protection it provides. Content-Security-Policy and Cross-Origin-Opener-Policy carry the most weight. HTTPS gets a baseline bonus. The total maps to a letter grade: A+ is a perfect 100, A is 90-99, B is 70-89, C is 50-69, D is 30-49, and F is below 30.

Want to understand what each header does and how to add missing ones? Read the full HTTP Security Headers guide.

Need Fast, Secure Hosting?

From managed WordPress to cloud servers, all 365i hosting comes with enterprise security headers configured out of the box.