Free HSTS checker — verify HTTP Strict Transport Security configuration and preload list status
This HSTS checker retrieves your domain's Strict-Transport-Security response header via the SSL Labs API (same trusted engine used by security professionals globally), then cross-references your domain against the official HSTS preload list via hstspreload.org. The result is a complete picture of your HSTS configuration, from basic header presence to preload list eligibility.
HSTS is a critical security mechanism that prevents the most common class of man-in-the-middle attacks: SSL stripping. Without HSTS, a network attacker can intercept the user's initial HTTP request and serve a fake HTTP version of your site, silently stripping the HTTPS upgrade. With HSTS, the browser refuses to make any HTTP request to your domain after it has seen the HSTS header once — converting all requests to HTTPS before they leave the browser.
A complete, secure HSTS configuration requires four things: the header must be present, max-age must be at least 31536000 (one year), includeSubDomains must be set (to protect all subdomains), and the preload directive should be present if you want the domain included in browser preload lists. This tool checks all four and explains exactly how to fix any gaps.
HSTS configuration examples — from basic to preload-ready
This is the gold-standard HSTS configuration. Two-year max-age, all subdomains covered, and preload-eligible. This header, combined with HTTP→HTTPS redirects on all subdomains, qualifies for submission to the Chrome, Firefox, and Edge HSTS preload lists. Once preloaded, the domain is protected from the very first browser visit.
A basic HSTS header with only max-age is a good start but leaves subdomains unprotected. Without includeSubDomains, an attacker can still target subdomains via HTTP. Adding includeSubDomains and preload (after verifying all subdomains serve HTTPS) upgrades this to a preload-eligible A+ configuration.
A domain without HSTS is vulnerable to SSL stripping. On any untrusted network (coffee shop Wi-Fi, hotel internet), an attacker can intercept HTTP requests and prevent the HTTPS upgrade from ever happening. Adding the HSTS header to your server configuration is a one-line fix that dramatically improves security.
Frequently asked questions about HSTS and HTTP Strict Transport Security
Need a disposable email address?Stop exposing your real inbox — get a free instant throwaway email with no signup and no trace.
Get Free Temp Mail →