Free HTTP headers checker — view and analyse all response headers for any URL
This HTTP headers checker fetches the specified URL from our server (so there are no browser CORS restrictions) and returns every response header sent by the web server. Headers are colour-coded into categories — Security, Caching, Content, CDN, Server, Cookies, and CORS — so you can quickly find what you're looking for. A built-in security audit instantly flags any of the six key security headers that are missing.
HTTP headers are the invisible layer of every web request. They tell browsers how to cache resources, which security policies to enforce, what content type is being served, which cookies to store, and whether CORS requests are allowed. Misconfigured headers are one of the most common sources of both security vulnerabilities and performance problems. This tool gives you a complete, readable view of all headers in one place.
Common use cases: verifying security headers after server configuration changes, debugging cache behaviour by checking Cache-Control and ETag, checking cookie security flags, investigating CDN behaviour via Cloudflare or Fastly headers, or simply understanding why a page is loading slowly due to missing or incorrect cache headers.
HTTP header examples — cache headers, security headers, and common server responses
This is the ideal response for a static asset like a hashed JS or CSS file. max-age=31536000 caches it for a year, immutable tells the browser not to even try revalidating it, and brotli (br) compression is used. The ETag enables conditional requests for future revalidation if the cache-control ever expires.
A complete security header set. HSTS forces HTTPS for 2 years including subdomains. CSP restricts script sources. X-Frame-Options prevents clickjacking. nosniff stops MIME sniffing. Referrer-Policy limits URL leakage. Permissions-Policy blocks browser features not needed. This configuration earns an A+ grade in security scanners.
Exposing server software and versions lets attackers know exactly which CVEs to target. Apache/2.4.51, PHP/8.1.12 — both have known vulnerabilities. Set ServerTokens Prod in Apache to only show "Apache", and disable expose_php in PHP. Nginx uses server_tokens off. This is a quick win that takes 2 minutes and immediately reduces your attack surface.
Frequently asked questions about HTTP response headers
Need a disposable email address?Get a free instant throwaway email — no signup, no trace.
Get Free Temp Mail →