HTTP headers
HTTP /api/v1/http/headersCapture every response header, follow redirects, time each hop.
https://www.cloudflare.com/ja-jp/sitemap.xml
200
1 hop
205 ms
| date | Sat, 09 May 2026 10:30:35 GMT |
| content-type | application/xml; charset=utf-8 |
| cache-control | public, max-age=0, must-revalidate |
| etag | W/"22e0b22b99d23a2bd894c7146864fdb2" |
| strict-transport-security | max-age=31536000; includeSubDomains |
| permissions-policy | geolocation=(), camera=(), microphone=() |
| referrer-policy | strict-origin-when-cross-origin |
| x-content-type-options | nosniff |
| x-frame-options | SAMEORIGIN |
| x-gww-loc | JA-JP |
| x-pgs-loc | JA-JP |
| x-xss-protection | 1; mode=block |
| vary | accept-encoding |
| set-cookie | __cf_bm=ZXHrTHSBeHz4dvpcv3tKrHuQutN1A_rfNw6JXpeYjXU-1778322635.0458817-1.0.1.1-sehny10JmiwmW8f9eV9nuaiQFo9ctkbeSHw3nUoefEpy23.TGe2oaL7WL.cNeBK.mvvh_UJzN3_Jb.ZDU7BS9DMGfg5r_xQr2tbvDOYkdKiq31vd6HQdln8ScXxkSYPsdKFC2Hv0uBdaijtCkBV4gA; HttpOnly; Secure; Path=/; Domain=www.cloudflare.com; Expires=Sat, 09 May 2026 11:00:35 GMT |
| report-to | {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=zDKJ%2Fpl145Xmh9ieg4RCX6DCoAC%2Byg5VUYH6nA1QnWZuK2Y9Q8zNenpQm4tREENqQbWiTrCeyb3D9eMRuEZm1h7OsDUTsKePlegrMHjJbIkMWSl7t8e2GDrKUrq8gSfy68nmCg%3D%3D"}]} |
| nel | {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800} |
| content-encoding | br |
| server | cloudflare |
| cf-ray | 9f9007950da42d00-AMS |
| alt-svc | h3=":443"; ma=86400 |
-
1
Paste your input
Enter the value at the top — domain, IP, URL, email, ASN, hash, whatever fits this tool. The smart input auto-detects type.
-
2
Click "Inspect"
host.tools issues real probes (DNS, HTTP, TCP, TLS, WHOIS where applicable) and renders the result in milliseconds.
-
3
Open the API tab
Every web tool has a sibling /api/v1/http/headers JSON endpoint with the same payload. One copy-as-curl click and you're scripting it.
Headers are how the modern web declares its security posture. Auditing them is the highest-ROI thing you can do this week.
/api/v1/http/headers?q=https%3A%2F%2Fwww.cloudflare.com%2Fja-jp%2Fsitemap.xml
curl -s '/api/v1/http/headers?q=https%3A%2F%2Fwww.cloudflare.com%2Fja-jp%2Fsitemap.xml'
<iframe src="/http/headers?q={INPUT}&embed=1"
width="100%" height="600" frameborder="0"></iframe>
Drop into any HTML page. The embed=1 flag hides nav and footer.
Upgrade to Pro for $19/mo. Cancel anytime. Works with the same API you already use.
Common questions
Is HTTP headers free?
Where does the data come from?
How fresh are the results?
?nocache=1 for a forced refresh.Can I run this from the command line?
host.tools http headers YOUR_INPUT.Can I monitor results over time?
Run HTTP headers on a schedule. Get pinged when it changes.
Pro gets you bulk lookups, monitors, webhook alerts, history, exports and 10,000 API calls/day. $19/mo.
- ✓Schedule any tool — every 1, 5, 15, 60 min
- ✓Diff against last run, alert on change
- ✓Webhook + email + Slack + PagerDuty + OpsGenie
- ✓Bulk CSV upload, 1,000 inputs per job
- ✓Export results as CSV / NDJSON / Excel
- ✓90-day history, comparison view