HTTP Headers Reference
Searchable HTTP headers reference with security checker
Showing 69 of 69 headers
Content-TypeIndicates the media type of the resource or the data being sent. For responses it tells the client how to interpret the body; for requests it tells the server the format of the submitted data.
Content-LengthIndicates the size of the message body in bytes. Helps the recipient know when the body ends and is required for keep-alive connections when Transfer-Encoding is not used.
Content-EncodingSpecifies the encoding (compression algorithm) applied to the body, so the recipient knows how to decode it. Common values are gzip, deflate, and br (Brotli).
Content-LanguageDescribes the natural language(s) of the intended audience for the message body, useful for content negotiation and accessibility.
Transfer-EncodingSpecifies the transfer encoding applied to the message body between nodes. The most common value is chunked, which allows streaming responses without knowing content length in advance.
ConnectionControls whether the network connection stays open after the current transaction finishes. Use keep-alive to reuse the connection or close to terminate it.
DateContains the date and time at which the message was originated. Servers must send this header in responses; it is expressed in HTTP-date format (RFC 7231).
ViaAdded by proxies, both forward and reverse, to track message forwarding and avoid request loops. Lists each proxy and the protocol version it used.
WarningDeprecatedCarries additional information about possible problems with a message that may not be reflected in the status code. Deprecated in favour of including warnings in the response body.
PragmaDeprecatedAn HTTP/1.0 header used mainly for backward compatibility. The only defined directive is no-cache, which has the same effect as Cache-Control: no-cache.
AcceptTells the server which content types the client can process, specified as MIME types with optional quality factors. The server should respond with one of the accepted types.
Accept-EncodingIndicates which content-encoding (compression) algorithms the client understands. The server may use any of the listed encodings to compress the response body.
Accept-LanguageIndicates the natural language and locale the client prefers. Servers use this for content negotiation and to serve localised responses when available.
Accept-CharsetDeprecatedAdvertises which character encodings the client understands. UTF-8 is universally supported so this header is rarely sent by modern browsers.
HostSpecifies the host and port number of the server to which the request is being sent. Required in all HTTP/1.1 requests; used by servers to select the correct virtual host.
User-AgentA string that lets servers and network peers identify the application, operating system, vendor, and version of the requesting user agent.
RefererContains the URL of the page that linked to the requested resource. Servers use it for analytics and access control. Note: the header name is a historical misspelling of "referrer".
OriginIndicates the origin (scheme, host, port) that caused the request. Sent with cross-origin requests and CORS preflight requests so the server can decide whether to allow access.
CookieSends stored HTTP cookies previously set by the server via Set-Cookie. Carries all cookies matching the current domain, path, and security attributes.
AuthorizationContains credentials to authenticate the client with the server. The value depends on the authentication scheme — commonly Basic (base64) or Bearer (JWT or OAuth token).
If-MatchMakes the request conditional: the server only processes it if the resource's ETag matches one of the listed tags. Commonly used to prevent mid-air collision in concurrent edits.
If-None-MatchMakes the request conditional: the server returns 304 Not Modified if the resource ETag matches, allowing the client to use its cached copy and saving bandwidth.
If-Modified-SinceMakes the request conditional on the resource having been modified after the specified date. Returns 304 if unchanged, allowing the client to use the cached version.
If-Unmodified-SinceMakes the request conditional: the server processes it only if the resource has not been modified since the given date. Used to prevent overwrites of stale data.
RangeRequests only a portion of a resource, enabling partial GET requests. Used for resumable downloads and video streaming. The server responds with 206 Partial Content.
TESpecifies which transfer encodings the client is willing to accept in the response, and whether it supports chunked transfer with trailers.
ExpectIndicates that the client requires particular server behaviours before sending the request body. The only defined value is 100-continue, which asks the server to confirm it will accept the upload.
FromContains an internet email address of the human user who controls the requesting user agent, primarily used by web crawlers to allow site operators to contact the bot owner.
Max-ForwardsUsed with TRACE and OPTIONS methods to limit the number of times the request can be forwarded by proxies. Each proxy decrements the value before forwarding.
Proxy-AuthorizationContains credentials to authenticate the client with a proxy server, analogous to Authorization but directed at an intermediate proxy rather than the origin server.
UpgradeAllows the client to request a protocol upgrade, for example from HTTP/1.1 to WebSocket. The server confirms with a 101 Switching Protocols response.
X-Forwarded-ForA de-facto standard header added by proxies and load balancers to identify the originating IP address of the client. Contains a comma-separated list as the request passes through multiple proxies.
X-Requested-WithIdentifies Ajax requests. Commonly sent as "XMLHttpRequest" by JavaScript frameworks to distinguish asynchronous requests from full page loads on the server side.
AllowLists the HTTP methods supported by the resource. Returned in a 405 Method Not Allowed response to inform the client which methods are valid for this endpoint.
Content-DispositionIndicates whether the response body should be displayed inline in the browser or treated as an attachment (file download). Also sets the suggested filename for downloads.
Content-LocationIndicates an alternate location for the returned data, providing a direct URL to the resource when content negotiation is used and the URL differs from the request URL.
Content-RangeIndicates where a partial message body fits within the full resource. Sent with 206 Partial Content responses to tell the client the byte range and total size returned.
ETagA unique identifier for a specific version of a resource, typically a hash of the content. Clients store the ETag and send it in If-None-Match on subsequent requests to enable conditional caching.
ExpiresSpecifies the date and time after which the response is considered stale. Superseded by Cache-Control max-age when both are present. The value 0 or a past date makes the resource immediately stale.
Last-ModifiedContains the date and time the server believes the resource was last changed. Used by clients in If-Modified-Since requests for conditional caching.
LocationIndicates the URL to redirect to for 3xx responses, or the URL of the newly created resource for 201 Created responses.
Proxy-AuthenticateDefines the authentication method that should be used to gain access to a resource behind a proxy, returned with a 407 Proxy Authentication Required response.
Retry-AfterIndicates how long the client should wait before making a follow-up request. Used with 503 Service Unavailable and 429 Too Many Requests responses.
ServerContains information about the software used by the origin server to handle the request. Often intentionally vague to avoid revealing exploitable version details.
Set-CookieSends a cookie from the server to the user agent. Multiple Set-Cookie headers can appear in one response. Supports directives like Secure, HttpOnly, SameSite, Path, Domain, and Max-Age.
VaryIndicates which request headers were used by the server to select the response. Caches must store separate variants for each unique combination of the listed header values.
WWW-AuthenticateDefines the authentication scheme that should be used to access the resource, returned with 401 Unauthorized. Tells the client what credentials format to supply in the Authorization header.
AgeIndicates the time in seconds the response has been in a proxy cache. A value of 0 means the response was fetched directly from the origin server.
Alt-SvcAdvertises that another network location (alternative service) can be used to access the same resource, enabling protocol upgrades like HTTP/3 over QUIC.
Strict-Transport-SecurityForces browsers to use HTTPS for all future requests to the domain for the specified duration. Prevents SSL-stripping attacks. The preload directive allows inclusion in browser HSTS preload lists.
Content-Security-PolicyDefines approved sources for content (scripts, styles, images, etc.) that the browser may load. Mitigates XSS and data-injection attacks by blocking content from unapproved origins.
X-Content-Type-OptionsPrevents browsers from MIME-type sniffing — guessing a different content type than declared. The only valid value is nosniff, which blocks requests where the type doesn't match.
X-Frame-OptionsControls whether the page can be embedded in a frame, iframe, or object. Prevents clickjacking attacks. Superseded by Content-Security-Policy frame-ancestors directive.
X-XSS-ProtectionDeprecatedEnables the Cross-Site Scripting (XSS) filter built into older browsers. Modern browsers have dropped this feature in favour of Content-Security-Policy; the header is now largely obsolete.
Permissions-PolicyAllows a site to control which browser features and APIs can be used in the page and in iframes, such as camera, microphone, geolocation, and payment requests.
Referrer-PolicyControls how much referrer information is included in the Referer header when navigating or loading resources. Stricter policies protect user privacy by limiting URL leakage.
Cross-Origin-Embedder-PolicyExperimentalPrevents a document from loading cross-origin resources that don't explicitly grant permission. Required (alongside COOP) to enable powerful isolation features like SharedArrayBuffer.
Cross-Origin-Opener-PolicyExperimentalAllows you to ensure that a top-level document does not share a browsing context group with cross-origin documents, isolating it from potential Spectre-style attacks.
Cross-Origin-Resource-PolicySignals that the browser should block no-cors cross-origin or cross-site requests to the resource, preventing cross-origin reads of sensitive resources like images or JSON.
Access-Control-Allow-OriginSpecifies which origin is permitted to access the resource. Use a specific origin for credentialed requests, or * to allow all origins for public resources.
Access-Control-Allow-MethodsSpecifies which HTTP methods are allowed in CORS requests to the resource. Returned in preflight (OPTIONS) responses to inform the browser what methods the client may use.
Access-Control-Allow-HeadersIndicates which HTTP headers can be used during the actual CORS request. Returned in preflight responses when the request includes Access-Control-Request-Headers.
Access-Control-Allow-CredentialsIndicates whether the response can be shared with JavaScript when the request's credentials (cookies, HTTP auth) are included. Must be true for credentialed cross-origin requests to work.
Access-Control-Max-AgeIndicates how long (in seconds) the results of a preflight request can be cached by the browser, avoiding repeated OPTIONS calls for subsequent requests.
Access-Control-Expose-HeadersLists response headers (beyond the CORS-safe-listed defaults) that browsers are allowed to access from JavaScript in a cross-origin context.
Access-Control-Request-HeadersUsed during a CORS preflight OPTIONS request to tell the server which HTTP headers the actual request will include, so the server can confirm they are permitted.
Access-Control-Request-MethodUsed in CORS preflight OPTIONS requests to notify the server which HTTP method will be used in the actual request, so the server can confirm it is permitted.
Cache-ControlHolds directives (instructions) for both requests and responses that control caching behaviour in browsers and shared caches (proxies, CDNs). One of the most important headers for web performance.
Clear-Site-DataClears browsing data (cookies, storage, cache) associated with the requesting website. Useful for sign-out flows to ensure all locally stored data is purged.
HTTP Headers Reference का उपयोग कैसे करें
- 1
Use the search bar at the top to instantly filter headers by name or description — results update as you type.
- 2
Click a category pill (General, Request, Response, Security, CORS, Caching, Authentication) to narrow results to that group.
- 3
Use the type tabs (All, Request, Response, Both) to filter by where each header is used in an HTTP exchange.
- 4
Click any header card to expand it and reveal the full syntax pattern and additional details.
- 5
Click the copy button on a header card to copy the header name to your clipboard for immediate use.
- 6
Switch to the Security Checker tab, paste raw HTTP response headers into the text area, and click Analyze.
- 7
Review the security score and the list of present (green) vs missing (red) security headers with severity labels.
- 8
Switch to the Status Codes tab to browse HTTP status codes by range, or use the search box to find a specific code.
HTTP Headers Reference के बारे में
Complete HTTP headers reference — browse, search, and learn about all standard HTTP request and response headers. Each header includes a description, syntax examples, common values, and browser compatibility notes.
Key Features
- Complete Reference: All standard HTTP request, response, and entity headers.
- Search & Filter: Find any header instantly by name or keyword.
- Categorized: Headers organized by type — authentication, caching, CORS, security, and more.
- Syntax Examples: Real-world examples for every header with common values.
- Security Headers: Detailed coverage of CSP, HSTS, X-Frame-Options, and other security headers.
Who Is This For?
Backend developers configuring server responses, frontend developers debugging API calls, DevOps engineers setting up security headers, and students learning HTTP protocol fundamentals.
Privacy & Security
Runs 100% in your browser — no signup, no uploads, no data stored.