HTTP Header Parser | Inspect Request & Response Headers

EncodingRuns in Your Browser (No Uploads)

Parse raw HTTP request or response headers into a normalized, readable summary with duplicate detection and cache, security, CORS, and content header groups.

Loading…

What to do next

Continue with a related workflow or open the next tool that usually follows this task.

How to Use This Tool

  1. 1

    Paste raw HTTP request or response headers into the input.

  2. 2

    Review the normalized header list and skipped-line warnings.

  3. 3

    Check duplicate header names such as Accept or Set-Cookie.

  4. 4

    Use the grouped summary to inspect cache, security, CORS, and content headers.

  5. 5

    Copy or download the normalized output for debugging notes.

When to Use This Tool

Cache Debugging

Inspect cache-control, etag, expires, vary, and age headers before debugging stale API or CDN responses.

CORS Troubleshooting

Check CORS response headers before testing a frontend request that fails in the browser.

Security Header Review

Review HSTS, CSP, frame, content-type, and referrer-related headers while preparing deployment checks.

API Debugging Notes

Normalize copied request headers from DevTools or curl when documenting API issues.

Examples

Inspect response headers

Input
HTTP/1.1 200 OK
content-type: application/json
cache-control: public, max-age=3600
strict-transport-security: max-age=31536000; includeSubDomains
Output
Start line: HTTP/1.1 200 OK
Total headers: 3
Cache headers: cache-control
Security headers: strict-transport-security

Find duplicate request headers

Input
GET /api/users HTTP/1.1
Host: api.example.com
Accept: application/json
Accept: text/plain
Output
Start line: GET /api/users HTTP/1.1
Duplicate header names: 1
Normalized headers:
host: api.example.com
accept: application/json
accept: text/plain

How HTTP Header Parsing Works

The parser recognizes HTTP request and response start lines before reading name/value header pairs.

Header names are grouped case-insensitively while original values are preserved.

Repeated header names are reported as duplicates instead of being overwritten.

Continuation lines are folded into the previous header value for readable output.

Malformed lines are skipped with warnings so a partial log still produces useful results.

Frequently Asked Questions

Q.Can I paste a full response header block?

A. Yes. Paste the status line and header block from DevTools, curl, a CDN log, or an API client. The parser keeps the start line and normalizes the headers below it.

Q.Are my headers sent to a server?

A. No. Everything runs locally in your browser. The tool does not fetch URLs, upload headers, or store inspected values.

Q.Does this check security headers?

A. It highlights common cache, CORS, content, request, response, and security header groups. These are inspection hints, not a complete security audit.

Related workflow guides

Use these focused guides when you need a practical workflow before opening the tool.

Workflow guide

Fix double-encoded query parameters

Use this workflow when encoded query strings look readable in parts, fail authentication, or return unexpected 400/404 errors.

Workflow guide

Analyze a Content-Security-Policy header

Use this workflow when a CSP blocks expected browser behavior, allows risky sources, or needs a readable review before a deployment change.

Workflow guide

Inspect HTTP response headers before debugging APIs

Use this workflow when a browser request, API response, redirect, or CDN cache behaves differently than expected and you need a clean header-level view first.

Workflow guide

Debug API JSON faster with JSONPath expressions

Use this workflow when a bug report, test failure, or production log includes a large JSON payload and you need to isolate request IDs, statuses, pagination links, or nested error fields.

Workflow guide

Check security headers before launching a web app

Use this workflow before a release when you need to confirm that response headers include practical browser security signals without sending internal URLs to a remote scanner.

Workflow guide

Convert timestamps from API logs and event payloads

Use this workflow when copied logs or API payloads contain mixed epoch values and you need to understand what happened when before changing application code.

Workflow guide

Convert Unix timestamps in API logs

Use this workflow when copied logs contain mixed timestamp units and you need to understand event order, compare server UTC with user-facing local time, or generate readable notes for debugging.

Workflow guide

Parse a URL query string for debugging

Use this workflow when a URL looks correct in the browser but an app, analytics tool, webhook, or API callback reads different query parameter values.

Related Tools

Explore more developer tools

Browse All Tools