Skip to main content
KX Toolkit

HSTS Checker

HSTS, or HTTP Strict Transport Security, is a response header that tells browsers to only ever connect to a site over HTTPS. Once a browser sees the header, it refuses to load the site over plain HTTP for the duration of the max-age value, even if the user types the URL with http

Domain Tools
Checks HSTS, HTTP/2, HTTP/3, and other security headers.

HSTS, or HTTP Strict Transport Security, is a response header that tells browsers to only ever connect to a site over HTTPS. Once a browser sees the header, it refuses to load the site over plain HTTP for the duration of the max-age value, even if the user types the URL with http

This free HSTS Checker from KX Toolkit is part of our all-in-one online toolkit. It runs entirely in your browser, so your data never leaves your device for client-side operations. 100% free, forever - no paywall, no credit card, no trial.

How to use the HSTS Checker

  1. Enter the domain or IP address.
  2. Pick the record type if the tool supports filtering.
  3. Run the lookup - most checks return in under a second.
  4. Copy the records for your DNS migration or audit notes.

What you can do with the HSTS Checker

  • Audit DNS before a domain migration.
  • Verify SSL certificate expiry and chain.
  • Check domain age and history before buying.
  • Diagnose email-delivery issues (SPF, DKIM, DMARC).

Why use KX Toolkit's HSTS Checker

  • Browser-based: Works on Windows, macOS, Linux, iOS and Android - no install, no extension.
  • Privacy-first: Client-side tools never upload your data; server-side tools delete files right after processing.
  • Mobile-friendly: Full feature parity on phones and tablets - not a stripped-down view.
  • Fast: Optimised for instant feedback. No artificial waiting screens, no email-gated downloads.
  • One hub for everything: 300+ tools across SEO, text, image, PDF, code, color, calculators and more - skip switching between sites.

Tips for the best results

DNS changes propagate at different speeds across resolvers - run the same check from Google (8.8.8.8) and Cloudflare (1.1.1.1) before declaring a problem.

Related Domain Tools

If you find this tool useful, explore the full Domain Tools collection or browse our complete tool directory. KX Toolkit is built for marketers, developers, designers, students and anyone who needs a quick utility without signing up for yet another SaaS.

What is HSTS and why is it important?
HSTS, or HTTP Strict Transport Security, is a response header that tells browsers to only ever connect to a site over HTTPS. Once a browser sees the header, it refuses to load the site over plain HTTP for the duration of the max-age value, even if the user types the URL with http://. This eliminates an entire class of downgrade and SSL stripping attacks that target the first connection.
What does the max-age value mean?
max-age is the number of seconds the browser should remember the HSTS policy. A common production value is 31536000, which is one year. Shorter values are useful while testing because mistakes can be reverted faster. Once you are confident in HTTPS coverage, raise the value, add includeSubDomains, and finally add the preload directive to be eligible for the browser preload list.
What is the HSTS preload list?
The preload list is a hardcoded set of HSTS-protected domains shipped inside Chrome, Firefox, Safari, and Edge. Domains on the list get HSTS protection on the very first visit, before any header is seen. To qualify, you must serve a valid certificate, redirect HTTP to HTTPS, include all subdomains, and submit the domain at hstspreload.org. Removal can take months, so preload only after thorough testing.
What other security headers should I check?
Beyond HSTS, modern sites should send Content-Security-Policy, X-Content-Type-Options, Referrer-Policy, Permissions-Policy, and Cross-Origin-Resource-Policy. Each closes a specific class of attacks like XSS, MIME sniffing, and cross-origin data leaks. The checker reports all of them, plus HTTP/2 and HTTP/3 support, so you can see at a glance how the site stacks up against current best practices.
Can HSTS lock me out of my own site?
Only if you set a long max-age and then lose your HTTPS configuration. Browsers will refuse plain HTTP, leaving users unable to reach the site until they wait out the policy or clear it manually. To avoid this, use a short max-age while testing, deploy includeSubDomains only after verifying every subdomain has a valid certificate, and keep certificate renewal automated and monitored.
Does HSTS work for subdomains automatically?
Only if you include the includeSubDomains directive. Without it, the policy applies only to the exact host that sent the header. Adding includeSubDomains is powerful but requires every subdomain, including legacy ones you might have forgotten, to support HTTPS. Audit your full DNS zone before enabling it, because once browsers cache the directive there is no per-subdomain exception.

No reviews yet

Be the first to share your experience with the HSTS Checker.