Redirect Tracer
Trace the full redirect chain for any URL. See every hop — 301, 302, 303, 307, 308 — with status codes, locations, and timing.
Redirect Chain
How to Use
-
1
Enter the starting URL
Paste any URL — shortened link, old domain, or marketing campaign URL — into the input. The tracer follows every HTTP redirect hop by hop without a browser, revealing the full chain.
-
2
Inspect each redirect hop
Review the status code (301, 302, 307, 308), destination URL, and response headers at each step. Look for redirect loops, mixed-HTTP/HTTPS transitions, and unnecessary hops that slow page load.
-
3
Identify SEO and performance issues
Count total hops and check whether link equity is preserved. A 301 chain longer than 3 hops may bleed PageRank and adds latency. Verify the final destination returns 200 OK and uses HTTPS.
About
HTTP redirects are the mechanism by which servers instruct clients to fetch a resource at a different URL. Defined in RFC 9110 §15.4 (Redirection 3xx), each redirect status code carries distinct semantics around permanence, method preservation, and caching behavior. What appears to be a simple link click can involve a chain of 5 or more hops across HTTP/HTTPS boundaries, domain migrations, CDN layers, and CMS canonical URL systems — each adding latency and potentially degrading link equity.
The Redirect Tracer makes each hop in the chain visible by issuing raw HTTP requests without following redirects automatically, capturing the status code and Location header at each step. This reveals issues invisible in a browser: redirect loops that browsers abort silently, mixed HTTP/HTTPS chains that break HSTS, server-side redirects that conflict with JavaScript-based redirects, and Cloudflare or Fastly CDN rules that intercept before the origin server responds.
For SEO professionals, the tracer confirms whether 301 permanent redirects are correctly set on migrated pages and whether redirect chains are short enough to preserve link equity. For backend engineers, it exposes configuration drift between development, staging, and production environments where a forgotten rewrite rule creates unexpected behavior. For security audits, it identifies open redirectors — endpoints that redirect to arbitrary external URLs based on query parameters — which are a common phishing vector (CWE-601).