HTTP headers
DI
discord.com response headers
https://discord.com/
HTTP 200
grade A
What this means
Strong header hygiene — the major security headers are present and configured at modern defaults. Re-check after deploys; CSP is the one most likely to silently regress.
Security headers
A
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
A
Content-Security-Policy
default-src 'self'; script-src 'self' 'unsafe-inline' 'nonce-MjMwLDIzMiw1MywxNTYsMTIzLDg3LDUsODE=' https://discord.com https://www.googletagmanager.com https://connect.facebook.net https://www.google-analytics.com https://ssl.google-analytics.com https://www.gstatic.com/recaptcha
— missing
No Referrer-Policy header. The browser default leaks the full URL on cross-origin requests.
Warnings
- No Referrer-Policy header. The browser default leaks the full URL on cross-origin requests.
Caching
- Cache-Control
- no-cache
- Last-Modified
- Fri, 24 Apr 2026 21:41:50 GMT
Cookies (2)
__dcfduid
SecureHttpOnlySameSite=lax
__sdcfduid
SecureHttpOnlySameSite=lax
Server & transport
- Server
- cloudflare
What to try next
Lock in CSP
If your CSP is good today, set up a CSP report-only deploy gate to catch silent regressions.
Pair with /ssl
Verify HSTS is consistent with the cert at /ssl/discord.com.
Monitor
Re-run after every deploy. Most security-header regressions land via reverse-proxy config drift.
All response headers (24)
Methodology
- Probe
- We open a HEAD request to https://{host}/ (falling back to GET on 405 / 501), capture every response header, and grade the six load-bearing security headers: Strict-Transport-Security, Content-Security-Policy, X-Frame-Options, X-Content-Type-Options, Referrer-Policy, and Permissions-Policy. The overall letter grade is the average of those six.
- Counts as DOWN
- The HEAD (and GET fallback) request fails to complete — DNS, TCP, TLS, or timeout. Nothing to grade.
- Counts as DEGRADED
- Reserved for grade C / D — common security headers present but weakened, or some missing. The probe still returns full data; the grade reflects production-readiness.
- Detail
- We do not test for known CVEs, fingerprint application versions, or attempt downgrade attacks. The probe is a single request — what the server returned to a generic client. CSP grading is intentionally crude (penalises wildcard sources and 'unsafe-eval'); a manual review is the right move for fine-grained CSP work.
- Cadence
- Every 5 minutes, in parallel across 4 monitoring regions (US East Virginia, US West Oregon, Europe London, Asia Singapore).
- Rate-limited targets
- If a host returns 429 or consistently drops connections from our IPs, we cap retries at 3 and report the last observed status — we do not flood the target to confirm the outage.
- Data source
- Direct probes from our monitoring infrastructure. We do not aggregate crowd reports, Twitter mentions, or DownDetector signals — every result on this page is a live network request.