Find resources loaded over insecure HTTP on your HTTPS page
This only checks mixed content. For a comprehensive analysis, use the full page check.
You can also audit your entire site. Duplicate titles and descriptions, orphan pages, broken links between sections, and other site-wide issues can only be found with a full site audit.
If you don't have an SEO specialist, we can help fix the errors found.
Mixed content occurs when a page loaded over secure HTTPS contains resources requested over insecure HTTP. These can be images, scripts, styles, fonts, iframes, and other elements. This undermines the security of the entire page, as HTTP resources are transmitted without encryption and can be intercepted or tampered with by an attacker.
Modern browsers (Chrome, Firefox, Edge) block active mixed content by default. Passive mixed content may load, but the browser removes the padlock icon from the address bar and shows a console warning. Since 2020, Chrome began automatically upgrading HTTP resources to HTTPS, and blocking them if that's not possible.
//example.com/file.js automatically uses the current protocolupgrade-insecure-requests directive forces the browser to automatically upgrade HTTP requests to HTTPSSearch engines prefer fully secure pages. Mixed content may cause Google to consider the page unsafe, negatively affecting search rankings. Additionally, blocked resources can break site display and functionality, increasing bounce rate.
Content-Security-Policy-Report-Only header to collect reports.upgrade-insecure-requests directive in the Content-Security-Policy header forces the browser to automatically replace HTTP with HTTPS. This is a good temporary solution, but not all resources may be available over HTTPS. Best practice is to fix all URLs in the source code and ensure each resource is available over the secure protocol.