This guide explains how to discover common redirect sources via command line. On occasion, a redirect that you are unsure of the source of may appear on your domain name. In some cases, the site’s headers will reveal the source of this redirect. The CURL command over SSH makes this simple to accomplish.
Follow the procedure:
- Log in to your server through SSH.
- Execute the command given below:
curl -I yourdomainname.come
You will get the following output:
[root@server ~]# curl -I yourdomain.com
HTTP/1.1 303 See Other
Date: Mon, 17 April 2023 05:04:24 GMT
Server: Apache
X-Redirect-By: WordPress
Content-Language: en
Location: https://yourdomain.com
Content-Type: text/html; charset=UTF-8 - The crucial line in the report above includes “X-Redirect-By.”
- If a redirection is discovered, here is where it comes from.
- The majority of popular CMSs to identify the source of redirects uses the X-Redirect-By header. The following are examples of frequent X-Redirect-By headers for CMS:
X-Redirect-By: Joomla
X-Redirect-By: Moodle
X-Redirect-By: WordPress
In this manner, you can discover common redirect sources via command line. For more latest updates, do visit our KB section regularly.
Related Articles
How to monitor incoming and outgoing network connections in Linux serversApril 19, 2024
How to set the possession of an unowned DNS ZoneApril 17, 2024
How to fix “There Has Been a Critical Error on This Website” issueApril 15, 2024
How to resolve “The uploaded file could not be moved to wp-content/uploads” issueApril 11, 2024