Mixed Content
The mixed content endpoint returns all insecure resources detected on a monitor with the mixed content check enabled. Mixed content occurs when an HTTPS page loads resources over HTTP.
You'll need a monitor ID for this endpoint.
Example request:
$ OHDEAR_TOKEN="your API token" $ curl https://ohdear.app/api/mixed-content/1 \ -H "Authorization: Bearer $OHDEAR_TOKEN" \ -H 'Accept: application/json' \ -H 'Content-Type: application/json'
All endpoints below follow the same authentication pattern.
Get mixed content for a monitor #
GET /api/mixed-content/{monitorId}
Returns all mixed content items from the latest completed crawl run. You can also fetch results from a specific past run by passing run_id (see check history).
Query parameters:
run_id(integer, optional) -- return results from a specific run instead of the latest. Get run IDs from the check history endpoint.
Here's what the response looks like:
{ "data": [ { "element_name": "img", "mixed_content_url": "http://example.com/image.jpg", "found_on_url": "https://example.com" } ], "meta": { "run_id": 98765, "run_started_at": "2026-03-17T00:30:00+00:00", "run_ended_at": "2026-03-17T00:53:58+00:00" } }
element_name: the HTML element that loads the insecure resource (e.g.,img,script,link)mixed_content_url: thehttp://URL being loaded on anhttps://pagefound_on_url: the page where the mixed content was detected
The meta object contains information about which run the results come from:
run_id: the ID of the runrun_started_at: when the run started (ISO 8601, UTC), ornullrun_ended_at: when the run completed (ISO 8601, UTC)
Feel free to reach out via [email protected] or on X via @OhDearApp if you have any other questions. We'd love to help!