TOOL

Request Inspector

Intercept and analyze HTTP/HTTPS traffic with mitmproxy. Debug API calls, inspect headers, modify requests, and replay traffic.

Powered by mitmproxy
mitmproxy.your-subdomain.asd.host
Filters
All Flows
GET requests
POST requests
Errors only
Stats
Captured127
Pending2
Intercepted Flows
recording
GET /api/users 200 45ms
POST /api/login 200 120ms
GET /api/products 200 89ms
PUT /api/cart/123 500 234ms
Proxy: localhost:8080 → tunnel

Capabilities

HTTP/HTTPS Interception

Capture all HTTP and HTTPS traffic between your client and server. See headers, bodies, and timing.

Request Modification

Edit requests and responses on the fly. Change headers, modify payloads, or redirect traffic.

Request Replay

Replay captured requests with modifications. Perfect for debugging edge cases and testing APIs.

Traffic Filtering

Filter traffic by host, path, method, or content type. Focus on what matters.

Export & Share

Export captured traffic as HAR files or share session recordings with teammates.

Web Interface

Modern web UI accessible through your ASD tunnel. No local installation required for viewers.

Quick Start

Run mitmproxy

$ docker run -it -p 8080:8080 -p 8081:8081 mitmproxy/mitmproxy mitmweb --web-host 0.0.0.0

Start with Docker. Web UI on port 8081.

Configure

asd.yaml
network:
  services:
    mitmproxy:
      dial: "127.0.0.1:8081"

Expose

$ asd up

One command. Tunnel created.

Access Anywhere

https://mitmproxy.your-subdomain.asd.host

Share with your team. Debug together.

Use Cases

API Debugging

Inspect API requests and responses to understand data flow

Webhook Testing

Capture and analyze incoming webhook payloads

Mobile App Debugging

Proxy mobile device traffic through mitmproxy

Security Testing

Analyze request/response patterns for vulnerabilities

Official Documentation

mitmproxy is an open-source project. Learn more from the official documentation.

View mitmproxy Docs

Frequently Asked Questions

Can mitmproxy inspect HTTPS traffic?

Yes, mitmproxy can decrypt HTTPS traffic by acting as a man-in-the-middle proxy. Install the mitmproxy CA certificate on your client device to enable HTTPS inspection.

How do I proxy mobile device traffic?

Configure your mobile device to use your computer as a proxy (the IP and port where mitmproxy runs). Then install the mitmproxy CA certificate from mitm.it on your device.

Can I modify requests and responses?

Yes, mitmproxy supports request and response modification. You can edit headers, change payloads, add delays, or redirect traffic using mitmproxy scripts or the interactive interface.

Is mitmproxy free to use?

Yes, mitmproxy is open-source and free. ASD provides secure tunnel access to the mitmproxy web interface so you can share debugging sessions with your team.

Ready to debug your APIs?

Start free and expose mitmproxy via secure tunnel.