Skip to content

How-to guide

How to Get Alerted When a Web Page Changes

You need to know when a web page changes — whether it's your own site after a deploy, a competitor's pricing page, or a regulatory page you're required to track. There are several approaches, from visual screenshot diffing to structural fingerprinting, each with different trade-offs. This guide covers them all.

  • 4 approaches to web page change detection
  • How SHA-256 fingerprinting works
  • Monitoring your own site vs. third-party pages

4 approaches

How web page change detection works

There are four main approaches to detecting when a web page changes. Each has different strengths depending on whether you're monitoring your own site or someone else's, and what kind of changes you care about.

1. Visual screenshot diffing

Tools take periodic screenshots and compare them pixel-by-pixel. When pixels change beyond a threshold, you get an alert with a visual diff highlighting what changed.

Best for: Catching visual regressions — layout shifts, broken images, missing elements.

Drawbacks: High false positive rate (ads, dynamic content, cookie banners trigger diffs). Computationally expensive. Doesn't tell you why something changed — just that it looks different.

2. DOM/HTML comparison

Tools fetch the page HTML and compare it to the previous version. Changes are shown as a text diff of the HTML source.

Best for: Tracking content changes on text-heavy pages — blog posts, documentation, legal pages.

Drawbacks: Extremely noisy on dynamic sites. Any timestamp, session token, CSRF token, or A/B test variation triggers a diff. Requires careful filtering to be useful.

3. Keyword/text monitoring

The simplest approach: check if a specific string is present (or absent) in the page response. UptimeRobot and similar tools offer this as "keyword monitoring."

Best for: Simple presence checks — "is the word 'error' on this page?" or "does this page still contain our company name?"

Drawbacks: Only catches changes you predict. Can't detect structural changes, missing assets, or layout shifts. Binary check — either the keyword is there or it isn't.

4. Structural fingerprinting (SHA-256)

This approach hashes the page's structural content — the meaningful HTML after stripping dynamic elements. When the fingerprint changes, the page structure has changed.

Best for: Detecting unexpected structural changes on your own site — deploy artifacts, CMS changes, defacement, unauthorized edits.

Drawbacks: Doesn't capture visual changes (CSS-only changes don't alter the HTML structure). Works best for sites you control where structural changes are meaningful.

This is the approach Sitewatch uses. SHA-256 fingerprinting is resilient to dynamic content (timestamps, tokens) while catching genuine structural changes.

Approach comparison

Which approach is right for you?

False positive rate

Visual / DOM diff:High (dynamic content)
SHA-256 fingerprinting:Low (structural only)

Dynamic site support

Visual / DOM diff:Needs filtering
SHA-256 fingerprinting:Built-in resilience

Setup complexity

Visual / DOM diff:Moderate (filters needed)
SHA-256 fingerprinting:Zero configuration

Detects CSS-only changes

Visual / DOM diff:Visual diff: yes
SHA-256 fingerprinting:No

Detects content changes

Visual / DOM diff:Yes
SHA-256 fingerprinting:Yes

Detects asset changes

Visual / DOM diff:Indirectly
SHA-256 fingerprinting:Yes (combined with asset checks)

Resource usage

Visual / DOM diff:High (screenshots)
SHA-256 fingerprinting:Low (hash comparison)

Monitoring your own site

Detecting changes on your own website

If you're monitoring your own website for unexpected changes, the best approach combines structural fingerprinting with asset validation:

  • Content fingerprinting catches unauthorized edits, CMS changes, and deploy artifacts that alter page structure
  • Asset validation catches broken JS bundles, missing stylesheets, and MIME mismatches that change detection alone would miss
  • Deploy hooks trigger checks immediately after deploys, so you know if a deploy changed something unexpected

This is exactly what Sitewatch provides out of the box — no configuration needed. Add your URL and content monitoring starts with your first check.

Common use cases

Post-deploy verification: Did this deploy change any page content that it shouldn't have? Content fingerprinting catches unexpected side effects across pages you didn't intend to change.

CMS change tracking: A content editor updates the homepage. The marketing team changes pricing copy. Content fingerprinting detects these changes and alerts you so nothing goes live without review.

Defacement detection: If an attacker modifies your page content, the SHA-256 fingerprint changes immediately. Combined with scheduled checks, this provides early warning of site tampering.

Start monitoring today

Free plan. No credit card.

Content monitoring FAQ

Know when your pages change

Free plan includes content fingerprinting. No credit card required.