How-to guide
How to Get Alerted When a Web Page Changes
You need to know when a web page changes — whether it's your own site after a deploy, a competitor's pricing page, or a regulatory page you're required to track. There are several approaches, from visual screenshot diffing to structural fingerprinting, each with different trade-offs. This guide covers them all.
- 4 approaches to web page change detection
- How SHA-256 fingerprinting works
- Monitoring your own site vs. third-party pages
4 approaches
How web page change detection works
There are four main approaches to detecting when a web page changes. Each has different strengths depending on whether you're monitoring your own site or someone else's, and what kind of changes you care about.
1. Visual screenshot diffing
Tools take periodic screenshots and compare them pixel-by-pixel. When pixels change beyond a threshold, you get an alert with a visual diff highlighting what changed.
Best for: Catching visual regressions — layout shifts, broken images, missing elements.
Drawbacks: High false positive rate (ads, dynamic content, cookie banners trigger diffs). Computationally expensive. Doesn't tell you why something changed — just that it looks different.
2. DOM/HTML comparison
Tools fetch the page HTML and compare it to the previous version. Changes are shown as a text diff of the HTML source.
Best for: Tracking content changes on text-heavy pages — blog posts, documentation, legal pages.
Drawbacks: Extremely noisy on dynamic sites. Any timestamp, session token, CSRF token, or A/B test variation triggers a diff. Requires careful filtering to be useful.
3. Keyword/text monitoring
The simplest approach: check if a specific string is present (or absent) in the page response. UptimeRobot and similar tools offer this as "keyword monitoring."
Best for: Simple presence checks — "is the word 'error' on this page?" or "does this page still contain our company name?"
Drawbacks: Only catches changes you predict. Can't detect structural changes, missing assets, or layout shifts. Binary check — either the keyword is there or it isn't.
4. Structural fingerprinting (SHA-256)
This approach hashes the page's structural content — the meaningful HTML after stripping dynamic elements. When the fingerprint changes, the page structure has changed.
Best for: Detecting unexpected structural changes on your own site — deploy artifacts, CMS changes, defacement, unauthorized edits.
Drawbacks: Doesn't capture visual changes (CSS-only changes don't alter the HTML structure). Works best for sites you control where structural changes are meaningful.
This is the approach Sitewatch uses. SHA-256 fingerprinting is resilient to dynamic content (timestamps, tokens) while catching genuine structural changes.
Approach comparison
Which approach is right for you?
| Feature | Visual / DOM diff | SHA-256 fingerprinting |
|---|---|---|
| False positive rate | High (dynamic content) | Low (structural only) |
| Dynamic site support | Needs filtering | Built-in resilience |
| Setup complexity | Moderate (filters needed) | Zero configuration |
| Detects CSS-only changes | Visual diff: yes | No |
| Detects content changes | Yes | Yes |
| Detects asset changes | Indirectly | Yes (combined with asset checks) |
| Resource usage | High (screenshots) | Low (hash comparison) |
False positive rate
Dynamic site support
Setup complexity
Detects CSS-only changes
Detects content changes
Detects asset changes
Resource usage
Monitoring your own site
Detecting changes on your own website
If you're monitoring your own website for unexpected changes, the best approach combines structural fingerprinting with asset validation:
- Content fingerprinting catches unauthorized edits, CMS changes, and deploy artifacts that alter page structure
- Asset validation catches broken JS bundles, missing stylesheets, and MIME mismatches that change detection alone would miss
- Deploy hooks trigger checks immediately after deploys, so you know if a deploy changed something unexpected
This is exactly what Sitewatch provides out of the box — no configuration needed. Add your URL and content monitoring starts with your first check.
Common use cases
Post-deploy verification: Did this deploy change any page content that it shouldn't have? Content fingerprinting catches unexpected side effects across pages you didn't intend to change.
CMS change tracking: A content editor updates the homepage. The marketing team changes pricing copy. Content fingerprinting detects these changes and alerts you so nothing goes live without review.
Defacement detection: If an attacker modifies your page content, the SHA-256 fingerprint changes immediately. Combined with scheduled checks, this provides early warning of site tampering.
Content monitoring FAQ
Sitewatch is designed to monitor your own websites and web apps. For monitoring third-party pages (competitor pricing, regulatory content), dedicated change detection tools like Visualping or ChangeTower may be more appropriate — they specialize in visual and text diffing of pages you don't control.
SHA-256 fingerprinting is naturally resilient to dynamic content. Timestamps, session tokens, CSRF tokens, and ad placements don't affect the structural fingerprint. Only genuine structural changes — new sections, removed content, modified layouts — trigger an alert.
Content change detection alerts you to structural changes, which typically includes your own intentional updates. The value is in catching unexpected changes — deploy side effects, CMS edits you didn't authorize, or changes to pages you didn't intend to modify.
Sitewatch currently fingerprints the full page structure. For granular element-level monitoring, a DOM-based change detection tool would be needed alongside Sitewatch's broader asset and content monitoring.
Know when your pages change
Free plan includes content fingerprinting. No credit card required.