
Find out where your tracking code is installed. Tag Scout scans your front-end HTML and shows where tracking scripts live in your WordPress install.
| Author: | zemraplugins (profile at wordpress.org) |
| WordPress version required: | 5.8 |
| WordPress version tested: | 6.9 |
| Plugin version: | 1.0.1 |
| Added to WordPress repository: | 10-12-2025 |
| Last updated: | 11-12-2025 |
| Rating, %: | 0 |
| Rated by: | 0 |
| Plugin URI: | https://zemraplugins.com/tag-scout/ |
| Total downloads: | 204 |
| Active installs: | 10+ |
![]() Click to start download |
|
Tracking scripts can hide in many places — plugins, themes, and custom code.
Tag Scout shows you exactly where each tracking code originates.
It scans any URL on your site and detects:
Google Analytics 4 (GA4)
Universal Analytics (legacy)
Google Tag Manager (GTM)
Meta Pixel
Hotjar
Microsoft Clarity
Tag Scout searches your WordPress installation for matching fragments in:
- wp_options (option values)
- wp_posts (post content across all post types, including Code Snippets CPT)
- wp_postmeta (meta values: page builders, ACF, etc.)
- Legacy Code Snippets table ({prefix}snippets), if present
- Key theme files: header.php, footer.php, functions.php in parent and child themes
Results are shown as clean cards with:
Provider name (GA4, UA, GTM, etc.)
ID (Measurement ID, UA property, GTM container, etc.)
Snippet preview
“Found in…” list (options, posts, postmeta, Code Snippets, theme files)
Tag Scout is read-only. It never changes your database or files — it just helps you find where to fix things.
Tag Scout does not connect to any third-party APIs or services. It only requests your own site’s URL using wp_remote_get() and scans that HTML for known tracking patterns.
Screenshots
FAQ
ChangeLog



