SaaS Tech Stack 2026: Patterns From Real Scan Data

April 24, 2026 · 12 min read

What does a SaaS tech stack actually look like in 2026? Not what vendors claim in their case studies or what Hacker News recommends this week—what are real SaaS companies actually running in production?

We used the DetectZeStack API to scan hundreds of SaaS websites and analyzed the results. The data comes from DNS records, HTTP headers, HTML fingerprints, and TLS certificates—the same signals our API returns on every request. This post breaks down the five most common patterns, explains what each combination tells you about the company behind it, and shows how to run these scans yourself.

What Does a Typical SaaS Tech Stack Look Like in 2026?

A “tech stack” in the SaaS context means more than just the programming language. It includes the frontend framework visitors interact with, the infrastructure serving the pages, the analytics and marketing tools tracking usage, and the security and performance layers protecting everything. Each layer leaves detectable fingerprints that a technology detection scan can pick up.

Frontend Frameworks

React remains the dominant frontend framework across SaaS products. It appears in two forms: as a standalone single-page application or bundled inside Next.js for server-side rendering and static generation. Next.js has become the default choice for new SaaS products because it handles routing, rendering, and deployment in one framework.

Vue.js holds a smaller but consistent share, particularly among developer tools and internal platforms. jQuery still appears on a surprising number of SaaS marketing sites—often because the marketing site runs on WordPress while the application itself uses React or Vue.

Tailwind CSS has overtaken Bootstrap as the most common CSS framework in newer SaaS products. Its utility-first approach is detectable through class name patterns in the HTML source.

Backend and Infrastructure

The backend is harder to detect from the outside, but infrastructure signals tell the story. CDN and hosting detection via DNS CNAME records reveals whether a SaaS product runs on Vercel, Netlify, AWS, or bare metal. HTTP headers like X-Powered-By sometimes leak the backend language: PHP, Ruby, Python, or Java.

Cloudflare is the most common CDN across all SaaS categories, detectable through its distinctive CF-Ray header and *.ns.cloudflare.com nameservers. Amazon CloudFront is the second most common, typically accompanying AWS-hosted infrastructure with its d*.cloudfront.net CNAME pattern.

Analytics and Marketing Tools

Google Analytics is nearly universal. Most SaaS products load either the gtag.js script or use Google Tag Manager as a container. Beyond Google Analytics, Segment appears frequently as a data pipeline, routing events to multiple downstream tools. HubSpot is common among B2B SaaS for both CRM and marketing automation, detectable through its tracking script and form embeds.

Intercom dominates the in-app messaging and support category. Its JavaScript widget is one of the most consistently detected third-party scripts across SaaS websites. Hotjar and Microsoft Clarity appear on SaaS marketing sites for session recording and heatmaps.

Security and Performance Layers

Cloudflare serves double duty for many SaaS products: CDN for performance and WAF for security. TLS certificates reveal whether a site uses Cloudflare’s edge certificates, AWS Certificate Manager, or Let’s Encrypt. The certificate issuer is a strong signal for the underlying hosting platform.

Security headers like Content-Security-Policy, Strict-Transport-Security, and X-Frame-Options vary widely across SaaS products. Products deployed on managed platforms (Vercel, Netlify) tend to have better default security headers than those on self-managed infrastructure.

5 SaaS Tech Stack Patterns We See Repeatedly

After analyzing the scan data, five distinct patterns emerged. Each represents a coherent set of technology choices that tend to appear together.

Pattern 1: The Next.js + Vercel + Stripe Stack

This is the most common pattern among SaaS products launched in the last two years. The stack:

Why it works: Vercel is built by the team behind Next.js, so the deployment experience is seamless. Stripe is the default payment processor for developer-oriented SaaS. This stack lets a small team ship a full product with minimal infrastructure management.

TechnologyDetection SignalConfidence
Next.js __next div, _next/ paths, __NEXT_DATA__ script 100%
Vercel CNAME: cname.vercel-dns.com 80%
Stripe js.stripe.com/v3 script inclusion 100%
Tailwind CSS Utility class patterns in HTML 100%

Pattern 2: The React + AWS + Segment Stack

This pattern dominates growth-stage and Series A/B SaaS companies that have outgrown simple deployment platforms:

The AWS infrastructure signals are unmistakable: CloudFront CNAME records, X-Amz-Cf-Id headers, and Amazon-issued TLS certificates. Segment’s analytics.js script is detectable in the HTML source and acts as a multiplier—one Segment installation routes data to five or six downstream tools. See our AWS hosting detection guide for the full set of signals.

Pattern 3: The Rails Holdouts (Still Going Strong)

Ruby on Rails powers some of the most successful SaaS products ever built, and those products have not migrated away. This pattern appears on established, profitable SaaS companies:

The Rails signal is often accompanied by a WordPress marketing site on a subdomain—a pattern where www.company.com runs WordPress and app.company.com runs Rails. You can detect the WordPress marketing site separately from the Rails application by scanning each subdomain.

Pattern 4: The Cloudflare-First Stack

Some SaaS products build their entire infrastructure around Cloudflare’s ecosystem:

This pattern is identifiable because Cloudflare signals appear across every detection layer: DNS nameservers show *.ns.cloudflare.com, HTTP headers include Server: cloudflare and CF-Ray, and TLS certificates show “Cloudflare Inc” as the issuer. When Cloudflare appears in all three layers simultaneously, the company has almost certainly built their entire infrastructure around it. For a deeper look at these signals, see DNS-Based Technology Detection.

Pattern 5: The Enterprise Java Stack

Enterprise SaaS products—particularly in fintech, healthcare, and compliance—show a distinctly different pattern:

The Java fingerprints are subtle but consistent. The JSESSIONID cookie is a dead giveaway for Java servlet containers. Akamai CDN usage correlates strongly with enterprise customers because Akamai’s pricing is oriented toward large contracts. When you see Akamai + Java + strict security headers, you are almost certainly looking at an enterprise product.

How We Collected This Data

Every data point in this post comes from the same detection methods the DetectZeStack API uses on every request:

  1. DNS resolution — Full CNAME chain resolution plus NS record inspection, matching against 111+ DNS CNAME signatures for CDNs, hosting platforms, and SaaS providers
  2. HTTP header analysis — Matching response headers against 7,300+ technology fingerprints from the Wappalyzer pattern database
  3. HTML fingerprinting — Scanning page source for script tags, meta tags, class names, and DOM patterns that identify specific technologies
  4. TLS certificate inspection — Checking the certificate issuer and Subject Alternative Names to identify CDN and hosting providers

We used the batch scanning endpoint to scan domains in groups of 10, then aggregated the results to identify recurring patterns. The POST /analyze/batch endpoint returns the same full detection result for each domain, making it straightforward to compare across hundreds of sites.

Methodology note: Technology detection reveals what is publicly observable on a website. It captures frontend frameworks, CDNs, analytics tools, and infrastructure with high accuracy. Backend languages are only detectable when they leak through HTTP headers or cookies—a well-configured server can hide its backend entirely. The patterns described here are based on what is consistently detectable across multiple domains.

Scan Any SaaS Tech Stack With the DetectZeStack API

You can reproduce this analysis on any set of SaaS domains. Here is how to scan individual sites, compare competitors, and batch-process a list.

Single Domain Scan

The free demo endpoint requires no API key. Scan any SaaS product to see its full tech stack:

$ curl -s "https://detectzestack.com/demo?url=stripe.com" | jq '.technologies[] | {name, categories, confidence}'
{
  "name": "React",
  "categories": ["JavaScript frameworks"],
  "confidence": 100
}
{
  "name": "Cloudflare",
  "categories": ["CDN"],
  "confidence": 80
}
{
  "name": "Google Analytics",
  "categories": ["Analytics"],
  "confidence": 100
}
{
  "name": "Stripe",
  "categories": ["Payment processors"],
  "confidence": 100
}

The demo endpoint is rate-limited to 20 requests per hour. For production use, the authenticated GET /analyze endpoint via RapidAPI supports higher volumes:

$ curl -s "https://detectzestack.p.rapidapi.com/analyze?url=notion.so" \
  -H "X-RapidAPI-Key: YOUR_KEY" \
  -H "X-RapidAPI-Host: detectzestack.p.rapidapi.com" | jq '.technologies[] | {name, categories}'

Compare Two SaaS Competitors Side by Side

The POST /compare endpoint takes two URLs and returns a structured diff showing shared and unique technologies. This is useful for competitive analysis—you can see at a glance whether two competitors made the same infrastructure choices:

$ curl -s -X POST "https://detectzestack.p.rapidapi.com/compare" \
  -H "X-RapidAPI-Key: YOUR_KEY" \
  -H "X-RapidAPI-Host: detectzestack.p.rapidapi.com" \
  -H "Content-Type: application/json" \
  -d '{"urls": ["linear.app", "shortcut.com"]}' | jq '.'

Comparing two project management SaaS products might reveal that both use React and Cloudflare (shared infrastructure choices) but differ on analytics tools, payment processors, or hosting platforms. Those differences are often the most interesting data points for competitive intelligence.

Batch Scan a List of SaaS Products

To analyze an entire market segment, use the POST /analyze/batch endpoint with up to 10 URLs per request:

$ curl -s -X POST "https://detectzestack.p.rapidapi.com/analyze/batch" \
  -H "X-RapidAPI-Key: YOUR_KEY" \
  -H "X-RapidAPI-Host: detectzestack.p.rapidapi.com" \
  -H "Content-Type: application/json" \
  -d '{"urls": ["slack.com", "notion.so", "linear.app", "figma.com", "vercel.com"]}'

Each URL in the batch counts as one request toward your plan limit. The endpoint scans all URLs concurrently, so a batch of 10 returns in roughly the same time as a single scan. For a complete walkthrough of scanning at scale—including a Python script with rate limiting and CSV output—see How to Batch Scan 1,000 Websites.

What These Patterns Mean for Buyers and Sellers

SaaS tech stack data is not just interesting trivia. It drives real business decisions across several use cases:

For sales teams: Technology choices are buying signals. A SaaS company using Segment but not a CDP like mParticle is a prospect for CDP vendors. A company on Heroku that just raised a Series B is likely evaluating AWS or GCP. A company without Intercom or Zendesk is a prospect for support platforms. See our guide on technographic prospecting with Stripe detection for a concrete example of turning tech stack data into qualified leads.

For competitive intelligence: If every competitor in your market is adopting Next.js and Vercel, that is a signal about where the industry is heading. If a competitor switches from Intercom to a custom support solution, that may indicate they have outgrown off-the-shelf tools. The competitor analysis guide covers how to build an ongoing monitoring workflow.

For security teams: The tech stack reveals the attack surface. A SaaS product running jQuery 2.x has known XSS vulnerabilities. A product without HSTS headers is vulnerable to downgrade attacks. A product leaking X-Powered-By: PHP/7.2 is running an end-of-life version. The CPE-based vulnerability detection endpoint maps detected technologies to known CVEs automatically.

For investors and analysts: Technology sophistication correlates with engineering maturity. A SaaS company still serving its marketing site from shared hosting with no CDN is at a different stage than one running on Vercel with Cloudflare and Segment. The tech stack is a proxy for how seriously the company takes performance, security, and scalability.

Conclusion: SaaS Tech Stacks Are Converging

The scan data reveals a clear convergence in SaaS technology choices. The Next.js + Vercel + Stripe + Cloudflare combination has emerged as the default stack for new products, while established companies cluster around React + AWS or Rails + Heroku patterns.

Three trends stand out:

  1. Cloudflare is everywhere. It appears in nearly every pattern, either as the primary CDN or as a security layer in front of another hosting provider.
  2. The frontend has standardized around React. Whether standalone or via Next.js, React is the dominant rendering library across all SaaS categories.
  3. Analytics stacks are fragmenting. While Google Analytics is nearly universal, SaaS companies are increasingly adding Segment, Mixpanel, PostHog, or Amplitude alongside it rather than relying on GA alone.

These patterns are detectable programmatically. Every technology mentioned in this post leaves fingerprints in DNS records, HTTP headers, HTML source, or TLS certificates—and the DetectZeStack API checks all four on every scan.

Related Reading

Scan Any SaaS Tech Stack

Detect React, Next.js, Cloudflare, Stripe, and 7,300+ other technologies. 100 requests/month free—no credit card required.

Get Your Free API Key

Get API updates and tech detection tips

Join the mailing list. No spam, unsubscribe anytime.