JSON result object for "http://fubo.tv/"

Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.

{
  "mx_cert_trusted_reason": "",
  "mx_a_records_reverse": [
    [
      10,
      [
        [
          "us-smtp-inbound-1.mimecast.com",
          "us-smtp-inbound-2.mimecast.com"
        ],
        [
          "us-smtp-inbound-2.mimecast.com",
          "us-smtp-inbound-1.mimecast.com"
        ],
        [],
        [
          "us-smtp-inbound-1.mimecast.com",
          "us-smtp-inbound-2.mimecast.com"
        ],
        [],
        []
      ]
    ],
    [
      10,
      [
        [
          "us-smtp-inbound-2.mimecast.com",
          "us-smtp-inbound-1.mimecast.com"
        ],
        [
          "us-smtp-inbound-1.mimecast.com",
          "us-smtp-inbound-2.mimecast.com"
        ],
        [],
        [],
        [],
        [
          "us-smtp-inbound-2.mimecast.com",
          "us-smtp-inbound-1.mimecast.com"
        ]
      ]
    ],
    [
      20,
      [
        [
          "ws-in-f26.1e100.net"
        ]
      ]
    ],
    [
      30,
      [
        [
          "ea-in-f27.1e100.net"
        ]
      ]
    ],
    [
      30,
      [
        [
          "rc-in-f26.1e100.net"
        ]
      ]
    ],
    [
      40,
      [
        [
          "la-in-f27.1e100.net"
        ]
      ]
    ],
    [
      40,
      [
        [
          "sa-in-f26.1e100.net"
        ]
      ]
    ]
  ],
  "mx_has_protocol_tls1_2": true,
  "final_url_is_https": true,
  "final_url": "https://www.fubo.tv/signin",
  "mx_pfs": true,
  "mx_cert_trusted": true,
  "final_https_url": "https://www.fubo.tv/signin",
  "mx_ciphers": {},
  "mx_vulnerabilities": {
    "LOGJAM_common primes": {
      "cve": "CVE-2015-4000",
      "severity": "HIGH",
      "finding": "common prime 'RFC2409/Oakley Group 2' detected"
    },
    "sec_client_renego": {
      "cve": "CVE-2009-3555",
      "severity": "MEDIUM",
      "finding": "Secure Client-Initiated Renegotiation : VULNERABLE, potential DoS threat"
    },
    "lucky13": {
      "cve": "CVE-2013-0169",
      "severity": "LOW",
      "finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
    }
  },
  "mx_has_protocol_tls1": false,
  "a_locations": [
    "United States"
  ],
  "mx_records": [
    [
      10,
      "us-smtp-inbound-1.mimecast.com"
    ],
    [
      10,
      "us-smtp-inbound-2.mimecast.com"
    ],
    [
      20,
      "aspmx.l.google.com"
    ],
    [
      30,
      "alt1.aspmx.l.google.com"
    ],
    [
      30,
      "alt2.aspmx.l.google.com"
    ],
    [
      40,
      "alt3.aspmx.l.google.com"
    ],
    [
      40,
      "alt4.aspmx.l.google.com"
    ]
  ],
  "cname_records": [],
  "mx_locations": [
    "United States"
  ],
  "mx_has_protocol_tls1_3": true,
  "a_records_reverse": [
    [],
    [],
    [],
    []
  ],
  "mx_ssl_finished": true,
  "leaks": [],
  "reachable": true,
  "a_records": [
    "151.101.128.230",
    "151.101.0.230",
    "151.101.192.230",
    "151.101.64.230"
  ],
  "mx_has_ssl": true,
  "mx_a_records": [
    [
      10,
      [
        "205.139.110.242",
        "205.139.110.221",
        "207.211.30.221",
        "205.139.110.141",
        "207.211.30.242",
        "207.211.30.141"
      ]
    ],
    [
      10,
      [
        "205.139.110.221",
        "205.139.110.242",
        "207.211.30.141",
        "207.211.30.242",
        "207.211.30.221",
        "205.139.110.141"
      ]
    ],
    [
      20,
      [
        "173.194.76.26"
      ]
    ],
    [
      30,
      [
        "142.250.153.27"
      ]
    ],
    [
      30,
      [
        "142.251.9.26"
      ]
    ],
    [
      40,
      [
        "142.250.150.27"
      ]
    ],
    [
      40,
      [
        "74.125.200.26"
      ]
    ]
  ],
  "mx_has_protocol_tls1_1": false,
  "mx_has_protocol_sslv3": false
}