Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.
{
"flashcookies_count": null,
"mx_a_records_reverse": [
[
10,
[
[
"mail-sj2pr05cu00204.inbound.protection.outlook.com"
],
[
"mail-mw2pr02cu00405.inbound.protection.outlook.com"
],
[
"mail-bl2pr02cu00100.inbound.protection.outlook.com"
],
[
"mail-co1pr03cu00104.inbound.protection.outlook.com"
],
[
"mail-cy1pr03cu00106.inbound.protection.outlook.com"
],
[
"mail-mn2pr04cu00205.inbound.protection.outlook.com"
],
[
"mail-co1pr05cu00201.inbound.protection.outlook.com"
]
]
]
],
"third_parties": [],
"mx_has_protocol_tls1_2": true,
"final_url_is_https": false,
"web_has_hsts_header": false,
"mx_pfs": true,
"mx_has_protocol_tls1": false,
"web_ciphers": {},
"mx_has_protocol_sslv2": false,
"requests_count": 2,
"web_cert_trusted": false,
"mx_ciphers": {},
"a_locations": [
"United States"
],
"initial_url": "http://www.paintrials.com/",
"mx_records": [
[
10,
"paintrials-com.mail.protection.outlook.com"
]
],
"web_has_hpkp_header": false,
"web_has_ssl": true,
"flashcookies": [],
"web_vulnerabilities": {
"beast": {
"cve": "CVE-2011-3389",
"severity": "LOW",
"finding": "BEAST: VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2"
},
"lucky13": {
"cve": "CVE-2013-0169",
"severity": "LOW",
"finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
},
"cbc_tls1": {
"cve": "CVE-2011-3389",
"severity": "MEDIUM",
"finding": "BEAST: CBC ciphers for TLS1: ECDHE-RSA-AES256-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA AES256-SHA CAMELLIA256-SHA ECDHE-RSA-AES128-SHA DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA AES128-SHA CAMELLIA128-SHA"
}
},
"redirected_to_https": false,
"mx_ssl_finished": true,
"openwpm_final_url": "http://www.paintrials.com/",
"mixed_content": false,
"headerchecks": {
"x-content-type-options": {
"status": "MISSING",
"value": ""
},
"x-frame-options": {
"status": "MISSING",
"value": ""
},
"content-security-policy": {
"status": "MISSING",
"value": ""
},
"x-xss-protection": {
"status": "MISSING",
"value": ""
},
"referrer-policy": {
"status": "MISSING",
"value": ""
}
},
"mx_has_ssl": true,
"web_ssl_finished": true,
"https": false,
"mx_has_protocol_sslv3": false,
"same_content_via_https": true,
"tracker_requests": [],
"google_analytics_present": false,
"third_parties_count": 0,
"mx_cert_trusted_reason": "",
"final_url": "http://www.paintrials.com/",
"mx_has_protocol_tls1_3": false,
"web_has_hsts_preload_header": false,
"web_cert_trusted_reason": "certificate does not match supplied URI (same w/o SNI)",
"requests": [
{
"headers": null,
"method": null,
"referrer": null,
"url": "http://www.paintrials.com/"
},
{
"headers": null,
"method": null,
"referrer": null,
"url": "https://www.cassavasciences.com/"
}
],
"web_has_protocol_sslv3": false,
"mx_vulnerabilities": {
"lucky13": {
"cve": "CVE-2013-0169",
"severity": "LOW",
"finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
}
},
"mx_cert_trusted": true,
"web_has_protocol_tls1_2": true,
"web_has_protocol_tls1": true,
"profilecookies": [],
"cname_records": [],
"success": true,
"cookie_stats": {
"first_party_flash": 0,
"first_party_long": 0,
"third_party_track_domains": [],
"third_party_track_uniq": 0,
"first_party_short": 0,
"third_party_long": 0,
"third_party_short": 0,
"third_party_track": 0,
"third_party_flash": 0
},
"mx_locations": [
"United States"
],
"web_has_protocol_tls1_3": false,
"cookies_count": 0,
"third_party_requests_count": 0,
"web_pfs": true,
"leaks": [],
"web_has_protocol_tls1_1": true,
"web_has_hsts_preload": false,
"reachable": true,
"a_records": [
"66.96.161.161"
],
"a_records_reverse": [
[
"161.161.96.66.static.eigbox.net"
]
],
"mx_a_records": [
[
10,
[
"52.101.41.4",
"52.101.42.13",
"52.101.9.0",
"52.101.42.4",
"52.101.40.6",
"52.101.9.5",
"52.101.42.9"
]
]
],
"responses": null,
"mx_has_protocol_tls1_1": false,
"final_https_url": "https://www.paintrials.com/"
}