Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.
{
"web_has_hsts_header": true,
"mx_a_records_reverse": [
[
10,
[
[
"mail-db3pr0202cu00200.inbound.protection.outlook.com"
],
[
"mail-am9pr04cu00107.inbound.protection.outlook.com"
],
[
"mail-am0pr04cu00500.inbound.protection.outlook.com"
],
[
"mail-am7pr05cu00204.inbound.protection.outlook.com"
],
[
"mail-am3pr04cu00501.inbound.protection.outlook.com"
],
[
"mail-as2pr05cu00100.inbound.protection.outlook.com"
],
[
"mail-db7pr03cu00403.inbound.protection.outlook.com"
],
[
"mail-am0pr83cu00404.inbound.protection.outlook.com"
],
[
"mail-du2pr03cu00105.inbound.protection.outlook.com"
]
]
]
],
"web_has_hsts_header_sufficient_time": true,
"final_url_is_https": true,
"final_url": "https://www.bam.com/en",
"mx_a_records": [
[
10,
[
"52.101.68.32",
"52.101.73.15",
"52.101.73.8",
"52.101.73.28",
"52.101.73.1",
"52.101.73.16",
"52.101.68.3",
"52.101.73.4",
"52.101.68.5"
]
]
],
"web_ciphers": {},
"final_https_url": "https://www.bam.com/en",
"web_has_protocol_sslv3": false,
"web_cert_trusted": true,
"a_locations": [
"United States"
],
"web_has_hpkp_header": false,
"mx_records": [
[
10,
"bam-eu.mail.protection.outlook.com"
]
],
"web_has_protocol_tls1": true,
"web_has_hsts_preload_header": false,
"cname_records": [
"redirects.bam.com"
],
"web_has_ssl": true,
"web_cert_trusted_reason": "",
"mx_locations": [
"Finland"
],
"web_vulnerabilities": {
"sec_client_renego": {
"cve": "CVE-2009-3555",
"severity": "HIGH",
"finding": "Secure Client-Initiated Renegotiation : VULNERABLE, DoS threat"
},
"beast": {
"cve": "CVE-2011-3389",
"severity": "LOW",
"finding": "BEAST: VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2"
},
"fallback_scsv": {
"cve": "",
"severity": "MEDIUM",
"finding": "TLS_FALLBACK_SCSV (RFC 7507) (experimental) : But received non-RFC-compliant 'handshake failure' instead of 'inappropriate fallback'"
},
"LOGJAM_common primes": {
"cve": "CVE-2015-4000",
"severity": "LOW",
"finding": "common prime 'RFC7919/ffdhe2048' detected"
},
"lucky13": {
"cve": "CVE-2013-0169",
"severity": "LOW",
"finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
},
"cbc_tls1": {
"cve": "CVE-2011-3389",
"severity": "MEDIUM",
"finding": "BEAST: CBC ciphers for TLS1: ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-SHA AES128-SHA AES256-SHA CAMELLIA128-SHA CAMELLIA256-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA128-SHA DHE-RSA-CAMELLIA256-SHA"
}
},
"web_has_protocol_tls1_3": false,
"a_records_reverse": [
[
"ec2-18-156-139-5.eu-central-1.compute.amazonaws.com"
]
],
"web_pfs": true,
"leaks": [],
"web_has_protocol_tls1_1": true,
"web_has_hsts_preload": false,
"reachable": true,
"a_records": [
"18.156.139.5"
],
"web_ssl_finished": true,
"web_has_protocol_tls1_2": true
}