JSON result object for "http://netvisual.tv/"

Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.

{
  "mx_cert_trusted_reason": "",
  "redirected_to_https": false,
  "mx_has_protocol_tls1": false,
  "mx_a_records_reverse": [
    [
      20,
      [
        [
          "mail-as9pr07cu00302.inbound.protection.outlook.com"
        ],
        [
          "mail-db3pr0202cu00100.inbound.protection.outlook.com"
        ],
        [
          "mail-am0pr83cu00404.inbound.protection.outlook.com"
        ],
        [
          "mail-du2pr03cu00105.inbound.protection.outlook.com"
        ],
        [
          "mail-db4pr02cu00400.inbound.protection.outlook.com"
        ],
        [
          "mail-as8pr05cu00300.inbound.protection.outlook.com"
        ],
        [
          "mail-am7pr05cu00106.inbound.protection.outlook.com"
        ],
        [
          "mail-db7pr03cu00403.inbound.protection.outlook.com"
        ]
      ]
    ],
    [
      99,
      [
        [
          "z4atvie10scgs101.rtccdn.com"
        ]
      ]
    ]
  ],
  "mx_has_protocol_tls1_2": true,
  "final_url_is_https": false,
  "openwpm_skipped_due_to_not_reachable": true,
  "final_url": "http://netvisual.tv/",
  "mx_pfs": true,
  "mx_has_protocol_tls1_1": false,
  "mx_ciphers": {},
  "unreachable_exception": "Traceback (most recent call last):\n  File \"/opt/privacyscore/privacyscore/test_suites/network.py\", line 126, in test_site\n    wget_final_url, wget_content, http_error = retrieve_url_with_wget(url)\n  File \"/opt/privacyscore/privacyscore/test_suites/network.py\", line 73, in retrieve_url_with_wget\n    raise subprocess.CalledProcessError(proc.returncode, \" \".join(cmd))\nsubprocess.CalledProcessError: Command 'env LC_ALL=C wget --no-verbose http://netvisual.tv/ -O- --no-check-certificate --user-agent=\"Mozilla/5.0 (X11; Linux x86_64; rv:53.0) Gecko/20100101 Firefox/53.0\"' returned non-zero exit status 4\n",
  "requests": [],
  "mx_vulnerabilities": {
    "lucky13": {
      "cve": "CVE-2013-0169",
      "severity": "LOW",
      "finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
    }
  },
  "mx_cert_trusted": true,
  "a_locations": [
    "Austria"
  ],
  "mx_records": [
    [
      20,
      "netvisual-tv.mail.protection.outlook.com"
    ],
    [
      99,
      "mail.rtcnow.com"
    ]
  ],
  "profilecookies": [],
  "cname_records": [],
  "success": false,
  "web_has_ssl": false,
  "web_ssl_finished": true,
  "mx_locations": [
    "Austria",
    "Finland"
  ],
  "mx_has_protocol_tls1_3": false,
  "a_records_reverse": [
    [
      "z4s10101cas.rtccdn.com"
    ]
  ],
  "mx_ssl_finished": true,
  "leaks": [],
  "headerchecks": {},
  "reachable": false,
  "a_records": [
    "62.13.194.10"
  ],
  "mx_has_ssl": true,
  "mx_a_records": [
    [
      20,
      [
        "52.101.73.2",
        "52.101.68.0",
        "52.101.73.4",
        "52.101.68.5",
        "52.101.68.16",
        "52.101.73.24",
        "52.101.73.22",
        "52.101.68.3"
      ]
    ],
    [
      99,
      [
        "62.13.193.52"
      ]
    ]
  ],
  "responses": [],
  "https": false,
  "mx_has_protocol_sslv3": false,
  "mx_has_protocol_sslv2": false
}