JSON result object for "http://www.it-sicherheit-bayern.de/"

Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.

{
  "mx_locations": [
    "Germany"
  ],
  "web_has_protocol_tls1_3": false,
  "reachable": true,
  "requests_count": 161,
  "requests": [
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "http://www.it-sicherheit-bayern.de/"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/mlg64v00/8ecw6.css"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.googleapis.com/css?family=Open+Sans%3A300italic%2C400italic%2C600italic%2C700italic%2C800italic%2C400%2C800%2C700%2C600%2C300&ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/o7d78a0/8ecw5.css"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.googleapis.com/css?family=Open+Sans:400,100,200,300,500,600,700,800,900&subset"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.googleapis.com/css?family=Raleway:400,100,200,300,500,600,700,800,900&subset"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/mk2hf4w8/8ecw5.css"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/1gg9xtzo/8ecw6.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/7j6ex1bp/9qpdj.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/d6ksdks/8ecw6.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/79ttdd6c/8ecw6.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/cxwcl6w/8ecw6.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/it_security_bav_4c-1.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2019/03/Bild-Header-Neui.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/08/up18atit-sa-520x337.jpeg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-4.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Logo_2018.jpeg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-dark.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/3.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-hres-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/logo_bits-and-bytes_01.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/Corinna_Goering_Logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/hsasec_logo-02-300x70.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Image-Enhancement-Labels-Prepress-workflow.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/weg-unternehmen-15-newcotec.gif"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-65px.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/07/Logo-ibi-research-1.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/mitsm_logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/MBtech.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Lohi-Signet.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-5.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/externer-datenschutzbeauftragter-iitr.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/images.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/itago_logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/pc_logo-claim-RGB-richtige-gr%C3%B6%C3%9Fe.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/meierc-logo-17.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/davidit_logo_rgb.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/human_risk_consulting_logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-2-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/dexevo-logo-color-300.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-cd36bda6c609c67ce7cab4412f277190.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/IHK_M%C3%BCnchen_Obb_LOGO_NEU.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/Bugl_Kollegen-Logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/OTH_Logo_ITZ-02.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Koramis-Logo_weiss.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-2.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/avl-logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-4.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/valeologo2016.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/ausecus-Logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-sws-computersysteme.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-1-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/aisec_190x52.gif"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Turban_Logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-3.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo_secureconsult_top.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/blaschke-logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/IHK_Logo-216x108-data.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo_roedl.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/is-revision.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/atarax-Logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/2.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/thd_403x70.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/07/LOGO-CERTUS-SOFTWARE-TM.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-2.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/Bechtle-Logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/applied-intelligence-Logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-2-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/BSP-logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-2.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/pslp_logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-nesec.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/gogu_logo_weiss.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/csm_Logo_Forsec_f7939af17b.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/apsec-Logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/peg_logo-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/08836b_8f24dce5850b4510b851e7ae1dc89e1b.gif"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-6.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-5.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/insys-icom-logo-de.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/csm_Logo_INFODAS_CLAIM_CMYK_121212_4dda37d9f6.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-2.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-3.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/eSourceOne-logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/FH_Wuerzburg_Schweinfurt_Logo.svg_.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-white.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/cropped-cropped-Logo_trans-1-1.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/mabunta-logo_neu.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo_40_jahre.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/las3_logo_full.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-1-1.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/car-Logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/logo-fau.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Dallmeier_Logo_top-mittel.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/omnis_400_150.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/psw-logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/flytechLogo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/454263-1024x143.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/ondeso_logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/04/aitiraum-Logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/dats_logo_sm-1.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/oth-regensburg-logo-mobile.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/LOGO_DocSetMinder.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/humhub_logo.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/rscs-logo.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2018/06/Download-7.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/uploads/2019/05/cl_label_silber-768x300.jpg"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/cache/wpfc-minified/1cfqrcac/8ecw5.css"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/framework/aqua/assets/javascripts/aqpb-view.js?ver=1590560639"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/underscore.min.js?ver=1.8.3"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/comment-reply.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/dist/vendor/wp-polyfill.min.js?ver=7.4.4"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/dist/i18n.min.js?ver=cced130522e86c87a37cd7b8397b882c"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/dist/vendor/lodash.min.js?ver=4.17.15"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/dist/url.min.js?ver=b7106409bea2c78aabddc45249f7c1fc"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/event-espresso-decaf/assets/dist/eejs-core.b7a939d385c911459c5b.dist.js?ver=b7a939d385c911459c5b0ba49ca3491e"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/event-espresso-decaf/assets/dist/eventespresso-core-blocks-frontend.783378f881f18e2f83a2.dist.js?ver=783378f881f18e2f83a250b42000cf33"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.9"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/table-of-contents-plus/front.min.js?ver=2002"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/framework/bootstrap1200/js/bootstrap.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/eslider/jquery.eislideshow.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.fitvids.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.ticker.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/flexslider/jquery.flexslider-min.js?ver=6.540"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.easing.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/owl-carousel/owl.carousel.min.js?ver=6.540"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/prettyphoto/js/jquery.prettyPhoto.js?ver=3.1.6"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.mousewheel.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.mobile-1.4.5.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.jcarousel.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.transit.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/jquery.ba-throttle-debounce.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/component.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/isotope/jquery.isotope.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/tweets/jquery.tweet.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/imagesloaded.pkgd.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/js/asalah.js?ver=6.540"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-includes/js/wp-embed.min.js?ver=5.4.1"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/js_composer/assets/js/dist/js_composer_front.min.js?ver=6.2.0"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.google-analytics.com/analytics.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/mem8YaGs126MiZpBA-UFVZ0b.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/img/bottom_shadow1200.png"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/raleway/v14/1Ptrg8zYS_SKggPNwPIsWqZPAA.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/raleway/v14/1Ptrg8zYS_SKggPNwJYtWqZPAA.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN7rgOUuhp.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/mem6YaGs126MiZpBA-UFUK0Zdc0.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/memnYaGs126MiZpBA-UFUKWiUNhrIqM.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/themes/bostan/framework/fontello/font/fontello.woff?51253260"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/raleway/v14/1Ptug8zYS_SKggPNyC0ITw.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://ssl.google-analytics.com/ga.js"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UNirkOUuhp.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.google-analytics.com/r/collect?v=1&_v=j82&aip=1&a=491049199&t=pageview&_s=1&dl=https%3A%2F%2Fwww.it-sicherheitscluster.de%2F&ul=en-us&de=UTF-8&dt=Startseite%20-%20IT-Sicherheitscluster%20e.V.&sd=24-bit&sr=1920x1080&vp=1912x1080&je=0&_u=YEBAAUABC~&jid=1044615705&gjid=418419442&cid=1645968513.1590566421&tid=UA-116575184-1&_gid=30295957.1590566421&_r=1&z=1120732633"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://www.it-sicherheitscluster.de/wp-content/plugins/js_composer/assets/lib/bower/font-awesome/webfonts/fa-solid-900.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://fonts.gstatic.com/s/opensans/v17/mem5YaGs126MiZpBA-UN_r8OUuhp.woff2"
    },
    {
      "headers": null,
      "referrer": null,
      "method": null,
      "url": "https://ssl.google-analytics.com/r/__utm.gif?utmwv=5.7.2&utms=1&utmn=653301071&utmhn=www.it-sicherheitscluster.de&utmcs=UTF-8&utmsr=1920x1080&utmvp=1912x1080&utmsc=24-bit&utmul=en-us&utmje=0&utmfl=-&utmdt=Startseite%20-%20IT-Sicherheitscluster%20e.V.&utmhid=491049199&utmr=-&utmp=%2F&utmht=1590566421120&utmac=UA-116575184-1&utmcc=__utma%3D101171289.1645968513.1590566421.1590566421.1590566421.1%3B%2B__utmz%3D101171289.1590566421.1.1.utmcsr%3D(direct)%7Cutmccn%3D(direct)%7Cutmcmd%3D(none)%3B&utmjid=1899724777&utmredir=1&utmu=qAAAAAAAAAAAAAAAAAABAAAE~"
    }
  ],
  "web_ciphers": {},
  "a_records": [
    "88.198.28.142"
  ],
  "mx_a_records": [
    [
      10,
      [
        "88.198.28.142"
      ]
    ]
  ],
  "leaks": [],
  "web_has_ssl": true,
  "final_url": "https://www.it-sicherheitscluster.de/",
  "google_analytics_anonymizeIP_not_set": 1,
  "a_locations": [
    "Germany"
  ],
  "third_party_requests_count": 16,
  "mx_records": [
    [
      10,
      "mail.it-sicherheit-bayern.de"
    ]
  ],
  "headerchecks": {
    "x-xss-protection": {
      "value": "",
      "status": "MISSING"
    },
    "x-frame-options": {
      "value": "",
      "status": "MISSING"
    },
    "referrer-policy": {
      "value": "",
      "status": "MISSING"
    },
    "x-content-type-options": {
      "value": "",
      "status": "MISSING"
    },
    "content-security-policy": {
      "value": "",
      "status": "MISSING"
    }
  },
  "web_has_hsts_header": false,
  "final_https_url": "https://www.it-sicherheitscluster.de/",
  "web_cert_trusted_reason": "",
  "https": true,
  "third_parties": [
    "fonts.googleapis.com",
    "fonts.gstatic.com",
    "ssl.google-analytics.com",
    "www.google-analytics.com"
  ],
  "profilecookies": [
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "101171289.1.10.1590566421",
      "path": "/",
      "name": "__utmb",
      "expiry": 1590568221,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 1801
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "1",
      "path": "/",
      "name": "__utmt",
      "expiry": 1590567021,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 601
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "101171289.1590566421.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none)",
      "path": "/",
      "name": "__utmz",
      "expiry": 1606334421,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 15768001
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "101171289",
      "path": "/",
      "name": "__utmc",
      "expiry": -1,
      "host": ".it-sicherheitscluster.de",
      "lifetime": -1
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "yes",
      "path": "/",
      "name": "cookielawinfo-checkbox-non-necessary",
      "expiry": 1622102420,
      "host": "www.it-sicherheitscluster.de",
      "lifetime": 31536000
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "GA1.2.1645968513.1590566421",
      "path": "/",
      "name": "_ga",
      "expiry": 1653638420,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 63072000
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "1",
      "path": "/",
      "name": "_gat",
      "expiry": 1590566480,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 60
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "GA1.2.30295957.1590566421",
      "path": "/",
      "name": "_gid",
      "expiry": 1590652820,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 86400
    },
    {
      "baseDomain": "it-sicherheitscluster.de",
      "isSecure": false,
      "isHttpOnly": false,
      "value": "101171289.1645968513.1590566421.1590566421.1590566421.1",
      "path": "/",
      "name": "__utma",
      "expiry": 1653638421,
      "host": ".it-sicherheitscluster.de",
      "lifetime": 63072001
    }
  ],
  "responses": null,
  "web_has_protocol_sslv2": false,
  "google_analytics_present": true,
  "web_has_protocol_tls1_1": true,
  "a_records_reverse": [
    [
      "www423.your-server.de"
    ]
  ],
  "web_pfs": true,
  "third_parties_count": 4,
  "final_url_is_https": true,
  "web_ssl_finished": true,
  "web_vulnerabilities": {
    "beast": {
      "finding": "BEAST: VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.1 TLSv1.2",
      "cve": "CVE-2011-3389",
      "severity": "LOW"
    },
    "breach": {
      "finding": "BREACH: potentially VULNERABLE, uses gzip HTTP compression.  - only supplied '/' tested ( Can be ignored for static pages or if no secrets in the page)",
      "cve": "CVE-2013-3587",
      "severity": "HIGH"
    },
    "cbc_tls1": {
      "finding": "BEAST: CBC ciphers for TLS1: DHE-RSA-AES256-SHA DHE-RSA-CAMELLIA256-SHA ECDHE-RSA-AES256-SHA DHE-RSA-AES128-SHA DHE-RSA-CAMELLIA128-SHA ECDHE-RSA-AES128-SHA AES256-SHA AES128-SHA",
      "cve": "CVE-2011-3389",
      "severity": "MEDIUM"
    },
    "lucky13": {
      "finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches",
      "cve": "CVE-2013-0169",
      "severity": "LOW"
    }
  },
  "web_has_protocol_tls1": true,
  "redirected_to_https": true,
  "cookies_count": 9,
  "flashcookies": [],
  "web_cert_trusted": true,
  "web_has_protocol_tls1_2": true,
  "google_analytics_anonymizeIP_set": 1,
  "cookie_stats": {
    "third_party_short": 5,
    "third_party_flash": 0,
    "third_party_track_uniq": 0,
    "third_party_track": 0,
    "first_party_long": 0,
    "third_party_long": 4,
    "third_party_track_domains": [],
    "first_party_flash": 0,
    "first_party_short": 0
  },
  "mixed_content": false,
  "web_has_hsts_preload_header": false,
  "openwpm_final_url": "https://www.it-sicherheitscluster.de/",
  "success": true,
  "web_has_protocol_sslv3": false,
  "tracker_requests": [
    "ssl.google-analytics.com",
    "www.google-analytics.com"
  ],
  "initial_url": "http://www.it-sicherheit-bayern.de/",
  "web_has_hsts_preload": false,
  "flashcookies_count": null,
  "web_has_hpkp_header": false,
  "mx_a_records_reverse": [
    [
      10,
      [
        [
          "www423.your-server.de"
        ]
      ]
    ]
  ],
  "cname_records": []
}