Note: This is not a stable API during the beta. Providing highlighted JSON instead of raw JSON data is therefore intentional.
{
"web_has_hsts_header": false,
"mx_a_records_reverse": [
[
5,
[
[
"static.90.4.13.49.clients.your-server.de"
],
[
"mail2.h-email.net"
],
[
"mail.h-email.net"
],
[
"mail.h-email.net"
],
[
"static.116.164.55.162.clients.your-server.de"
],
[
"static.135.194.161.5.clients.your-server.de"
],
[
"mail.h-email.net"
],
[
"mail.h-email.net"
],
[
"static.206.214.107.91.clients.your-server.de"
],
[
"mail3.h-email.net"
]
]
],
[
5,
[
[
"mail.h-email.net"
],
[
"static.90.4.13.49.clients.your-server.de"
],
[
"mail.h-email.net"
],
[
"static.206.214.107.91.clients.your-server.de"
],
[
"mail2.h-email.net"
],
[
"mail.h-email.net"
],
[
"mail.h-email.net"
],
[
"static.116.164.55.162.clients.your-server.de"
],
[
"mail3.h-email.net"
],
[
"static.135.194.161.5.clients.your-server.de"
]
]
]
],
"final_url_is_https": false,
"final_url": "http://www.sapvalue.ru/about",
"mx_a_records": [
[
5,
[
"49.13.4.90",
"165.227.159.144",
"178.62.199.248",
"5.75.171.74",
"162.55.164.116",
"5.161.194.135",
"167.235.143.33",
"5.161.98.212",
"91.107.214.206",
"165.227.156.49"
]
],
[
5,
[
"5.161.98.212",
"49.13.4.90",
"178.62.199.248",
"91.107.214.206",
"165.227.159.144",
"5.75.171.74",
"167.235.143.33",
"162.55.164.116",
"165.227.156.49",
"5.161.194.135"
]
]
],
"web_ciphers": {
"std_HIGH": {
"severity": "MEDIUM",
"finding": "High encryption (AES+Camellia, no AEAD) not offered"
}
},
"final_https_url": "https://www.sapvalue.ru/about",
"web_has_protocol_sslv3": false,
"web_cert_trusted": false,
"a_locations": [
"Germany"
],
"web_has_hpkp_header": false,
"mx_records": [
[
5,
"mail.h-email.net"
],
[
5,
"mail.h-email.net"
]
],
"web_has_protocol_tls1": true,
"web_has_hsts_preload_header": false,
"cname_records": [],
"web_has_ssl": true,
"web_cert_trusted_reason": "All certificate trust checks failed: (chain incomplete).",
"mx_locations": [
"Germany",
"United States",
"Netherlands",
"Iran"
],
"web_vulnerabilities": {
"breach": {
"cve": "CVE-2013-3587",
"severity": "HIGH",
"finding": "BREACH: potentially VULNERABLE, uses gzip HTTP compression. - only supplied '/' tested ( Can be ignored for static pages or if no secrets in the page)"
},
"beast": {
"cve": "CVE-2011-3389",
"severity": "LOW",
"finding": "BEAST: VULNERABLE -- but also supports higher protocols (possible mitigation): TLSv1.2"
},
"lucky13": {
"cve": "CVE-2013-0169",
"severity": "LOW",
"finding": "potentially vulnerable to LUCKY13, uses cipher block chaining (CBC) ciphers with TLS. Check patches"
},
"cbc_tls1": {
"cve": "CVE-2011-3389",
"severity": "MEDIUM",
"finding": "BEAST: CBC ciphers for TLS1: ECDHE-RSA-AES128-SHA AES128-SHA"
}
},
"a_records_reverse": [
[]
],
"web_pfs": true,
"leaks": [],
"web_has_protocol_tls1_1": true,
"web_has_hsts_preload": false,
"reachable": true,
"a_records": [
"185.53.177.52"
],
"web_ssl_finished": true,
"web_has_protocol_tls1_2": true,
"same_content_via_https": true
}