aldi.be

.be crawl

First seen 2026-05-11 · Last seen 2026-05-18 · ok HTTP/1.1 200 7301 ms crawled 2026-05-16

US · 13.33.235.128 · AS16509 Amazon.com, Inc.

Reputation 100/100

Classifying

Technology

CDN
Amazon CloudFront
Server
Apache

DNS records live

NS
  • ns-1025.awsdns-00.org
  • ns-1728.awsdns-24.co.uk
  • ns-458.awsdns-57.com
  • ns-832.awsdns-40.net
MX
  • 10 aldi-be.mail.protection.outlook.com
TXT
  • swisssign-check=JOPPY_68hPLTsCinVVQVUpoEe58
  • tPl2Ac4A4uSu5/QXs5x01m3zJSN192A3vwT0mcx6zAPHrI/mp5HngHROKFj0WWVemzBYUssa9ce1UMXqZzaODg==
  • 7h08k5sqy6ztxhdd7jd7rv73my0jvp68
Verified for
  • Miro

Email authentication strong

SPF
v=spf1 ip4:18.196.215.67 ip4:20.40.137.116/30 ip4:20.40.137.120/29 ip4:20.61.145.119 ip4:20.224.168.48 ip4:46.183.45.192/27 ip4:185.149.52.31 ip4:185.149.52.57 ip4:185.149.52.58 ip4:185.149.52.66 ip4:185.149.52.70 include:spf.servicemail24.de include:_spf.salesforce.com include:spf.mandrillapp.com include:essprod0.templafy-ess.com include:spf.protection.outlook.com ~all
softfail (~all)
DMARC
v=DMARC1; p=quarantine; sp=quarantine; rua=mailto:dmarc-rua@aldi-nord.de; pct=100; ri=86400
policy: quarantine · sp=quarantine
DKIM
Show 4 DKIM selectors
  • selector1: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnJtjbkJ6EbSx+P28jgOycBjYvbm0z9i7uR8B8eRj9lw4cVPAukSBiwuZ7wf3rMIg0tR3x/qrK7EGij…
  • selector2: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAw3V8zXasldY8zHN1UDKiSZRmYXUrRrVcfYHXTqTXKUJASMDKAfHtL5jRQQe2oaOEftVKXHYf638IUj…
  • s1: k=rsa; t=s; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA6848BptQYK7nWODFZNq7h50LxMX3fGpSHzHS0lBaZGBS89rXH89BB2C3EIzBPOTLjGVP6ZGylY727JoCAr…
  • s2: k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDElXy+S21iMvjNULpuYBZd5q6RmjUR1hU9mfz+5W0xqxkZYZDS8PmSJ8ube8b2xw5evoHA99ZdOey7A4bFQUxke4…
selectors probed

Certificate (current)

Thawte TLS RSA CA G1
from 2026-03-05 to 2026-09-20
Expires in 122 days

HTTP security headers

Header hygiene 70/100 Checked live page: https://www.aldi.be/

present
  • strict-transport-security
  • content-security-policy
  • x-content-type-options
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • missing frame protection
  • missing Referrer Policy
  • missing Permissions Policy
Header values
x-content-type-options
nosniff
content-security-policy
frame-ancestors 'self' folder.aldi.be experience.adobe.com aldinord.experiencecloud.adobe.com; default-src * 'unsafe-eval' 'unsafe-inline' data: blob:
strict-transport-security
max-age=31536000

Linked from (2)