cauxseine.fr
HTML metadata
Technology
- Server
- o2switch-PowerBoost-v3
- CMS
- WordPress
- Fonts
-
- Google Fonts
Third-party hosts loaded (6)
- fonts.googleapis.com×5
- cauxseine.matomo.novacity.fr×1
- code.jquery.com×1
- fonts.gstatic.com×1
- gmpg.org×1
- maxcdn.bootstrapcdn.com×1
Social
Contact
- Phone
Registration
- Registrar
- OVH
- Created
- 2007-10-12
- Expires
- 2026-12-15 208 days left
- Updated
- 2026-01-31
- Name servers
-
- dns10.ovh.net
- ns10.ovh.net
DNS records live
- NS
-
- dns10.ovh.net
- ns10.ovh.net
- MX
-
- 0 cauxseine-fr.mail.protection.outlook.com
- TXT
-
Show 4 TXT records
MS=5327CEEA9002954E70DACB4A26D5B01AF3BAB639ppe-01dfb43abaa0c7e30b84NuM0wDWclu1Ze1/iikeBbwysS/tCpWvEZJ1oLqOytZHBGAXaxEOBFplO+DV0S+5H9Q4LLtUZYqHd11uV7bCuXw==aquaray-ownership-verification=d9d6fbc85d1d1d0dbad72d4d17d41f7c
- Verified for
-
- Brevo
- Microsoft 365
Email authentication strong
- SPF
-
v=spf1 a mx a:smtp-out.acheteza.fr ip4:213.32.80.74 ip4:84.55.139.117 ip4:185.41.28.6 include:spf.brevo.com include:spf.protection.outlook.com include:spf.emailsignatures365.com include:spf-westeu.emailsignatures365.com include:_spf.o2switch.inovawork.net -allstrict (-all) - DMARC
-
v=DMARC1; p=reject;rua=mailto:webmaster@cauxseine.fr,mailto:rua@dmarc.brevo.com;ruf=mailto:webmaster@cauxseine.frpolicy: reject (enforced) - DKIM
-
- default:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA3sd3y5c+Jd7lpsqGh9j+2Pd8PQ59seVsFDFSIj6oSBhZygLj1Kx5HVND/jy3y/jF1/URSyGDHAOCcq… - selector1:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAuhqgoMgg0tzLYSmLKQxneyCwO1suVSQwG/YWEttgyM9adgzZnQMmQc317u8+lA8LGfy7t+Qg0/x6S0… - mail:
k=rsa;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDeMVIzrCa3T14JsNY0IRv5/2V1/v2itlviLQBwXsa7shBD6TrBkswsFUToPyMRWC9tbR/5ey0nRBH0ZVxp+lsmTxid2Y2z…
selectors probed - default:
Certificate (current)
R13
Expires in 48 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-frame-options
- x-content-type-options
- referrer-policy
- permissions-policy
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
Header values
- referrer-policy
strict-origin-when-cross-origin- x-frame-options
SAMEORIGIN- permissions-policy
fullscreen=*, geolocation=*, camera=*, microphone=*, display-capture=*- x-content-type-options
nosniff- content-security-policy
default-src * https: data: 'unsafe-inline' 'unsafe-eval';- strict-transport-security
max-age=31536000; includeSubDomains; preload