diosna.de

.de crawl

First seen 2026-04-13 · Last seen 2026-05-07 · ok HTTP/1.1 200 1804 ms crawled 2026-05-07

DE · 185.166.22.172 · AS15817 Mittwald CM Service GmbH & Co. KG

Reputation 100/100

Classifying

HTML metadata

Title
DE: Home
Language
de-DE
Generator
TYPO3 CMS
Canonical
https://www.diosna.de/
Translations
  • de-de
  • en-gb

Technology

Server
Apache
Cookie consent
  • Cookiebot

Third-party hosts loaded (2)

  • consent.cookiebot.com×1
  • www.diosna.com×1

Social

Contact

Phone
Address
DIOSNA Dierks & Söhne GmbHAm Tie 2349086 Osnabrück, GermanyTel.+49 541 33104 0info@diosna.com

Registration

Updated
2018-03-13
Name servers
  • ans0.ewetel.de.
  • ans1.ewetel.net.
  • ans2.ewetel.de.
  • ans3.ewetel.net.

DNS records live

NS
  • ans0.ewetel.de
  • ans1.ewetel.net
  • ans2.ewetel.de
  • ans3.ewetel.net
MX
  • 10 mxa-0019c401.gslb.pphosted.com
  • 10 mxb-0019c401.gslb.pphosted.com
TXT
Show 7 TXT records
  • MS=ms43253293
  • knowbe4-site-verification=6cb885db43bf9f062323b8341c4517f8
  • cTwruRXZKcaHYl8EdnW+breWXyHxevhSUFHhHX0s00TvruuSUq87+RnFJOmTQYBOTTB+NQS0YR3xFu25YTbM8w==
  • MS=ms78203910
  • MS=2F17943B5E10C6085C12A4694FCF01BA4AB4B20E
  • docusign=3317deb2-c603-4a78-a1de-8ab843427f9e
  • pardot947442=9c3171401a38b5bd98a5ec3ebf2a6f7acdb59c0afd06e06f5339c757119f1789

Email authentication strong

SPF
v=spf1 include:%{i}._ip.%{h}._ehlo.%{d}._spf.vali.email ~all
softfail (~all)
DMARC
v=DMARC1; p=quarantine; pct=100; adkim=s; aspf=s; rua=mailto:dmarc_agg@vali.email,mailto:dmarc-report@diosna.de; ruf=mailto:dmarc-report@diosna.de; fo=1; rf=afrf
policy: quarantine
DKIM
  • s2: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1GiZcFh7i1BI0NGHDnjCipIMyonZUgNMhJPJAymHx6yQZ7yLRd988bwU99uQjs0YXy1f1yVtRuchH7…
selectors probed

Certificate (current)

R13
from 2026-04-03 to 2026-07-02
Expires in 44 days

HTTP security headers

Header hygiene 80/100 Checked live page: https://www.diosna.de/

present
  • strict-transport-security
  • content-security-policy
  • x-frame-options
  • x-content-type-options
  • referrer-policy
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • weak content type protection
  • missing Permissions Policy
Header values
referrer-policy
strict-origin-when-cross-origin
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff, nosniff
content-security-policy
default-src 'self';style-src 'self' 'unsafe-inline' https://fonts.googleapis.com ; img-src 'self' https://maps.googleapis.com https://maps.gstatic.com/ https://www.google.de https://googleads.g.doubleclick.net https://www.google.com data: https://px.ads.linkedin.com https://imgsct.cookiebot.com https://www.linkedin.com; object-src 'self' data:; frame-src 'self' https://consentcdn.cookiebot.com https://www.diosna.com https://td.doubleclick.net/ mailto: tel: *.youtube.com *.youtube-nocookie.com; script-src 'self' 'unsafe-inline' https://px.ads.linkedin.com https://snap.licdn.com https://imgsct.cookiebot.com https://maps.googleapis.com https://consent.cookiebot.com https://googleads.g.doubleclick.net https://consentcdn.cookiebot.com https://www.google-analytics.com/analytics.js https://www.googletagmanager.com; connect-src 'self' https://consen
strict-transport-security
max-age=31536000; includeSubdomains

Links to (5)

Linked from (2)