gillette.de
HTML metadata
Technology
- CDN
- Azure Front Door
- CMS
- Next.js
Third-party hosts loaded (1)
- images.ctfassets.net×14
Social
Registration
- Updated
- 2018-05-07
- Name servers
-
- ns1-02.azure-dns.com.
- ns2-02.azure-dns.net.
- ns3-02.azure-dns.org.
- ns4-02.azure-dns.info.
DNS records live
- NS
-
- ns1-02.azure-dns.com
- ns2-02.azure-dns.net
- ns3-02.azure-dns.org
- ns4-02.azure-dns.info
- MX
-
- 10 mail2.gillette.com
- 20 mail1.gillette.com
- TXT
-
Show 4 TXT records
google-site-verification=H9jWduhz0lawHOxBjWeeXyzrdoHLVyOhWC5ctA4G1gggoogle-site-verification=enuc_--f7UZuYGJh0denaK4TYqc2zP1MsjYBqLtZW0AC5E0-6729-160C-1124-DF76-AD8B-600D-BF81ahrefs-site-verification_b15c32d976bf43cd271d2fb8e0599f1c9b0e6c9709601cf69422a9496e9b5231
Email authentication partial
- SPF
- not published
- DMARC
-
v=DMARC1; p=none; fo=1; ri=3600; rua=mailto:procter-gamble@rua.dmp.cisco.com; ruf=mailto:procter-gamble@ruf.dmp.cisco.compolicy: none (monitoring only) - DKIM
- no key found at common selectors
Certificate (current)
Sectigo Public Server Authentication CA OV R36
Expires in 103 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-frame-options
- x-content-type-options
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
- missing Referrer Policy
- missing Permissions Policy
Header values
- x-frame-options
DENY- x-content-type-options
nosniff- content-security-policy
default-src 'self' https://videos.ctfassets.net/; style-src 'self' 'unsafe-inline' *.pricespider.com *; img-src * 'self' data: https: blob: *.pricespider.com; media-src * 'self' data: https: blob:; script-src https://cdn.rudderlabs.com https://*.rudderstack.com/ * data: *.pricespider.com blob: 'unsafe-inline' 'unsafe-eval'; connect-src * data: blob: 'unsafe-inline'; font-src * data: blob: 'unsafe-inline'; frame-src *;- strict-transport-security
max-age=31536000
Links to (4)
- facebook.com×2
- instagram.com×2
- pg.com×2
- youtube.com×2