grupolomas.com
HTML metadata
Technology
- CDN
- Cloudflare
- CMS
- WordPress
Third-party hosts loaded (4)
- ajax.aspnetcdn.com×2
- builder-assets.unbounce.com×2
- cdnjs.cloudflare.com×1
- challenges.cloudflare.com×1
Registration
- Registrar
- PDR Ltd. d/b/a PublicDomainRegistry.com
- Created
- 2005-01-06
- Expires
- 2027-01-06 230 days left
- Updated
- 2026-01-06
- Name servers
-
- ns-cloud-b1.googledomains.com
- ns-cloud-b2.googledomains.com
- ns-cloud-b3.googledomains.com
- ns-cloud-b4.googledomains.com
DNS records live
- NS
-
- ns-cloud-b1.googledomains.com
- ns-cloud-b2.googledomains.com
- ns-cloud-b3.googledomains.com
- ns-cloud-b4.googledomains.com
- MX
-
- 0 grupolomas-com.mail.protection.outlook.com
- TXT
-
duo_sso_verification=dqBG4QWX7Pu7Ard9xAtvCPbQ7iZvw9NxZXuQ9zFkSSCOD8qZm5jo7s4r4V7c4rVilogmein-verification-code=a23c7051-7dfa-4c84-86d6-acb1536f9346
- Verified for
-
- Cisco
- Microsoft 365
Email authentication strong
- SPF
-
v=spf1 include:_spf.google.com include:spf-us.emailsignatures365.com include:spf.protection.outlook.com include:servers.mcsv.net include:_spf.salesforce.com include:emailus.freshservice.com ~allsoftfail (~all) - DMARC
-
v=DMARC1; p=quarantine; rua=mailto:dmarc-rua@grupolomas.com; ruf=mailto:dmarc-ruf@grupolomas.com; pct=100; fo=0:1:d:s;policy: quarantine - DKIM
-
Show 4 DKIM selectors
- google:
v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCA5xa6iW76ccepZ2iChecYQ+xSgiqi5j4CyGYrPauHRB1r9i/hfxXE9blKnAEGJGAGrMjqUsS4kAREVg6gCu… - selector1:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2fssP1r9yvHlZ0fzmcCj7+kP4JFaRcqjmRWHWkLgJspkFPDpfD6EGqreRtGplw1ch2KwvDNEaVHQRa… - selector2:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAtd+F8MhdhiD32BKKPpmZ7euuEBfKI2/7QObQxQVx1yvQ/gcnBFI0x/tgSO4CVuvH6ADYXvJEcJQV7s… - k2:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2aC2KjGKLOwTweBY5A9RpjsxaBXR9r7OAU6U8/zn92ivImI75naUujWbItRI/QmL1jy5PWGqLwoUA…
selectors probed - google:
Certificate (current)
GeoTrust TLS RSA CA G1
Expires in 138 days
HTTP security headers
- present
-
- content-security-policy
- x-content-type-options
- referrer-policy
- findings
-
- missing HSTS
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
- missing frame protection
- missing Permissions Policy
Header values
- referrer-policy
strict-origin-when-cross-origin- x-content-type-options
nosniff- content-security-policy
default-src * data: blob: 'unsafe-inline' 'unsafe-eval'