hiclyde.com

.com crawl

First seen 2026-04-16 · Last seen 2026-05-07 · ok HTTP/1.1 200 2210 ms crawled 2026-05-11

US · 34.200.28.195 · AS14618 Amazon.com, Inc.

Reputation 75/100 wrong cert

Classifying

HTML metadata

Title
Clyde
Language
en

Technology

CMS
Gatsby
Analytics
  • Google Tag Manager
Third-party hosts loaded (7)
  • cdnjs.cloudflare.com×2
  • apis.google.com×1
  • cdn.plaid.com×1
  • clyde-static-files.s3.us-east-1.amazonaws.com×1
  • js.stripe.com×1
  • maxcdn.bootstrapcdn.com×1
  • www.googletagmanager.com×1

Registration

Registrar
Amazon Registrar, Inc.
Created
2017-12-27
Expires
2026-12-27 221 days left
Updated
2025-08-27
Name servers
  • ns-1360.awsdns-42.org
  • ns-2015.awsdns-59.co.uk
  • ns-265.awsdns-33.com
  • ns-943.awsdns-53.net

DNS records live

NS
  • ns-1360.awsdns-42.org
  • ns-2015.awsdns-59.co.uk
  • ns-265.awsdns-33.com
  • ns-943.awsdns-53.net
MX
  • 1 aspmx.l.google.com
  • 10 alt3.aspmx.l.google.com
  • 10 alt4.aspmx.l.google.com
  • 5 alt1.aspmx.l.google.com
  • 5 alt2.aspmx.l.google.com
TXT
  • google-site-verification=XavYSYiUurHt7kbfwLp9fXzI0HF-NWvDRnl0vvzhwG0

Email authentication strong

SPF
v=spf1 include:_spf.google.com ip4:149.72.243.224 include:mail.zendesk.com ~all
softfail (~all)
DMARC
v=DMARC1; p=quarantine; rua=ipm375d@ar.glockapps.com,mailto:dmarcaggregate@joinclyde.com; ruf=ipm375d@fr.glockapps.com,mailto:dmarcforensic@joinclyde.com; adkim=s; fo=1; pct=5;
policy: quarantine · pct=5
DKIM
  • s1: k=rsa; t=s; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAzKx5xIQQYmKbQT5/bdHrvF04epORm07fkbOqwUZuByXjUj17Wp7mWYirx5zMZPym79ergjC6OtBBHYTl8R…
  • s2: k=rsa; t=s; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCr1gLoU/Pc/ALV48MRNmE82+HnX9dF9wQf4mJ32LjNBTi4COngEwqCdssgepiNXTnoZ8EY3NTBSzN4A5hWw6Dgtl…
selectors probed

Certificate (current) wrong cert

Kubernetes Ingress Controller Fake Certificate
from 2026-05-08 to 2027-05-08
Expires in 354 days

HTTP security headers

Header hygiene 85/100 Checked live page: https://www.hiclyde.com

present
  • strict-transport-security
  • content-security-policy
  • x-frame-options
  • x-content-type-options
  • referrer-policy
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • missing Permissions Policy
Header values
referrer-policy
no-referrer
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
content-security-policy
img-src * data:;script-src 'unsafe-inline' *;default-src *;base-uri 'self';block-all-mixed-content;font-src 'self' https: data:;frame-ancestors 'self';object-src 'none';script-src-attr 'none';style-src 'self' https: 'unsafe-inline';upgrade-insecure-requests
strict-transport-security
max-age=31536000; includeSubDomains

Linked from (1)