hotelspecials.nl
HTML metadata
Technology
- CDN
- Amazon CloudFront
- Analytics
-
- Google Analytics
- Google Tag Manager
- Hotjar
- Ads
-
- Google Ads (DoubleClick)
- Fonts
-
- Google Fonts
Third-party hosts loaded (22)
- fonts.googleapis.com×3
- www.googletagmanager.com×3
- bat.bing.com×2
- d1fc8wv8zag5ca.cloudfront.net×2
- googleads.g.doubleclick.net×2
- hotelspecials.emsecure.net×2
- script.hotjar.com×2
- static.hotjar.com×2
- vars.hotjar.com×2
- vc.hotjar.io×2
- widget.trustpilot.com×2
- www.facebook.com×2
- www.google-analytics.com×2
- www.google.com×2
- www.google.ie×2
- fonts.gstatic.com×1
- www.hotelspecials.at×1
- www.hotelspecials.be×1
- www.hotelspecials.de×1
- www.hotelspecials.dk×1
- www.hotelspecials.no×1
- www.hotelspecials.se×1
Social
Registration
- Registrar
- team.blue nl B.V.
- Created
- 2002-03-07
- Updated
- 2021-03-28
- Name servers
-
- ns-1094.awsdns-08.org
- ns-1011.awsdns-62.net
- ns-1624.awsdns-11.co.uk
- ns-106.awsdns-13.com
DNS records live
- NS
-
- ns-1011.awsdns-62.net
- ns-106.awsdns-13.com
- ns-1094.awsdns-08.org
- ns-1624.awsdns-11.co.uk
- MX
-
- 0 hotelspecials-nl.mail.protection.outlook.com
- Verified for
-
- Atlassian
- DocuSign
- Microsoft 365
Email authentication partial
- SPF
-
v=spf1 include:spf.mandrillapp.com include:spf.flowmailer.net include:spf.protection.outlook.com include:mailgun.org -allstrict (-all) - DMARC
-
v=DMARC1; p=none; rua=mailto:dmarc@bookerzzz.uriports.com; ruf=mailto:dmarc@bookerzzz.uriports.com; fo=1:d:spolicy: none (monitoring only) - DKIM
-
- k1:
k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDbNrX2cY/GUKIFx2G/1I00ftdAj713WP9AQ1xir85i89sA2guU0ta4UX1Xzm06XIU6iBP41VwmPwBGRNofhBVR+e6WHUo… - s1:
k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDSRiDFhFadTf+byZqSEK+cEgbwmZr38rXgqbpCrxROXdgAZiHGJhnxPm/1oianqYg+dKVxklcBMOktScQJaQx7zh9o8U2…
selectors probed - k1:
Certificate (current)
Amazon RSA 2048 M01
Expires in 169 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-frame-options
- x-content-type-options
- referrer-policy
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
- missing Permissions Policy
Header values
- referrer-policy
no-referrer- x-frame-options
SAMEORIGIN- x-content-type-options
nosniff- content-security-policy
default-src data: 'self' https: https://*.hotjar.com https://*.hotjar.io wss://*.hotjar.com; script-src 'self' https: 'unsafe-inline' 'unsafe-eval'; style-src 'self' https: 'unsafe-inline'- strict-transport-security
max-age=31536000; includeSubDomains