iconia.co.jp
HTML metadata
Technology
- CDN
- Amazon CloudFront
- Server
- CloudFront
- CMS
- Next.js
- Analytics
-
- Google Tag Manager
Third-party hosts loaded (4)
- imagedelivery.net×112
- j.wovn.io×1
- mystays-upload-prod.s3.ap-northeast-1.amazonaws.com×1
- www.googletagmanager.com×1
DNS records live
- NS
-
- ns-1292.awsdns-33.org
- ns-176.awsdns-22.com
- ns-2041.awsdns-63.co.uk
- ns-618.awsdns-13.net
- MX
-
- 1 aspmx.l.google.com
- 10 alt3.aspmx.l.google.com
- 10 alt4.aspmx.l.google.com
- 5 alt1.aspmx.l.google.com
- 5 alt2.aspmx.l.google.com
- Verified for
-
Email authentication strong
- SPF
-
v=spf1 include:_spf.google.com include:mail.zendesk.com include:zcsend.net include:spf-bma.mpme.jp include:spf15.gmoserver.jp ~allsoftfail (~all) - DMARC
-
v=DMARC1; p=quarantine; pct=25; rua=mailto:dmarcreports@example.compolicy: quarantine · pct=25 - DKIM
-
- google:
v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCQv3gmrLs+FD24ZVphXEpPJqOD3kkFVFILzWFVRn+pCXyP5xmYHrzYW+z9vQvWPcEDiOUEakxB5jX4cxJJDN…
selectors probed - google:
Certificate (current)
Amazon RSA 2048 M03
Expires in 70 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-content-type-options
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
- missing frame protection
- missing Referrer Policy
- missing Permissions Policy
Header values
- x-content-type-options
nosniff- content-security-policy
default-src 'self'; script-src 'self' https: 'unsafe-inline' 'unsafe-eval'; style-src 'self' https: 'unsafe-inline'; img-src 'self' https: data: blob: imagedelivery.net; font-src 'self' https: data:; connect-src 'self' https:; media-src 'self' https: blob:; frame-src 'self' *.iconia.co.jp localhost:1337 https:; frame-ancestors 'self' *.iconia.co.jp localhost:1337;- strict-transport-security
max-age=31536000; includeSubDomains; preload