localcan.com

.com crawl

First seen 2026-05-03 · Last seen 2026-05-10 · ok HTTP/1.1 200 1229 ms crawled 2026-05-10

NL · 159.223.213.74 · AS14061 DigitalOcean, LLC

Reputation 100/100

sector tech type homepage

HTML metadata

Title
LocalCan™ - Local domains and persistent Public URLs
Description
LocalCan™ for macOS and Windows is a powerful Ngrok alternative, allowing developers to build and test apps with .local domains and secure persistent Public URLs.
Language
en
Canonical
https://www.localcan.com

Open Graph

title
LocalCan™ - Local domains and persistent Public URLs
site name
LocalCan™ - Local domains and persistent Public URLs
description
LocalCan™ for macOS and Windows is a powerful Ngrok alternative, allowing developers to build and test apps with .local domains and secure persistent Public URLs.

Technology

Server
nginx
CMS
Next.js

Third-party hosts loaded (1)

  • umami.journal.do×1

Social

Registration

Registrar
OVH sas
Created
2023-04-29
Expires
2030-04-29 1441 days left
Updated
2025-04-08
Name servers
  • ns1.digitalocean.com
  • ns2.digitalocean.com
  • ns3.digitalocean.com

DNS records live

NS
  • ns1.digitalocean.com
  • ns2.digitalocean.com
  • ns3.digitalocean.com
MX
  • 10 mx.zoho.eu
  • 20 mx2.zoho.eu
  • 50 mx3.zoho.eu
TXT
  • zoho-verification=zb29657771.zmverify.zoho.eu
  • google-site-verification=bv6psEIq5gIsYk1VIqdLvxR5LBnmZ3-PaHwVzNDwfZE
  • google-site-verification=rKegZeaHd9_cc8z9wF3WhnuELIfsTaJUShKrMQ7gGZA

Email authentication strong

SPF
v=spf1 include:zohomail.eu ~all
softfail (~all)
DMARC
v=DMARC1; p=reject;
policy: reject (enforced)
DKIM
  • google: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAlb4Xogb+Vb8lM5c/QFH3K4/t8hiaRxAdQBtDM5NABLhpXJp9EG98aRWs225v0kYRHkfKikhx6UCO3A…
selectors probed

Certificate (current)

E7
from 2026-04-20 to 2026-07-19
Expires in 61 days

HTTP security headers

Header hygiene 65/100 Checked live page: https://www.localcan.com/

present
  • content-security-policy
  • x-frame-options
  • x-content-type-options
  • referrer-policy
findings
  • missing HSTS
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • missing Permissions Policy
Header values
referrer-policy
no-referrer-when-downgrade
x-frame-options
SAMEORIGIN
x-content-type-options
nosniff
content-security-policy
default-src * data: 'unsafe-eval' 'unsafe-inline'

Links to (13)

Linked from (1)