mazola.de

.de crawl

First seen 2026-04-20 · Last seen 2026-05-14 · ok HTTP/1.1 200 1425 ms crawled 2026-05-14

DE · 178.16.57.57 · AS15817 Mittwald CM Service GmbH & Co. KG

Reputation 94/100 dmarc monitor-only

sector food type homepage

HTML metadata

Title
Mazola® – Hochwertige Speiseöle seit 1911 - Mazola
Description
Gutes Öl erkennen Sie ganz einfach: am Etikett von Mazola®. Entdecken Sie die ganze Vielfalt hochwertiger Speiseöle zum Verfeinern, Braten und Backen.
Language
de
Generator
Powered by WPBakery Page Builder - drag and drop page builder for WordPress.
Canonical
https://www.mazola.de/
Feeds

Open Graph

url
https://www.mazola.de
title
Mazola® – Hochwertige Speiseöle seit 1911 - Mazola
locale
de_DE
site name
Mazola
description
Gutes Öl erkennen Sie ganz einfach: am Etikett von Mazola®. Entdecken Sie die ganze Vielfalt hochwertiger Speiseöle zum Verfeinern, Braten und Backen.

Technology

Server
Apache
CMS
WordPress
Fonts
  • Google Fonts

Third-party hosts loaded (2)

  • consent.cookiefirst.com×1
  • fonts.googleapis.com×1

Contact

Email

Registration

Updated
2025-08-06
Name servers
  • ns01.agenturserver.co.
  • ns01.agenturserver.de.
  • ns01.agenturserver.it.

DNS records live

NS
  • ns01.agenturserver.co
  • ns01.agenturserver.de
  • ns01.agenturserver.it
MX
  • 10 mailrelay.peterkoelln.de
TXT
  • google-site-verification=uPcrl-bSyTzaqAA2ljx7a3AjY7pQObZUx9gOZeWmW2A
  • facebook-domain-verification=dlzr390u2m1ykzdch4phb5xykse0tn
  • MS=ms72415344

Email authentication partial

SPF
v=spf1 mx ~all
softfail (~all)
DMARC
v=DMARC1; p=none; rua=mailto:monitor@peterkoelln.de; ruf=mailto:security@peterkoelln.de; fo=0:1:d:s
policy: none (monitoring only)
DKIM
no key found at common selectors

Certificate (current)

RapidSSL TLS RSA CA G1
from 2025-08-15 to 2026-09-15
Expires in 118 days

HTTP security headers

Header hygiene 80/100 Checked live page: https://www.mazola.de/

present
  • strict-transport-security
  • content-security-policy
  • x-frame-options
  • x-content-type-options
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • missing Referrer Policy
  • missing Permissions Policy
Header values
x-frame-options
sameorigin
x-content-type-options
nosniff
content-security-policy
default-src 'self' 'unsafe-inline' 'unsafe-eval' https: data: *.mozala.de;
strict-transport-security
max-age=15768000

Linked from (3)