spiruella.nl
HTML metadata
Technology
- Server
- Apache
- CMS
- WordPress 6.6.5
- Analytics
-
- Google Tag Manager
- Hotjar
- Microsoft Clarity
- Ads
-
- Google Ads (DoubleClick)
- Meta Pixel
- TikTok Pixel
- Cookie consent
-
- Cookiebot
- Fonts
-
- Font Awesome
- Google Fonts
Third-party hosts loaded (24)
- y9w4j9n8.delivery.rocketcdn.me×134
- www.google.com×3
- consent.cookiebot.com×2
- www.feedbackcompany.com×2
- www.spiruella.be×2
- analytics.tiktok.com×1
- bat.bing.com×1
- cdn.doofinder.com×1
- chimpstatic.com×1
- connect.facebook.net×1
- consentcdn.cookiebot.com×1
- fonts.googleapis.com×1
- gmpg.org×1
- googleads.g.doubleclick.net×1
- platform.getqonfi.com×1
- script.hotjar.com×1
- scripts.clarity.ms×1
- squeezely.tech×1
- static.hotjar.com×1
- t.contentsquare.net×1
- use.fontawesome.com×1
- www.clarity.ms×1
- www.googletagmanager.com×1
- www.gstatic.com×1
Social
Contact
Registration
- Registrar
- OVH
- Created
- 2010-03-07
- Updated
- 2025-07-09
- Name servers
-
- dns20.ovh.net
- ns20.ovh.net
DNS records live
- NS
-
- dns20.ovh.net
- ns20.ovh.net
- MX
-
- 1 mx0.mail.ovh.net
- 10 mx1.mail.ovh.net
- 20 mx2.mail.ovh.net
- 30 mx3.mail.ovh.net
- 40 mx4.mail.ovh.net
- TXT
-
mandrill_verify.SSf5j8OWdKKJZRJD7nw6SA1|www.spiruella.nl
- Verified for
-
- Microsoft 365
Email authentication partial
- SPF
-
v=spf1 mx a ip4:178.18.140.58 ip6:2a01:7c8:bb07:9:5054:ff:fee2:d7da include:mx.ovh.com include:sendgrid.net include:servers.mcsv.net include:spf.mandrillapp.com include:spf.monta.nl ~allsoftfail (~all) - DMARC
-
v=DMARC1;p=none;policy: none (monitoring only) - DKIM
-
- k2:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2aC2KjGKLOwTweBY5A9RpjsxaBXR9r7OAU6U8/zn92ivImI75naUujWbItRI/QmL1jy5PWGqLwoUA…
selectors probed - k2:
Certificate (current)
R12
Expires in 64 days
HTTP security headers
- present
-
- content-security-policy
- findings
-
- missing HSTS
- missing frame protection
- missing content type protection
- missing Referrer Policy
- missing Permissions Policy
Header values
- content-security-policy
upgrade-insecure-requests;