tedi.com
HTML metadata
Social
Registration
- Registrar
- united-domains GmbH
- Created
- 1996-05-22
- Expires
- 2026-05-23 4 days left
- Updated
- 2026-03-21
- Name servers
-
- ns.udag.de
- ns.udag.net
- ns.udag.org
DNS records live
- NS
-
- ns.udag.de
- ns.udag.net
- ns.udag.org
- MX
-
- 10 smail-ted-mta1.dts-security.de
- 20 smail-ted.dts-security.de
- TXT
-
Show 5 TXT records
Sendinblue-code:e5ff684e338327152d5fc06a15c969dbdeepl-domain-verification=03baa41e342c4f1cb5d2ec608e35aa5batlassian-domain-verification=ar26Ga04fLlxWTUnRz0zU94FOVkvwdufOFPW8BZHah7kawqra2cICKoCocKkg54aQ01XmdGxXScriI5FAxLsfzvZy5N22A/ZTzFTqr2exvE=miro-verification=4c5922f7db105f28cb15ea03df4681ea438361d0
Email authentication strong
- SPF
-
v=spf1 mx include:_spf.google.com include:spf.sendinblue.com include:spf-de.emailsignatures365.com include:spf-westeu.emailsignatures365.com include:spf.protection.outlook.com ip4:84.201.116.132 ip4:62.55.182.68 ip4:212.101.206.69 ip4:193.77.210.50 ip4:62.159.22.76 ip4:195.146.148.61 ip4:46.24.12.81 ip4:46.20.39.109 ip4:81.90.38.26 ip4:194.181.161.230 ip4:46.44.230.193 ip4:194.152.195.81 ip4:92.168.72.233 ip4:82.177.197.242 ip4:213.16.47.90 ip4:136.255.200.70 ip4:104.151.30.194 ip4:104.155.16.17 ip4:192.158.29.88 ip4:149.72.247.231 ip4:24.40.153.186 ip4:46.20.39.108 ip4:85.22.179.100 -allstrict (-all) - DMARC
-
v=DMARC1;p=quarantine;sp=none; rua=mailto:dmarc@mailinblue.com; ruf=mailto:dmarc@mailinblue.com; pct=100;adkim=r;aspf=rpolicy: quarantine · sp=none - DKIM
-
- selector1:
v=DKIM1; k=rsa; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCu/yHHj1K079zDlqHFgYuO4xqVYuHZ2ddPA3JcpKwNi2q/n+fIXGTOE8x8SldFq1WmhGvYQPbDCxKcNDB7Gy… - mail:
k=rsa;p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDeMVIzrCa3T14JsNY0IRv5/2V1/v2itlviLQBwXsa7shBD6TrBkswsFUToPyMRWC9tbR/5ey0nRBH0ZVxp+lsmTxid2Y2z…
selectors probed - selector1:
Certificate (current)
E7
Expires in 56 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-frame-options
- x-content-type-options
- referrer-policy
- permissions-policy
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
Header values
- referrer-policy
strict-origin-when-cross-origin- x-frame-options
SAMEORIGIN- permissions-policy
interest-cohort=()- x-content-type-options
nosniff- content-security-policy
default-src 'self' https:; script-src 'self' https: blob: 'unsafe-inline' 'unsafe-eval'; style-src 'self' https: 'unsafe-inline'; img-src * data: blob:; font-src 'self' https: data:; connect-src *; media-src 'self' https: blob:; object-src 'none'; frame-ancestors *; upgrade-insecure-requests- strict-transport-security
max-age=31536000; includeSubDomains; preload