volkswagen.co.uk
HTML metadata
Technology
- CMS
- Gatsby
Third-party hosts loaded (6)
- assets.volkswagen.com×18
- vw-tam.lighthouselabs.eu×2
- feature-services.vwonehub.io×1
- smartsignals2.smart-digital-solutions.de×1
- v1-539-4.mofa.feature-app.io×1
- v3-113-1.gsl.feature-app.io×1
Social
Contact
- Address
- rd November 2025
Registration
- Registrar
- Markmonitor Inc.
- Created
- 1996-10-02
- Expires
- 2026-10-02 133 days left
- Updated
- 2024-08-31
- Name servers
-
- ns1.markmonitor.com.
- ns2.markmonitor.com.
- ns3.markmonitor.com.
- ns4.markmonitor.com.
- ns5.markmonitor.com.
- ns6.markmonitor.com.
- ns7.markmonitor.com.
DNS records live
- NS
-
- ns1.markmonitor.com
- ns2.markmonitor.com
- ns3.markmonitor.com
- ns4.markmonitor.com
- ns5.markmonitor.com
- ns6.markmonitor.com
- ns7.markmonitor.com
- MX
-
- 10 mx10.vwgroup.com
- 20 mx20.vwgroup.com
- TXT
-
Show 5 TXT records
n7zgw8x4n3fz3n9pkmkk2bmdgk29z4pfpardot936893=e56ceb9d9925231cc02418d213d77be2e6be292c33d9257f16033d914c2c3231include:volkswagen.decqkznqpfv2fxw0c17hjnppjxskgrw6jgmyengine=b20b950958d2a07d3f68df57ab94edab
- Verified for
-
- Adobe
- Apple
- GlobalSign
- Meta
- Microsoft 365
Email authentication strong
- SPF
-
v=spf1 include:%{ir}.%{v}.%{d}.spf.has.pphosted.com ~allsoftfail (~all) - DMARC
-
v=DMARC1; p=reject; sp=none; fo=1; rua=mailto:dmarc_rua@emaildefense.proofpoint.com;policy: reject (enforced) · sp=none - DKIM
-
- k2:
v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAv2aC2KjGKLOwTweBY5A9RpjsxaBXR9r7OAU6U8/zn92ivImI75naUujWbItRI/QmL1jy5PWGqLwoUA… - s1:
v=DKIM1; h=sha256; k=rsa; s=email; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDCUKVoe1wgQ1xMquc6FbOYwheCIAAvlPHL+Oq3ZsyURS5Sr/AbwobsgcNqw+rUwzW… - s2:
v=DKIM1; h=sha256; k=rsa; s=email; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQCkrTLr1XF6eWuB4MQB0QRyHhabb8YItabIuUNcf5bju4VkxpS07M1M9VuqM/HLyhC…
selectors probed - k2:
Certificate (current)
GeoTrust TLS RSA CA G1
Expires in 10 days
HTTP security headers
- present
-
- strict-transport-security
- content-security-policy
- x-frame-options
- x-content-type-options
- findings
-
- CSP allows unsafe inline scripts/styles
- CSP uses wildcard sources
- missing Referrer Policy
- missing Permissions Policy
Header values
- x-frame-options
DENY- x-content-type-options
nosniff- content-security-policy
default-src https: 'unsafe-eval' 'unsafe-inline'; script-src https: 'unsafe-eval' 'unsafe-inline'; style-src https: 'unsafe-eval' 'unsafe-inline'; img-src https: data: blob: *; media-src https: data: blob: *; object-src 'none'; frame-ancestors 'none'; connect-src * data: blob: ; base-uri 'self'; upgrade-insecure-requests; font-src https: 'unsafe-inline' data: 'unsafe-inline'; worker-src * blob:;- strict-transport-security
max-age=31536000