weareplannedparenthoodaction.org

.org crawl

First seen 2026-04-11 · Last seen 2026-05-19 · ok HTTP/1.1 200 5453 ms crawled 2026-05-18

US · 104.18.25.74 · AS13335 Cloudflare, Inc.

Reputation 100/100

Classifying

HTML metadata

Title
Donate to Planned Parenthood Action Fund
Canonical
https://www.weareplannedparenthoodaction.org/KDlEsm4r6EizP0SdpEj8Fg2

Open Graph

url
https://www.weareplannedparenthoodaction.org/KDlEsm4r6EizP0SdpEj8Fg2
title
Fight for abortion access and repro rights.
description
Reproductive health and rights are on the line. Don't let extremists win. Donate to Planned Parenthood Action Fund now.

Technology

CDN
Cloudflare
CMS
Gatsby
Fonts
  • Google Fonts
Third-party hosts loaded (10)
  • nvlupin.blob.core.windows.net×6
  • www.plannedparenthoodaction.org×4
  • static.everyaction.com×3
  • cdnjs.cloudflare.com×2
  • ajax.googleapis.com×1
  • client.px-cloud.net×1
  • fast.fonts.net×1
  • fonts.googleapis.com×1
  • js.verygoodvault.com×1
  • try.abtasty.com×1

Contact

Phone

Registration

Registrar
Network Solutions, LLC
Created
2017-12-01
Expires
2026-12-01 195 days left
Updated
2025-10-07
Name servers
  • darl.ns.cloudflare.com
  • sima.ns.cloudflare.com

DNS records live

NS
  • darl.ns.cloudflare.com
  • sima.ns.cloudflare.com

Email authentication no MX

SPF
v=spf1 -all
strict (-all)
DMARC
v=DMARC1; p=reject; sp=reject; adkim=s; aspf=s;
policy: reject (enforced) · sp=reject
DKIM
Show 12 DKIM selectors
  • default: v=DKIM1; p=
  • google: v=DKIM1; p=
  • selector1: v=DKIM1; p=
  • selector2: v=DKIM1; p=
  • k1: v=DKIM1; p=
  • k2: v=DKIM1; p=
  • mail: v=DKIM1; p=
  • dkim: v=DKIM1; p=
  • s1: v=DKIM1; p=
  • s2: v=DKIM1; p=
  • mxvault: v=DKIM1; p=
  • smtpapi: v=DKIM1; p=
selectors probed

Certificate (current)

WE1
from 2026-03-26 to 2026-06-24
Expires in 35 days

HTTP security headers

Header hygiene 70/100 Checked live page: https://www.weareplannedparenthoodaction.org/KDlEsm4r6EizP0SdpEj8Fg2?fb=true

present
  • strict-transport-security
  • content-security-policy
  • content-security-policy-report-only
  • x-content-type-options
findings
  • CSP allows unsafe inline scripts/styles
  • CSP uses wildcard sources
  • missing frame protection
  • missing Referrer Policy
  • missing Permissions Policy
Header values
x-content-type-options
nosniff
content-security-policy
script-src 'nonce-f31db311-a3e2-4b3b-9d17-cc0fd6105a3e' 'strict-dynamic', default-src * 'unsafe-eval' 'unsafe-inline' data: blob:
strict-transport-security
max-age=31536000
content-security-policy-report-only
script-src 'nonce-f31db311-a3e2-4b3b-9d17-cc0fd6105a3e' 'strict-dynamic' 'report-sample'; report-uri /csp/report?metadata=form%3ab2443928-2b6e-48e8-b33f-449da448fc16; report-to csp-endpoint

Links to (2)

Linked from (1)