|Site title||Cryptocurrency Market Capitalizations | CoinMarketCap|
|Description||Cryptocurrency market cap rankings, charts, and more|
|Date first seen||June 2013|
|Netcraft Risk Rating||0/10|
|Netblock Owner||Cloudflare, Inc.|
|IP address||184.108.40.206 (VirusTotal)|
|Organisation||WhoisGuard, Inc., P.O. Box 0823-03411, Panama, Panama|
|Top Level Domain||Commercial entities (.com)|
|DNS Security Extensions||unknown|
|0.0.0.0-255.255.255.255||N/A||IANA-BLK||The whole IPv4 address space|
|↳ 220.127.116.11-18.104.22.168||United States||NET104||American Registry for Internet Numbers|
|↳ 22.214.171.124-126.96.36.199||United States||CLOUDFLARENET||Cloudflare, Inc.|
|↳ 188.8.131.52||United States||CLOUDFLARENET||Cloudflare, Inc.|
|::/0||N/A||ROOT||Root inet6num object|
|↳ 2600::/12||United States||NET6-2600||American Registry for Internet Numbers|
|↳ 2606:4700::/32||United States||CLOUDFLARENET||Cloudflare, Inc.|
|↳ 2606:4700:0:0:0:0:6811:8cb2||United States||CLOUDFLARENET||Cloudflare, Inc.|
|Organisational unit||Not Present|
|Subject Alternative Name||*.coinmarketcap.com, sni.cloudflaressl.com, coinmarketcap.com|
|Validity period||From Apr 6 2020 to Oct 9 2020 (6 months, 3 days)|
|Public key algorithm||id-ecPublicKey|
|Public key length||256|
|Perfect Forward Secrecy||Yes|
|Next Protocol Negotiation||h2,http/1.1|
|Supported TLS Extensions||RFC4366 server name, unknown, RFC5746 renegotiation info, RFC4492 EC point formats, RFC5077 session ticket, Next Protocol Negotiation|
|Issuing organisation||CloudFlare, Inc.|
|Issuer common name||CloudFlare Inc ECC CA-2|
|Issuer unit||Not Present|
|Issuer location||San Francisco|
|Certificate Revocation Lists||
|Public Key Hash||af477e6d295c9811c4bddb67b74028f338b1a6971e1d44def7faeb93597c22ef|
|OCSP servers||http://ocsp.digicert.com - 92.95% uptime in the past 24 hours
|OCSP stapling response||No response received|
Signed Certificate Timestamps (SCTs)
|Certificate||DigiCert Yeti 2020
This site does not support the SSL version 3 protocol.
The site offered the Heartbeat TLS extension prior to the Heartbleed disclosure, but is using a new certificate and no longer offers Heartbeat.
This test does not exploit the Heartbleed vulnerability but uses information from conventional HTTPS requests. More information about Heartbleed detection.
SSL Certificate Chain
|Common name||Baltimore CyberTrust Root|
|Validity period||From 2000-05-12 to 2025-05-12|
|Common name||CloudFlare Inc ECC CA-2|
|Organisational unit||Not Present|
|Validity period||From 2015-10-14 to 2020-10-09|
Sender Policy Framework
A host's Sender Policy Framework (SPF) describes who can send mail on its behalf. This is done by publishing an SPF record containing a series of rules. Each rule consists of a qualifier followed by a specification of which domains to apply this qualifier to. For more information please see open-spf.org.
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a mechanism for domain owners to indicate how mail purporting to originate from their domain should be authenticated. It builds on SPF and DKIM, providing a method to set policy and to give reporting of failures. For more information please see dmarc.org.
Raw DMARC record:
v=DMARC1; p=quarantine; pct=100; rua=mailto:email@example.com; ruf=mailto:firstname.lastname@example.org; sp=quarantine; aspf=r; adkim=r
|p=quarantine||Requested handling policy||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|pct=100||Sampling rate||100% of messages from the Domain Owner's mail stream should have DMARC applied.|
|rua=mailto:email@example.com||Reporting URI(s) for aggregate firstname.lastname@example.org|
|ruf=mailto:email@example.com||Reporting URI(s) for failure firstname.lastname@example.org|
|sp=quarantine||Requested handling policy for subdomains||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|aspf=r||SPF alignment mode||Relaxed: the Organizational Domains of both the SPF-authenticated domain and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
|adkim=r||DKIM alignment mode||Relaxed: the Organizational Domains of both the DKIM-authenticated signing domain (taken from the value of the "d=" tag in the signature) and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
Site Technology (fetched 19 days ago)
A web accelerator is a proxy server that reduces web site access times.
Includes all the main technologies that Netcraft detects as running on the server such as PHP.
Content Delivery Network
A content delivery network or content distribution network (CDN) is a large distributed system of servers deployed in multiple data centers in the Internet. The goal of a CDN is to serve content to end-users with high availability and high performance.
Web analytics is the measurement, collection, analysis and reporting of internet data for purposes of understanding and optimizing web usage.
A character encoding system consists of a code that pairs each character from a given repertoire with something else such as a bit pattern, sequence of natural numbers, octets, or electrical pulses in order to facilitate the transmission of data (generally numbers or text) through telecommunication networks or for data storage.
HTTP compression is a capability that can be built into web servers and web clients to make better use of available bandwidth, and provide greater transmission speeds between both.
Web Browser Targeting
Web browser targeting enables software applications to make use of specific functions of the browser as well as optimizing the application for specific browser versions.
Technology Description Popular sites using this technology Expect Certificate Transparency Header Enforce Certificate Transparency requirements freebitco.in, medium.com, kissanime.ru Strict Transport Security Web security policy mechanism whereby a web server declares that complying user agents are to interact with it using only secure HTTP connections www.amazon.com, disqus.com, accounts.google.com Expect Certificate Transparency Report Header Report the use of misissued certificates for a site static.addtoany.com, login.salesforce.com, discordapp.com Strict-Transport-Security (including subdomains) No description www.amazon.de, www.amazon.co.uk, www.imdb.com Content Security Policy Detect and mitigate attacks in the browser www.pinterest.com, yandex.ru, opus.analytics.yahoo.com Document Compatibility Mode A meta-tag used in Internet Explorer 8 to enable compatibility mode www.amazon.fr, www.baidu.com, teams.microsoft.com X-Content-Type-Options Browser MIME type sniffing is disabled www.googleadservices.com, login.microsoftonline.com, vars.hotjar.com X-Frame-Options Deny Prevents the web page being embedded in a frame www.virustotal.com, www.t-online.de, 1337x.to X-XSS-Protection Disabled Cross-site scripting protection is disabled www.google.com, www.w3schools.com, www.googletagmanager.com Referrer Policy Restrict referrer information included in subsequent requests www.digikala.com, www.upwork.com, www.tumblr.com
A Document Type Declaration, or DOCTYPE, is an instruction that associates a particular SGML or XML document (for example, a webpage) with a Document Type Definition (DTD).
HTML5 is a markup language for structuring and presenting content for the World Wide Web and a core technology of the Internet. It is the fifth revision of the HTML standard.
Technology Description Popular sites using this technology Viewport meta tag HTML5 tag usually used for mobile optimization
Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language (such as XHTML).