|Site title||Top of the last 24 hours / Habr|
|Description||Top of the last 24 hours|
|Date first seen||January 2011|
|Netcraft Risk Rating||0/10|
|Netblock Owner||Habr LLC|
|IP address||126.96.36.199 (VirusTotal)|
|IPv6 address||Not Present|
|Top Level Domain||Commercial entities (.com)|
|DNS Security Extensions||Enabled|
|0.0.0.0-255.255.255.255||N/A||IANA-BLK||The whole IPv4 address space|
|↳ 188.8.131.52-184.108.40.206||Netherlands||178-RIPE||RIPE Network Coordination Centre|
|↳ 220.127.116.11-18.104.22.168||Russian Federation||RU-QRATOR-20100512|
|↳ 22.214.171.124-126.96.36.199||Russian Federation||QRATOR-2041||Habr LLC|
|↳ 188.8.131.52||Russian Federation||QRATOR-2041||Habr LLC|
|Organisational unit||Not Present|
|Subject Alternative Name||*.habr.com, habr.com|
|Validity period||From May 30 2020 to Dec 2 2021 (18 months, 3 days)|
|Public key algorithm||id-ecPublicKey|
|Public key length||256|
|Perfect Forward Secrecy||Yes|
|Next Protocol Negotiation||http/1.1|
|Supported TLS Extensions||RFC5746 renegotiation info, RFC4366 server name, RFC4492 EC point formats, RFC5077 session ticket, Next Protocol Negotiation, unknown|
|Issuing organisation||Sectigo Limited|
|Issuer common name||Sectigo ECC Domain Validation Secure Server CA|
|Issuer unit||Not Present|
|Issuer state||Greater Manchester|
|Certificate Revocation Lists||Not Present|
|Public Key Hash||11f75ee993ec9b1cd9925b9d9b3c27a74409859d664b01eb843c5ccdba597263|
|OCSP servers||http://ocsp.sectigo.com - 100% uptime in the past 24 hours
|OCSP stapling response||No response received|
Signed Certificate Timestamps (SCTs)
|Certificate||Google Xenon 2021
|Certificate||Let's Encrypt Oak 2021
This site does not support the SSL version 3 protocol.
The site did not offer the Heartbeat TLS extension prior to the Heartbleed disclosure, and so was not exploitable.
This test does not exploit the Heartbleed vulnerability but uses information from conventional HTTPS requests. More information about Heartbleed detection.
SSL Certificate Chain
|Common name||USERTrust ECC Certification Authority|
|Organisational unit||Not Present|
|Organisation||The USERTRUST Network|
|Validity period||From 2010-02-01 to 2038-01-18|
|Common name||Sectigo ECC Domain Validation Secure Server CA|
|Organisational unit||Not Present|
|Validity period||From 2018-11-02 to 2030-12-31|
|Netblock owner||IP address||OS||Web server||Last seen|
|Habr LLC Spartakovsky lane 2, bld. 1 Moscow 105082 Russian Federation||184.108.40.206||Linux||QRATOR||20-Mar-2020|
Sender Policy Framework
A host's Sender Policy Framework (SPF) describes who can send mail on its behalf. This is done by publishing an SPF record containing a series of rules. Each rule consists of a qualifier followed by a specification of which domains to apply this qualifier to. For more information please see open-spf.org.
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a mechanism for domain owners to indicate how mail purporting to originate from their domain should be authenticated. It builds on SPF and DKIM, providing a method to set policy and to give reporting of failures. For more information please see dmarc.org.
Raw DMARC record:
v=DMARC1; p=quarantine; sp=quarantine; rua=mailto:firstname.lastname@example.org; ri=86400;
|p=quarantine||Requested handling policy||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|sp=quarantine||Requested handling policy for subdomains||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|rua=mailto:email@example.com||Reporting URI(s) for aggregate firstname.lastname@example.org|
|ri=86400||Aggregate reporting interval||No more than 86400 seconds separating aggregate reports.|
|Company||Primary Category||Tracker||Popular Sites with this Tracker|
|Criteo||Advertising||Criteo||www.babnet.net, www.kp.ru, www.walmart.ca|
|Analytics||Facebookpixel||www.b92.net, www.webmd.com, www.mediafire.com|
|Analytics||Googletagmanager||www.digikala.com, www.t-online.de, www.bbc.co.uk|
|VKontakte||Widget||VK||www.reg.ru, www.ntv.ru, www.yaplakal.com|
|Yandex||Analytics||Yandexanalytics||www.liveomg.com, www.yandex.ru, online.sberbank.ru|
Site Technology (fetched 24 days ago)
An application server is a server that provides software applications with services such as security, data services, transaction support, load balancing, and management of large distributed systems.
Includes all the main technologies that Netcraft detects as running on the server such as PHP.
Client-Side Scripting Frameworks
Frameworks or libraries allow for easier development of applications by providing an Application Program Interface (API) or a methodology to follow whilst developing.
RSS Rich Site Summary is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardized format.
A character encoding system consists of a code that pairs each character from a given repertoire with something else such as a bit pattern, sequence of natural numbers, octets, or electrical pulses in order to facilitate the transmission of data (generally numbers or text) through telecommunication networks or for data storage.
HTTP compression is a capability that can be built into web servers and web clients to make better use of available bandwidth, and provide greater transmission speeds between both.
Web Browser Targeting
Web browser targeting enables software applications to make use of specific functions of the browser as well as optimizing the application for specific browser versions.
Technology Description Popular sites using this technology Strict Transport Security Web security policy mechanism whereby a web server declares that complying user agents are to interact with it using only secure HTTP connections t.co, medium.com, disqus.com Strict-Transport-Security (including subdomains) No description discordapp.com, player.vimeo.com, login.microsoftonline.com X-Content-Type-Options Browser MIME type sniffing is disabled www.googleadservices.com, teams.microsoft.com, vars.hotjar.com Strict-Transport-Security (preload) No description www.researchgate.net, www.upwork.com, static.addtoany.com X-Frame-Options Same Origin Do not allow this site to be rendered within an iframe www.google.com, accounts.google.com Public Key Pins Detect and mitigate MITM attacks www.zacks.com, addons.mozilla.org, packages.debian.org
A Document Type Declaration, or DOCTYPE, is an instruction that associates a particular SGML or XML document (for example, a webpage) with a Document Type Definition (DTD).
Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language (such as XHTML).
Technology Description Popular sites using this technology External Styles defined within an external CSS file www.linkedin.com, www.paypal.com, www.yahoo.com CSS Media Query No description www.w3schools.com, www.booking.com, www.microsoft.com Embedded Styles defined within a webpage www.bbc.co.uk, www.amazon.co.uk, www.amazon.com