|Site title||t.co / Twitter|
|Date first seen||August 2010|
|Netcraft Risk Rating||2/10|
|Netblock Owner||Twitter Inc.|
|IP address||126.96.36.199 (VirusTotal)|
|IPv6 address||Not Present|
|Organisation||Registrant Organization: Twitter, Inc., Registrant State/Province: CA, Registrant Country: US|
|Top Level Domain||Colombia (.co)|
|DNS Security Extensions||unknown|
|0.0.0.0-255.255.255.255||N/A||IANA-BLK||The whole IPv4 address space|
|↳ 188.8.131.52-184.108.40.206||United States||NET104||American Registry for Internet Numbers|
|↳ 220.127.116.11-18.104.22.168||United States||TWITTER-NETWORK||Twitter Inc.|
|↳ 22.214.171.124||United States||TWITTER-NETWORK||Twitter Inc.|
|Subject Alternative Name||t.co, www.t.co|
|Validity period||From Apr 9 2019 to Apr 1 2020 (11 months, 3 weeks, 1 day)|
|Public key algorithm||rsaEncryption|
|Public key length||2048|
|Perfect Forward Secrecy||Yes|
|Next Protocol Negotiation||h2,spdy/3.1,http/1.1|
|Supported TLS Extensions||RFC5746 renegotiation info, RFC4492 EC point formats, RFC5077 session ticket, Next Protocol Negotiation|
|Issuing organisation||DigiCert Inc|
|Issuer common name||DigiCert SHA2 High Assurance Server CA|
|Issuer location||Not Present|
|Issuer state||Not Present|
|Certificate Revocation Lists||
|Public Key Hash||fc5ea476b32fbd36ce093661e9f298690d403c3c88d8426a539a3bc7d58f92c8|
|OCSP servers||http://ocsp.digicert.com - 100% uptime in the past 24 hours
|OCSP stapling response||No response received|
Signed Certificate Timestamps (SCTs)
This site does not support the SSL version 3 protocol.
The site offered the Heartbeat TLS extension prior to the Heartbleed disclosure, but is using a new certificate and no longer offers Heartbeat.
This test does not exploit the Heartbleed vulnerability but uses information from conventional HTTPS requests. More information about Heartbleed detection.
SSL Certificate Chain
|Common name||DigiCert High Assurance EV Root CA|
|Validity period||From 2006-11-10 to 2031-11-10|
|Common name||DigiCert SHA2 High Assurance Server CA|
|Validity period||From 2013-10-22 to 2028-10-22|
Sender Policy Framework
A host's Sender Policy Framework (SPF) describes who can send mail on its behalf. This is done by publishing an SPF record containing a series of rules. Each rule consists of a qualifier followed by a specification of which domains to apply this qualifier to. For more information please see open-spf.org.
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a mechanism for domain owners to indicate how mail purporting to originate from their domain should be authenticated. It builds on SPF and DKIM, providing a method to set policy and to give reporting of failures. For more information please see dmarc.org.
Raw DMARC record:
v=DMARC1; p=reject; adkim=s; aspf=s; rua=mailto:email@example.com; ruf=mailto:firstname.lastname@example.org; fo=1
|p=reject||Requested handling policy||Reject: emails that fail the DMARC mechanism check should be rejected. Rejection SHOULD occur during the SMTP transaction.|
|adkim=s||DKIM alignment mode||Strict: the Fully Qualified Domains of both the DKIM-authenticated signing domain (taken from the value of the "d=" tag in the signature) and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
|aspf=s||SPF alignment mode||Strict: the Fully Qualified Domains of both the SPF-authenticated domain and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
|rua=mailto:email@example.com||Reporting URI(s) for aggregate firstname.lastname@example.org|
|ruf=mailto:email@example.com||Reporting URI(s) for failure firstname.lastname@example.org|
|fo=1||Failure reporting options||Generate a DMARC failure report if any underlying authentication mechanism failed to produce an aligned "pass" result.|
Site Technology (fetched 16 days ago)
Web analytics is the measurement, collection, analysis and reporting of internet data for purposes of understanding and optimizing web usage.
HTTP compression is a capability that can be built into web servers and web clients to make better use of available bandwidth, and provide greater transmission speeds between both.
Web Browser Targeting
Web browser targeting enables software applications to make use of specific functions of the browser as well as optimizing the application for specific browser versions.
Technology Description Popular sites using this technology Strict Transport Security Web security policy mechanism whereby a web server declares that complying user agents are to interact with it using only secure HTTP connections www.bitmex.com, www.linkedin.com, medium.com X-XSS-Protection Disabled Cross-site scripting protection is disabled www.t-online.de, www.researchgate.net, www.digikala.com
A Document Type Declaration, or DOCTYPE, is an instruction that associates a particular SGML or XML document (for example, a webpage) with a Document Type Definition (DTD).
Cascading Style Sheets (CSS) is a style sheet language used for describing the presentation semantics (the look and formatting) of a document written in a markup language (such as XHTML).