|Netblock Owner||OVH SAS|
|IP address||184.108.40.206 (VirusTotal)|
|Top Level Domain||Russian Federation (.ru)|
|DNS Security Extensions||unknown|
|0.0.0.0-255.255.255.255||N/A||IANA-BLK||The whole IPv4 address space|
|↳ 220.127.116.11-18.104.22.168||Netherlands||RIPE-37||RIPE Network Coordination Centre|
|↳ 22.214.171.124-126.96.36.199||France||OVH||OVH SAS|
|↳ 188.8.131.52||France||OVH||OVH SAS|
|::/0||N/A||ROOT||Root inet6num object|
|↳ 2001:4000::/23||Netherlands||EU-ZZ-2001-4000||RIPE Network Coordination Centre|
This is not a HTTPS site. If you're looking for SSL/TLS information try the HTTPS site report.
|Netblock owner||IP address||OS||Web server||Last seen|
|OVH SAS Dedicated servers http//www.ovh.com||184.108.40.206||Linux||nginx||6-Jun-2020|
Sender Policy Framework
A host's Sender Policy Framework (SPF) describes who can send mail on its behalf. This is done by publishing an SPF record containing a series of rules. Each rule consists of a qualifier followed by a specification of which domains to apply this qualifier to. For more information please see open-spf.org.
DMARC (Domain-based Message Authentication, Reporting and Conformance) is a mechanism for domain owners to indicate how mail purporting to originate from their domain should be authenticated. It builds on SPF and DKIM, providing a method to set policy and to give reporting of failures. For more information please see dmarc.org.
Raw DMARC record:
v=DMARC1; aspf=r; adkim=r; fo=1; p=quarantine; sp=quarantine; rua=mailto:email@example.com
|aspf=r||SPF alignment mode||Relaxed: the Organizational Domains of both the SPF-authenticated domain and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
|adkim=r||DKIM alignment mode||Relaxed: the Organizational Domains of both the DKIM-authenticated signing domain (taken from the value of the "d=" tag in the signature) and that of the RFC5322.From domain must be equal if the identifiers are to be considered aligned.|
|fo=1||Failure reporting options||Generate a DMARC failure report if any underlying authentication mechanism failed to produce an aligned "pass" result.|
|p=quarantine||Requested handling policy||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|sp=quarantine||Requested handling policy for subdomains||Quarantine: emails that fail the DMARC mechanism check should be treated by Mail Receivers as suspicious. Depending on the capabilities of the Mail Receiver, this can mean "place into spam folder", "scrutinize with additional intensity", and/or "flag as suspicious".|
|rua=mailto:firstname.lastname@example.org||Reporting URI(s) for aggregate email@example.com|
No known trackers were identified.