Open
Cached
·
just now
92/100
SECURITY SCORE
Detected Technologies
AWS CloudFront
Let's Encrypt
AWS
Amazon S3
Calendly
Cloudflare CDNJS
Font Awesome
Google AdSense
Google Analytics
Google API JS Client
Google DoubleClick
Google Search
Google Static File Front End
Google Tag Manager
Hotjar
HubSpot
Active incidents
HubSpot Analytics
Active incidents
HubSpot Forms
Active incidents
IP-API
Active incidents
jsDelivr
LinkedIn
Sentry
Vimeo
Wistia
Yoast
Google Cloud
Certificate Information
Subject
CN=aravo.com
Issuer
C=US, O=Let's Encrypt, CN=E8
Valid From
May 02, 2026
Valid Until
July 31, 2026
89 days
Public Key
ECDSA
256 bit
(P-256)
Adequate
Signature Algorithm
ECDSA-SHA384
SHA-256 Fingerprint
D0:EF:14:85:3B:DF:0B:9C:75:AE:2A:52:72:64:ED:17:EF:93:FB:60:57:07:ED:E4:38:BC:3E:C9:45:0F:6B:92
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Good
max-age=63072000; includeSubDomains
X-Frame-Options
Present
SAMEORIGIN, SAMEORIGIN
X-Content-Type-Options
Present
nosniff, nosniff
Referrer-Policy
Present
strict-origin-when-cross-origin, strict-origin-when-cross-origin
Permissions-Policy
Present
accelerometer=(), autoplay=(), camera=(); +11 more
Recommendations
- • Consider adding 'preload' to HSTS for maximum security
- • Improve CSP by adding more specific directives and removing 'unsafe-inline'
CAA Records (Certificate Authority Authorization)
CAA Records
Not Configured
(Any CA can issue certificates)
CAA Issues
- • No CAA records configured - any CA can issue certificates
Recommendations
- • Implement CAA records to restrict which CAs can issue certificates for your domain
- • This adds an extra layer of security against unauthorized certificate issuance
- • Example: Add CAA record 'example.com. CAA 0 issue "letsencrypt.org"'
- • Consider adding 'iodef' record to receive security incident reports