Open
Cached
·
just now
95/100
SECURITY SCORE
Detected Technologies
AWS CloudFront
YouTube
Google AdSense
Google Tag Manager
Bing
Sectigo
Reddit
HubSpot Forms
Google DoubleClick
Google Analytics
Microsoft Advertising
Crazy Egg
Segment
Google Static File Front End
LaunchDarkly
Ghost
Google API JS Client
Twitter
Transcend
LinkedIn
Cloudinary
Stripe
HubSpot Analytics
unpkg
Google Search
Facebook
Amazon S3
GitHub
Visual Website Optimizer
IP-API
HubSpot
Vector
Microsoft Clarity
HubSpot Live Chat
jsDelivr
Google Cloud
Certificate Information
Subject
CN=onfleet.com
Issuer
C=GB, O=Sectigo Limited, CN=Sectigo Public Server Authentication CA DV R36
Valid From
June 09, 2025
Valid Until
July 08, 2026
66 days
Public Key
RSA
2048 bit
Adequate
Signature Algorithm
SHA384-RSA
SHA-256 Fingerprint
35:D2:DE:DE:0A:E8:1B:6C:18:27:10:70:F4:C1:79:09:FA:8D:3F:68:BD:AE:96:F9:2C:93:FA:51:09:D4:8A:0F
Alternative Names
Security Configuration
TLS Protocols
TLS 1.2
TLS 1.3
Forward Secrecy
Supported
(Modern clients use PFS)
HTTP Security Headers
Status
Strict-Transport-Security
Good
max-age=31536000; includeSubDomains
X-Frame-Options
Good
SAMEORIGIN
X-Content-Type-Options
Good
nosniff
Referrer-Policy
Good
no-referrer-when-downgrade
Permissions-Policy
Missing
Not configured
Recommendations
- • Consider adding 'preload' to HSTS for maximum security
- • Strengthen CSP by removing 'unsafe-eval'
- • Consider adding Permissions-Policy to control browser features
CAA Records (Certificate Authority Authorization)
CAA Records
Configured
(Restricts certificate issuance)
Current Issuer
Authorized
(Matches CAA policy)
Authorized CAs
Incident Reporting
mailto:[email protected]
Recommendations
- • Consider using critical flag (flags=128) for stricter CAA enforcement
- • You have authorized 4 CAs - consider limiting to only the CAs you actively use
- • Consider adding 'issuewild' records to control wildcard certificate issuance