Security Report Summary
IP Address:
Report Time: 21 Feb 2019 00:18:25 UTC
  • X-Frame-Options
  • Strict-Transport-Security
  • X-Content-Type-Options
  • X-XSS-Protection
  • Content-Security-Policy
  • Referrer-Policy
  • Feature-Policy
Supported By
Netsparker - security scanner Go beyond secure http headers and scan your website for critical vulnerabilities malicious hackers can exploit. Learn more with a free demo of Netsparker!
Raw Headers
HTTP/1.1200 OK
DateThu, 21 Feb 2019 00:18:25 GMT
Content-Typetext/html; charset=utf-8
Set-Cookie__cfduid=dbf11e5317ea25ee1f2f9919884f6a6b11550708305; expires=Fri, 21-Feb-20 00:18:25 GMT; path=/;; HttpOnly
X-XSS-Protection1; mode=block
Cache-Controlpublic, max-age=1800, s-maxage=1800, stale-if-error=1800, stale-while-revalidate=60
Expect-CTmax-age=604800, report-uri=""
Missing Headers
Content-Security-PolicyContent Security Policy is an effective measure to protect your site from XSS attacks. By whitelisting sources of approved content, you can prevent the browser from loading malicious assets.
Referrer-PolicyReferrer Policy is a new header that allows a site to control how much information the browser includes with navigations away from a document and should be set by all sites.
Feature-PolicyFeature Policy is a new header that allows a site to control which features and APIs can be used in the browser.
Additional Information
X-Frame-OptionsX-Frame-Options tells the browser whether you want to allow your site to be framed or not. By preventing a browser from framing your site you can defend against attacks like clickjacking.
Strict-Transport-SecurityHTTP Strict Transport Security is an excellent feature to support on your site and strengthens your implementation of TLS by getting the User Agent to enforce the use of HTTPS.
X-Content-Type-OptionsX-Content-Type-Options stops a browser from trying to MIME-sniff the content type and forces it to stick with the declared content-type. The only valid value for this header is "X-Content-Type-Options: nosniff".
X-XSS-ProtectionX-XSS-Protection sets the configuration for the cross-site scripting filters built into most browsers. The best configuration is "X-XSS-Protection: 1; mode=block".
Expect-CTExpect-CT allows a site to determine if they are ready for the upcoming Chrome requirements and/or enforce their CT policy.
ServerServer value has been changed. Typically you will see values like "Microsoft-IIS/8.0" or "nginx 1.7.2".