ns.tools Open in urlscan Pro
2a00:c70:1:178:170:40:38:1  Public Scan

URL: https://ns.tools/onys.fr
Submission: On November 22 via api from LU — Scanned from FR

Form analysis 1 forms found in the DOM

POST /onys.fr

<form accept-charset="utf-8" action="/onys.fr" method="post" role="form">
  <div style="display:none;"><input autocomplete="off" class="form-control" name="_csrfToken" type="hidden" value="13Uwho1gyXpk30Gs8H4U/aaJTuihWu6o904Kk788AK/NpaM+VqHziY/dd2qxgLKnMMOxFLBe036s2gr/XKYEWw=="></div>
  <div class="form-group has-label text"><label for="input">Domain or Ip</label> <input class="form-control" name="input" type="text" value="onys.fr"></div>
  <div class="form-action"><button class="btn btn-primary" type="submit">Analyse</button> <a class="btn btn-link disabled ml-2" href="#" id="reload"><i class="fa-sync-alt fas fa-spin"></i> Refresh analyse </a></div>
  <div style="display:none;"><input autocomplete="off" class="form-control" name="_Token[fields]" type="hidden" value="48c2a6365fcfa152e4371cd72a022f80f8ddc4bb%3A"><input autocomplete="off" class="form-control" name="_Token[unlocked]" type="hidden"
      value=""></div>
</form>

Text Content

Domain name or IP address audit tools
 * Report
 * Dns
 * Domain
 * Mail
 * Web
 * 

Domain name or IP address audit tools
 * Report
 * Dns
 * Domain
 * Mail
 * Web
 * 

Domain or Ip
Analyse Refresh analyse



ANALYSIS REPORT ON DOMAIN: ONYS.FR

Generated on 22 Nov 2024 01:12 Duration of the analysis 7.7s

Share

--------------------------------------------------------------------------------

Score 90%
B
DNS

A
DOMAIN

A
MAIL


WEB

B



RESUME

3 Warnings 1 Info
 * 3 Warnings
 * 1 Info

BIND VERSION IS HIDDEN

Dns version is visible for becky.ns.cloudflare.com with IP 108.162.192.73 :
2024.11.1.

Dns version is visible for becky.ns.cloudflare.com with IP 172.64.32.73 :
2024.11.1.

Dns version is visible for becky.ns.cloudflare.com with IP 173.245.58.73 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 172.64.33.103 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 108.162.193.103 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 173.245.59.103 :
2024.11.1.

X-XSS-PROTECTION HEADER IS PRESENT

The X-XSS-Protection header was not found.

CONTENT TYPE OPTIONS HEADER IS PRESENT

The X-Content-Type-Options header was not found.

CONTENT SECURITY POLICY HEADER IS PRESENT

The Content-Security-Policy header was not found.


DNS

 * Resume
 * Tree
    * Step 1
       * Substep 1
   
    * Step 2
       * Substep 1
       * Substep 2
       * Substep 3
   
    * Step 3
       * Substep 1
       * Substep 2
       * Substep 3
       * Substep 4
       * Substep 5
       * Substep 6

 * Zone
 * Host
 * DNSSEC
 * Tests

 * Resume
 * Tree
 * Zone
 * Host
 * DNSSEC
 * Tests
 * 


DNS SERVERS FOR ONYS.FR

onys.fr was detected as domain

Name becky.ns.cloudflare.com IPs
 * 108.162.192.73
 * 172.64.32.73
 * 173.245.58.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103

Step 1
Substep 1
Step 2
Substep 1 Substep 2 Substep 3
Step 3
Substep 1 Substep 2 Substep 3 Substep 4 Substep 5 Substep 6


QUERY INFORMATIONS

Server g.root-servers.net
[ 192.112.36.4 ] Duration 90 ms Type authority Headers RCODE : 0 AA : 0 TC : 0


RESPONSE

Name d.nic.fr IPs
 * 194.0.9.1

Name f.ext.nic.fr IPs
 * 194.146.106.46

Name g.ext.nic.fr IPs
 * 194.0.36.1


QUERY INFORMATIONS

Server d.nic.fr
[ 194.0.9.1 ] Duration 23 ms Type authority Headers RCODE : 0 AA : 0 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 108.162.192.73
 * 172.64.32.73
 * 173.245.58.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103


QUERY INFORMATIONS

Server f.ext.nic.fr
[ 194.146.106.46 ] Duration 11 ms Type authority Headers RCODE : 0 AA : 0 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 173.245.58.73
 * 108.162.192.73
 * 172.64.32.73

Name ben.ns.cloudflare.com IPs
 * 173.245.59.103
 * 172.64.33.103
 * 108.162.193.103


QUERY INFORMATIONS

Server g.ext.nic.fr
[ 194.0.36.1 ] Duration 14 ms Type authority Headers RCODE : 0 AA : 0 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 173.245.58.73
 * 108.162.192.73
 * 172.64.32.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103


QUERY INFORMATIONS

Server becky.ns.cloudflare.com
[ 108.162.192.73 ] Duration 17 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 172.64.32.73
 * 173.245.58.73
 * 108.162.192.73

Name ben.ns.cloudflare.com IPs
 * 173.245.59.103
 * 172.64.33.103
 * 108.162.193.103


QUERY INFORMATIONS

Server becky.ns.cloudflare.com
[ 172.64.32.73 ] Duration 16 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 108.162.192.73
 * 172.64.32.73
 * 173.245.58.73

Name ben.ns.cloudflare.com IPs
 * 108.162.193.103
 * 173.245.59.103
 * 172.64.33.103


QUERY INFORMATIONS

Server becky.ns.cloudflare.com
[ 173.245.58.73 ] Duration 16 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 173.245.58.73
 * 108.162.192.73
 * 172.64.32.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103


QUERY INFORMATIONS

Server ben.ns.cloudflare.com
[ 172.64.33.103 ] Duration 16 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 172.64.32.73
 * 173.245.58.73
 * 108.162.192.73

Name ben.ns.cloudflare.com IPs
 * 173.245.59.103
 * 172.64.33.103
 * 108.162.193.103


QUERY INFORMATIONS

Server ben.ns.cloudflare.com
[ 108.162.193.103 ] Duration 17 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 108.162.192.73
 * 172.64.32.73
 * 173.245.58.73

Name ben.ns.cloudflare.com IPs
 * 108.162.193.103
 * 173.245.59.103
 * 172.64.33.103


QUERY INFORMATIONS

Server ben.ns.cloudflare.com
[ 173.245.59.103 ] Duration 17 ms Type answer Headers RCODE : 0 AA : 1 TC : 0


RESPONSE

Name becky.ns.cloudflare.com IPs
 * 173.245.58.73
 * 108.162.192.73
 * 172.64.32.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103


NAME SERVERS

Name becky.ns.cloudflare.com IPs
 * 108.162.192.73
 * 172.64.32.73
 * 173.245.58.73

Name ben.ns.cloudflare.com IPs
 * 172.64.33.103
 * 108.162.193.103
 * 173.245.59.103


A AND AAAA FIELDS

IPv4 104.21.49.84 TTL 300 (5 minutes)
IPv4 172.67.160.111 TTL 300 (5 minutes)
IPv6 2606:4700:3031:0:0:0:6815:3154 TTL 300 (5 minutes)
IPv6 2606:4700:3034:0:0:0:ac43:a06f TTL 300 (5 minutes)


SOA

From ben.ns.cloudflare.com Master server becky.ns.cloudflare.com TTL 1800 (30
minutes) Contact dns@cloudflare.com Serial 2355292870 Refresh 10000 (2 hours)
Retry 2400 (40 minutes) Expire 604800 (7 days) Minimum 1800 (30 minutes)


HOST FOUND



Name www.onys.fr IP 172.67.160.111 IP 104.21.49.84 IP
2606:4700:3034:0:0:0:ac43:a06f IP 2606:4700:3031:0:0:0:6815:3154 TTL 300 (5
minutes)
Your domain is not protected by DNSSECDNSSEC Definition

BIND VERSION IS HIDDEN

Dns version is visible for becky.ns.cloudflare.com with IP 108.162.192.73 :
2024.11.1.

Dns version is visible for becky.ns.cloudflare.com with IP 172.64.32.73 :
2024.11.1.

Dns version is visible for becky.ns.cloudflare.com with IP 173.245.58.73 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 172.64.33.103 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 108.162.193.103 :
2024.11.1.

Dns version is visible for ben.ns.cloudflare.com with IP 173.245.59.103 :
2024.11.1.

The Bind version should not be visible otherwise it will be possible to search
for potential security vulnerabilities of the version.

0.025s

DOMAIN HAVE AT LEAST 2 DNS SERVERS

Passed

In order for the availability rate of DNS servers to be at its highest, it is
vital and recommended by the RFC to have at least 2 servers.

RFC

0.000s

ALL DNS SERVERS ARE RESPONDING

Passed

Every DNS servers should be accessible and accept public query.

0.004s

ALL SERVERS RETURN SUCCESS

Passed

It's important that all servers returned a "success" code.

0.004s

RESPONSES ARE NOT CNAME OR A

Passed

The answers should not be a CNAME or A type.

RFC

0.004s

DNS SERVERS IP ARE DIFFERENTS

Passed

IPs for DNS servers must be different in order to have high availability.

0.000s

DNS SERVERS IP ARE IN DIFFERENT CLASS C

Passed

The class C of each IP must be different so that the servers are not found on
the same bay and therefore there is a risk of unavailability.

RFC

0.000s

DNS SERVERS ARE SYNCHRONIZED

Passed

The synchronization of the DNS servers must be perfect in order to avoid any dns
resolution error. The servers must therefore give the same answer when asked
"what are the DNS servers for the domain?".

0.000s

SOA ARE SYNCHRONIZED

Passed

The SOA answered by the DNS servers must be identical for each servers. The most
important information is the master server and the contact email address.

0.000s

SOA EMAIL IS VALID

Passed

An email address must respect some conditions to be valid, accordding to the RFC
5322.

RFC

0.000s

SOA REFRESH IS VALID

Passed

The refresh value be must between 1200 and 43200.

RFC

0.000s

SOA RETRY, REFRESH AND EXPIRE VALUES ARE CORRECT

Passed

The Retry, Refresh and Expire values musth follow this path : retry < refresh <
expire.

RFC

0.000s

DNS SERVERS ARE NOT OPEN RELAY

Passed

DNS resolvers that allow queries from all IP addresses and are exposed to the
Internet can be attacked and used to conduct Denial of Service (DoS) attacks on
behalf of the hacker.

0.026s

TRANSFER ZONE IS DISABLE

Passed

An attacker can use a zone transfer that contains a malicious code or an
inappropriate format that crashes a DNS server vulnerable to this type of
attack, which results in a DoS that destabilizes the DNS services. It is
possible to test it manually with this commands: #host -T axfr or #dig axfr.

documentation

0.061s

RECURSIVE QUERY IS DISABLE

Passed

Having a dns server that allow recursive queries is a security risk, DDOS attack
can be performed.

RFC documentation documentation

0.029s

DNS SERVERS IP ARE NOT PRIVATE

Passed

It is strictly forbidden to have private IP in DNS

documentation

0.000s

SAME MX ARE RETURNED

Passed

It is extremely important that each DNS return the same MX records in order to
avoid contacting an SMTP server that no longer exists.

0.026s


DOMAIN

Resume Whois Reputation Tests
 * Resume
 * Whois
 * Reputation
 * Tests
 * 


WHOIS

Registrar DOMAINIUM sarl Owner - Created at unknown Changed at unknown Expires
at unknown


REPUTATION

Google Safe Browsing Web of trust Blacklists Virus Total
Domain
Whois server whois.afnic.fr Created at unknown Changed at unknown Expires at
unknown Name servers
Registrar
Id - Name DOMAINIUM sarl Phone - Email ndd@domainium.fr Url
https://www.domainium.fr/enregistrement-de-noms-de-domaine-fr/


GOOGLE SAFE BROWSING

Status


WEB OF TRUST

Status


BLACKLISTS

RFC Ignorant Rbl Jp RblDns Sorbs Spam Eating Monkey SpamHaus SuRbl Support
Intelligence Swinog UriBl


VIRUS TOTAL

Detection ratio /

SCANS

DOMAIN IS NOT BLACKLISTED

Passed

A domain must not be blacklisted or it will be penalized for referencing and
deliverability of emails.

0.000s

DOMAIN IS NOT LISTED IN GOOGLE SAFE BROWSING

Passed

Google safe browsing categorizes a domain as bad if something suspicious is
detected.

0.000s

DOMAIN IS NOT LISTED IN VIRUSTOTAL

Passed

Virus Total analyze your domain or IP address with 66 antivirus.

0.000s

DOMAIN HAVE GOOD REPUTATION ON WEB OF TRUST

Passed

Web Of Trust rates thousands of websites and find threats if they exist.

0.000s

DNS SERVERS ARE SAME IN DNS TREE AND WHOIS

Skipped

The dns servers given in the domain whois must be the same as those returned by
a dns resolution request.

0.000s


MAIL

Resume Servers Autodiscover Tests
 * Resume
 * Servers
 * Autodiscover
 * Tests
 * 

please wait

Error 500: An Internal Error Has Occurred.
file: undefined, line: undefined
called URL: /fetch/onys.fr/mail_servers

Autodiscover not configured

Error 500: An Internal Error Has Occurred.
file: undefined, line: undefined
called URL: /test/onys.fr/mail


WEB

Resume Informations Tests
 * Resume
 * Informations
 * Tests
 * 


WEBSITE

Url https://www.onys.fr/ Https Title onys.fr est en vente Description Unknown
First paragraph

> Le prix de vente du nom de domaine permet son transfert définitif de propriété
> à votre nom effectué auprès de votre propre prestataire (GoDaddy, OVH, IONOS,
> Gandi…). Vous ne payerez par la suite à votre prestataire que le coût de
> renouvellement annuel, soit quelque euros par an. La maison de ventes aux
> enchères Boischaut, spécialiste de la vente de biens incorporels
> professionnels pour vous assister en tant que tiers de confiance réglementé.
> Elle vous assistera dans la négociation et sera séquestre des fonds pendant la
> transaction. Coût du service :69 € HT (facturé au début et non remboursable)+
> Success fee : 200 € HT Quelques résultats récents de ventes aux enchères...

Url http://www.onys.fr/ Title onys.fr est en vente Description Unknown Response
time 0.038 second Server cloudflare Powered by Unknown Encoding utf-8 HSTS

HEADERS

 * CF-RAY: 8e650da29b33019a-CDG
 * Connection: close
 * Content-Type: text/html; charset=UTF-8
 * Date: Fri, 22 Nov 2024 01:12:47 GMT
 * Last-Modified: Thu, 17 Oct 2024 15:31:02 GMT
 * NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
 * Report-To:
   {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aQ9TIRDOtJ9vPerUj8XdvdqzDBbpoAHK%2BEynXn3SEUPnnyyKIATAxYu03UNWLY0%2FCqAGP2DO4h3Ry%2BQLdyAKPipi7mBCaTA0PhdU9VAl8ey0eJDwl%2B8LmV%2FHzbnpugPHarxKj5P%2FL4kBDA%3D%3D"}],"group":"cf-nel","max_age":604800}
 * Server: cloudflare
 * Transfer-Encoding: chunked
 * Vary: Accept-Encoding
 * alt-svc: h3=":443"; ma=86400
 * cf-cache-status: DYNAMIC
 * server-timing:
   cfL4;desc="?proto=TCP&rtt=4193&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=90&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"

Url https://www.onys.fr/ Title onys.fr est en vente Description Unknown Response
time 0.051 second Server cloudflare Powered by Unknown Encoding utf-8 HSTS

HEADERS

 * CF-RAY: 8e650da51fdd036d-CDG
 * Connection: close
 * Content-Type: text/html; charset=UTF-8
 * Date: Fri, 22 Nov 2024 01:12:48 GMT
 * Last-Modified: Thu, 17 Oct 2024 15:31:02 GMT
 * NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
 * Report-To:
   {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5waEPMroHo%2BMlDnGBTipZ41hSlB0T38e%2FHYtgAGdHr8S3KQz%2BpGEVo0c441yGo2auH7I3qkKZ%2Fe4cIYgHfAD2puRAuzX0FW9tPiwrYx%2BcpoJLvu2h8%2FYokhVV021VE12ex5aO38rJql%2F8A%3D%3D"}],"group":"cf-nel","max_age":604800}
 * Server: cloudflare
 * Transfer-Encoding: chunked
 * Vary: Accept-Encoding
 * alt-svc: h3=":443"; ma=86400
 * cf-cache-status: DYNAMIC
 * server-timing:
   cfL4;desc="?proto=TCP&rtt=3377&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2827&recv_bytes=709&delivery_rate=1198942&cwnd=252&unsent_bytes=0&cid=cdf2ad6b6659e483&ts=42&x=0"

X-XSS-PROTECTION HEADER IS PRESENT

The X-XSS-Protection header was not found.

The HTTP X-XSS-Protection response header is a feature of Internet Explorer,
Chrome and Safari that stops pages from loading when they detect reflected
cross-site scripting (XSS) attacks.

documentation

0.001s

CONTENT TYPE OPTIONS HEADER IS PRESENT

The X-Content-Type-Options header was not found.

The only defined value, "nosniff", prevents Internet Explorer from MIME-sniffing
a response away from the declared content-type. This also applies to Google
Chrome, when downloading extensions.

RFC

0.000s

CONTENT SECURITY POLICY HEADER IS PRESENT

The Content-Security-Policy header was not found.

The HTTP Content-Security-Policy response header allows web site administrators
to control resources the user agent is allowed to load for a given page. With a
few exceptions, policies mostly involve specifying server origins and script
endpoints. This helps guard against cross-site scripting attacks (XSS).

documentation

0.000s

DOMAIN HAVE "A" FIELD

Passed

The domain must have an A field in order for the website to be accessible.

0.000s

HOST "WWW" HAVE "A" FIELD

Passed

WWW host is not required for a website, but it's better to have one.

0.000s

DOMAIN HAVE "AAAA" FIELD

Passed

It is highly recommended to have an IPv6 for the website.

0.000s

HOST "WWW" HAVE "AAAA" FIELD

Passed

If you configure a WWW host for your website, it is recommended to have an IPv6.

0.000s

HTTP PORT (80) IS OPEN

Passed

This test verifies the presence of a website for the given IP or domain. Then
scans port 80.
If the domain or IP is pointing to a website then port 80 must be open so that
it can be accessed from a browser.
Otherwise port 80 must be closed.

0.000s

HTTPS PORT (443) IS OPEN

Passed

This test verifies the presence of a website for the given IP or domain. Then
scans port 443.
If the domain or IP is pointing to a website then port 443 must be open so that
it can be accessed from a browser.
Otherwise port 443 must be closed.

0.000s

WEB SERVER VERSION IS HIDDEN

Passed

To avoid giving details to malicious people, the version of the server should
not be visible.

0.000s

WEB APPLICATION TECHNOLOGY IS HIDDEN

Passed

To avoid giving details to malicious people, the technology that supports the
application should not be visible.

0.000s

COOKIES ARE SECURE

Skipped

Using "HttpOnly" instruction prevents someone to access to cookies via
Javascript. The secure flag will allow you to prevent a cookie from ever being
communicated in simple HTTP. (RFC 6265 section 8.3)

RFC

0.000s

 * Documentation
 * FAQ
 * Glossary

 * Domains Rank
 * Hosts Rank
 * IPs Rank

 * Last domains
 * Last hosts
 * Last IPs

 * Contact us
 * Tools
 * Privacy Notice