Security Analysis Results

app.safeweb.co

Comprehensive domain security and infrastructure analysis

Live Website Preview

website screenshot of https://u25993967.ct.sendgrid.net/ls/click?upn=u001.ndfZw1dClDRlW6JqSuZRjxJEkBPonzVKRUD2ebD21gbdTxXNyIE8QNHH-2Bfuoocnl5X6VnZKqNTGKrC0dDRlMVbT3JemIVvgwt6OAiBnbVr0-3D3rv8_E3jX7UdwUvWW16GmiaKN7BYJgAW-2FJQqjwmGb3me-2B5o-2BIb7IEhJK94kcTtueBf9QYJc6CT9YF6zcUdsJFTJAcFsvN16-2BD-2Fmxx1GiCkbfZhlRBIT9NFrHj1cEET7XzqsfeYmwh9ajU4vQ3nOfdvxs444UMcX8oIBjkjzSlggesCflsZGHR1M8HonyVV7PMyIqMAlmAFcucbePvErmRZiVuh63EtPEK7wlJx5Yy3qcOee4NsPwVZpuCIDxwWgO7WYx4Qc28stBOZLz94MmHA-2BwAMPOftkG7NTUzwpQSoS-2FPRetUXMgVq32fTSBx7-2FYpXdAjG1mRNNGf1F7VWBJjoI7boOrkGjiwHI2xN2nu7Sx9QCtbwAkfrjWjKQ8PPbeQ-2Fsm9cgUzuZywcfD1TnO7IxwTaz-2Bhu5swJTTw1srrFqpLhD2EE4W-2FR2zIClUpQDGZikmUY8HQbEAaVeMlITKcYZj1lw-3D-3D

No Security Risks Detected

This domain appears to be safe and secure

100%
Score

Disclaimer: This assessment is based on automated analysis of publicly available information. Results are for informational purposes only. For critical applications, consult security professionals.

Page Information

Target URL
https://u25993967.ct.sendgrid.net/ls/click?upn=u001.ndfZw1dClDRlW6JqSuZRjxJEkBPonzVKRUD2ebD21gbdTxXNyIE8QNHH-2Bfuoocnl5X6VnZKqNTGKrC0dDRlMVbT3JemIVvgwt6OAiBnbVr0-3D3rv8_E3jX7UdwUvWW16GmiaKN7BYJgAW-2FJQqjwmGb3me-2B5o-2BIb7IEhJK94kcTtueBf9QYJc6CT9YF6zcUdsJFTJAcFsvN16-2BD-2Fmxx1GiCkbfZhlRBIT9NFrHj1cEET7XzqsfeYmwh9ajU4vQ3nOfdvxs444UMcX8oIBjkjzSlggesCflsZGHR1M8HonyVV7PMyIqMAlmAFcucbePvErmRZiVuh63EtPEK7wlJx5Yy3qcOee4NsPwVZpuCIDxwWgO7WYx4Qc28stBOZLz94MmHA-2BwAMPOftkG7NTUzwpQSoS-2FPRetUXMgVq32fTSBx7-2FYpXdAjG1mRNNGf1F7VWBJjoI7boOrkGjiwHI2xN2nu7Sx9QCtbwAkfrjWjKQ8PPbeQ-2Fsm9cgUzuZywcfD1TnO7IxwTaz-2Bhu5swJTTw1srrFqpLhD2EE4W-2FR2zIClUpQDGZikmUY8HQbEAaVeMlITKcYZj1lw-3D-3D
Page Title
SafeWeb - Dark Web Monitoring
app.safeweb.co faviconSite Favicon
Status
Active

Host Information

Domain
app.safeweb.co
Server
Vercel
Country
United States
IP Address
66.33.60.130
ASN Information
16509
AMAZON-02

Technologies

Node.js logo
Node.js
Programming languages
React logo
React
JavaScript frameworks
Google Cloud logo
Google Cloud
IaaS
Vercel logo
Vercel
PaaS
Next.js logo
Next.js
JavaScript frameworks
HSTS logo
HSTS
Security
+2 more technologies detected

SSL Certificate

HTTPS Enabled
Secure
Certificate Issuer
N/A
Valid From
2025-08-12 08:44:28
Valid Until
2026-08-13 08:44:28
Subject Name
app.safeweb.co

Performance Statistics

65
Total Requests
2
Domains
2
IP Addresses
638.07 KB
Transfer Size
Content Size2.07 MB

HTTP Headers

Age
0
Cache-Control
private, no-cache, no-store, max-age=0, must-revalidate
Content-Encoding
br
Content-Type
text/html; charset=utf-8
Date
Wed, 13 Aug 2025 08:44:29 GMT
Link
</_next/static/media/4c9affa5bc8f420e-s.p.woff2>; rel=preload; as="font"; crossorigin=""; type="font/woff2", </_next/static/css/44ffc66ddeb7c8ef.css>; rel=preload; as="style"
Server
Vercel
Strict-Transport-Security
max-age=63072000
Transfer-Encoding
chunked
X-Matched-Path
/reports/[id]
X-Powered-By
Next.js
X-Vercel-Cache
MISS
X-Vercel-Id
fra1::lhr1::hhdsr-1755074668825-e1121dd8b3cd
13 headers detected

Technology Stack Analysis

Node.js

Node.js

Programming languages

Node.js is an open-source, cross-platform, JavaScript runtime environment that executes JavaScript code outside a web browser.

React

React

JavaScript frameworks

React is an open-source JavaScript library for building user interfaces or UI components.

Google Cloud

Google Cloud

IaaS

Google Cloud is a suite of cloud computing services.

Vercel

Vercel

PaaS

Vercel is a cloud platform for static frontends and serverless functions.

Next.js

Next.js

JavaScript frameworksWeb frameworks

Next.js is a React framework for developing single page Javascript applications.

HSTS

HSTS

Security

HTTP Strict Transport Security (HSTS) informs browsers that the site should only be accessed using HTTPS.

Google Cloud CDN

Google Cloud CDN

CDN

Cloud CDN uses Google's global edge network to serve content closer to users.

Webpack

Webpack

Miscellaneous

Webpack is an open-source JavaScript module bundler.

Website Cookies 1

lang

app.safeweb.co

Strict
Value
en
Expires:Session

External Links 28

an investigation on their behalf concluded that "the actor merely utilised functionalities inherent in the platform's standard offerings, designed to gather information from publicly available sources"

socradar.io

Analyze
Target URL
https://socradar.io/socradars-response-to-the-usdods-claim-of-scraping-330-million-emails/

a large corpus of data from DemandScience (a company owned by Pure Incubation), appeared for sale on a popular hacking forum

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/inside-the-demandscience-by-pure-incubation-data-breach

a post to a popular hacking forum alleged that millions of LinkedIn records had been scraped and leaked

troyhunt.com

Analyze
Target URL
https://troyhunt.com/hackers-scrapers-fakers-whats-really-inside-the-latest-linkedin-dataset

hundreds of gigabytes of business data collated from public sources was obtained and later published to a popular hacking forum

kaduu.io

Analyze
Target URL
https://kaduu.io/blog/2022/02/04/us-strategic-company-bureau-van-dijk-hacked/

LinkedIn was targeted by attackers who scraped data from hundreds of millions of public profiles and later sold them online

www.businessinsider.com.au

Analyze
Target URL
https://www.businessinsider.com.au/linkedin-data-scraped-500-million-users-for-sale-online-2021-4

An update on report of scraped data

news.linkedin.com

Analyze
Target URL
https://news.linkedin.com/2021/june/an-update-from-linkedin

a massive trove of personal information referred to as "db8151dd"

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/the-unattributable-db8151dd-data-breach

dehashed.com

dehashed.com

Analyze
Target URL
https://dehashed.com/

security researchers Vinny Troia and Bob Diachenko identified an unprotected Elasticsearch server holding 1.2 billion records of personal data

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/data-enrichment-people-data-labs-and-another-622m-email-addresses

a spam operation known as "Intelimost" sent millions of emails appearing to come from people the recipients knew

techcrunch.com

Analyze
Target URL
https://techcrunch.com/2019/04/02/inside-a-spam-operation/

Bob Diachenko found over 3 million unique email addresses in an exposed Elasticsearch database

securitydiscovery.com

Analyze
Target URL
https://securitydiscovery.com/massive-spam-operation-uncovered-in-a-database-leak/

verifications.io suffered a data breach

securitydiscovery.com

Analyze
Target URL
https://securitydiscovery.com/800-million-emails-leaked-online-by-email-verification-service

Bob Diachenko

twitter.com

Analyze
Target URL
https://twitter.com/mayhemdayone

Vinny Troia

twitter.com

Analyze
Target URL
https://twitter.com/vinnytroia

an archived copy remains viewable

web.archive.org

Analyze
Target URL
https://web.archive.org/web/20190227230352/https://verifications.io/

The 773 Million Record "Collection #1" Data Breach

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/the-773-million-record-collection-1-data-reach

Apollo left a database containing billions of data points publicly exposed without a password

www.wired.com

Analyze
Target URL
https://www.wired.com/story/apollo-breach-linkedin-salesforce-data/

Vinny Troia

www.vinnytroia.com

Analyze
Target URL
http://www.vinnytroia.com/

The Apollo website has a contact form

www.apollo.io

Analyze
Target URL
https://www.apollo.io/contact

was misconfigured such that it exposed the email addresses of more than 43 million people

www.bleepingcomputer.com

Analyze
Target URL
https://www.bleepingcomputer.com/news/security/trik-spam-botnet-leaks-43-million-email-addresses/

the marketing firm Exactis inadvertently publicly leaked 340 million records of personal data

www.wired.com

Analyze
Target URL
https://www.wired.com/story/exactis-database-leak-340-million-records/

Vinny Troia of Night Lion Security

www.nightlionsecurity.com

Analyze
Target URL
https://www.nightlionsecurity.com/

Onliner Spambot was identified by security researcher Benkow moʞuƎq

benkowlab.blogspot.com.au

Analyze
Target URL
https://benkowlab.blogspot.com.au/2017/08/from-onliner-spambot-to-millions-of.html

Inside the Massive 711 Million Record Onliner Spambot Dump

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/inside-the-massive-711-million-record-onliner-spambot-dump

Password reuse, credential stuffing and another billion records in Have I Been Pwned

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/password-reuse-credential-stuffing-and-another-1-billion-records-in-have-i-been-pwned

they forced password resets for customers they believed may be at risk

motherboard.vice.com

Analyze
Target URL
https://motherboard.vice.com/read/dropbox-forces-password-resets-after-user-credentials-exposed

was subsequently traded online

motherboard.vice.com

Analyze
Target URL
https://motherboard.vice.com/read/hackers-stole-over-60-million-dropbox-accounts

LinkedIn had 164 million email addresses and passwords exposed

www.troyhunt.com

Analyze
Target URL
https://www.troyhunt.com/observations-and-thoughts-on-the-linkedin-data-breach

Requested Domains 2

app.safeweb.co

Subdomain
No category information available

u25993967.ct.sendgrid.net

Unknown Type
No category information available
LinkCheck

© 2025 LinkCheck. Secure domain analysis you can trust.