Infrastructure
· 17 checks — DNS, redirects, IPv6, crawlability, URL variants, and domain intelligence rolled into one auditable list.DCDN & DeliveryActionNo CDN detectedFIX
Consider using a CDN to improve global delivery speed and reduce origin load.
BDNSSECUnsigned (DNSSEC not deployed)REVIEW
BURL Variantswww/non-www, trailing slash, HTTP→HTTPSREVIEW
www / non-www
Inconsistent — duplicate content risk
HTTP → HTTPS
Consistent
BTLS Certificate Expiry & Recommendations67 days until leaf cert expires — 2 issues to addressREVIEW
Certificate validity
Recommended actions
- Enable HSTS: Strict-Transport-Security: max-age=31536000; includeSubDomains
- Enable DNSSEC on your domain for DNS spoofing protection
BOperational Status PageNo status page link detectedREVIEW
A+DNS Records1 A records, 17 ms lookupPASS
| A | 17.253.144.10 |
| AAAA | 2620:149:af0::10 |
| CNAME | — |
| NS | a.ns.apple.com, b.ns.apple.com, c.ns.apple.com, d.ns.apple.com |
| MX | 10 mx-in.g.apple.com 20 mx-in-vib.apple.com 20 mx-in-hfd.apple.com 20 mx-in-ma.apple.com 20 mx-in-rn.apple.com 20 mx-in-sg.apple.com |
| TXT | _eht2v8yfz1agpq7o4zdkkz3k0k86fyr _khcec23xgc5b2lb981hup1csjb4cdnz 77a4a6de-da14-449c-83c4-85366e0f55f9 apple-domain-verification=X5Jt76bn3Dnmgzjj cerner-client-id=22dd1d8a-5e8b-4e1e-80ef-39bcdfd42798 cerner-client-id=ce3abf18-ee87-43b9-9927-9eb24b4bac4a ValidationTokenValue=77a4a6de-da14-449c-83c4-85366e0f55f9 miro-verification=2494d255c4c50b1e521650a0659cbf3fa08b0072 facebook-domain-verification=n6cqjfucq6plswmtfbwnbbeu1qiq3v SPF v=spf1 include:_spf.apple.com include:_spf-txn.apple.com ~all adobe-idp-site-verification=6bd5e74c-a3a0-4781-b2e1-e95399b5e11c webexdomainverification.8C462=b728ec3f-dfc9-42f9-92cb-9ba8853cbee8 yahoo-verification-key=Ay+djyw0qWQgXKWGA/jstjYryTMrKb+PBXI5l8u5/jw= google-site-verification=8M6XjQCzydT62jk8HY3VXPAG-nKDllTRV-JpA3-Ktyw google-site-verification=L5kkMdiFI8npvb6KlHui84fJaCw5G64DWhaDRIAT4_c google-site-verification=zBSq1mG5ssu2If-C17UAz_MzSZDcx03MVxmeDwMNc5w Dynatrace-site-verification=7d881a7c-c13f-4146-9d27-2731459e2509__iqls0105tagglc... cisco-ci-domain-verification=6f3bfb849796a518061f8e8c4356f687a138502d86db7427916... atlassian-domain-verification=mLabq99iaT8kquJechF6l31FAYoNUe3WB7tLpLFUiUYVJCse9S... atlassian-domain-verification=qZD4TfnCAoAjCFQgafhoKQpOs9tviekNK4wYE4a5eK3XoRP06h... json:eyJ3aHkiOiJUaGlzIGlzIHRvIHRydW5jYXRlIFVEUCByZXNwb25zZXMgZm9yIFRYVCBxdWVyaWV... json:eyJ3aHkiOiJUaGlzIGlzIHRvIHRydW5jYXRlIFVEUCByZXNwb25zZXMgZm9yIFRYVCBxdWVyaWV... |
| CAA | Lookup not available with standard resolver |
Multiple A records provide failover if one server goes down.
Single A record means a single point of failure — if that IP goes down, your site is unreachable until DNS TTL expires.
Learn more ▾ ▴
Add multiple A records for round-robin failover, or use a managed DNS provider with health-checked failover (Route 53, Cloudflare, NS1). Short TTL (60-300s) lets clients recover faster on outages.
Source: SRE practice / DNS architecture
A+Subdomain TakeoverNo subdomain takeover risk detectedPASS
A+CAA Recordsissue: pki.apple.com | issuewild: pki.apple.com | iodef configuredPASS
AReverse DNS1/2 IPs match cert SANPASS
A+Multi-Resolver DNS SpeedMean 0ms across 3 resolvers (spread 1ms)PASS
ARedirect Chain1 redirect(s), 77 ms totalPASS
https://apple.com
9 ms · HTTP/1.1
https://www.apple.com/
69 ms · HTTP/1.1 FINAL
| # | URL | Status | Time | Protocol | Server |
|---|---|---|---|---|---|
| 1 | https://apple.com | 301 | 9 ms | HTTP/1.1 | |
| 2 | https://www.apple.com/ | 200 | 69 ms | HTTP/1.1 | Apple |
See the visual redirect chain in the HTTP Probe tab →
A+IPv6 ReadinessIPv6 reachable (2 ms)PASS
A+Crawlabilityrobots.txt present, sitemap with 47 URLsPASS
# robots.txt for https://www.apple.com/
User-agent: *
Disallow: /*shop/browse/overlay/*
Disallow: /*shop/iphone/payments/overlay/*
Disallow: /cn/*/aow/*
Disallow: /tmall*
Allow: /ac/globalnav/2.0/*/images/ac-globalnav/globalnav/search/*
User-agent: Baiduspider
Disallow: /*
Allow: /cn/*
Allow: /cn-edu/*
Allow: /cn-k12/*
User-agent: HaoSouSpider
Disallow: /*
Allow: /cn/*
Allow: /cn-edu/*
Allow: /cn-k12/*
User-agent: Sogou web spider
Disallow: /*
Allow: /cn/*
Allow: /cn-k12/*
User-agent: Sogou inst spider
Disallow: /*
Allow: /cn/*
Allow: /cn-k12/*
User-agent: Sogou spider2
Disallow: /*
Allow: /cn/*
Allow: /cn-k12/*
#DaumWebMasterTool:6ff40e0f09564a9d4e3bc80e7cbde7c196677a2f5f610eb9c029836774f9a8e9:D9a8IEFAzmC/NWsQ3tB0Wg==
Sitemap: https://www.apple.com/shop/sitemap.xml
Sitemap: https://www.apple.com/autopush/sitemap/sitemap-index.xml
Sitemap: https://www.apple.com/newsroom/sitemap.xml
Sitemap: https://www.apple.com/retail/sitemap/sitemap.xml
Sitemap: https://www.apple.com/today/sitemap-index.xml
- https://www.apple.com.cn/shop/sitemap-in...
- https://www.apple.com/ae/shop/sitemap-in...
- https://www.apple.com/at/shop/sitemap-in...
- https://www.apple.com/au/shop/sitemap-in...
- https://www.apple.com/be-fr/shop/sitemap...
- https://www.apple.com/be-nl/shop/sitemap...
- https://www.apple.com/br/shop/sitemap-in...
- https://www.apple.com/ca/shop/sitemap-in...
- https://www.apple.com/ch-de/shop/sitemap...
- https://www.apple.com/ch-fr/shop/sitemap...
- https://www.apple.com/cl/shop/sitemap-in...
- https://www.apple.com/cz/shop/sitemap-in...
- https://www.apple.com/de/shop/sitemap-in...
- https://www.apple.com/dk/shop/sitemap-in...
- https://www.apple.com/es/shop/sitemap-in...
- https://www.apple.com/fi/shop/sitemap-in...
- https://www.apple.com/fr/shop/sitemap-in...
- https://www.apple.com/hk-zh/shop/sitemap...
- https://www.apple.com/hk/shop/sitemap-in...
- https://www.apple.com/hu/shop/sitemap-in...
- https://www.apple.com/ie/shop/sitemap-in...
- https://www.apple.com/in/shop/sitemap-in...
- https://www.apple.com/it/shop/sitemap-in...
- https://www.apple.com/jp/shop/sitemap-in...
- https://www.apple.com/kr/shop/sitemap-in...
- https://www.apple.com/lu/shop/sitemap-in...
- https://www.apple.com/mx/shop/sitemap-in...
- https://www.apple.com/my/shop/sitemap-in...
- https://www.apple.com/nl/shop/sitemap-in...
- https://www.apple.com/no/shop/sitemap-in...
- https://www.apple.com/nz/shop/sitemap-in...
- https://www.apple.com/ph/shop/sitemap-in...
- https://www.apple.com/pl/shop/sitemap-in...
- https://www.apple.com/pt/shop/sitemap-in...
- https://www.apple.com/ru/shop/sitemap-in...
- https://www.apple.com/sa-ar/shop/sitemap...
- https://www.apple.com/sa-en/shop/sitemap...
- https://www.apple.com/se/shop/sitemap-in...
- https://www.apple.com/sg/shop/sitemap-in...
- https://www.apple.com/shop/sitemap-index...
- https://www.apple.com/th-en/shop/sitemap...
- https://www.apple.com/th/shop/sitemap-in...
- https://www.apple.com/tr/shop/sitemap-in...
- https://www.apple.com/tw/shop/sitemap-in...
- https://www.apple.com/uk/shop/sitemap-in...
- https://www.apple.com/vn/shop/sitemap-in...
- https://www.apple.com/xf/shop/sitemap-in...
A+Domain Intelligenceapple.com — via Nom-iq Ltd. dba COM LAUDE, 39 years, 9 months oldPASS
281 days
February 20, 2027
67 days
Issued by Apple Inc.
39 years, 9 months
Registered February 19, 1987
Not enabled
Protects against DNS spoofing
Unknown
2620:149:af0::10
Nom-iq Ltd. dba COM LAUDE
Expiry timeline
Recommended actions
- Enable DNSSEC to protect visitors from DNS spoofing
- Enable registrar lock (clientTransferProhibited) to block unauthorized domain transfers
DNSSEC protects against DNS spoofing attacks. While not required, enabling DNSSEC adds an additional layer of security. Contact your DNS provider to enable it.
Without DNSSEC, an attacker who can poison your DNS can hijack your domain — and SSL certs alone don't stop them.
Learn more ▾ ▴
DNSSEC adds cryptographic signatures to DNS records, preventing forged responses from poisoning resolver caches. Without it, an attacker who controls the network path can redirect your domain to a malicious server before any HTTPS handshake happens. Most modern registrars (Cloudflare, Google Domains, Route 53) enable it with one toggle.
Source: ICANN / RFC 4033
The domain can be transferred without an unlock step. Enable registrar lock (clientTransferProhibited) in your registrar's control panel to protect against unauthorized or accidental transfers.
Without registrar lock, an attacker who phishes your registrar credentials can transfer the domain in minutes — total brand hijack.
Learn more ▾ ▴
Registrar lock (clientTransferProhibited, clientUpdateProhibited, clientDeleteProhibited) requires extra verification before any transfer/update/delete. Every major registrar offers it free. Combined with 2FA on your registrar account, it's the strongest defense against domain hijacking.
Source: ICANN / domain-security best practice