Skip to content
https://reddit.com

Infrastructure

· 17 checks — DNS, redirects, IPv6, crawlability, URL variants, and domain intelligence rolled into one auditable list.
SCORE
83
GRADE
B
FIX
1
REVIEW
7
PASS
9
INFO
0
Probed from Sao Paulo, Brazil
301 Moved Permanently
Checks
17
9 PASS 7 REVIEW 1 FIX
F
Crawlability
Action
robots.txt present, sitemap with 0 URLs
FIX
robots.txt present, sitemap with 0 URLs
Info::
robots.txt is present
Got: 538 bytes
Critical::
robots.txt blocks all crawlers
Disallow: / for all user-agents prevents search engines from indexing any page. This will remove the site from search results.
Info::
sitemap.xml is present
Warning::
sitemap.xml contains invalid XML
Search engines may not be able to parse the sitemap. Fix XML validation errors.
Warning::
sitemap.xml is empty — no URLs found
An empty sitemap provides no value. Add <url> entries for your pages.
Info::
robots.txt does not reference a sitemap
Add a 'Sitemap:' directive to robots.txt so search engines can discover your sitemap.

Disallow: / for all user-agents prevents search engines from indexing any page. This will remove the site from search results.

Why this matters

Disallow: / in robots.txt blocks every search crawler — the site becomes invisible in organic search.

Learn more

Common deployment mistake: a staging robots.txt with `User-agent: * / Disallow: /` ships to prod. The site falls out of search results within days. Verify your robots.txt is the production-intended version. If this is intentional (private site), no action needed.

Source: Google Search Central

Search engines may not be able to parse the sitemap. Fix XML validation errors.

Why this matters

An unparseable sitemap is silently ignored by Google — the URLs it advertises are never queued for crawl.

Learn more

Google's sitemap parser is strict about XML validity. A single unescaped `&` or unclosed tag invalidates the whole file. Run your sitemap through a validator (Search Console's Sitemaps report flags it) and fix the offending entry. Most generators escape correctly; mistakes usually come from manually-written entries.

Source: sitemaps.org / Google Search Central

An empty sitemap provides no value. Add <url> entries for your pages.

Why this matters

An empty sitemap signals 'no content to index' to Google — actively harmful versus having no sitemap at all.

Learn more

Google compares URLs in the sitemap against URLs it has crawled. An empty sitemap on a site with thousands of pages signals abandonment. Either populate it correctly (most CMSes auto-generate) or delete the file and let Google crawl normally.

Source: Google Search Central / sitemaps.org

Add a 'Sitemap:' directive to robots.txt so search engines can discover your sitemap.

Why this matters

robots.txt omits Sitemap: directive — crawlers must fetch /sitemap.xml by convention; reliable but missing the explicit hint.

Source: sitemaps.org

robots.txt 200 OK
Size 538 B Sitemaps referenced 0 User-agents * Blocking Yes — all crawlers blocked
# Welcome to Reddit's robots.txt
# Reddit believes in an open internet, but not the misuse of public content.
# See https://support.reddithelp.com/hc/en-us/articles/26410290525844-Public-Content-Policy Reddit's Public Content Policy for access and use restrictions to Reddit content.
# See https://www.reddit.com/r/reddit4researchers/ for details on how Reddit continues to support research and non-commercial use.
# policy: https://support.reddithelp.com/hc/en-us/articles/26410290525844-Public-Content-Policy

User-agent: *
Disallow: /

sitemap.xml 200 OK
Type URL Set URLs 0 entries Valid XML No
B
DNSSEC
Unsigned (DNSSEC not deployed)
REVIEW
Unsigned (DNSSEC not deployed)
Info::
DNSSEC is not deployed
The zone is not DNSSEC-signed. Users on validating resolvers (Cloudflare 1.1.1.1, Quad9 9.9.9.9, growing default in mobile resolvers) get no protection against DNS spoofing for this domain. Most registrars now offer DNSSEC at a single click; consider enabling it for sites where authenticity matters (banking, healthcare, government).
C
Reverse DNS
Action
0/8 IPs match cert SAN
REVIEW
0/8 IPs match cert SAN
Info::
PTR lookup failed for 151.101.129.140: lookup 151.101.129.140: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 151.101.1.140: lookup 151.101.1.140: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 151.101.65.140: lookup 151.101.65.140: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 151.101.193.140: lookup 151.101.193.140: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 2a04:4e42::396: lookup 2a04:4e42::396: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 2a04:4e42:200::396: lookup 2a04:4e42:200::396: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 2a04:4e42:400::396: lookup 2a04:4e42:400::396: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
Info::
PTR lookup failed for 2a04:4e42:600::396: lookup 2a04:4e42:600::396: no such host
No reverse DNS record set for this IP. Common on bare cloud-VM IPs without provider-side PTR; not a security issue.
B
URL Variants
www/non-www, trailing slash, HTTP→HTTPS
REVIEW
www/non-www, trailing slash, HTTP→HTTPS
Critical::
Both www and non-www versions serve content
Got: Both variants return 200 Expected: One variant 301-redirects to the other
Info::
HTTP correctly 301-redirects to HTTPS

www / non-www

200https://www.reddit.com/
200https://reddit.com/

Inconsistent — duplicate content risk

HTTP → HTTPS

301http://reddit.com/ https://reddit.com/

Consistent

B
TLS Certificate Expiry & Recommendations
147 days until leaf cert expires — 1 issues to address
REVIEW

Certificate validity

147
days left
0d 30d 60d 90d+

Recommended actions

  • Enable DNSSEC on your domain for DNS spoofing protection
B
CDN & Delivery
Varnish
REVIEW
Varnish
Info::
Site is served via Varnish CDN
Got: via: 1.1 varnish
CDN Detected: Varnish
Provider Varnish Evidence via: 1.1 varnish
B
CDN Cache Observability
No CDN cache-status headers in the response
REVIEW
No CDN cache-status headers in the response
Info::
No CDN cache-status headers in the response
Without an X-Cache / CF-Cache-Status / X-Vercel-Cache / Age header, you can't tell from outside whether a request hit the cache or went to origin. Operationally important: enables debugging stale-content reports and verifying cache rules. Most managed CDN platforms emit at least one of these by default; absence often means the platform's diagnostic headers are stripped at an upstream proxy.
B
Operational Status Page
No status page link detected
REVIEW
No status page link detected
Info::
No operational status page link detected
Status pages communicate planned maintenance and incidents to users -- a hallmark of operationally-mature services. Most SaaS teams publish one via Atlassian Statuspage, Instatus, BetterUptime, or a self-hosted Cachet. Smaller sites legitimately don't need one; flagged as Info, not a failure.
A+
DNS Records
4 A records, 68 ms lookup
PASS
4 A records, 68 ms lookup
Info::
Resolves to 4 IPv4 address(es)
Got: 151.101.129.140, 151.101.1.140, 151.101.65.140, 151.101.193.140
Info::
Has 4 IPv6 (AAAA) record(s)
Got: 2a04:4e42::396, 2a04:4e42:200::396, 2a04:4e42:400::396, 2a04:4e42:600::396
Info::
4 nameserver(s) configured
Got: ns-1029.awsdns-00.org, ns-1887.awsdns-43.co.uk, ns-378.awsdns-47.com, ns-557.awsdns-05.net
Info::
5 mail exchanger(s) configured
Info::
SPF record present in TXT
Info::
DNS resolution time: 68 ms
Got: 68 ms
A151.101.129.140, 151.101.1.140, 151.101.65.140, 151.101.193.140
AAAA2a04:4e42::396, 2a04:4e42:200::396, 2a04:4e42:400::396, 2a04:4e42:600::396
CNAME
NSns-1029.awsdns-00.org, ns-1887.awsdns-43.co.uk, ns-378.awsdns-47.com, ns-557.awsdns-05.net
MX
1 aspmx.l.google.com
5 alt1.aspmx.l.google.com
5 alt2.aspmx.l.google.com
10 aspmx2.googlemail.com
10 aspmx3.googlemail.com
TXT
00DV90000052YKT=1TBV90000000AsD
00Dbf000005OCRl=1TBbf0000000MJt
00Dbf000005OCTN=1TBbf0000000Mer
00Do0000000I6Pa=1TBcv0000000HQh
614ac4be-8664-4cea-8e29-f84d08ad875c
MS=ms71041902
a5897185-49e1-4181-9065-51bd24737466
apple-domain-verification=qC3rSSKrh10DoMI7
atlassian-domain-verification=aGWDxGvt+oY3p7qTWt5v2uJDVJkoJAeHxwGqKmGQLMEsUXUJJe...
atlassian-domain-verification=vBaV6PXyyu4OAPLiQFbxFMCboSTjoR/qxKJ2OlpI46ZEpZL/FV...
box-domain-verification=95c33f4ee4b11d8827190dbc5371ca7df25b961019116e5565ce4aa3...
cursor-domain-verification-f9fw38=WVB8yAMGTZXO7Je9DLuj1DIZB
docusign=6ba0c5a9-5a5e-41f8-a7c8-8b4c6e35c10c
google-site-verification=0uv13-wxlHK8FFKaUpgzyrVmL1YdNYW6v3PupLdw3JI
google-site-verification=5Qzlkl8HJJSBKnMI7rQGDr9Sgiir4Ey6klx1rWQCJ2M
google-site-verification=QO4VY1PRzsG-MxiQn3j0kxd_ZaFjcTk6MWBfKru0_5I
google-site-verification=oh_YJE560y0e6FHP1RT7NIjyTlBhACNMvD2EgSss0sc
google-site-verification=zZHozYbAJmSLOMG4OjQFoHiVqkxtdgvyBzsE7wUGFiw
jamf-site-verification=EGK11tNR4hezQg0jZaIDpA
jetbrains-domain-verification=bjn7o9fxbduga0omhaepeewtx
onetrust-domain-verification=6b98ba3dd087405399bbf45b6cbdcd37
postman-domain-verification=ad4c89daaf83d06f70cb6e8737cb323b039aeaae9e0e288c7508...
protonmail-verification=24cb91442caf54c8b820f4a0347292f143531210
stripe-verification=80aa7e2c9775fee2653f61b04b46da6fd227b56fecd9499e5f63cd0dcf56...
stripe-verification=9bd70dd1884421b47f596fea301e14838c9825cdba5b209990968fdc6f80...
twilio-domain-verification=5e37855d7c9445e967b31c5e0371ebb5
SPF v=spf1 include:amazonses.com include:_spf.google.com include:19922862.spf01.hubs...
CAALookup not available with standard resolver
Resolved in 68 ms
A+
Subdomain Takeover
No subdomain takeover risk detected
PASS
No subdomain takeover risk detected
Info::
No CNAME record present
A
CAA Records
issue: digicert.com, pki.goog
PASS
issue: digicert.com, pki.goog
Info::
CAA issue tag present — authorized CA(s): digicert.com, pki.goog
Info::
No CAA iodef tag — won't be notified of failed issuance attempts
Add `0 iodef "mailto:security@example.com"` to receive notifications when a CA refuses issuance because it doesn't match your CAA policy. Useful signal for detecting issuance attempts by unauthorized CAs.
A+
Multi-Resolver DNS Speed
Mean 1ms across 3 resolvers (spread 1ms)
PASS
Mean 1ms across 3 resolvers (spread 1ms)
Info::
Quad9: 1ms
Got: 1ms via 9.9.9.9:53
Info::
Google: 1ms
Got: 1ms via 8.8.8.8:53
Info::
Cloudflare: 2ms
Got: 2ms via 1.1.1.1:53
A
Redirect Chain
1 redirect(s), 25 ms total
PASS
1 redirect(s), 25 ms total
Info::
Single redirect
Got: https://reddit.com → https://www.reddit.com/ (301)
Info::
WWW normalization redirect

https://reddit.com

12 ms · HTTP/1.1

301

https://www.reddit.com/

14 ms · HTTP/1.1 FINAL

#URLStatusTimeProtocolServer
1https://reddit.com30112 msHTTP/1.1snooserv
2https://www.reddit.com/20014 msHTTP/1.1snooserv

See the visual redirect chain in the HTTP Probe tab →

A+
IPv6 Readiness
IPv6 reachable (1 ms)
PASS
IPv6 reachable (1 ms)
Info::
IPv6 is configured and reachable at 2a04:4e42::396, 2a04:4e42:200::396, 2a04:4e42:400::396, 2a04:4e42:600::396
Got: 1 ms connect
IPv6 Ready
AAAA Records 2a04:4e42::396, 2a04:4e42:200::396, 2a04:4e42:400::396, 2a04:4e42:600::396 Connection Reachable (1 ms)
A+
Domain Intelligence
reddit.com — via MarkMonitor Inc., 21 years, 4 months old
PASS
reddit.com — via MarkMonitor Inc., 21 years, 4 months old
Info::
Domain registered until Apr 29, 2028 (2 years remaining)
Info::
DNSSEC is not enabled
DNSSEC protects against DNS spoofing attacks. While not required, enabling DNSSEC adds an additional layer of security. Contact your DNS provider to enable it.
Info::
Registrar: MarkMonitor Inc.
Warning::
Registrar lock is NOT enabled
The domain can be transferred without an unlock step. Enable registrar lock (clientTransferProhibited) in your registrar's control panel to protect against unauthorized or accidental transfers.
Domain expiry

715 days

April 29, 2028

SSL certificate

147 days

Issued by DigiCert Inc

Domain age

21 years, 4 months

Registered April 29, 2005

DNSSEC

Not enabled

Protects against DNS spoofing

Hosting

Unknown

2a04:4e42::396

Registrar

MarkMonitor Inc.

Unlocked 4 NS records
Expiry timeline
Today
+1 year
Domain expiry SSL expiry Danger zone (≤30 days)
Recommended actions
  • Enable DNSSEC to protect visitors from DNS spoofing
  • Enable registrar lock (clientTransferProhibited) to block unauthorized domain transfers
Registrar MarkMonitor Inc.
Created April 29, 2005 (21 years, 4 months ago)
Expires April 29, 2028 (2 years)
Last Updated March 28, 2026
Name Servers ns-1029.awsdns-00.org, ns-1887.awsdns-43.co.uk, ns-378.awsdns-47.com, ns-557.awsdns-05.net
DNSSEC Not enabled
Hosting
IP Address 2a04:4e42::396
Data source: rdap (0.4s)

DNSSEC protects against DNS spoofing attacks. While not required, enabling DNSSEC adds an additional layer of security. Contact your DNS provider to enable it.

Why this matters

Without DNSSEC, an attacker who can poison your DNS can hijack your domain — and SSL certs alone don't stop them.

Learn more

DNSSEC adds cryptographic signatures to DNS records, preventing forged responses from poisoning resolver caches. Without it, an attacker who controls the network path can redirect your domain to a malicious server before any HTTPS handshake happens. Most modern registrars (Cloudflare, Google Domains, Route 53) enable it with one toggle.

Source: ICANN / RFC 4033

The domain can be transferred without an unlock step. Enable registrar lock (clientTransferProhibited) in your registrar's control panel to protect against unauthorized or accidental transfers.

Why this matters

Without registrar lock, an attacker who phishes your registrar credentials can transfer the domain in minutes — total brand hijack.

Learn more

Registrar lock (clientTransferProhibited, clientUpdateProhibited, clientDeleteProhibited) requires extra verification before any transfer/update/delete. Every major registrar offers it free. Combined with 2FA on your registrar account, it's the strongest defense against domain hijacking.

Source: ICANN / domain-security best practice

A+
HTTP Probe Timing
Total 11 ms — DNS, TCP, TLS, TTFB, content transfer breakdown
PASS
DNS Lookup DNS Lookup — time to resolve the domain name to an IP address.
3 ms
TCP Connect TCP Connect — time to establish a TCP connection to the server.
1 ms
TLS Handshake TLS Handshake — time to complete the HTTPS encryption handshake.
3 ms
Time to First Byte Time to First Byte — how long the server takes to respond with the first byte of data.
11 ms
Total Time Total request time from DNS lookup through full response.
11 ms

Connection waterfall

DNS Lookup 3 ms TCP Connect 1 ms TLS Handshake 3 ms Server Processing 4 ms Content Transfer 0 ms
A+
Health Check Endpoint
Auth-protected health endpoint at https://reddit.com/health (HTTP 403)
PASS
Auth-protected health endpoint at https://reddit.com/health (HTTP 403)
Info::
Auth-protected health endpoint exposed at https://reddit.com/health
Got: https://reddit.com/health
All checks on this page are automated. Results are estimates - run targeted manual reviews when the score affects a release decision.

Send Feedback