Skip to main content

Is ameli.fr a Scam? Security Check Results - ameli.fr Reviews

A

Is ameli.fr Safe? Security Analysis for Just a moment...

Check if ameli.fr is a scam or legitimate. Free security scan and reviews.

Analyzed 9/7/2025Completed 1:09:12 PM
42
Security Score
HIGH RISK

AI analysis incomplete. Run a Rescan to get comprehensive AI-powered insights including business intelligence, technology detection, and security observations.

πŸ›‘οΈSecurity Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

55/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Weak Referrer-Policy configuration

LOW

Current value: "same-origin"

πŸ‘€GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

10/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

Third-party services without privacy policy

HIGH

Detected services: Cloudflare

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

πŸ›‘οΈNIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

πŸ“§Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

85/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

Strict DMARC Alignment

LOW

Strict alignment may cause legitimate emails to fail

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 ip4:93.174.145.55 ip4:93.174.144.25 ip4:93.174.145.54 ip4:93.174.144.24 ip4:93.174.145.218 ip4:93.174.144.218 -all
DNS Lookups:0/10
Policy:-all
DMARC Details
Policy:reject
Subdomain Policy:reject
Aggregate Reports:cpam.rua@emailsecurity.merox.io
MTA-STS Details

πŸ†SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

85/100
Score

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 31 days

Mixed Content Detected

MEDIUM

1 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints

Certificate Details

Subject:ameli.fr
Issuer:Certigna Services CA
Valid Until:10/8/2025 (31 days)
SANs:www.assurance-maladie.ameli.fr, www.invasion-ist.ameli.fr, www.bonsreflexes.ameli.fr +7 more

OCSP Status

OCSP Stapling Disabled

πŸ“ŠDNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

85/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Registration Details

Domain Age
23 years(mature)
Expiry Risk
low(300 days)
Protection Level
strong

DNS Records

A Records:89.31.147.88
Name Servers:
dns1.cscdns.net
dns2.cscdns.net
MX Records:
20: smtpagt1.assurance-maladie.fr
20: smtpagt2.assurance-maladie.fr
SOA:Serial: 2018091488, TTL: 14400s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:152ms

SPF Analysis

SPF Record:
v=spf1 ip4:93.174.145.55 ip4:93.174.144.25 ip4:93.174.145.54 ip4:93.174.144.24 ip4:93.174.145.218 ip4:93.174.144.218 -all

⚑Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

0/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

Critical Service Exposed: Telnet

CRITICAL

Port 23 (Telnet) is publicly accessible - Telnet - Unencrypted remote access

High-Risk Service Exposed: RPC

HIGH

Port 135 (RPC) is publicly accessible - RPC - Windows RPC endpoint

High-Risk Service Exposed: NetBIOS

HIGH

Port 139 (NetBIOS) is publicly accessible - NetBIOS - Windows file sharing

Critical Service Exposed: SMB

CRITICAL

Port 445 (SMB) is publicly accessible - SMB - Windows file sharing, high risk

Critical Service Exposed: MSSQL

CRITICAL

Port 1433 (MSSQL) is publicly accessible - MSSQL - Database server

Critical Service Exposed: Oracle

CRITICAL

Port 1521 (Oracle) is publicly accessible - Oracle - Database server

Critical Service Exposed: MySQL

CRITICAL

Port 3306 (MySQL) is publicly accessible - MySQL - Database server

Critical Service Exposed: RDP

CRITICAL

Port 3389 (RDP) is publicly accessible - RDP - Remote Desktop, prime ransomware target

Critical Service Exposed: PostgreSQL

CRITICAL

Port 5432 (PostgreSQL) is publicly accessible - PostgreSQL - Database server

Critical Service Exposed: Redis

CRITICAL

Port 6379 (Redis) is publicly accessible - Redis - In-memory database

High-Risk Service Exposed: Elasticsearch

HIGH

Port 9200 (Elasticsearch) is publicly accessible - Elasticsearch - Search engine

Critical Service Exposed: MongoDB

CRITICAL

Port 27017 (MongoDB) is publicly accessible - MongoDB - NoSQL database

Analyze Another Website