Skip to main content

Is clientfloor.com a Scam? Security Check Results - clientfloor.com Reviews

C

Is clientfloor.com Safe? Security Analysis for 403 Forbidden

Check if clientfloor.com is a scam or legitimate. Free security scan and reviews.

OtherN/asmall
Analyzed 10/3/2025Completed 4:34:00 PM
39
Security Score
HIGH RISK

AI Summary

The website clientfloor.com is currently inaccessible, returning a 403 Forbidden error page with minimal HTML content. This prevents any meaningful extraction of business, technical, or security information from the site itself. The domain is registered with GoDaddy.com, LLC since 2012 and is active until 2026, indicating a mature domain age. However, the lack of accessible content and absence of security or privacy policies significantly limits the ability to assess the company's market position, services, or compliance posture. Technically, no information about the technology stack, hosting environment beyond the registrar, or analytics tools is available. Security posture cannot be evaluated due to missing data, but the absence of DNSSEC and security headers suggests room for improvement. Overall, the site presents a low trust profile due to inaccessibility and lack of transparency.

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

No business intelligence data could be extracted from the website due to the 403 Forbidden error. The domain age suggests the business or entity has existed for over a decade, but no information about company name, services, sector, or market positioning is available. No contact details, certifications, or trust indicators are present. The lack of accessible content and policies hinders any competitive or strategic analysis.

Security Posture Analysis

Comprehensive Security Assessment

The security posture of clientfloor.com cannot be fully assessed due to the blocked website content. The domain does not have DNSSEC enabled, and no security headers or HTTPS status were provided. The WHOIS data shows no privacy protection, which is positive for transparency. The 403 Forbidden error could indicate restrictive server configurations or security controls, but no specific WAF or security vendor was identified. No incident response or vulnerability disclosure information is available. Overall, the security maturity appears low based on available data.

Strategic Recommendations

Priority Actions for Security Improvement

1

Enable HTTPS with a valid SSL/TLS certificate to secure communications.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Generic Detected

Website returns a 403 Forbidden error with minimal HTML content indicating access is blocked or restricted. No specific WAF vendor identified.

Analysis results may be incomplete. For accurate analysis, please contact guard@offseq.com

Business Insights

Content Quality:

poor

Branding:

inconsistent

Technical Stack

SEO:

poor

Security Assessment

0

Analytics & Tracking

Tracking Level:minimal
Privacy Compliance:poor

Advertising & Marketing

Transparency Level:poor

Website Quality Assessment

Design Quality:poor
User Experience:poor
Content Relevance:poor
Navigation Clarity:poor
Professionalism:poor
Trustworthiness:low

Key Observations

1

Website content is inaccessible due to 403 Forbidden error.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

40/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

Insufficient contact information

MEDIUM

GDPR requires organizations to provide clear contact details

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:secureserver.net -all
DNS Lookups:1/10
Policy:-all

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

72/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 70 days

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

60/100
Score

Unregistered MX Record

HIGH

MX record points to unregistered domain: clientfloor-com.mail.protection.outlook.com

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

Domain Registration Details

Domain Age
13 years(mature)
Expiry Risk
low(280 days)
Protection Level
strongDNSSEC OFF

DNS Records

A Records:209.59.156.75
Name Servers:
ns11.domaincontrol.com
ns12.domaincontrol.com
MX Records:
0: clientfloor-com.mail.protection.outlook.com
SOA:Serial: 2022061901, TTL: 3600s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:51ms

SPF Analysis

SPF Record:
v=spf1 include:secureserver.net -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

Due to the 403 Forbidden error and minimal HTML content, no technical stack, CMS, or platform information could be identified. The domain is hosted or registered via GoDaddy.com, LLC. No scripts, analytics, or marketing tools were detected. The lack of DNSSEC and security headers suggests technical debt in security configuration. Performance, mobile optimization, and accessibility cannot be assessed. The site requires modernization and improved technical implementation to support business and security goals.
Analyze Another Website