Skip to main content

Is fullcontact.com a Scam? Security Check Results - FullContact Reviews

fullcontact.com favicon

Is fullcontact.com Safe? Security Analysis for FullContact

Check if fullcontact.com is a scam or legitimate. Free security scan and reviews.

TechnologyN/amedium
Google AnalyticsGoogle Tag ManagerLinkedIn Insight TagPardotjQuery+5 more
Analyzed 9/6/2025Completed 12:52:49 AM
72
Security Score
MEDIUM RISK

AI Summary

FullContact is a privacy-focused identity resolution company that provides businesses with tools to unify, enrich, and manage customer data for improved personalization and marketing effectiveness. Positioned as an industry leader, FullContact offers a suite of products including lead identification, customer data unification, and first-party data management. The company operates primarily in the B2B technology sector and is a subsidiary of J2 Martech Corp., a Ziff Davis company. The website demonstrates a mature digital presence with comprehensive content, strong branding, and integration of modern marketing and analytics technologies. Security posture is solid with HTTPS enforcement and privacy compliance, though some security headers could be improved. The absence of WHOIS data is a notable transparency gap but does not detract significantly from the overall legitimacy given the professional presentation and partner ecosystem. Strategic recommendations include enhancing security headers, publishing incident response contacts, and adding a security.txt file to improve vulnerability disclosure transparency.

Detected Technologies

Google AnalyticsGoogle Tag ManagerLinkedIn Insight TagPardotjQueryWordPressYoast SEOCanvi (navigation)HotjarCloudflare (implied by JS challenge script)

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

FullContact holds a strong market position in the identity resolution space, leveraging partnerships with major technology companies such as Snowflake, Adobe, and Zapier. Their business model focuses on providing SaaS solutions that enable clients to create unified customer views and actionable insights without compromising privacy. The company targets marketing technology platforms, consumer brands, and publishers, emphasizing privacy-centric data handling. Growth indicators include a robust partner ecosystem and comprehensive resource offerings. The company’s operations reflect a strategic focus on privacy compliance and data security, aligning with evolving regulatory requirements.

Extracted Contact Information

Marketing Intelligence Data

Email Addresses (1)

c*****@fullcontact.com

Security Posture Analysis

Comprehensive Security Assessment

The website employs HTTPS and integrates consent management platforms, indicating a commitment to data privacy and security. Anti-clickjacking measures are implemented, and no sensitive data is exposed in the HTML. However, the absence of explicit security headers such as Content Security Policy (CSP) and HTTP Strict Transport Security (HSTS) suggests room for improvement. There is no publicly available incident response or vulnerability disclosure information, which could hinder rapid response to security issues. Overall, the security maturity is good but could be enhanced by adopting additional best practices and transparency measures.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement and enforce security headers including CSP, HSTS, and X-Content-Type-Options to strengthen defense against common web attacks.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

FullContact

Description:

FullContact is a privacy-safe Identity Resolution company building trust between people and brands. They deliver capabilities to create tailored customer experiences, improve ad targeting, unify data, and apply insights in real-time.

Key Services:
Acumen Lead IdentificationResolve (customer data unification)Enrich (data append and insights)Identity Streme™ (first-party data management)
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
Google AnalyticsGoogle Tag ManagerLinkedIn Insight TagPardotjQueryWordPressYoast SEOCanvi (navigation)HotjarCloudflare (implied by JS challenge script)
Frameworks:
WordPress
Platforms:
WordPress CMS
Performance:

moderate

Mobile:

good

Accessibility:

basic

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • Anti-clickjacking script present
  • Consent management platform integrated
  • No exposed sensitive data in HTML

Analytics & Tracking

Services:
Google AnalyticsHotjarLinkedIn Insight TagPardot
Tracking Level:extensive
Privacy Compliance:good

Advertising & Marketing

Ad Networks:
Google AdsDoubleClickBing AdsLinkedIn Ads
Tracking Pixels:
HotjarLinkedIn Insight TagPardot
Marketing Tools:
PardotConvertexperiments
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and professional design

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

95/100
Score

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

68/100
Score

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

Privacy policy may not be GDPR compliant

MEDIUM

Privacy policy lacks explicit GDPR compliance elements

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
emailphone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

80/100
Score

Complex SPF record

LOW

Too many include statements can cause lookup limits

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:_spf.google.com include:aspmx.pardot.com include:stspg-customer.com include:spf.zoho.com include:transmail.net include:zcsend.net ip4:198.21.4.252/32 ip4:192.254.120.56/32 -all
DNS Lookups:6/10
Policy:-all
DKIM Selectors Found
Selector:google(1296-bit rsa)
Selector:s1(1440-bit rsa)
DMARC Details
Policy:quarantine
Aggregate Reports:088836b424@rua.easydmarc.us
Forensic Reports:088836b424@ruf.easydmarc.us

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

52/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 86 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.3TLSv1.2TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

80/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

Domain Registration Details

Domain Age
25 years(mature)
Expiry Risk
low(273 days)
Protection Level
basicDNSSEC OFF

DNS Records

A Records:141.193.213.10, 141.193.213.11
Name Servers:
ns-1.awsdns-00.com
ns-1295.awsdns-33.org
ns-2042.awsdns-63.co.uk
ns-655.awsdns-17.net
MX Records:
5: aspmx.l.google.com
10: alt2.aspmx.l.google.com
20: alt3.aspmx.l.google.com
20: alt4.aspmx.l.google.com
10: alt1.aspmx.l.google.com
SOA:Serial: 1, TTL: 86400s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:72ms

SPF Analysis

SPF Record:
v=spf1 include:_spf.google.com include:aspmx.pardot.com include:stspg-customer.com include:spf.zoho.com include:transmail.net include:zcsend.net ip4:198.21.4.252/32 ip4:192.254.120.56/32 -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on WordPress CMS with a modern tech stack including Google Analytics, Pardot, LinkedIn Insight Tag, and Hotjar for analytics and marketing automation. The site is mobile optimized with responsive design and good SEO practices implemented via Yoast SEO. Performance is moderate with room for optimization. The presence of multiple external scripts and trackers indicates extensive user data collection, balanced by visible privacy and cookie consent mechanisms. Technical debt appears low, but continuous monitoring of third-party integrations is recommended to mitigate security risks.
Analyze Another Website