Skip to main content

Is infinity-tracking.com a Scam? Security Check Results - Infinity Reviews

infinity-tracking.com favicon

Is infinity-tracking.com Safe? Security Analysis for Infinity

Check if infinity-tracking.com is a scam or legitimate. Free security scan and reviews.

TechnologyUnited Kingdommedium
HubSpot CMSjQuery 1.11.2Splide.js (carousel)Venobox (lightbox)Calendly (booking widget)+1 more
Analyzed 9/5/2025Completed 4:11:52 AM
71
Security Score
MEDIUM RISK

AI Summary

Infinity is a UK-based technology company specializing in call analytics software designed to enhance marketing performance, sales acceleration, contact center operations, and customer service. Their platform leverages AI-powered call tracking, conversation analytics, and attribution tools to provide actionable insights that help businesses optimize marketing spend and improve customer interactions. The website demonstrates a strong market position with notable clients such as Aviva, Specsavers, and Vodafone, indicating a medium-sized enterprise with a solid reputation. Technically, the website is built on the HubSpot CMS platform, utilizing modern JavaScript libraries like jQuery, Splide.js for carousels, and Venobox for media display. It integrates third-party services such as Calendly for demo bookings and Google Tag Manager for analytics, reflecting a mature digital infrastructure optimized for performance and user experience. The site is mobile-optimized, accessible, and SEO-friendly, with a professional design and clear navigation. From a security perspective, the site enforces HTTPS and uses reputable third-party scripts, though explicit security headers are not visible in the HTML source. There is no exposed sensitive data or vulnerable libraries detected. Privacy compliance is well addressed with clear privacy and cookie policies and GDPR adherence. However, the WHOIS data is fully redacted, which is common for privacy protection but limits transparency. The website compensates with strong trust indicators including client testimonials and partner logos. Overall, Infinity presents a low-risk profile with a professional online presence, robust technical implementation, and good privacy practices. Strategic recommendations include enhancing visible security headers, publishing a security policy and incident response contacts, and maintaining up-to-date third-party components to further strengthen security posture.

Detected Technologies

HubSpot CMSjQuery 1.11.2Splide.js (carousel)Venobox (lightbox)Calendly (booking widget)Google Tag Manager

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Infinity operates in the call analytics and marketing attribution sector, targeting marketers, sales teams, contact centers, and compliance officers. Their business model is B2B SaaS, providing software solutions that connect marketing activities to phone call outcomes, enabling better ROI measurement and operational efficiency. The company has established partnerships and integrations with major technology providers and platforms, enhancing its ecosystem and market reach. The presence of high-profile clients and detailed case studies suggests a competitive advantage in AI-driven call analytics. Growth indicators include new product releases like Smart Outcomes and Smart Match, focusing on AI-powered campaign optimization and call revenue attribution. The company emphasizes customer success and training, indicating a comprehensive service approach beyond software delivery.

Extracted Contact Information

Marketing Intelligence Data

Phone Numbers (8)

+4433306*****
443*******
+4433306*****
+5511438*****
028*******
+3 more numbers found

Security Posture Analysis

Comprehensive Security Assessment

The website demonstrates a mature security posture with mandatory HTTPS usage and secure embedding of third-party services like Calendly. No sensitive information is exposed in the HTML source, and no outdated or vulnerable libraries are detected. However, explicit security headers such as Content-Security-Policy, X-Frame-Options, and X-Content-Type-Options are not evident in the provided HTML, which could be improved. There is no public incident response or security contact information, nor a published vulnerability disclosure policy or security.txt file. Privacy policies are comprehensive and GDPR compliant, reflecting good data protection practices. Overall, the security maturity is good but could benefit from enhanced transparency and additional security controls.

Strategic Recommendations

Priority Actions for Security Improvement

1

Implement and verify security headers including CSP, X-Frame-Options, and X-Content-Type-Options to mitigate common web vulnerabilities.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Company:

Infinity

Description:

Infinity provides call analytics solutions that help improve marketing campaign performance, accelerate sales, streamline operations, and enhance customer experience.

Key Services:
Call TrackingConversation AnalyticsSmart OutcomesSmart Match
Content Quality:

excellent

Branding:

consistent

Technical Stack

Technologies:
HubSpot CMSjQuery 1.11.2Splide.js (carousel)Venobox (lightbox)Calendly (booking widget)Google Tag Manager
Platforms:
HubSpot
Performance:

fast

Mobile:

excellent

Accessibility:

good

SEO:

good

Security Assessment

Security Score:
85/100
Best Practices:
  • HTTPS enforced
  • No exposed sensitive data in HTML
  • Use of reputable third-party scripts
  • Secure form embedding via Calendly

Analytics & Tracking

Services:
Google Tag Manager
Tracking Level:moderate
Privacy Compliance:good

Advertising & Marketing

Marketing Tools:
HubSpotCalendly
Transparency Level:good

Website Quality Assessment

Design Quality:excellent
User Experience:excellent
Content Relevance:excellent
Navigation Clarity:excellent
Professionalism:excellent
Trustworthiness:high

Key Observations

1

Website is fully accessible with rich content and no blocking mechanisms.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

45/100
Score

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Weak Referrer-Policy configuration

LOW

Current value: "no-referrer-when-downgrade"

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

80/100
Score

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

No Data Protection Officer mentioned

LOW

Large organizations may need to designate a DPO under GDPR

GDPR Compliance Analysis

Privacy Policy85% confidence
Cookie Policy85% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

17/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

70/100
Score

Complex SPF record

LOW

Too many include statements can cause lookup limits

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1 include:amazonses.com include:2215743.spf01.hubspotemail.net include:_spf.salesforce.com include:spfcloud.letsignit.com include:spf.protection.outlook.com include:eu.mailgun.org ip4:213.131.182.34 ip4:66.179.50.160/27 ip4:67.217.237.192/27 ip4:75.98.93.0/24 ip4:173.226.199.130 ip4:64.74.209.0/24 ip4:64.191.16.0/24 ip4:35.176.92.96/27 ip4:35.176.228.19/32 -all
DNS Lookups:6/10
Policy:-all
DKIM Selectors Found
Selector:google(1416-bit rsa)
Selector:selector1(1416-bit rsa)
Selector:selector2(1416-bit rsa)
Selector:s1(1296-bit rsa)
DMARC Details
Policy:none
Aggregate Reports:dmarc-reports@infinity.co

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

90/100
Score

Mixed Content Detected

MEDIUM

2 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints

Certificate Details

Subject:www.infinity.co
Issuer:Amazon RSA 2048 M02
Valid Until:6/19/2026 (287 days)
SANs:www.infinity.co

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

80/100
Score

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

Domain Delete Lock Not Enabled

LOW

Domain can be deleted without additional verification

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

Domain Registration Details

Domain Age
15 years(mature)
Expiry Risk
low(227 days)
Protection Level
moderateDNSSEC OFF

DNS Records

A Records:199.60.103.144, 199.60.103.44
Name Servers:
ns-1377.awsdns-44.org
ns-1702.awsdns-20.co.uk
ns-2.awsdns-00.com
ns-878.awsdns-45.net
MX Records:
0: infinity-co.mail.protection.outlook.com
SOA:Serial: 1, TTL: 86400s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:48ms

SPF Analysis

SPF Record:
v=spf1 include:amazonses.com include:2215743.spf01.hubspotemail.net include:_spf.salesforce.com include:spfcloud.letsignit.com include:spf.protection.outlook.com include:eu.mailgun.org ip4:213.131.182.34 ip4:66.179.50.160/27 ip4:67.217.237.192/27 ip4:75.98.93.0/24 ip4:173.226.199.130 ip4:64.74.209.0/24 ip4:64.191.16.0/24 ip4:35.176.92.96/27 ip4:35.176.228.19/32 -all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is built on HubSpot CMS, leveraging modern JavaScript libraries and third-party integrations for enhanced user experience and functionality. Performance is optimized with lazy loading of images and asynchronous script loading. The site is mobile responsive and accessible, with good SEO practices including meta tags and Open Graph data. The use of Google Tag Manager enables flexible analytics deployment. The technical infrastructure is robust and modern, supporting the business goals effectively. Opportunities exist to improve security header implementation and to document technical security controls publicly. No technical debt or legacy technology issues are apparent from the HTML source.
Analyze Another Website