Skip to main content

Is romasassvari.lv a Scam? Security Check Results - romasassvari.lv Reviews

R

Is romasassvari.lv Safe? Security Analysis for romasassvari.lv

Check if romasassvari.lv is a scam or legitimate. Free security scan and reviews.

OtherN/asmall
Parallels Plesk Control PanelJavaScript
Analyzed 7/30/2025Completed 11:35:21 PM
35
Security Score
HIGH RISK

AI Summary

The website romasassvari.lv currently serves only as a default placeholder page generated by the Parallels Plesk Control Panel, indicating that the hosting environment is set up but no actual website content has been uploaded. There is no business information, contact details, or privacy policies present, which suggests the domain is either newly registered or inactive. The site links externally only to Parallels and Virtuozzo domains related to hosting management. Technically, the site uses Parallels Plesk with JavaScript for dynamic content insertion, but lacks modern SEO, accessibility, or security best practices. Security posture is weak due to absence of HTTPS redirect on the main page, missing security headers, and exposure of default test pages. No WAF or blocking mechanisms are detected, but the lack of content and security controls results in a low trust and legitimacy score.

Detected Technologies

Parallels Plesk Control PanelJavaScript

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

No identifiable business operations or market positioning can be derived from the website content. The domain appears unused or under preparation for future deployment. There are no indications of revenue streams, customer targeting, or partnerships beyond hosting provider references. The absence of contact or legal information further limits business intelligence insights.

Security Posture Analysis

Comprehensive Security Assessment

The security posture is minimal and insufficient for a production website. The site lacks HTTPS enforcement on the main page, has no security headers, and exposes default Plesk test pages which could be leveraged for reconnaissance or exploitation. No privacy or incident response policies are present. The domain WHOIS data is unavailable due to query limits, reducing transparency. Overall, the site is vulnerable to basic security risks and does not demonstrate compliance with GDPR or other standards.

Strategic Recommendations

Priority Actions for Security Improvement

1

Upload actual website content promptly to replace the default placeholder page.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Business Insights

Description:

This website is a default placeholder page indicating that the web server is set up but no site content has been uploaded yet.

Content Quality:

poor

Branding:

inconsistent

Technical Stack

Technologies:
Parallels Plesk Control PanelJavaScript
Performance:

moderate

Mobile:

basic

Accessibility:

basic

SEO:

poor

Security Assessment

Security Score:
30/100

Analytics & Tracking

Tracking Level:minimal
Privacy Compliance:poor

Advertising & Marketing

Transparency Level:poor

Website Quality Assessment

Design Quality:poor
User Experience:poor
Content Relevance:poor
Navigation Clarity:poor
Professionalism:poor
Trustworthiness:low

Key Observations

1

Website is a default Parallels Plesk placeholder page with no uploaded content.

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

15/100
Score

Missing Strict-Transport-Security header

HIGH

Forces HTTPS connections

Missing X-Frame-Options header

HIGH

Prevents clickjacking attacks

Missing X-Content-Type-Options header

MEDIUM

Prevents MIME type sniffing

Missing Content-Security-Policy header

HIGH

Controls resources the browser is allowed to load

Missing X-XSS-Protection header

MEDIUM

Legacy XSS protection (deprecated but still recommended)

Missing Referrer-Policy header

LOW

Controls referrer information sent with requests

Missing Permissions-Policy header

MEDIUM

Controls browser features and APIs

Sensitive data may be cached

LOW

Cache-Control header should include "no-store" for sensitive pages

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

25/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

EU business without adequate privacy measures

CRITICAL

EU businesses are subject to strict GDPR requirements

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: energy, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

60/100
Score

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

No email authentication configured

CRITICAL

Domain is vulnerable to email spoofing

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

62/100
Score

Weak Protocols Supported

HIGH

Server supports weak protocols: TLSv1.1

OCSP Stapling Not Enabled

LOW

OCSP stapling improves performance and privacy

Certificate Transparency Not Implemented

LOW

Certificate is not logged in Certificate Transparency logs

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 44 days

Mixed Content Detected

MEDIUM

10 resources loaded over insecure HTTP

Partial SSL/TLS Assessment

LOW

Completed 3 of 4 security checks due to time constraints

Protocol Support

TLSv1.2TLSv1.3TLSv1.1

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

65/100
Score

Insufficient Name Servers

MEDIUM

Domain has only 1 name server (minimum 2 recommended)

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

No DMARC Record

MEDIUM

DMARC policy not configured

DNS Records

A Records:195.60.248.8
Name Servers:
ns.romasassvari.lvDNS only
MX Records:
10: mail.romasassvari.lv
50: mail.tikli.lv
SOA:Serial: 1750019181, TTL: 10800s

DNSSEC Status

DNSSEC Not Enabled

DNS Performance

Resolution Time:414ms

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

20/100
Score

High-Risk Service Exposed: FTP

HIGH

Port 21 (FTP) is publicly accessible - FTP - Often unencrypted file transfer

Service Exposed: SSH

MEDIUM

Port 22 (SSH) is publicly accessible - SSH - Secure but can be brute-forced

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website is hosted on a Parallels Plesk Control Panel environment with JavaScript used for dynamic script loading. No CMS or modern frameworks are detected. The site lacks SEO meta tags, structured data, or accessibility features. Performance is moderate given the minimal content. The hosting provider is not explicitly identified beyond the Plesk references. There is technical debt in the form of exposed test pages and missing HTTPS enforcement. Modernization and security hardening are recommended before launching a production site.
Analyze Another Website