Skip to main content

Is stackup.sh a Scam? Security Check Results - stackup.sh Reviews

S

Is stackup.sh Safe? Security Analysis for stackup.sh | 525: SSL handshake failed

Check if stackup.sh is a scam or legitimate. Free security scan and reviews.

OtherN/asmall
Cloudflare
Analyzed 9/6/2025Completed 6:44:22 AM
40
Security Score
HIGH RISK

AI Summary

The website stackup.sh is currently inaccessible due to a Cloudflare SSL handshake failure (Error 525), indicating a misconfiguration or incompatibility between Cloudflare and the origin server's SSL setup. As a result, the site content is blocked and only an error page is served. No business, contact, or policy information is available on the page, severely limiting the ability to assess the company's operations or compliance posture. The technical infrastructure relies on Cloudflare as a CDN and security provider, but the origin server's SSL issues prevent proper secure access. Security posture is weak due to lack of visible security headers and policies. Overall, the site is non-functional and lacks any meaningful content or trust indicators.

Detected Technologies

Cloudflare

🧠AI Business Intelligence

Technology stack, business insights, and market analysis powered by AI.

Business Intelligence

Market & Strategic Analysis

Due to the lack of accessible content and absence of business information, no meaningful business intelligence can be derived. The domain appears to be small scale or early stage, but no details on market positioning, services, or partnerships are available. The only external domain referenced is cloudflare.com, which is related to the CDN and security service used. No contact emails, phone numbers, or social media links are present to indicate active business operations or customer engagement.

Security Posture Analysis

Comprehensive Security Assessment

The security posture is currently poor. The SSL handshake failure prevents secure HTTPS connections end-to-end, which is a critical issue. No security headers or policies are present on the error page. No incident response or vulnerability disclosure information is available. The site is protected by Cloudflare, but the origin server SSL misconfiguration negates this benefit. There is no evidence of GDPR compliance or privacy protections. Overall, the site is vulnerable to service disruption and lacks transparency on security practices.

Strategic Recommendations

Priority Actions for Security Improvement

1

Resolve the SSL handshake failure by configuring the origin server SSL certificate and cipher suites to be compatible with Cloudflare.

Observations

AI-powered comprehensive website and business analysis.

AI-Enhanced Website Analysis

Cloudflare Detected

The website is showing a Cloudflare 525 SSL handshake failed error page indicating the origin server SSL is misconfigured or unreachable. Content is blocked by Cloudflare.

Analysis results may be incomplete. For accurate analysis, please contact guard@offseq.com

Business Insights

Content Quality:

poor

Branding:

inconsistent

Technical Stack

Technologies:
Cloudflare
SEO:

poor

Security Assessment

Security Score:
10/100

Analytics & Tracking

Tracking Level:minimal
Privacy Compliance:poor

Advertising & Marketing

Transparency Level:poor

Website Quality Assessment

Design Quality:poor
User Experience:poor
Content Relevance:poor
Navigation Clarity:poor
Professionalism:poor
Trustworthiness:low

Key Observations

1

Website content is inaccessible due to Cloudflare SSL handshake failure (Error 525).

🛡️Security Headers

HTTP security headers analysis and recommendations.

Security Headers

HTTP security headers analysis

0/100
Score
Analysis failed - content could not be retrieved

👤GDPR Compliance

Privacy and data protection assessment under GDPR regulations.

GDPR Compliance

Privacy and data protection assessment

35/100
Score

No Privacy Policy found

HIGH

GDPR requires a clear and accessible privacy policy

No Cookie Policy found

HIGH

GDPR requires clear information about cookie usage

No Cookie Consent Banner found

HIGH

GDPR requires explicit consent for non-essential cookies

Third-party services without privacy policy

HIGH

Detected services: Cloudflare

GDPR Compliance Analysis

Privacy Policy0% confidence
Cookie Policy0% confidence
Contact Information Found90% confidence
phone

🛡️NIS2 Compliance

Network & Information Security Directive compliance assessment.

NIS2 Compliance

Network & Information Security Directive

2/100
Score

No information security framework found

HIGH

NIS2 requires documented cybersecurity and information security measures

No vulnerability disclosure policy

MEDIUM

NIS2 encourages coordinated vulnerability disclosure

No security policy documentation found

HIGH

NIS2 requires documented cybersecurity governance and risk management

No incident response procedures found

HIGH

NIS2 requires documented incident response and business continuity plans

No business continuity planning found

MEDIUM

NIS2 emphasizes operational resilience and business continuity

No security contact information

HIGH

NIS2 requires clear incident reporting channels

No vulnerability reporting mechanism

MEDIUM

Clear vulnerability reporting supports coordinated disclosure

No NIS2 reference found

LOW

Consider explicitly mentioning NIS2 compliance efforts

Critical sector without clear security compliance

HIGH

Detected sectors: transport, digital

📧Email Security

SPF, DKIM, and DMARC validation and email security assessment.

Email Security

SPF, DKIM, and DMARC validation

60/100
Score

DMARC not enforcing

MEDIUM

DMARC policy is set to "none"

No DKIM record found

MEDIUM

DKIM adds cryptographic signatures to emails

No BIMI Record

LOW

BIMI displays brand logos in email clients

No MTA-STS Policy

MEDIUM

MTA-STS enforces TLS for email delivery

No TLS-RPT Record

LOW

TLS-RPT provides reporting for email TLS issues

SPF
Sender Policy Framework
DKIM
DomainKeys Identified Mail
DMARC
Domain-based Message Authentication
MX Records
Mail Exchange Records
BIMI
Brand Indicators
MTA-STS
Mail Transfer Agent Security
TLS-RPT
TLS Reporting
DNSSEC
DNS Security
SPF Details
Record:
v=spf1include:_spf.google.com~all
DMARC Details
Policy:none
Aggregate Reports:0f052d2800574c4d95bd4e1dec3347c3@dmarc-reports.cloudflare.net

🏆SSL/TLS Security

Certificate validity and encryption analysis.

SSL/TLS Security

Certificate validity and encryption analysis

75/100
Score

SSL Certificate Expires Within 90 Days

MEDIUM

SSL certificate expires in 85 days

Weak SSL Key Length

HIGH

SSL certificate uses 256-bit key, which is considered weak

Partial SSL/TLS Assessment

LOW

Completed 2 of 4 security checks due to time constraints

Certificate Details

Subject:stackup.sh
Issuer:WE1
Valid Until:12/1/2025 (85 days)
SANs:stackup.sh, *.stackup.sh

OCSP Status

OCSP Stapling Disabled

📊DNS Health

DNS configuration and security assessment.

DNS Health

DNS configuration and security assessment

35/100
Score

Unregistered MX Record

HIGH

MX record points to unregistered domain: 7rkn47okjtuaio2p62izzogcu4vodlf3jwtyb7kd3ofdlridpxxa.mx-verification.google.com

DNSSEC Not Enabled

MEDIUM

DNSSEC is not configured for this domain

CAA Records Not Configured

LOW

Certificate Authority Authorization (CAA) records not found

Potential Subdomain Takeover

HIGH

Subdomain api.stackup.sh points to unregistered service ag-8080-1491798611.us-east-1.elb.amazonaws.com

Invalid SPF Record

MEDIUM

SPF record syntax is invalid

DMARC Policy Set to None

LOW

DMARC is configured but not enforcing any policy

DNS Records

A Records:172.67.73.235, 104.26.0.67, 104.26.1.67
AAAA Records:2606:4700:20::681a:43, 2606:4700:20::ac43:49eb, 2606:4700:20::681a:143
Name Servers:
kristina.ns.cloudflare.comDNS only
kurt.ns.cloudflare.comDNS only
MX Records:
1: aspmx.l.google.com
10: alt3.aspmx.l.google.com
10: alt4.aspmx.l.google.com
15: 7rkn47okjtuaio2p62izzogcu4vodlf3jwtyb7kd3ofdlridpxxa.mx-verification.google.com
5: alt1.aspmx.l.google.com
5: alt2.aspmx.l.google.com

DNSSEC Status

DNSSEC Not Enabled

SPF Analysis

SPF Record:
v=spf1 include:23377954.spf10.hubspotemail.net ~all v=spf1 include:_spf.google.com ~all v=spf1include:_spf.google.com~all

Network Security

Port scanning and network exposure analysis.

Network Security

Port scanning and network exposure analysis

100/100
Score

Good Network Security Posture

LOW

No unnecessary services detected on common risky ports

🔧Technical Analysis

Detailed technical findings and analysis from AI assessment.

Technical Analysis

Comprehensive security assessment findings

Additional Findings

The website uses Cloudflare as a CDN and security provider, but the origin server SSL configuration is incompatible, causing a 525 SSL handshake failure error. The HTML content is minimal and only serves an error message with no metadata beyond basic charset and viewport tags. No CMS, analytics, or marketing technologies are detected. The site lacks SEO optimization and accessibility features. Performance and mobile optimization cannot be assessed due to blocked content. The technical debt includes misconfigured SSL and absence of security best practices.
Analyze Another Website