Portal
autographman.co.uk Domain Audit
Sunshine Supporting Services Audit
cscc.com.au Domain Audit
CONFIDENTIAL — SSS-SEC-2026-002 — sunshinesupportingservices.com
Independent Security Assessment

Domain & Email
Security Assessment

A comprehensive security audit of sunshinesupportingservices.com covering email authentication, DNS infrastructure, web security headers, compliance alignment, and threat intelligence.

Domain
sunshinesupportingservices.com
Assessment Date
23 February 2026
Document ID
SSS-SEC-2026-002
Scan Mode
Deep Scan
Classification
CONFIDENTIAL
01 — Overview

Executive Summary

High-level findings and risk assessment for sunshinesupportingservices.com

Critical Findings Detected

This assessment identified 17 findings across email authentication, DNS infrastructure, web security, and compliance alignment for sunshinesupportingservices.com. The domain has critical email security gaps — no DKIM authentication and no DMARC record — while the SPF record includes secureserver.net with hardfail but does not include Microsoft 365 (spf.protection.outlook.com), despite MX routing to Outlook — meaning legitimate outbound emails from M365 will fail SPF checks. The domain is clean on all DNSBL blacklists. The website benefits from GoDaddy's managed infrastructure providing TLS 1.3 and strong HSTS, but the Content Security Policy is limited to frame-ancestors only, and several security headers are absent.

17
Total Findings
6
Critical + High
TLS 1.3
TLS Version
Expires 2026-11-17
Starfield Technologies
Platform
Critical
2
High
4
Medium
4
Low
4
Info
3
Quick Wins

SSS-001: Configure DKIM via Microsoft 365 Admin Center + GoDaddy CNAME records (30min-1h)
SSS-002: Add DMARC record in monitoring mode (p=none) (5min)
SSS-003: Update SPF to include spf.protection.outlook.com (5min)

IDFindingSeverityStatus
SSS-001No DKIM AuthenticationCriticalOpen
SSS-002No DMARC RecordCriticalOpen
SSS-003SPF Record Missing Microsoft 365 IncludeHighOpen
SSS-004Weak Content Security PolicyHighOpen
SSS-005Missing X-Content-Type-Options HeaderHighOpen
SSS-006SMTP STARTTLS Not DetectedHighOpen
SSS-007No CAA RecordsMediumOpen
SSS-008DNSSEC Not EnabledMediumOpen
SSS-009Cookie Missing HttpOnly and SameSite AttributesMediumOpen
SSS-010No MTA-STS PolicyMediumOpen
SSS-011Missing Referrer-Policy HeaderLowOpen
SSS-012Missing Permissions-Policy HeaderLowOpen
SSS-013No security.txt FileLowOpen
SSS-014No TLS-RPT RecordLowOpen
SSS-015HSTS Preload Not SubmittedInfoOpen
SSS-016No DANE/TLSA RecordsInfoOpen
SSS-017No BIMI RecordInfoOpen
02 — Scope & Methodology

Assessment Scope

What was tested, how, and what limitations apply

In Scope

  • ✓ DNS records & configuration
  • ✓ Email authentication (SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE)
  • ✓ HTTP security headers
  • ✓ SSL/TLS configuration
  • ✓ DNSBL / blacklist checking
  • ✓ SMTP analysis
  • ✓ OSINT & historical intelligence
  • ✓ Compliance framework alignment

Out of Scope

  • ✗ Application security testing
  • ✗ Penetration testing
  • ✗ Source code review
  • ✗ Social engineering
  • ✗ Internal network assessment
Methodology Note

This assessment was performed using publicly available information only. No intrusive testing was conducted. Scan timestamp: 2026-02-23T03:00:11Z. Mode: Deep Scan.

03 — Findings

Detailed Findings

17 findings identified, sorted by severity.

SSS-001Critical8.0/10 Critical

No DKIM Authentication

No DKIM records were found for any of 20 common selectors. Emails from @sunshinesupportingservices.com cannot be cryptographically verified as genuine, enabling trivial email forgery. This is especially critical with Microsoft 365 as the mail platform.

Likelihood
Impact
Evidence
Evidence
Selectors checked: 20 (default, google, selector1, selector2, k1, dkim, s1, s2, mail, etc.)
Found: 0

MX: sunshinesupportingservices-com.mail.protection.outlook.com
Platform: Microsoft 365 (requires selector1/selector2 CNAME records)
Remediation
Remediation
Configure DKIM via Microsoft 365 Admin Center:
1. Go to https://security.microsoft.com → Email authentication → DKIM
2. Select sunshinesupportingservices.com
3. Enable DKIM signing
4. Add these CNAME records at GoDaddy DNS:

   selector1._domainkey CNAME selector1-sunshinesupportingservices-com._domainkey.TENANT.onmicrosoft.com
   selector2._domainkey CNAME selector2-sunshinesupportingservices-com._domainkey.TENANT.onmicrosoft.com

(Replace TENANT with the Microsoft 365 tenant name)
SSS-002Critical8.0/10 Critical

No DMARC Record

No DMARC record exists for sunshinesupportingservices.com. Without DMARC, there is no policy instructing receiving servers how to handle emails that fail SPF/DKIM checks, and no reporting mechanism for email authentication failures.

Likelihood
Impact
Evidence
Evidence
dig TXT _dmarc.sunshinesupportingservices.com → No record found

Current state: SPF exists but DKIM missing — DMARC would fail alignment for all emails
Remediation
Remediation
Add DMARC record at GoDaddy DNS. Start with monitoring mode, then tighten after DKIM is configured:

Phase 1 (immediate — monitoring):
  _dmarc TXT "v=DMARC1; p=none; rua=mailto:dmarc@sunshinesupportingservices.com; fo=1"

Phase 2 (after DKIM confirmed working, ~2 weeks):
  _dmarc TXT "v=DMARC1; p=quarantine; rua=mailto:dmarc@sunshinesupportingservices.com; fo=1"

Phase 3 (after quarantine period, ~4 weeks):
  _dmarc TXT "v=DMARC1; p=reject; rua=mailto:dmarc@sunshinesupportingservices.com; fo=1"
SSS-003High6.4/10 High

SPF Record Missing Microsoft 365 Include

The SPF record includes secureserver.net (GoDaddy) with hardfail (-all), but MX points to Microsoft 365 (sunshinesupportingservices-com.mail.protection.outlook.com). Emails sent from Microsoft 365 will fail SPF checks because spf.protection.outlook.com is not included.

Likelihood
Impact
Evidence
Evidence
Current SPF: v=spf1 include:secureserver.net -all
MX: sunshinesupportingservices-com.mail.protection.outlook.com (priority 0)

Missing: include:spf.protection.outlook.com
Remediation
Remediation
Update SPF record at GoDaddy DNS:

v=spf1 include:secureserver.net include:spf.protection.outlook.com -all

This adds Microsoft 365's sending IPs while maintaining the hardfail policy.
SSS-004High4.8/10 High

Weak Content Security Policy

The CSP header only defines frame-ancestors, which prevents clickjacking but provides no protection against XSS, data injection, or other content-based attacks. Missing critical directives: default-src, script-src, style-src, img-src, connect-src.

Likelihood
Impact
Evidence
Evidence
Content-Security-Policy: frame-ancestors 'self' godaddy.com *.godaddy.com dev-godaddy.com *.dev-godaddy.com test-godaddy.com *.test-godaddy.com

Missing directives: default-src, script-src, style-src, img-src, connect-src

Note: This is a GoDaddy Website Builder limitation — CSP is platform-managed
Remediation
Remediation
GoDaddy Website Builder manages the CSP header at the platform level. Options:
1. Contact GoDaddy support to request stricter CSP directives
2. If possible, add custom headers via .htaccess or GoDaddy's header configuration
3. Consider migrating to a platform that allows full CSP control (e.g., Cloudflare Pages, Netlify)

Ideal CSP for a static site:
default-src 'self'; script-src 'self' img1.wsimg.com fonts.googleapis.com; style-src 'self' 'unsafe-inline' fonts.googleapis.com; img-src 'self' isteam.wsimg.com data:; font-src fonts.gstatic.com; frame-ancestors 'self'
SSS-005High3.6/10 Medium

Missing X-Content-Type-Options Header

The X-Content-Type-Options header is not set. Without this header, browsers may MIME-sniff responses, potentially treating non-executable content as executable — enabling drive-by download attacks.

Likelihood
Impact
Evidence
Evidence
Response headers scanned — X-Content-Type-Options: NOT PRESENT

Expected: X-Content-Type-Options: nosniff
Remediation
Remediation
Add header via GoDaddy's configuration or contact support:

X-Content-Type-Options: nosniff

This is a single-value header with no configuration complexity.
SSS-006High3.2/10 Medium

SMTP STARTTLS Not Detected

The SMTP connection to the MX server did not indicate STARTTLS support during the scan. Without STARTTLS, email in transit is unencrypted and vulnerable to interception. Note: Microsoft 365 normally supports STARTTLS — this may be a scan timing issue.

Likelihood
Impact
Evidence
Evidence
MX: sunshinesupportingservices-com.mail.protection.outlook.com
Banner: 220 SY3PEPF0000A727.mail.protection.outlook.com Microsoft ESMTP MAIL Service ready
STARTTLS: false

Note: Microsoft 365 typically supports STARTTLS. The scan may not have received the full EHLO response.
Remediation
Remediation
1. Verify STARTTLS manually: openssl s_client -starttls smtp -connect sunshinesupportingservices-com.mail.protection.outlook.com:25
2. If STARTTLS is confirmed working, this is a false positive from the scan
3. Microsoft 365 Exchange Online always supports TLS — ensure the MX record is correct
4. Consider adding MTA-STS to enforce TLS for inbound email
SSS-007Medium3.2/10 Medium

No CAA Records

No CAA (Certificate Authority Authorization) records exist. Any certificate authority can issue certificates for this domain, increasing the risk of unauthorized certificate issuance.

Likelihood
Impact
Evidence
Evidence
dig CAA sunshinesupportingservices.com → No records

Current CA: GoDaddy (Go Daddy Secure Certificate Authority - G2)
Recommended CAA: restrict to GoDaddy only
Remediation
Remediation
Add CAA records at GoDaddy DNS:

  sunshinesupportingservices.com. CAA 0 issue "godaddy.com"
  sunshinesupportingservices.com. CAA 0 iodef "mailto:admin@sunshinesupportingservices.com"
SSS-008Medium2.4/10 Medium

DNSSEC Not Enabled

DNSSEC is not configured for this domain. DNS responses can be spoofed or tampered with in transit, enabling cache poisoning and man-in-the-middle attacks.

Likelihood
Impact
Evidence
Evidence
dig DS sunshinesupportingservices.com → No DS records
DNSSEC: disabled
Registrar DNS: ns77.domaincontrol.com / ns78.domaincontrol.com (GoDaddy)
Remediation
Remediation
Enable DNSSEC via GoDaddy domain management:
1. Log into GoDaddy → My Products → DNS Management
2. Navigate to DNSSEC settings
3. Enable DNSSEC (GoDaddy handles key generation and DS record publication)

Note: GoDaddy supports one-click DNSSEC for domains using their nameservers.
SSS-009Medium2.4/10 Medium

Cookie Missing HttpOnly and SameSite Attributes

The dps_site_id cookie is set without HttpOnly or SameSite attributes. While the Secure flag is present, missing HttpOnly allows JavaScript access (XSS risk) and missing SameSite may allow CSRF attacks.

Likelihood
Impact
Evidence
Evidence
Set-Cookie: dps_site_id=ap-southeast-2; path=/; secure

Missing: HttpOnly flag
Missing: SameSite attribute
Present: Secure flag ✓
Remediation
Remediation
This is a GoDaddy platform cookie (DPS = Digital Publishing System). Contact GoDaddy support or:

Ideal cookie: dps_site_id=ap-southeast-2; path=/; secure; HttpOnly; SameSite=Lax

Note: Since this appears to be a non-sensitive site ID cookie, the risk is lower than for session cookies.
SSS-010Medium2.4/10 Medium

No MTA-STS Policy

No MTA-STS (Mail Transfer Agent Strict Transport Security) policy exists. Without MTA-STS, there is no mechanism to enforce TLS for inbound email connections, allowing downgrade attacks.

Likelihood
Impact
Evidence
Evidence
MTA-STS record: Not found
MTA-STS mode: null

MX: Microsoft 365 (supports TLS natively, but MTA-STS adds enforcement)
Remediation
Remediation
1. Create MTA-STS policy file at https://mta-sts.sunshinesupportingservices.com/.well-known/mta-sts.txt:

   version: STSv1
   mode: enforce
   mx: sunshinesupportingservices-com.mail.protection.outlook.com
   mx: *.mail.protection.outlook.com
   max_age: 604800

2. Add DNS record:
   _mta-sts TXT "v=STSv1; id=20260223"

Note: Requires hosting the policy file on a subdomain — may need separate hosting from GoDaddy Website Builder.
SSS-011Low1.6/10 Low

Missing Referrer-Policy Header

No Referrer-Policy header is set. The browser's default behaviour may leak the full URL (including query parameters) to external sites when users click outbound links.

Likelihood
Impact
Evidence
Evidence
Response headers scanned — Referrer-Policy: NOT PRESENT

Expected: Referrer-Policy: strict-origin-when-cross-origin
Remediation
Remediation
Add header:
Referrer-Policy: strict-origin-when-cross-origin
SSS-012Low0.8/10 Low

Missing Permissions-Policy Header

No Permissions-Policy header is set. Browser features like camera, microphone, geolocation, and payment APIs are not explicitly restricted.

Likelihood
Impact
Evidence
Evidence
Response headers scanned — Permissions-Policy: NOT PRESENT
Remediation
Remediation
Add header:
Permissions-Policy: camera=(), microphone=(), geolocation=(), payment=()
SSS-013Low0.8/10 Low

No security.txt File

No security.txt file exists at /.well-known/security.txt (RFC 9116). This file provides security researchers with contact information for responsible vulnerability disclosure.

Likelihood
Impact
Evidence
Evidence
GET https://sunshinesupportingservices.com/.well-known/security.txt → Not found
GET https://sunshinesupportingservices.com/security.txt → Not found
Remediation
Remediation
Create /.well-known/security.txt with content:

Contact: mailto:security@sunshinesupportingservices.com
Expires: 2027-02-23T00:00:00.000Z
Preferred-Languages: en

Note: GoDaddy Website Builder may not support custom file paths — check platform capabilities.
SSS-014Low0.4/10 Low

No TLS-RPT Record

No TLS-RPT (TLS Reporting) record exists. Without TLS-RPT, you won't receive reports about email TLS connection failures from receiving servers.

Likelihood
Impact
Evidence
Evidence
dig TXT _smtp._tls.sunshinesupportingservices.com → No record found
Remediation
Remediation
Add DNS record:
_smtp._tls TXT "v=TLSRPTv1; rua=mailto:tlsrpt@sunshinesupportingservices.com"
SSS-015Info0.4/10 Low

HSTS Preload Not Submitted

HSTS is configured with preload directive in the header, but the domain does not appear on the HSTS preload list. The preload directive has no effect until the domain is submitted to hstspreload.org.

Likelihood
Impact
Evidence
Evidence
Strict-Transport-Security: max-age=63072000; includeSubDomains; preload
HSTS Preload List: NOT LISTED

Note: The HSTS configuration is excellent (2-year max-age, includeSubDomains, preload directive present)
Remediation
Remediation
Submit to HSTS preload list:
1. Visit https://hstspreload.org/
2. Enter sunshinesupportingservices.com
3. Confirm the requirements are met (they are)
4. Submit for inclusion

Note: Preload is permanent and difficult to reverse. Ensure all subdomains support HTTPS before submitting.
SSS-016Info0.4/10 Low

No DANE/TLSA Records

No DANE (DNS-based Authentication of Named Entities) TLSA records exist. DANE provides an additional layer of TLS certificate verification via DNS but requires DNSSEC to be enabled first.

Likelihood
Impact
Evidence
Evidence
dig TLSA _25._tcp.sunshinesupportingservices-com.mail.protection.outlook.com → No records

Prerequisite: DNSSEC must be enabled before DANE can be effective
Remediation
Remediation
1. Enable DNSSEC first (see SSS-008)
2. Then add TLSA records for the MX server

Note: DANE adoption is low and Microsoft 365 manages their own TLS certificates. This is informational only.
SSS-017Info0.4/10 Low

No BIMI Record

No BIMI (Brand Indicators for Message Identification) record exists. BIMI allows displaying a verified brand logo in email clients that support it (Gmail, Apple Mail).

Likelihood
Impact
Evidence
Evidence
dig TXT default._bimi.sunshinesupportingservices.com → No record found

Prerequisite: DMARC p=reject must be configured before BIMI will function
Remediation
Remediation
After DMARC is set to p=reject:
1. Create a square SVG logo in Tiny P/S format
2. Optionally obtain a VMC (Verified Mark Certificate) from DigiCert or Entrust
3. Add DNS record:
   default._bimi TXT "v=BIMI1; l=https://sunshinesupportingservices.com/bimi/logo.svg"
04 — Risk Assessment

Risk Matrix

Findings plotted by likelihood and impact

Risk Assessment Matrix — Likelihood vs Impact
Negligible
Minor
Moderate
Major
Severe
Almost Certain
Likely
Possible
Unlikely
Rare
05 — Compliance

Compliance & Framework Assessment

Alignment against 9 industry frameworks

IdControlStatusEvidence
ISM-0574SPF specificationpartialSPF present with hardfail but missing M365 include
ISM-1151SPF verification (hardfail)passUsing -all (hardfail)
ISM-0269DKIM recordsfailNo DKIM selectors found (0 of 20)
ISM-1540DMARC configurationfailNo DMARC record exists
ISM-1799DMARC enforcementfailNo DMARC record — no policy to enforce
ISM-0569Email gateway routingpassMX points to Microsoft 365 (Exchange Online Protection)
ISM-1552HTTPS-onlypassHSTS with 2-year max-age, includeSubDomains, preload directive
ISM-1139TLS configurationpassTLS 1.3 with PFS
ISM-1369TLS forward secrecypassPFS enabled (TLS 1.3 implies PFS)
ISM-1706DNSSECfailNo DS records found
ISM-1485Security headersfail2 of 9 scored headers present (22%)
ISM-0659Content filteringfailNo CAA records; CSP limited to frame-ancestors only
ISM-1157Gateway securitypartialAWS Global Accelerator detected; no explicit WAF
ControlStatusEvidence
INFOSEC-3: Email authenticationfailSPF partial (missing M365), DKIM absent, DMARC absent
INFOSEC-4: Web securitypartialHSTS excellent, TLS 1.3, but weak CSP and missing headers
INFOSEC-10: Essential Eight alignmentfail2 of 5 assessable controls at ML0
ControlStatusEvidence
9.2: DNS filtering/securityfailNo DNSSEC, no CAA records
9.5: DMARC enforcementfailNo DMARC record exists
3.10: TLS configurationpassTLS 1.3 with PFS, HSTS preload-ready
12.1: DNS infrastructurepartialGoDaddy managed NS, no DNSSEC, no CAA

Overall CSF Score: 33% (10/30)

GOVERN1/5IDENTIFY2/5PROTECT3/5DETECT1/5RESPOND1/5RECOVER2/5
Govern
1/5
Identify
2/5
Protect
3/5
Detect
1/5
Respond
1/5
Recover
2/5
ControlStatusEvidence
PCI DSS 4.2.1: Strong cryptographypassTLS 1.3 with AES-128
PCI DSS 6.4.1: Public-facing web app protectionspartialWeak CSP; no explicit WAF detected
PCI DSS 11.3.1: Vulnerability managementpartialManaged platform reduces attack surface; no security.txt for disclosure
ControlStatusEvidence
FirewallspartialAWS Global Accelerator provides some protection; no explicit WAF
Secure ConfigurationfailMissing security headers (5 of 7 absent)
Security Update ManagementpassGoDaddy managed platform handles patching
Access ControlRequires Internal AssessmentCannot assess from external scan
Malware ProtectionRequires Internal AssessmentCannot assess from external scan
ControlStatusEvidence
A05:2021 Security MisconfigurationfailMissing X-Content-Type-Options, Referrer-Policy, Permissions-Policy; weak CSP
A02:2021 Cryptographic FailurespassTLS 1.3, PFS, valid certificate
A07:2021 Identification and Authentication FailuresfailNo DKIM, no DMARC — email authentication failures
ControlStatusEvidence
A.8.24: Use of cryptographypassTLS 1.3 with AES-128 and PFS
A.8.20: Network securitypartialHSTS configured; DNSSEC missing
A.5.14: Information transferfailEmail authentication incomplete (no DKIM/DMARC)
06 — Email Authentication

Email Security Deep Dive

SPF, DKIM, DMARC, MTA-STS, TLS-RPT, DANE, and BIMI analysis

ProtocolStatusDetails
SPFFoundv=spf1 include:secureserver.net -all
Qualifier: hardfail
DKIMNot FoundChecked 20 selectors
DMARCMissingNo DMARC record
MTA-STSMissingNo MTA-STS policy
TLS-RPTMissingNo TLS-RPT record
DANE/TLSANot FoundNo TLSA records
BIMINot FoundNo BIMI record

SPF Mechanism Analysis

2
Total Mechanisms
1/10
DNS Lookups
OK
1
Includes
-all
Qualifier
Hardfail (strict)
include:secureserver.net-all
07 — DNS & Domain

DNS & Domain Infrastructure

Nameservers, records, and DNSSEC status

Record TypeValue
NSns77.domaincontrol.com
ns78.domaincontrol.com
MX sunshinesupportingservices-com.mail.protection.outlook.com
A76.223.105.230
13.248.243.5
AAAA
SOAns77.domaincontrol.com dns.jomax.net 2022111700
CAA
DNSSECNot Enabled

Infrastructure Geolocation

IPLocationISP / Org
76.223.105.230Seattle, United StatesAmazon.com, Inc.
13.248.243.5Montreal, CanadaAmazon.com, Inc.
08 — DNS Quality

DNS Quality Metrics

Nameserver diversity, propagation, and configuration health

2
Nameservers
1
NS Providers
1194d
SOA Serial Age
No
Wildcard DNS

DNS Propagation Check

Consistent

DNS resolution is consistent across global resolvers.

ResolverResults
Google
8.8.8.8
13.248.243.5,76.223.105.230
Cloudflare
1.1.1.1
13.248.243.5,76.223.105.230
Quad9
9.9.9.9
13.248.243.5,76.223.105.230
OpenDNS
208.67.222.222
13.248.243.5,76.223.105.230

TTL Values

Record TypeTTL (seconds)
A3599
MX3599
NS3599
09 — Security Headers

HTTP Security Headers

Analysis of security-related HTTP response headers

F
2/9 security headers present (22%)
HeaderStatusValue
Strict-Transport-SecurityPresentmax-age=63072000; includeSubDomains; preload
Content-Security-PolicyPresentframe-ancestors 'self' godaddy.com *.godaddy.com dev-godaddy.com *.dev-godaddy.com test-godaddy.com *.test-godaddy.com
X-Frame-OptionsMissing
X-Content-Type-OptionsMissing
Referrer-PolicyMissing
Permissions-PolicyMissing
X-XSS-ProtectionMissing
Cross-Origin-Opener-PolicyMissing
Cross-Origin-Resource-PolicyMissing
Cross-Origin-Embedder-PolicyMissing
Cache-ControlPresentmax-age=30
ServerPresentDPS/2.0.0+sha-fa2cab1
10 — Web Security

Cookie, CORS & Web Security

Cookie flags, CORS policy, mixed content, and CSP analysis

Cookies

CookieSecureHttpOnlySameSite
dps_site_idYesNoNone

CORS Policy

Access-Control-Allow-Origin: Not set

CSP Analysis

Content-Security-Policy
{
  "directives": [
    "frame-ancestors 'self' godaddy.com *.godaddy.com dev-godaddy.com *.dev-godaddy.com test-godaddy.com *.test-godaddy.com"
  ],
  "raw": "frame-ancestors 'self' godaddy.com *.godaddy.com dev-godaddy.com *.dev-godaddy.com test-godaddy.com *.test-godaddy.com",
  "missingDirectives": [
    "default-src",
    "script-src",
    "style-src",
    "img-src",
    "connect-src"
  ]
}
11 — Reputation

Blacklist & Email Reputation

DNSBL and domain reputation checks

DNSBL Canary Blocked

The DNS resolver is blocking DNSBL queries. Blacklist results below may be unreliable.

IP Blacklist Checks

DNSBLStatus
zen.spamhaus.orgClean
bl.spamcop.netClean
b.barracudacentral.orgClean
dnsbl.sorbs.netClean
cbl.abuseat.orgClean

Domain Blacklist Checks

DNSBLStatus
dbl.spamhaus.orgClean
multi.uribl.comClean
multi.surbl.orgClean
black.uribl.comClean
12 — SMTP

SMTP Analysis

Mail server banner, capabilities, and encryption

CheckResult
Banner220 ML1PEPF00011308.mail.protection.outlook.com Microsoft ESMTP MAIL Service ready at Sun, 22 Feb 2026 17:00:24 +0000 [08DE6B947CC9F7B1]
EHLO CapabilitiesML1PEPF00011308.mail.protection.outlook.com Hello [[scanner-ip]]
STARTTLSNot Supported
PTR Recordmail-meupr01cu00305.inbound.protection.outlook.com
13 — OSINT

OSINT & Historical Intelligence

Certificate transparency, archived snapshots, and subdomain enumeration

Certificate Transparency Logs

Common NameIssuerNot Before
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22025-10-19T10:18:28
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22024-10-19T06:24:26
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22025-10-19T10:18:28
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22024-10-19T06:24:26
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22023-10-18T21:30:14
sunshinesupportingservices.comC=US, ST=Arizona, L=Scottsdale, O="GoDaddy.com, Inc.", OU=http://certs.godaddy.com/repository/, CN=Go Daddy Secure Certificate Authority - G22022-11-17T10:52:50

Wayback Machine History

Typosquatting & Similar Domains

Common misspellings and confusable domain variants that could be used for phishing or brand impersonation. These should be monitored or defensively registered.

194 variants generated: 11 tld variant, 10 homoglyph, 24 transposed, 90 adjacent key, 25 missing letter, 25 doubled letter, 9 hyphenation

sunshinesupportingservices.net TLD variant WHOIS ↗
sunshіnesupportingservices.com Homoglyph WHOIS ↗
usnshinesupportingservices.com Transposed WHOIS ↗
aunshinesupportingservices.com Adjacent key WHOIS ↗
unshinesupportingservices.com Missing letter WHOIS ↗
ssunshinesupportingservices.com Doubled letter WHOIS ↗
s-unshinesupportingservices.com Hyphenation WHOIS ↗
sunshinesupportingservices.org TLD variant WHOIS ↗
sunshinеsupportingservices.com Homoglyph WHOIS ↗
snushinesupportingservices.com Transposed WHOIS ↗
dunshinesupportingservices.com Adjacent key WHOIS ↗
snshinesupportingservices.com Missing letter WHOIS ↗
suunshinesupportingservices.com Doubled letter WHOIS ↗
sunsh-inesupportingservices.com Hyphenation WHOIS ↗
sunshinesupportingservices.io TLD variant WHOIS ↗
sunshinesuрportingservices.com Homoglyph WHOIS ↗
susnhinesupportingservices.com Transposed WHOIS ↗
wunshinesupportingservices.com Adjacent key WHOIS ↗
sushinesupportingservices.com Missing letter WHOIS ↗
sunnshinesupportingservices.com Doubled letter WHOIS ↗
sunshin-esupportingservices.com Hyphenation WHOIS ↗
sunshinesupportingservices.co TLD variant WHOIS ↗
sunshinesupрortingservices.com Homoglyph WHOIS ↗
sunhsinesupportingservices.com Transposed WHOIS ↗

Showing 24 of 194 variants (highest-threat first)

14 — Technology

Technology Stack

Detected platform, CDN, WAF, and server details

43ms
Response Time
Fast
16ms
DNS Lookup
27ms
Server Processing
ComponentDetails
ServerDPS/2.0.0+sha-fa2cab1
TLS VersionTLS 1.3
Cipher SuiteAes128
SSL Expiry2026-11-17
Perfect Forward SecrecyYes
15 — Hosting

Hosting & Infrastructure

Hosting provider, server software, CMS detection, and certificate history

ComponentDetails
Hosting ProviderAWS
ASN OrganizationAWS Global Accelerator (GLOBAL)
Server VersionDPS/2.0.0
CMS DetectedStarfield Technologies; Go Daddy Website Builder 8.0.0000

Certificate Issuer History

IssuerCertificatesFirst SeenLast Seen
62024-10-19T06:24:262025-10-19T10:18:28
16 — WHOIS & Domain Intel

WHOIS & Domain Intelligence

Domain registration, expiry, registrant contacts, and TLD-specific status analysis via RDAP

WHOIS Privacy Active

Registrant contact details are redacted by a privacy/proxy service. The domain owner's identity is not publicly visible.

5y 0m
Domain Age
360d
Until Expiry
4
Status Codes
5y 0m old — 84% of registration period elapsed
Registered: 2021-02-18TodayExpires: 2027-02-18

Domain Profile

FieldValue
Registrar146
TLD.com
Registered2021-02-18 (5y 0m ago)
Expires2027-02-18 (360 days remaining)
Registrant PrivacyYes (WHOIS privacy enabled)
RDAP Sourcehttps://rdap.org/domain/sunshinesupportingservices.com

Domain Status Codes

Status CodeInterpretationSeverity
client delete prohibitedRegistrar-set delete protectioninfo
client renew prohibitedRegistrar-set renewal lockwarning
client transfer prohibitedRegistrar-set transfer lock (normal)info
client update prohibitedRegistrar-set update lockinfo
.com — ICANN gTLD
Generic top-level domain governed by ICANN. Standard EPP status codes apply. Transfer locks are set by the registrar and are normal protective measures.

RDAP Nameservers

NS77.DOMAINCONTROL.COM
NS78.DOMAINCONTROL.COM
17 — SEO & Visibility

SEO & Visibility

Meta tags, Open Graph, structured data, and sitemap analysis

CheckStatusDetails
Title TagFoundSunshine Support Care (21 chars)
Meta DescriptionMissing
Canonical URLMissing
Viewport MetaFoundPresent
JSON-LD Structured DataMissing
Twitter CardFoundsummary
SitemapFoundAccessible (2 URLs)

Open Graph Tags

PropertyValue
og:imagehttps://img1.wsimg.com/isteam/ip/023c81f3-e27b-40f7-869d-c6051d9b339c/new%20look.png
og:localeen_AU
og:titleSunshine Support Care
og:urlhttps://sunshinesupportingservices.com/
og:typewebsite
og:site_nameSunshine Support Care

Social Share Previews

How this site appears when shared on social platforms.

iMessage / Link Preview
Sunshine Support Care
sunshinesupportingservices.com
Twitter / X
Preview
Sunshine Support Care
sunshinesupportingservices.com
Facebook
Preview
sunshinesupportingservices.com
Sunshine Support Care

robots.txt Directives (2)

Parsed Directives
User-agent: *
Disallow: /404
18 — Site Structure

Site Structure & Crawl Analysis

Pages discovered via HTTP crawl compared against sitemap.xml

3
Pages Crawled
3
Sitemap URLs
100%
Sitemap Coverage
0
Broken Links
In Both (Crawl + Sitemap)
Crawl Only (not in sitemap)
Sitemap Only (not crawled)
Broken (4xx/5xx/timeout)

Site Map Diagram

100%
flowchart TD
  classDef inBoth fill:#00b89420,stroke:#00b894,color:#e8e8ed
  classDef crawlOnly fill:#fdcb6e20,stroke:#fdcb6e,color:#e8e8ed
  classDef sitemapOnly fill:#a855f720,stroke:#a855f7,color:#e8e8ed
  classDef broken fill:#ef535020,stroke:#ef5350,color:#e8e8ed
  root["Sunshine Support Care"]:::inBoth
  subgraph sg__about_us["/about-us"]
    p_about_us["About Us"]:::inBoth
  end
  subgraph sg__contact_us["/contact-us"]
    p_contact_us["Sunshine Support Care"]:::inBoth
  end
  root --> p_about_us
  root --> p_contact_us
Mermaid diagram (enable JavaScript or view in a Mermaid-compatible renderer) flowchart TD classDef inBoth fill:#00b89420,stroke:#00b894,color:#e8e8ed classDef crawlOnly fill:#fdcb6e20,stroke:#fdcb6e,color:#e8e8ed classDef sitemapOnly fill:#a855f720,stroke:#a855f7,color:#e8e8ed classDef broken fill:#ef535020,stroke:#ef5350,color:#e8e8ed root["Sunshine Support Care"]:::inBoth subgraph sg__about_us["/about-us"] p_about_us["About Us"]:::inBoth end subgraph sg__contact_us["/contact-us"] p_contact_us["Sunshine Support Care"]:::inBoth end root --> p_about_us root --> p_contact_us
Crawled 3 pages in 1.8s • Max depth: 4 • Max pages: 100 • Sitemap: https://sunshinesupportingservices.com/sitemap.xml
19 — Monitoring

Proactive Monitoring Recommendations

Recommended monitoring and alerting setup

MonitorToolFrequency
DNSBL monitoringHetrixTools free tierEvery 6 hours
DMARC aggregate reportsPostmark DMARC / DMARCian freeWeekly review
SSL certificate expiryUptime Kuma / UptimeRobotDaily
DNS record driftDNS Spy / custom scriptWeekly
CT log monitoringCertSpotter / Facebook CT MonitorReal-time
20 — Roadmap

Recommendations & Remediation Roadmap

Prioritized actions grouped by timeline

Immediate (0-48 hours)

FindingSeverityActionEffort
SSS-001CriticalConfigure DKIM via Microsoft 365 Admin Center + GoDaddy CNAME records30min-1h
SSS-002CriticalAdd DMARC record in monitoring mode (p=none)5min
SSS-003HighUpdate SPF to include spf.protection.outlook.com5min

Short Term (1-2 weeks)

FindingSeverityActionEffort
SSS-007MediumAdd CAA records for GoDaddy5min
SSS-008MediumEnable DNSSEC via GoDaddy5min
SSS-015InfoSubmit to HSTS preload list5min
SSS-002CriticalEscalate DMARC to p=quarantine after 2 weeks monitoring5min

Medium Term (1-3 months)

FindingSeverityActionEffort
SSS-004HighInvestigate CSP options with GoDaddy or consider platform migration2-4h
SSS-005HighAdd missing security headers if GoDaddy permits custom headers1-2h
SSS-010MediumConfigure MTA-STS (requires subdomain hosting)2-4h
SSS-002CriticalEscalate DMARC to p=reject after 4 weeks5min
21 — Appendices

Appendices

Raw data, glossary, and disclaimers

A. robots.txt

robots.txt
User-agent: *
Disallow: /404

B. Sitemap

Sitemap
https://sunshinesupportingservices.com/sitemap.xml

C. Glossary

TermDefinition
SPFSender Policy Framework — restricts which servers can send email for a domain
DKIMDomainKeys Identified Mail — cryptographic email authentication
DMARCDomain-based Message Authentication, Reporting & Conformance
MTA-STSMail Transfer Agent Strict Transport Security — enforces TLS for email
TLS-RPTTLS Reporting — receive reports about email TLS failures
DANE/TLSADNS-based Authentication of Named Entities — binds certificates to DNS
DNSSECDomain Name System Security Extensions — cryptographic DNS validation
CAACertificate Authority Authorization — restricts which CAs can issue certificates
BIMIBrand Indicators for Message Identification — brand logo in email clients
HSTSHTTP Strict Transport Security — forces HTTPS connections
CSPContent Security Policy — controls which resources a page can load
DNSBLDNS-based Blackhole List — real-time email/IP reputation service

D. Disclaimer

This security assessment was performed using publicly available information only. No intrusive testing, penetration testing, or vulnerability exploitation was conducted.

Severity ratings use a qualitative likelihood x impact risk matrix aligned with ISO 27005. Risk scores are indicative and based on professional judgement.

This document is classified CONFIDENTIAL and is intended solely for the named recipient.

Assessment methodology references: NIST SP 800-177 Rev. 1, OWASP Secure Headers Project, PCI DSS v4.0, UK Cyber Essentials, ACSC Essential Eight, ISO 27005.