A deep technical analysis of 814856 European websites. TLS configuration, email authentication, security headers, and DNS security — measured, not estimated.
91.8%
TLS 1.3
7.8%
DMARC reject
20%
HSTS
8%
CSP
15%
DNSSEC
44%
HTTPS
18%
IPv6 ready
8%
HTTP/3
88%
NS redundancy
0%
sec.txt CRA
11%
Mixed content
5%
CSP reporting
More reports
806213 sites scanned
TLS encrypts data in transit. TLS 1.3 is the current standard — older versions have known vulnerabilities. Required by GDPR Art. 32 (encryption of personal data), NIS2 Art. 21 (state of the art security measures), and PCI DSS 4.0 (TLS 1.2+ mandatory since March 2025).
39%
Forward Secrecy
100%
Certificate Transparency
34%
OCSP Stapling
32%
Wildcard Certs
0%
Deprecated TLS
861108 sites scanned
HTTP security headers instruct browsers to enable protections like XSS filtering, clickjacking prevention, and content type enforcement. OWASP recommends all six headers. NIS2 Art. 21 and ISO 27001 A.8.9 require appropriate technical measures — missing headers indicate gaps.
44%
HTTPS Redirect
5%
HSTS Preload Ready
2%
security.txt
78%
Open CORS
2%
HSTS < 6 months
1%
Unsafe Referrer-Policy
1%
COOP Enabled
6%
Server Misconfigs
843288 sites scanned
SPF, DKIM, and DMARC prevent email spoofing and phishing. Without DMARC enforcement, attackers can send emails that appear to come from your domain. Required by NIS2 Art. 21 (supply chain security), DORA Art. 9 (ICT risk management), and BSI IT-Grundschutz APP.5.3.
68%
SPF
27%
DKIM
39%
DMARC
36%
STARTTLS
36%
Modern SMTP TLS
0%
Blacklisted
Percentage of sites without effective DMARC policy (spoofable via email)
861418 sites scanned
DNS security features protect against cache poisoning, domain hijacking, and man-in-the-middle attacks. DNSSEC is recommended by ENISA and required under NIS2 for essential entities. CAA prevents unauthorized certificate issuance (RFC 8659). MTA-STS enforces TLS for inbound email.
Zone Transfer (AXFR) open on 1% of domains — full DNS zone data is publicly accessible.
How this data was collected and what it represents.
All data is collected through automated, non-intrusive scans of publicly accessible websites. No login credentials are used, no forms are submitted, and no private data is accessed.
Sites are scanned across multiple dimensions: HTTP headers, TLS certificates, DNS records, and email authentication (SPF/DKIM/DMARC). Privacy, accessibility, and technology data are available in dedicated reports.
No individual sites are named. All statistics are aggregated and anonymised. Regulatory references indicate which requirements relate to each finding — they do not assert non-compliance of any specific organisation.
Run a free security scan and see how you compare — TLS, headers, email, DNS — in 30 seconds, no account needed.
Based on automated scans of 814856 European websites. Updated continuously.