TrackingTheTrackers
.com
TrackingTheTrackers
.com
A free analysis tool to check if a website is disguising third-party trackers as first-party trackers.
ANALYZE
Analysis results for:
SFR
https://www.sfr.fr
Disguised Third-Party Trackers
These trackers are purposely disguising themselves as first-party to bypass browser restrictions and privacy-protection tools.
sfr.fr.ssl.d2.sc.omtrdc.net
is hiding behind
smetrics.sfr.fr
.
2 different requests were immediately made to this tracker after opening sfr.fr.
→ https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s82215039558225?AQB=1&ndh=1&pf=1&t=25%2F5%2F2022%2013%3A48%3A54%206%200&fid=788FA85E6539368F-0480B8FF58BCE813&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&cl=34000000&pageName=Web%2FHomePages%2FAccueil%2FV6&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV6&v7=%3EHomePages%3AV6%3E%23&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&v16=X&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7C604-1%7C550-2%7C609-1%7C389-3%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
→ https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s82215039558225?AQB=1&pccr=true&vidn=315B8923749CDB00-4000188667EF747D&ndh=1&pf=1&t=25%2F5%2F2022%2013%3A48%3A54%206%200&fid=788FA85E6539368F-0480B8FF58BCE813&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&cl=34000000&pageName=Web%2FHomePages%2FAccueil%2FV6&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV6&v7=%3EHomePages%3AV6%3E%23&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&v16=X&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7C604-1%7C550-2%7C609-1%7C389-3%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
sfr.eulerian.net
is hiding behind
netc.sfr.fr
.
This tracker is executing JavaScript on sfr.fr, greatly increasing its ability to perform fingerprinting.
2 different requests were immediately made to this tracker after opening sfr.fr.
→ https://netc.sfr.fr/RNETCS4525.js
→ https://netc.sfr.fr/col188a/-/1906855682?device=t&eatm_intentionMatter=0&eatm_clientType=prospect&eatm_brand=sfr&eatm_pagetype=home&marchand=marchand&segment-site=homepage&url=https%3A%2F%2Fwww.sfr.fr%2F&profildetaille=99&urlp=%2Fweb%2Fhomepages%2Faccueil%2Fv6&eatm_section=home&fra=0&eatm_segmentSite=homepage&eatm_pro=0&sd=24&eatm_intentionType=sfr%2Fbol%2Fonline%2Fautre%2Fautre%2Fautre&ss=800x600&gdpr_customvendor=89.10002.10004.10005.10006.10007.10008&evariant=1-2&clientauthentifie=1&
Leaking Cookies
These cookies belong to sfr.fr and were automatically sent to the disguised third-party trackers listed above.
etuix
YDQOWK7hwEOzZmH_X1wBfDQ3upbfU4zOX9yw6kq_c.j27MAbPQpiqQ--
eTpT
0
s_vi
[CS]v1|315B8923749CDB00-4000188667EF747D[CE]
s_cc
true
s_cmCT
19168:Tape/Marque
gpv_p41
Web%2FHomePages%2FAccueil%2FV6
s_depth
1
eTagAB
52
s_fid
788FA85E6539368F-0480B8FF58BCE813
eTagUI
>HomePages:V6>#
authent
1_undefined
eTab389
3
eTab609
1
eTab604
1
eTagLV
27602748
eTeCli
X
eTab550
2
While our analysis tool was not able to confirm that session cookies were sent as well, a long list of leaking cookies could mean that they would be.
Anyone in possession of those cookies can impersonate you on that website — i.e., access your account.
Cached analysis results from
a year ago
.
Analyze again