A free analysis tool to check if a website is disguising third-party trackers as first-party trackers.
Analysis results for:
SFR
https://www.sfr.fr
sfr.fr
Disguised Third-Party Trackers
These trackers are purposely disguising themselves as first-party to bypass browser restrictions and privacy-protection tools.
Adobe Experience Cloud
sfr.fr.ssl.d2.sc.omtrdc.net is hiding behind smetrics.sfr.fr.
2 different requests were immediately made to this tracker after opening sfr.fr.
https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s82215039558225?AQB=1&ndh=1&pf=1&t=25%2F5%2F2022%2013%3A48%3A54%206%200&fid=788FA85E6539368F-0480B8FF58BCE813&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&cl=34000000&pageName=Web%2FHomePages%2FAccueil%2FV6&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV6&v7=%3EHomePages%3AV6%3E%23&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&v16=X&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7C604-1%7C550-2%7C609-1%7C389-3%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s82215039558225?AQB=1&pccr=true&vidn=315B8923749CDB00-4000188667EF747D&ndh=1&pf=1&t=25%2F5%2F2022%2013%3A48%3A54%206%200&fid=788FA85E6539368F-0480B8FF58BCE813&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&cl=34000000&pageName=Web%2FHomePages%2FAccueil%2FV6&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV6&v7=%3EHomePages%3AV6%3E%23&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&v16=X&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7C604-1%7C550-2%7C609-1%7C389-3%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
Eulerian
sfr.eulerian.net is hiding behind netc.sfr.fr.
This tracker is executing JavaScript on sfr.fr, greatly increasing its ability to perform fingerprinting.
2 different requests were immediately made to this tracker after opening sfr.fr.
https://netc.sfr.fr/RNETCS4525.js
https://netc.sfr.fr/col188a/-/1906855682?device=t&eatm_intentionMatter=0&eatm_clientType=prospect&eatm_brand=sfr&eatm_pagetype=home&marchand=marchand&segment-site=homepage&url=https%3A%2F%2Fwww.sfr.fr%2F&profildetaille=99&urlp=%2Fweb%2Fhomepages%2Faccueil%2Fv6&eatm_section=home&fra=0&eatm_segmentSite=homepage&eatm_pro=0&sd=24&eatm_intentionType=sfr%2Fbol%2Fonline%2Fautre%2Fautre%2Fautre&ss=800x600&gdpr_customvendor=89.10002.10004.10005.10006.10007.10008&evariant=1-2&clientauthentifie=1&
Leaking Cookies
These cookies belong to sfr.fr and were automatically sent to the disguised third-party trackers listed above.
etuixYDQOWK7hwEOzZmH_X1wBfDQ3upbfU4zOX9yw6kq_c.j27MAbPQpiqQ--
eTpT0
s_vi[CS]v1|315B8923749CDB00-4000188667EF747D[CE]
s_cctrue
s_cmCT19168:Tape/Marque
gpv_p41Web%2FHomePages%2FAccueil%2FV6
s_depth1
eTagAB52
s_fid788FA85E6539368F-0480B8FF58BCE813
eTagUI>HomePages:V6>#
authent1_undefined
eTab3893
eTab6091
eTab6041
eTagLV27602748
eTeCliX
eTab5502
While our analysis tool was not able to confirm that session cookies were sent as well, a long list of leaking cookies could mean that they would be.
Anyone in possession of those cookies can impersonate you on that website — i.e., access your account.
Cached analysis results from .
Analyze again