A free analysis tool to check if a website is disguising third-party trackers as first-party trackers.
Analysis results for:
SFR
https://www.sfr.fr
sfr.fr
Disguised Third-Party Trackers
These trackers are purposely disguising themselves as first-party to bypass browser restrictions and privacy-protection tools.
Adobe Experience Cloud
sfr.fr.ssl.d2.sc.omtrdc.net is hiding behind smetrics.sfr.fr.
2 different requests were immediately made to this tracker after opening sfr.fr.
https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s1224466120022?AQB=1&ndh=1&pf=1&t=27%2F10%2F2019%2015%3A27%3A59%203%200&fid=33D18DDA95E9D507-1B2834E4631EEA20&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&pageName=Web%2FHomePages%2FAccueil%2FV4&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV4&v7=%3EHomePages%3AV4%3E%23&c8=99&v8=99&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&c13=99&v13=99&c14=99&v14=99&v16=X&c17=2&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v28=refus_cookie&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7CNSF-1%7C034-2%7C819-1%7C867-1%7C998-1%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
https://smetrics.sfr.fr/b/ss/sfrunvglobprod,sfrunvboutprod/1/JS-2.12.0/s1224466120022?AQB=1&pccr=true&vidn=2EEF4AFF8515C837-400007C4C32D8E46&ndh=1&pf=1&t=27%2F10%2F2019%2015%3A27%3A59%203%200&fid=33D18DDA95E9D507-1B2834E4631EEA20&vmt=4CCBEF5D&vmf=sfr.122.2o7.net&ce=UTF-8&ns=sfr&pageName=Web%2FHomePages%2FAccueil%2FV4&g=https%3A%2F%2Fwww.sfr.fr%2F&cc=EUR&ch=HomePages&server=www.sfr.fr&events=event53%2Cevent45%2Cevent47&c1=HomePages%3AAccueil&h1=Web%2FHomePages%2FAccueil&c2=HomePages%3AAccueil%3AV4&v7=%3EHomePages%3AV4%3E%23&c8=99&v8=99&c10=1&v10=1&v11=D%3Dc1&v12=D%3Dc2&c13=99&v13=99&c14=99&v14=99&v16=X&c17=2&c18=99&v18=99&c19=99&v19=99&c27=HTTPS&v28=refus_cookie&v29=D%3DpageName&c33=Mozilla_5.0_%28Windows_NT_10.0_Win64_x64%29_AppleWebKit_537.36_%28KHTML%2C_like_Gecko%29_Chrome_79.0.3945.0_Safari_537.36&v39=Tape%2FMarque&c40=D%3DpageName&v40=Tape%2FMarque&v45=D%3DpageName&v50=Tape%2FMarque&c55=%7CNSF-1%7C034-2%7C819-1%7C867-1%7C998-1%7C&v55=D%3Dc55&c64=Tape%2FMarque&c73=https%3A%2F%2Fwww.sfr.fr%2F&s=800x600&c=24&j=1.6&v=N&k=Y&bw=1200&bh=700&AQE=1
Eulerian
sfr.eulerian.net is hiding behind netc.sfr.fr.
This tracker is executing JavaScript on sfr.fr, greatly increasing its ability to perform fingerprinting.
2 different requests were immediately made to this tracker after opening sfr.fr.
https://netc.sfr.fr/WWSFRF8223.js
https://netc.sfr.fr/col246a/-/691398324?sd=24&profildetaille=99&url=https%3A%2F%2Fwww.sfr.fr%2F&marchand=marchand&eatm_section=home&eatm_clientType=prospect&eatm_pagetype=home&eatm_brand=sfr&eatm_pro=0&clientauthentifie=1&ss=800x600&device=t&eatm_isNewBol=0&urlp=%2Fweb%2Fhomepages%2Faccueil%2Fv4&fra=0&
Leaking Cookies
These cookies belong to sfr.fr and were automatically sent to the disguised third-party trackers listed above.
etuixb.7gulu6d6ru30knEQ68BI1BGkD03F_Xqxfa5VxJ9TmSKSkYUIcbKQ--
s_cctrue
eTagLV26247807
authent1_undefined
eTagUI>HomePages:V4>#
eTab9981
gpv_p41Web%2FHomePages%2FAccueil%2FV4
s_depth1
eTab0342
eTab8671
eTagAB81
eTab8191
s_cmCT18227:Tape/Marque
eTabNSF1
While our analysis tool was not able to confirm that session cookies were sent as well, a long list of leaking cookies could mean that they would be.
Anyone in possession of those cookies can impersonate you on that website — i.e., access your account.
Cached analysis results from .
Analyze again