DNS Records
A | 141.193.213.10 |
MX | alt1.aspmx.l.google.com (priority: 5) |
MX | alt2.aspmx.l.google.com (priority: 5) |
MX | alt3.aspmx.l.google.com (priority: 10) |
MX | alt4.aspmx.l.google.com (priority: 10) |
MX | aspmx.l.google.com (priority: 1) |
NS | ns1.dnsimple.com |
NS | ns2.dnsimple-edge.net |
NS | ns3.dnsimple.com |
NS | ns4.dnsimple-edge.org |
TXT | apple-domain-verification=Wb3qIPAzoidNpdOR |
TXT | atlassian-domain-verification=bIaczIt0CNtVbBCJywbz18vth5aCM/69yQR3DaUwGT6St974ySrom7yllB1vTETC |
TXT | atlassian-sending-domain-verification=f26fe8ec-0b5e-4c0a-b484-c7a68dbde0c2 |
TXT | google-site-verification=B0dL4CXCMyVfJ70U4Jq8nnXX9Si8rX6A-A8TXMelY_Q |
TXT | google-site-verification=yHclpU096xgEV_4CRYNXrErsJxwZutt9CsdJjYYX3Ks |
TXT | MS=ms94232294 |
TXT | slack-domain-verification=A1NlWarsniP5QOZy9WSEGk6m0AvxLL7JdmA3lter |
TXT | v=spf1 a include:_spf.google.com include:servers.mcsv.net ~all |
JSON+LD
{
"@context": "https://schema.org",
"@graph": [
{
"@type": "BreadcrumbList",
"@id": "https://prowler.com/#breadcrumblist",
"itemListElement": [
{
"@type": "ListItem",
"@id": "https://prowler.com/#listItem",
"position": 1,
"name": "Home"
}
]
},
{
"@type": "Organization",
"@id": "https://prowler.com/#organization",
"name": "Prowler",
"description": "Secure Your Cloud, Your Way",
"url": "https://prowler.com/",
"logo": {
"@type": "ImageObject",
"url": "https://prowler.com/wp-content/uploads/prowler-logo.svg",
"@id": "https://prowler.com/#organizationLogo",
"width": 239,
"height": 40
},
"image": {
"@id": "https://prowler.com/#organizationLogo"
}
},
{
"@type": "WebPage",
"@id": "https://prowler.com/#webpage",
"url": "https://prowler.com/",
"name": "Prowler: Open Source Cloud Security Tool",
"description": "See it in action Discover how Prowler simplifies cloud security. Watch our demo to see real-time solutions for complex security challenges. Watch Now Empower your decisions with data-driven insights Leverage detailed analytics to gain insights into security trends and patterns over time. Use data visualizations to make informed decisions about security strategies and resource allocation.",
"inLanguage": "en-US",
"isPartOf": {
"@id": "https://prowler.com/#website"
},
"breadcrumb": {
"@id": "https://prowler.com/#breadcrumblist"
},
"image": {
"@type": "ImageObject",
"url": "https://prowler.com/wp-content/uploads/cta-grid-center-focus.svg",
"@id": "https://prowler.com/#mainImage",
"width": 1728,
"height": 1060
},
"primaryImageOfPage": {
"@id": "https://prowler.com/#mainImage"
},
"datePublished": "2024-08-19T22:32:49-07:00",
"dateModified": "2025-03-26T09:19:12-07:00"
},
{
"@type": "WebSite",
"@id": "https://prowler.com/#website",
"url": "https://prowler.com/",
"name": "Prowler",
"description": "Secure Your Cloud, Your Way",
"inLanguage": "en-US",
"publisher": {
"@id": "https://prowler.com/#organization"
}
}
]
}