DNS Records
A | 104.26.0.72 |
A | 104.26.1.72 |
A | 172.67.70.118 |
AAAA | 2606:4700:20::681a:148 |
AAAA | 2606:4700:20::681a:48 |
AAAA | 2606:4700:20::ac43:4676 |
MX | alt1.aspmx.l.google.com (priority: 5) |
MX | alt2.aspmx.l.google.com (priority: 5) |
MX | alt3.aspmx.l.google.com (priority: 10) |
MX | alt4.aspmx.l.google.com (priority: 10) |
MX | aspmx.l.google.com (priority: 1) |
NS | dorthy.ns.cloudflare.com |
NS | nash.ns.cloudflare.com |
TXT | apple-domain-verification=LmrkYkgYwwPcwv01 |
TXT | atlassian-domain-verification=PsO5fTpMOVgM1XPb6lRphPfmB/cY95ZaS5ZR2E1aowPsOscMLBgFbBJWufNSLKmJ |
TXT | docusign=009f039d-21bd-4752-9c1b-622e0e317283 |
TXT | drift-domain-verification=79dda2760826a01b0b18982e02e1e1083a7f6fb3f6e2665429ee26ff4c26dfee |
TXT | Ffoa6DK4kkXHWJjpyoQrsp8KDLCFpoMXqSivRke04hE= |
TXT | google-site-verification=a5N9-aA_1TA3OGcTdva96TQNXvkj-Iw3OAx3Papa_Rw |
TXT | google-site-verification=RpCvWZeFu8fnHDEcGSCehj7IwZYhdDp_ZNgXZd9IfBw |
TXT | google-site-verification=tpIUVMRJx6506Y9FtjGJ2HyArbzSPisCp_KztZ1CLOU |
TXT | logmein-verification-code=33746b05-2fc3-4a67-95c8-f6e49bccebb9 |
TXT | MS=ms28900440 |
TXT | MS=ms85153935 |
TXT | pardot_273752_*=9ae7a3bcf273bb08905c47d32c6840798f85d4c2ab924a34be4a0994f2d3a18f |
TXT | v=spf1 include:mktomail.com include:mail.zendesk.com include:_spf.google.com include:spf.protection.outlook.com include:_spf.salesforce.com -all |
JSON+LD
{
"@context": "https://schema.org",
"@graph": [
{
"@type": "WebPage",
"@id": "https://anchore.com/",
"url": "https://anchore.com/",
"name": "SBOM-Powered Software Composition Analysis • Anchore",
"isPartOf": {
"@id": "https://anchore.com/#website"
},
"about": {
"@id": "https://anchore.com/#organization"
},
"datePublished": "2024-11-07T01:11:30+00:00",
"dateModified": "2024-11-07T01:11:33+00:00",
"description": "Anchore's SBOM-powered modern SCA platform is trusted by the U.S. department of defense and Fortune 500 companies around the globe.",
"breadcrumb": {
"@id": "https://anchore.com/#breadcrumb"
},
"inLanguage": "en-US",
"potentialAction": [
{
"@type": "ReadAction",
"target": [
"https://anchore.com/"
]
}
]
},
{
"@type": "BreadcrumbList",
"@id": "https://anchore.com/#breadcrumb",
"itemListElement": [
{
"@type": "ListItem",
"position": 1,
"name": "Home"
}
]
},
{
"@type": "WebSite",
"@id": "https://anchore.com/#website",
"url": "https://anchore.com/",
"name": "Anchore",
"description": "Software supply chain security solutions",
"publisher": {
"@id": "https://anchore.com/#organization"
},
"potentialAction": [
{
"@type": "SearchAction",
"target": {
"@type": "EntryPoint",
"urlTemplate": "https://anchore.com/?s={search_term_string}"
},
"query-input": {
"@type": "PropertyValueSpecification",
"valueRequired": true,
"valueName": "search_term_string"
}
}
],
"inLanguage": "en-US"
},
{
"@type": "Organization",
"@id": "https://anchore.com/#organization",
"name": "Anchore, Inc.",
"url": "https://anchore.com/",
"logo": {
"@type": "ImageObject",
"inLanguage": "en-US",
"@id": "https://anchore.com/#/schema/logo/image/",
"url": "https://anchore.com/wp-content/uploads/2021/12/Anchore_Logo_Blue-500.png",
"contentUrl": "https://anchore.com/wp-content/uploads/2021/12/Anchore_Logo_Blue-500.png",
"width": 500,
"height": 185,
"caption": "Anchore, Inc."
},
"image": {
"@id": "https://anchore.com/#/schema/logo/image/"
}
}
]
}