doshii.com Technology Stack
doshii.com runs 6 technologies across 5 categories — covering everything from web servers and frameworks to analytics and security.
Infrastructure Layer
Let's Encrypt
Font scripts
Adobe Fonts
Typekit
PaaS
Vercel
SSL/TLS certificate authority
Let's Encrypt
Security
HSTS
Video players
YouTube
Compare doshii.com's Stack
How was this detected?
For doshii.com, DetectZeStack identified 6 technologies: 5 via HTTP fingerprinting and 1 via TLS handshake.
Detection runs four independent layers in parallel: HTTP response headers, TLS handshake metadata, certificate issuer inspection, and DNS record lookups. The breakdown above shows which layers fired for this specific domain — some sites carry most of their fingerprint in HTTP, others rely heavily on infrastructure (DNS/TLS).
How doshii.com compares
Symmetric diff between doshii.com and similar sites detected on DetectZeStack.
vs www.myzeller.com — 3 shared, 3 unique here, 4 unique there
Only on doshii.com: Adobe Fonts, Typekit, YouTube
Only on www.myzeller.com: Next.js, Node.js, React, Webpack
vs www.mastt.com — 1 shared, 4 unique here, 4 unique there
Only on doshii.com: Vercel, YouTube, Adobe Fonts, Typekit
Only on www.mastt.com: Unpkg, cdnjs, jQuery, Google Cloud
vs massdynamics.com — 1 shared, 4 unique here, 4 unique there
Only on doshii.com: Adobe Fonts, Typekit, Let's Encrypt, Vercel
Only on massdynamics.com: Google Cloud, HubSpot CMS Hub, jQuery, AOS
Need this data programmatically? Our API detects 7,300+ technologies at 1/50th the cost of BuiltWith.
Get Free API Key Chrome ExtensionWhat technologies does doshii.com use?
doshii.com uses 6 technologies across 5 categories. The full breakdown is listed above, organized by function. Each technology was identified through analysis of HTTP headers, DNS records, TLS certificates, and HTML content.
How is doshii.com's tech stack detected?
DetectZeStack identifies technologies on doshii.com through multiple detection methods: HTTP response header analysis, HTML and JavaScript content scanning, DNS record lookups, and TLS certificate inspection. This multi-layered approach catches technologies that single-method tools miss.