Check DNS, Urls + Redirects, Certificates and Content of your Website


Update: 2020-03-04 - now 90 days later. All affected Letsencrypt certificates should be renewed. Time to remove that Info.




L

Loop - it's impossible to use this site

Checked:
17.09.2019 15:58:46


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
heavy-r.com
A
95.211.187.146
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.
No Hostname found
yes
1
0

AAAA

yes


www.heavy-r.com
A
95.211.187.146
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.
No Hostname found
yes
1
0

AAAA

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 59944, Flags 256



1 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 30.09.2019, 00:00:00, Signature-Inception: 09.09.2019, 00:00:00, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.09.2019, 05:00:00, Signature-Inception: 17.09.2019, 04:00:00, KeyTag 59944, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 17708, Flags 256



Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.09.2019, 18:25:33, Signature-Inception: 09.09.2019, 18:20:33, KeyTag 30909, Signer-Name: com



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: heavy-r.com
heavy-r.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "s3vkr13nritsb1qgiqjligrnqvnvd1i0" between the hashed NSEC3-owner "s3vjrup5ogbggck4pkj1ctu6cksrd1j3" and the hashed NextOwner "s3vl51pjk9ua510qu3r1rulukl4bqpuh". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 23.09.2019, 05:33:38, Signature-Inception: 16.09.2019, 04:23:38, KeyTag 17708, Signer-Name: com



0 DNSKEY RR found




Zone: www.heavy-r.com
www.heavy-r.com
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.heavy-r.com
  ns0.leaseweb.nl

heavy-r.com
  ns1.leaseweb.nl / ns1
62.212.64.121
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.


 
2001:1af8:4100:a064::53
Amsterdam/North Holland/Netherlands (NL) - LEASEWEB


  ns4.leaseweb.net / ns4
85.17.96.106
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.


 
2001:1af8:2100:1::53
Amsterdam/North Holland/Netherlands (NL) - LEASEWEB


  ns5.leaseweb.nl / ns5
83.149.64.123
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.


 
2001:1af8:3100:a006:3::53
Amsterdam/North Holland/Netherlands (NL) - LEASEWEB

com
  a.gtld-servers.net


  b.gtld-servers.net


  c.gtld-servers.net


  d.gtld-servers.net


  e.gtld-servers.net


  f.gtld-servers.net


  g.gtld-servers.net


  h.gtld-servers.net


  i.gtld-servers.net


  j.gtld-servers.net


  k.gtld-servers.net


  l.gtld-servers.net


  m.gtld-servers.net


4. SOA-Entries


Domain:com
Zone-Name:
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1568728715
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:13


Domain:heavy-r.com
Zone-Name:
Primary:ns0.leaseweb.nl
Mail:postmaster.leaseweb.nl
Serial:2017082801
Refresh:14400
Retry:7200
Expire:604800
TTL:86400
num Entries:6


Domain:www.heavy-r.com
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://heavy-r.com/video/162512/girl_humiliated_with_poop/
95.211.187.146
301
https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
0.040
E
Location: https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
Content-Length: 0
Connection: close
Date: Tue, 17 Sep 2019 13:59:21 GMT
Server: unknown/1.0

• http://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
95.211.187.146
302
https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
0.040
A
Location: https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
Content-type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Date: Tue, 17 Sep 2019 13:59:21 GMT
Server: unknown/1.0

• https://heavy-r.com/video/162512/girl_humiliated_with_poop/
95.211.187.146
301
https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
3.430
B
Location: https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
Content-Length: 0
Connection: close
Date: Tue, 17 Sep 2019 13:59:22 GMT
Server: unknown/1.0

• https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
95.211.187.146
301
https://www.heavy-r.com/video/162512/Girl_Humiliated_With_Poop/
3.197
L
Location: /video/162512/Girl_Humiliated_With_Poop/
Content-type: text/html; charset=UTF-8
Connection: close
Transfer-Encoding: chunked
Date: Tue, 17 Sep 2019 13:59:25 GMT
Server: unknown/1.0

• http://heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
95.211.187.146
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.044
E
Visible Content:
Location: https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 0
Connection: close
Date: Tue, 17 Sep 2019 13:59:28 GMT
Server: unknown/1.0

• http://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
95.211.187.146
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.043
A
Visible Content:
Location: https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Date: Tue, 17 Sep 2019 13:59:28 GMT
Server: unknown/1.0

• https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 11/5439 Inline-CSS (∑/total): 3/1861
404

Html is minified: 149.68 %
3.200
A
Not Found
Visible Content:
Content-Type: text/html; charset=utf-8
Last-Modified: Tue, 17 Sep 2019 13:59:29 GMT
Cache-Control: no-cache, must-revalidate
Pragma: no-cache
Connection: close
Transfer-Encoding: chunked
Date: Tue, 17 Sep 2019 13:59:29 GMT
Server: unknown/1.0

7. Comments


1. General Results, most used to calculate the result

Aname "heavy-r.com" is domain, public suffix is "com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services"
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Ahttp://www.heavy-r.com/video/162512/girl_humiliated_with_poop/ 95.211.187.146
302
https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
correct redirect http - https with the same domain name
Bhttps://heavy-r.com/video/162512/girl_humiliated_with_poop/ 95.211.187.146
301

Missing HSTS-Header
Bhttps://www.heavy-r.com/video/162512/girl_humiliated_with_poop/ 95.211.187.146
301

Missing HSTS-Header
CError - no version with Http-Status 200
Ehttp://heavy-r.com/video/162512/girl_humiliated_with_poop/ 95.211.187.146
301
https://www.heavy-r.com/video/162512/girl_humiliated_with_poop/
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Hfatal error: No https - result with http-status 200, no encryption
Lhttps://www.heavy-r.com/video/162512/girl_humiliated_with_poop/ 95.211.187.146
301
https://www.heavy-r.com/video/162512/Girl_Humiliated_With_Poop/
Error direct loop
OOld connection: Diffie-Hellman Key Exchange with 1024 Bit is unsecure. Update to 2048 Bit Key Exchange. Read https://weakdh.org/ to learn how to update your server.

2. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns0.leaseweb.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://www.heavy-r.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
3.200 seconds
Warning: 404 needs more then one second
ADuration: 65603 milliseconds, 65.603 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
heavy-r.com
95.211.187.146
443
ok
Tls12
DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak
heavy-r.com
95.211.187.146
443
ok
Tls12

DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.heavy-r.com

2CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas

3CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, C=US, ST=Texas

4CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL


www.heavy-r.com
95.211.187.146
443
ok
Tls12
DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak

www.heavy-r.com
95.211.187.146
443
ok
Tls12

DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.heavy-r.com

2CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas

3CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, C=US, ST=Texas

4CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL


www.heavy-r.com
www.heavy-r.com
443
ok
Tls12
DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak

www.heavy-r.com
www.heavy-r.com
443
ok
Tls12

DiffieHellman
1024
Aes256
256
Sha384
error checking OCSP stapling
weak
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.heavy-r.com

2CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas

3CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, C=US, ST=Texas

4CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL


9. Certificates

1.
1.
CN=*.heavy-r.com
17.05.2019
16.05.2020
19 days expired
*.heavy-r.com, heavy-r.com - 2 entries
1.
1.
CN=*.heavy-r.com
17.05.2019

16.05.2020
19 days expired
*.heavy-r.com, heavy-r.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0977706402494BB7E600480A66F96D96
Thumbprint:60375F6C8FED18B0B409A565B78430907AB40DEB
SHA256 / Certificate:5iY+StztSPU8FYJLDEUyzJVKHbrqOCW9VOJnJTsgICg=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):d796b1e6ab2ef5276f95b8a1eae3a05e71e883cfb8ad28e1198df590d45b79ae
SHA256 hex / Subject Public Key Information (SPKI):0634fa28294f32cb93e110ca3f68e3859b7d25f98ebdb3eef38e43ca8e90f324
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsps.ssl.com
OCSP - must staple:no
Certificate Transparency:yes


2.
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, S=Texas, C=US
12.02.2016
12.02.2031
expires in 3905 days


2.
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, S=Texas, C=US
12.02.2016

12.02.2031
expires in 3905 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0997ED109D1F07FC
Thumbprint:33EE4E370A8D90FD4B1445E672226C4B829CC6D2
SHA256 / Certificate:UnpgsCq/OkpVGcT2L7vVYOMDQHTu7IuHmaqTaGk/420=
SHA256 hex / Cert (DANE * 0 1):527a60b02abf3a4a5519c4f62fbbd560e3034074eeec8b8799aa9368693fe36d
SHA256 hex / PublicKey (DANE * 1 1):ecb701e59f004d5cf8adc42d218e71262afcffe1777bf1cf8bc2037429e309a1
SHA256 hex / Subject Public Key Information (SPKI):e9ea4546336ef6f46ccf89014949d03ca5f6ee0f5c39c5c1b6a40ded0d80fb0e
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsps.ssl.com
OCSP - must staple:no
Certificate Transparency:no


3.
CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, S=Texas, C=US
11.09.2018
11.09.2023
expires in 1194 days


3.
CN=SSL.com Root Certification Authority RSA, O=SSL Corporation, L=Houston, S=Texas, C=US
11.09.2018

11.09.2023
expires in 1194 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00E4270495F68C91D6D0EC7B494EA4DF1C
Thumbprint:FF95E7706B770B38AD8D8EABE014061F69A86800
SHA256 / Certificate:rPcY34OOZABRd30ZR/UWIOjYBLoYZVOuUvyYEbXTS4s=
SHA256 hex / Cert (DANE * 0 1):acf718df838e640051777d1947f51620e8d804ba186553ae52fc9811b5d34b8b
SHA256 hex / PublicKey (DANE * 1 1):d1c45377ebdcd618cd1651dc2e02c21d751e5aa9fcd1b3431ff6ecf6a31348fa
SHA256 hex / Subject Public Key Information (SPKI):550e78e324d77eb8cc7cad09e8c83c7c207ce78b2713367e934545764d21a5ea
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://sslcom.ocsp-certum.com
OCSP - must staple:no
Certificate Transparency:no


4.
CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
22.10.2008
31.12.2029
expires in 3497 days


4.
CN=Certum Trusted Network CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL
22.10.2008

31.12.2029
expires in 3497 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:0444C0
Thumbprint:07E032E020B72C3F192F0628A2593A19A70F069E
SHA256 / Certificate:XFhGjVX1jkl+dDmC0rUAELbRZTdKz4On1KMtt2jEQI4=
SHA256 hex / Cert (DANE * 0 1):5c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e
SHA256 hex / PublicKey (DANE * 1 1):aa2630a7b617b04d0a294bab7a8caaa5016e6dbe604837a83a85719fab667eb5
SHA256 hex / Subject Public Key Information (SPKI):64595cb06875e6ebb75149ea07633b3cb552b4d056262ae7e6db6ac67f58c2dc
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas
0
1
2

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1616025492
leaf cert
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas
2020-05-11 10:34:28
2022-05-16 10:34:28
*.heavy-r.com, heavy-r.com - 2 entries


916222775
leaf cert
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas
2019-05-17 03:57:34
2020-05-16 03:57:34
*.heavy-r.com, heavy-r.com - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas
0
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1485509804
leaf cert
CN=SSL.com RSA SSL subCA, O=SSL Corporation, L=Houston, C=US, ST=Texas
2019-05-17 01:57:34
2020-05-16 01:57:34
*.heavy-r.com, heavy-r.com
2 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses (alpha)

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.heavy-r.com
0

no CAA entry found
1
0
heavy-r.com
0

no CAA entry found
1
0
com
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
heavy-r.com

ok
1
0
www.heavy-r.com

ok
1
0
_acme-challenge.heavy-r.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.heavy-r.com

Name Error - The domain name does not exist
1
0
_acme-challenge.heavy-r.com.heavy-r.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.heavy-r.com.heavy-r.com

Name Error - The domain name does not exist
1
0
_acme-challenge.www.heavy-r.com.www.heavy-r.com

Name Error - The domain name does not exist
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=5dbeda04-bedc-455e-abed-c0e1ccd27ac1


Last Result: https://check-your-website.server-daten.de/?q=heavy-r.com%2fvideo%2f162512%2fgirl_humiliated_with_poop%2f - 2020-05-21 01:19:53


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=heavy-r.com%2fvideo%2f162512%2fgirl_humiliated_with_poop%2f" target="_blank">Check this Site: heavy-r.com/video/162512/girl_humiliated_with_poop/</a>