Check DNS, Urls + Redirects, Certificates and Content of your Website




C

More then one http status 200 as result

Checked:
05.08.2022 16:14:53


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
zwei14.email
A
138.201.205.25
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH
Hostname: yoshi.zwei14.de
yes
1
0

AAAA

yes


www.zwei14.email
A
138.201.205.25
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH
Hostname: yoshi.zwei14.de
yes
1
0

AAAA

yes


*.zwei14.email
A
138.201.205.25
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 20826, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2022, 00:00:00 +, Signature-Inception: 31.07.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: email
email
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 62422, DigestType 2 and Digest kqnaaGZ0ubww7nIiQTCnx2HVsBkC2ppaYgOMeWoWvTM=



1 RRSIG RR to validate DS RR found



RRSIG-Owner email., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.08.2022, 05:00:00 +, Signature-Inception: 05.08.2022, 04:00:00 +, KeyTag 20826, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20826 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 25314, Flags 256



Public Key with Algorithm 8, KeyTag 61839, Flags 256



Public Key with Algorithm 8, KeyTag 62422, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner email., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 22.08.2022, 15:47:01 +, Signature-Inception: 01.08.2022, 14:47:01 +, KeyTag 62422, Signer-Name: email



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 62422 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 62422, DigestType 2 and Digest "kqnaaGZ0ubww7nIiQTCnx2HVsBkC2ppaYgOMeWoWvTM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: zwei14.email
zwei14.email
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "54hcmjg1afr038m6mnf3gtj60n8rq35n" between the hashed NSEC3-owner "54adat1j89f9m0mic591e9c9hvfdis8k" and the hashed NextOwner "54i2d0i19b6f7vr4nmeq3c8b5bkodmao". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 54adat1j89f9m0mic591e9c9hvfdis8k.email., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 22.08.2022, 15:47:01 +, Signature-Inception: 01.08.2022, 14:47:01 +, KeyTag 25314, Signer-Name: email



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "ggnkr2vtou09md2ls7j0bjsujo55akqm" as Owner. That's the Hash of "email" with the NextHashedOwnerName "ggqh5siee1n6e19h99cnjjpcta83g4pc". So that domain name is the Closest Encloser of "zwei14.email". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner ggnkr2vtou09md2ls7j0bjsujo55akqm.email., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 26.08.2022, 14:04:02 +, Signature-Inception: 05.08.2022, 13:04:02 +, KeyTag 25314, Signer-Name: email



0 DNSKEY RR found




Zone: www.zwei14.email
www.zwei14.email
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.zwei14.email
  ns.udag.de / reg-fam1_customer8

zwei14.email
  ns.udag.de / reg-fam1_customer8
192.174.68.8
Salzburg/Austria (AT) - NICat-anycast


 
2001:67c:1bc::8
Salzburg/Austria (AT) - nic.at GmbH


  ns.udag.net / reg-ffm1_customer8
176.97.158.8
Vienna/Austria (AT) - NICat-anycast


 
2001:67c:10b8::8
Zurich/Switzerland (CH) - IPCOM-anycast


  ns.udag.org / reg-ffm1_customer8
176.97.158.91
Vienna/Austria (AT) - NICat-anycast


 
2001:67c:1bc::91
Salzburg/Austria (AT) - nic.at GmbH

email
  v0n0.nic.email / app10.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


  v0n1.nic.email / app26.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  v0n2.nic.email / app15.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


  v0n3.nic.email / app26.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  v2n0.nic.email / FRA4


  v2n1.nic.email / FRA6


4. SOA-Entries


Domain:email
Zone-Name:email
Primary:v0n0.nic.email
Mail:hostmaster.donuts.email
Serial:1659708115
Refresh:7200
Retry:900
Expire:1209600
TTL:3600
num Entries:6


Domain:zwei14.email
Zone-Name:zwei14.email
Primary:ns.udag.de
Mail:hostmaster.united-domains.de
Serial:2022080501
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:6


Domain:www.zwei14.email
Zone-Name:zwei14.email
Primary:ns.udag.de
Mail:hostmaster.united-domains.de
Serial:2022080501
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://zwei14.email, address used: https://zwei14.email/, Screenshot created 2022-08-05 16:32:13 +00:0

Mobil (412px x 732px)

145 milliseconds

Screenshot mobile - https://zwei14.email/
Mobil + Landscape (732px x 412px)

136 milliseconds

Screenshot mobile landscape - https://zwei14.email/
Screen (1280px x 1680px)

269 milliseconds

Screenshot Desktop - https://zwei14.email/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://zwei14.email/
138.201.205.25
301
https://zwei14.email/
Html is minified: 102.32 %
0.046
A
Connection: close
content-type: text/html
content-length: 707
date: Fri, 05 Aug 2022 14:15:41 GMT
server: LiteSpeed
location: https://zwei14.email/

• http://www.zwei14.email/
138.201.205.25
301
https://www.zwei14.email/
Html is minified: 102.32 %
0.047
A
Connection: close
content-type: text/html
content-length: 707
date: Fri, 05 Aug 2022 14:15:41 GMT
server: LiteSpeed
location: https://www.zwei14.email/

• https://zwei14.email/
138.201.205.25
200

3.377
B
small visible content (num chars: 0)
Connection: close
content-type: text/html
last-modified: Wed, 08 Jan 2020 15:59:45 GMT
etag: "0-5e15fc71-98c1c99dcf092290;;;"
accept-ranges: bytes
content-length: 0
date: Fri, 05 Aug 2022 14:15:47 GMT
server: LiteSpeed
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://www.zwei14.email/
138.201.205.25
200

3.556
B
small visible content (num chars: 0)
Connection: close
content-type: text/html
last-modified: Wed, 08 Jan 2020 15:59:45 GMT
etag: "0-5e15fc71-98c1c99dcf092290;;;"
accept-ranges: bytes
content-length: 0
date: Fri, 05 Aug 2022 14:15:41 GMT
server: LiteSpeed
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• http://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
138.201.205.25
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 102.32 %
0.063
A
Visible Content: 301 Moved Permanently The document has been permanently moved.
Connection: close
content-type: text/html
content-length: 707
date: Fri, 05 Aug 2022 14:15:52 GMT
server: LiteSpeed
location: https://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• http://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
138.201.205.25
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 102.32 %
0.123
A
Visible Content: 301 Moved Permanently The document has been permanently moved.
Connection: close
content-type: text/html
content-length: 707
date: Fri, 05 Aug 2022 14:15:51 GMT
server: LiteSpeed
location: https://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• https://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 101.39 %
3.363
A
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server! Proudly powered by LiteSpeed Web Server Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.
Connection: close
cache-control: private, no-cache, no-store, must-revalidate, max-age=0
pragma: no-cache
content-type: text/html
content-length: 1238
date: Fri, 05 Aug 2022 14:16:01 GMT
server: LiteSpeed
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 101.39 %
3.377
A
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server! Proudly powered by LiteSpeed Web Server Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.
Connection: close
cache-control: private, no-cache, no-store, must-revalidate, max-age=0
pragma: no-cache
content-type: text/html
content-length: 1238
date: Fri, 05 Aug 2022 14:15:57 GMT
server: LiteSpeed
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://138.201.205.25/
138.201.205.25
200

3.450
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 0)
Connection: close
content-type: text/html
last-modified: Mon, 09 Sep 2019 21:08:12 GMT
etag: "0-5d76bf3c-c8aa4e3106161427;;;"
accept-ranges: bytes
content-length: 0
date: Fri, 05 Aug 2022 14:15:52 GMT
server: LiteSpeed
alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

7. Comments


1. General Results, most used to calculate the result

Aname "zwei14.email" is domain, public suffix is ".email", top-level-domain is ".email", top-level-domain-type is "generic", tld-manager is "Binky Moon, LLC", num .email-domains preloaded: 129 (complete: 175327)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: www.zwei14.email has only one ip address.
Warning: Only one ip address found: zwei14.email has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.zwei14.email has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: zwei14.email has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
AGood: destination is https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (5 urls)
https://zwei14.email/ 138.201.205.25


Url with incomplete Content-Type - header - missing charset
https://www.zwei14.email/ 138.201.205.25


Url with incomplete Content-Type - header - missing charset
https://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://138.201.205.25/ 138.201.205.25


Url with incomplete Content-Type - header - missing charset
Ahttp://zwei14.email/ 138.201.205.25
301
https://zwei14.email/
Correct redirect http - https with the same domain name
Ahttp://www.zwei14.email/ 138.201.205.25
301
https://www.zwei14.email/
Correct redirect http - https with the same domain name
Bhttps://zwei14.email/ 138.201.205.25
200

Missing HSTS-Header
Bhttps://www.zwei14.email/ 138.201.205.25
200

Missing HSTS-Header
Bhttps://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
Bhttps://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Nhttps://138.201.205.25/ 138.201.205.25
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nwww.zwei14.email:25


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nwww.zwei14.email:587


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nzwei14.email:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.zwei14.email:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain www.zwei14.email, 1 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain zwei14.email, 1 ip addresses.

2. Header-Checks


3. DNS- and NameServer - Checks

AInfo:: 6 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 6 Queries complete, 6 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns.udag.de (192.174.68.8, 2001:67c:1bc::8), ns.udag.net (176.97.158.8, 2001:67c:10b8::8), ns.udag.org (176.97.158.91, 2001:67c:1bc::91)
AGood (1 - 3.0):: An average of 2.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: ns.udag.de, ns.udag.net, ns.udag.org, 3 Name Servers included in Delegation: ns.udag.de, ns.udag.net, ns.udag.org, 3 Name Servers included in 1 Zone definitions: ns.udag.de, ns.udag.net, ns.udag.org, 1 Name Servers listed in SOA.Primary: ns.udag.de.
AGood: Only one SOA.Primary Name Server found.: ns.udag.de.
AGood: SOA.Primary Name Server included in the delegation set.: ns.udag.de.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns.udag.de, ns.udag.net, ns.udag.org
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 3 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 3 Name Servers, 3 Top Level Domains: de, org, net
AGood: Name Servers with different domain names found.: 3 different Domains found
AGood: Name servers with different Country locations found: 3 Name Servers, 2 Countries: AT, CH
AInfo: Ipv4-Subnet-list: 3 Name Servers, 2 different subnets (first Byte): 176., 192., 2 different subnets (first two Bytes): 176.97., 192.174., 2 different subnets (first three Bytes): 176.97.158., 192.174.68.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 1 different subnets (first block): 2001:, 1 different subnets (first two blocks): 2001:067c:, 2 different subnets (first three blocks): 2001:067c:01bc:, 2001:067c:10b8:, 2 different subnets (first four blocks): 2001:067c:01bc:0000:, 2001:067c:10b8:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
3.363 seconds
Warning: 404 needs more then one second
https://www.zwei14.email/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
3.377 seconds
Warning: 404 needs more then one second
ADuration: 1054797 milliseconds, 1054.797 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
zwei14.email
138.201.205.25
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
zwei14.email
138.201.205.25
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.zwei14.email
138.201.205.25
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.zwei14.email
138.201.205.25
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


zwei14.email
zwei14.email
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

zwei14.email
zwei14.email
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.zwei14.email
www.zwei14.email
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.zwei14.email
www.zwei14.email
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


138.201.205.25
138.201.205.25
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

138.201.205.25
138.201.205.25
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - incomplete
1CN=*.aix-cloud.de

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


zwei14.email
138.201.205.25
25
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

zwei14.email
138.201.205.25
25
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


zwei14.email
138.201.205.25
587
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

zwei14.email
138.201.205.25
587
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=zwei14.email

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


zwei14.email
138.201.205.25
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

zwei14.email
138.201.205.25
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=yoshi.zwei14.de

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.zwei14.email
138.201.205.25
25
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.zwei14.email
138.201.205.25
25
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - incomplete
1CN=*.aix-cloud.de

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


www.zwei14.email
138.201.205.25
587
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.zwei14.email
138.201.205.25
587
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - incomplete
1CN=*.aix-cloud.de

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


www.zwei14.email
138.201.205.25
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.zwei14.email
138.201.205.25
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=yoshi.zwei14.de

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


9. Certificates

1.
1.
CN=zwei14.email
05.08.2022
03.11.2022
397 days expired
webmail.zwei14.email, www.zwei14.email, zwei14.email - 3 entries
1.
1.
CN=zwei14.email
05.08.2022

03.11.2022
397 days expired
webmail.zwei14.email, www.zwei14.email, zwei14.email - 3 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:044BEBC85489B140C92ED399407F7E8B5E6A
Thumbprint:F8D1504ED0FFC70BA87B2D9FE3821802EE9CCA29
SHA256 / Certificate:y8APydfoV7Y4zRtc3NozZbEd7f+m0gIE4Bq2ybsNb2o=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):078b8557d5212d6a78768ee86690ac1e9dccad7a07d12a7d8be6d3db16d27dd6
SHA256 hex / Subject Public Key Information (SPKI):078b8557d5212d6a78768ee86690ac1e9dccad7a07d12a7d8be6d3db16d27dd6 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 650 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 650 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4199 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4199 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=*.aix-cloud.de
17.02.2020
22.02.2021
1016 days expired
*.aix-cloud.de, aix-cloud.de - 2 entries
2.
1.
CN=*.aix-cloud.de
17.02.2020

22.02.2021
1016 days expired
*.aix-cloud.de, aix-cloud.de - 2 entries

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:1F5DFBD8FF6B9FADF27308812A6522BF
Thumbprint:2ADDDD7C12082C977F3257E4DD0EEB8B449987CC
SHA256 / Certificate:d7564Vplgz4CmhMqIj+NB7tQkSPmn085pJ0yuN74I+g=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):afc984ced0f72a03c0078e62ef48a23aaa81a1b52f55bc86aed47a8098b30f7c
SHA256 hex / Subject Public Key Information (SPKI):afc984ced0f72a03c0078e62ef48a23aaa81a1b52f55bc86aed47a8098b30f7c
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)

NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.

2.
CN=*.aix-cloud.de
17.02.2020
22.02.2021
1016 days expired
*.aix-cloud.de, aix-cloud.de - 2 entries

2.
CN=*.aix-cloud.de
17.02.2020

22.02.2021
1016 days expired
*.aix-cloud.de, aix-cloud.de - 2 entries

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:1F5DFBD8FF6B9FADF27308812A6522BF
Thumbprint:2ADDDD7C12082C977F3257E4DD0EEB8B449987CC
SHA256 / Certificate:d7564Vplgz4CmhMqIj+NB7tQkSPmn085pJ0yuN74I+g=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):afc984ced0f72a03c0078e62ef48a23aaa81a1b52f55bc86aed47a8098b30f7c
SHA256 hex / Subject Public Key Information (SPKI):afc984ced0f72a03c0078e62ef48a23aaa81a1b52f55bc86aed47a8098b30f7c
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)

NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.

3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2584 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2584 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2584 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2584 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 5159 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 5159 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1854 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1854 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1854 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1854 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
1.
CN=yoshi.zwei14.de
30.07.2022
28.10.2022
403 days expired
yoshi.zwei14.de - 1 entry
3.
1.
CN=yoshi.zwei14.de
30.07.2022

28.10.2022
403 days expired
yoshi.zwei14.de - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:030E345ED82E420448F4975BB26C9B88B46F
Thumbprint:7F03C456D0E0D8C09FE1017DDB9BF0C426BCBCEC
SHA256 / Certificate:9GdzanoHcgJEmy1m046z/C96vwvMh9EjsbNmMqwY9Fw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9370e503675485b6d1cfd7af2dfd5e010e54c9be4f9e9b50ae2cbfd7ae02bf8d
SHA256 hex / Subject Public Key Information (SPKI):9370e503675485b6d1cfd7af2dfd5e010e54c9be4f9e9b50ae2cbfd7ae02bf8d (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 650 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 650 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4199 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4199 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns.udag.de, ns.udag.net, ns.udag.org

QNr.DomainTypeNS used
1
de
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
2
ns.udag.de: 192.174.68.8, 2001:67c:1bc::8
NS
a.nic.de (2001:678:2::53)
3
net
NS
m.root-servers.net (2001:dc3::35)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
4
ns.udag.net: 176.97.158.8, 2001:67c:10b8::8
NS
l.gtld-servers.net (2001:500:d937::30)
5
org
NS
k.root-servers.net (2001:7fd::1)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
6
ns.udag.org: 176.97.158.91, 2001:67c:1bc::91
NS
a0.org.afilias-nst.info (2001:500:e::1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.zwei14.email
0

no CAA entry found
1
0
zwei14.email
0

no CAA entry found
1
0
email
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
zwei14.email
v=spf1 +a +mx +a:yoshi.zwei14.de include:secure-mailgate.com -all
ok
1
0
www.zwei14.email

ok
1
0
_acme-challenge.zwei14.email
oD_GGo9Q9e1xQ3InP0jTf2rPmhmmZAVj5vE0eYIifZk
looks good, correct length, correct characters
1
0
_acme-challenge.www.zwei14.email

missing entry or wrong length
1
0
_acme-challenge.zwei14.email.zwei14.email

perhaps wrong
1
0
_acme-challenge.www.zwei14.email.zwei14.email

perhaps wrong
1
0
_acme-challenge.www.zwei14.email.www.zwei14.email

perhaps wrong
1
0


15. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

zwei14.email
10
mail.zwei14.email

0
1
ok


A


138.201.205.25

0
1
ok


CNAME



0
0
ok

_dmarc
TXT
_dmarc.zwei14.email

v=DMARC1; p=none

0
1
ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
zwei14.email
138.201.205.25
25
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
22 Ciphers, 141.58 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
9 Ciphers, 71.90 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


587
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
22 Ciphers, 141.46 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


8443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
14 Ciphers, 97.17 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1
www.zwei14.email
138.201.205.25
25
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
22 Ciphers, 142.08 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
9 Ciphers, 71.11 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


587
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
22 Ciphers, 141.90 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


8443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
14 Ciphers, 97.03 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

DomainIPPortDescriptionResultAnswer
zwei14.email
138.201.205.25
21
FTP
open
220 ProFTPD Server (ProFTPD) [138.201.205.25]

zwei14.email
138.201.205.25
21
FTP
open
220 ProFTPD Server (ProFTPD) [138.201.205.25]

zwei14.email
138.201.205.25
22
SSH



zwei14.email
138.201.205.25
22
SSH



zwei14.email
138.201.205.25
25
SMTP
open
220 yoshi.zwei14.de ESMTP Postfix

Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is valid
zwei14.email
138.201.205.25
25
SMTP
open
220 yoshi.zwei14.de ESMTP Postfix
Mail certificate is valid
Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
Mail From: openrelay-test@check-your-website.server-daten.de
RCPT TO: openrelay-result@check-your-website.server-daten.de
554 5.7.1 openrelay-result@check-your-website.server-daten.de: Relay access denied
Excellent: No open relay after STARTTLS
zwei14.email
138.201.205.25
53
DNS



zwei14.email
138.201.205.25
53
DNS



zwei14.email
138.201.205.25
110
POP3
open
+OK Dovecot ready. <10fff7.a.62ed2639.P9cmNmkycqQQiJG+pUa8ig==@yoshi.zwei14.de>

zwei14.email
138.201.205.25
110
POP3
open
+OK Dovecot ready. <10fff7.a.62ed2639.P9cmNmkycqQQiJG+pUa8ig==@yoshi.zwei14.de>
This port ist unencrypted and deprecated. Don't use it.
zwei14.email
138.201.205.25
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

zwei14.email
138.201.205.25
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
zwei14.email
138.201.205.25
465
SMTP (encrypted)
open


zwei14.email
138.201.205.25
465
SMTP (encrypted)
open


zwei14.email
138.201.205.25
587
SMTP (encrypted, submission)
open
220 yoshi.zwei14.de ESMTP Postfix

Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING

Answer AUTH LOGIN: (no AUTH option found)

Mail certificate is valid
zwei14.email
138.201.205.25
587
SMTP (encrypted, submission)
open
220 yoshi.zwei14.de ESMTP Postfix
Mail certificate is valid
Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING Good: STARTTLS found
Excellent: No unencrypted login possible
Mail From: openrelay-test@check-your-website.server-daten.de
RCPT TO: openrelay-result@check-your-website.server-daten.de
554 5.7.1 intern.server-daten.de[85.215.2.227]: Client host rejected: Access denied
Excellent: No open relay after STARTTLS
zwei14.email
138.201.205.25
993
IMAP (encrypted)
open


zwei14.email
138.201.205.25
993
IMAP (encrypted)
open


zwei14.email
138.201.205.25
995
POP3 (encrypted)
open


zwei14.email
138.201.205.25
995
POP3 (encrypted)
open


zwei14.email
138.201.205.25
1433
MS SQL



zwei14.email
138.201.205.25
1433
MS SQL



zwei14.email
138.201.205.25
2082
cPanel (http)



zwei14.email
138.201.205.25
2082
cPanel (http)



zwei14.email
138.201.205.25
2083
cPanel (https)



zwei14.email
138.201.205.25
2083
cPanel (https)



zwei14.email
138.201.205.25
2086
WHM (http)



zwei14.email
138.201.205.25
2086
WHM (http)



zwei14.email
138.201.205.25
2087
WHM (https)



zwei14.email
138.201.205.25
2087
WHM (https)



zwei14.email
138.201.205.25
2089
cPanel Licensing



zwei14.email
138.201.205.25
2089
cPanel Licensing



zwei14.email
138.201.205.25
2095
cPanel Webmail (http)



zwei14.email
138.201.205.25
2095
cPanel Webmail (http)



zwei14.email
138.201.205.25
2096
cPanel Webmail (https)



zwei14.email
138.201.205.25
2096
cPanel Webmail (https)



zwei14.email
138.201.205.25
2222
DirectAdmin (http)



zwei14.email
138.201.205.25
2222
DirectAdmin (http)



zwei14.email
138.201.205.25
2222
DirectAdmin (https)



zwei14.email
138.201.205.25
2222
DirectAdmin (https)



zwei14.email
138.201.205.25
3306
mySql
open


zwei14.email
138.201.205.25
3306
mySql
open


zwei14.email
138.201.205.25
5224
Plesk Licensing



zwei14.email
138.201.205.25
5224
Plesk Licensing



zwei14.email
138.201.205.25
5432
PostgreSQL



zwei14.email
138.201.205.25
5432
PostgreSQL



zwei14.email
138.201.205.25
8080
Ookla Speedtest (http)



zwei14.email
138.201.205.25
8080
Ookla Speedtest (http)



zwei14.email
138.201.205.25
8080
Ookla Speedtest (https)



zwei14.email
138.201.205.25
8080
Ookla Speedtest (https)



zwei14.email
138.201.205.25
8083
VestaCP http



zwei14.email
138.201.205.25
8083
VestaCP http



zwei14.email
138.201.205.25
8083
VestaCP https



zwei14.email
138.201.205.25
8083
VestaCP https



zwei14.email
138.201.205.25
8443
Plesk Administration (https)
open
https://138.201.205.25:8443/
Http-Status: 303
Certificate is invalid Redirect: https://zwei14.email/login.php?success_redirect_url=%2F
zwei14.email
138.201.205.25
8443
Plesk Administration (https)
open
https://138.201.205.25:8443/
Http-Status: 303
Certificate is invalid Redirect: https://zwei14.email/login.php?success_redirect_url=%2F
zwei14.email
138.201.205.25
8447
Plesk Installer + Updates



zwei14.email
138.201.205.25
8447
Plesk Installer + Updates



zwei14.email
138.201.205.25
8880
Plesk Administration (http)
open
http://138.201.205.25:8880/
Http-Status: 303
Redirect: http://zwei14.email/login.php?success_redirect_url=%2F
zwei14.email
138.201.205.25
8880
Plesk Administration (http)
open
http://138.201.205.25:8880/
Http-Status: 303
Redirect: http://zwei14.email/login.php?success_redirect_url=%2F
zwei14.email
138.201.205.25
10000
Webmin (http)



zwei14.email
138.201.205.25
10000
Webmin (http)



zwei14.email
138.201.205.25
10000
Webmin (https)



zwei14.email
138.201.205.25
10000
Webmin (https)



www.zwei14.email
138.201.205.25
21
FTP
open
220 ProFTPD Server (ProFTPD) [138.201.205.25]

www.zwei14.email
138.201.205.25
21
FTP
open
220 ProFTPD Server (ProFTPD) [138.201.205.25]

www.zwei14.email
138.201.205.25
22
SSH



www.zwei14.email
138.201.205.25
22
SSH



www.zwei14.email
138.201.205.25
25
SMTP
open
220 yoshi.zwei14.de ESMTP Postfix

Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is invalid
www.zwei14.email
138.201.205.25
25
SMTP
open
220 yoshi.zwei14.de ESMTP Postfix
Mail certificate is invalid
Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-AUTH DIGEST-MD5 CRAM-MD5 PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
Mail From: openrelay-test@check-your-website.server-daten.de
RCPT TO: openrelay-result@check-your-website.server-daten.de
554 5.7.1 openrelay-result@check-your-website.server-daten.de: Relay access denied
Excellent: No open relay after STARTTLS
www.zwei14.email
138.201.205.25
53
DNS



www.zwei14.email
138.201.205.25
53
DNS



www.zwei14.email
138.201.205.25
110
POP3
open
+OK Dovecot ready. <10fff7.12.62ed2641.zo7sYKub8lZP3EAK2/nRYQ==@yoshi.zwei14.de>

www.zwei14.email
138.201.205.25
110
POP3
open
+OK Dovecot ready. <10fff7.12.62ed2641.zo7sYKub8lZP3EAK2/nRYQ==@yoshi.zwei14.de>
This port ist unencrypted and deprecated. Don't use it.
www.zwei14.email
138.201.205.25
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

www.zwei14.email
138.201.205.25
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
www.zwei14.email
138.201.205.25
465
SMTP (encrypted)
open


www.zwei14.email
138.201.205.25
465
SMTP (encrypted)
open


www.zwei14.email
138.201.205.25
587
SMTP (encrypted, submission)
open
220 yoshi.zwei14.de ESMTP Postfix

Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING

Answer AUTH LOGIN: (no AUTH option found)

Mail certificate is invalid
www.zwei14.email
138.201.205.25
587
SMTP (encrypted, submission)
open
220 yoshi.zwei14.de ESMTP Postfix
Mail certificate is invalid
Answer EHLO: 250-yoshi.zwei14.de 250-PIPELINING 250-SIZE 52428800 250-ETRN 250-STARTTLS 250-ENHANCEDSTATUSCODES 250-8BITMIME 250-DSN 250 CHUNKING Good: STARTTLS found
Excellent: No unencrypted login possible
Mail From: openrelay-test@check-your-website.server-daten.de
RCPT TO: openrelay-result@check-your-website.server-daten.de
554 5.7.1 intern.server-daten.de[85.215.2.227]: Client host rejected: Access denied
Excellent: No open relay after STARTTLS
www.zwei14.email
138.201.205.25
993
IMAP (encrypted)
open


www.zwei14.email
138.201.205.25
993
IMAP (encrypted)
open


www.zwei14.email
138.201.205.25
995
POP3 (encrypted)
open


www.zwei14.email
138.201.205.25
995
POP3 (encrypted)
open


www.zwei14.email
138.201.205.25
1433
MS SQL



www.zwei14.email
138.201.205.25
1433
MS SQL



www.zwei14.email
138.201.205.25
2082
cPanel (http)



www.zwei14.email
138.201.205.25
2082
cPanel (http)



www.zwei14.email
138.201.205.25
2083
cPanel (https)



www.zwei14.email
138.201.205.25
2083
cPanel (https)



www.zwei14.email
138.201.205.25
2086
WHM (http)



www.zwei14.email
138.201.205.25
2086
WHM (http)



www.zwei14.email
138.201.205.25
2087
WHM (https)



www.zwei14.email
138.201.205.25
2087
WHM (https)



www.zwei14.email
138.201.205.25
2089
cPanel Licensing



www.zwei14.email
138.201.205.25
2089
cPanel Licensing



www.zwei14.email
138.201.205.25
2095
cPanel Webmail (http)



www.zwei14.email
138.201.205.25
2095
cPanel Webmail (http)



www.zwei14.email
138.201.205.25
2096
cPanel Webmail (https)



www.zwei14.email
138.201.205.25
2096
cPanel Webmail (https)



www.zwei14.email
138.201.205.25
2222
DirectAdmin (http)



www.zwei14.email
138.201.205.25
2222
DirectAdmin (http)



www.zwei14.email
138.201.205.25
2222
DirectAdmin (https)



www.zwei14.email
138.201.205.25
2222
DirectAdmin (https)



www.zwei14.email
138.201.205.25
3306
mySql
open


www.zwei14.email
138.201.205.25
3306
mySql
open


www.zwei14.email
138.201.205.25
5224
Plesk Licensing



www.zwei14.email
138.201.205.25
5224
Plesk Licensing



www.zwei14.email
138.201.205.25
5432
PostgreSQL



www.zwei14.email
138.201.205.25
5432
PostgreSQL



www.zwei14.email
138.201.205.25
8080
Ookla Speedtest (http)



www.zwei14.email
138.201.205.25
8080
Ookla Speedtest (http)



www.zwei14.email
138.201.205.25
8080
Ookla Speedtest (https)



www.zwei14.email
138.201.205.25
8080
Ookla Speedtest (https)



www.zwei14.email
138.201.205.25
8083
VestaCP http



www.zwei14.email
138.201.205.25
8083
VestaCP http



www.zwei14.email
138.201.205.25
8083
VestaCP https



www.zwei14.email
138.201.205.25
8083
VestaCP https



www.zwei14.email
138.201.205.25
8443
Plesk Administration (https)
open
https://138.201.205.25:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.zwei14.email/login.php?success_redirect_url=%2F
www.zwei14.email
138.201.205.25
8443
Plesk Administration (https)
open
https://138.201.205.25:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.zwei14.email/login.php?success_redirect_url=%2F
www.zwei14.email
138.201.205.25
8447
Plesk Installer + Updates



www.zwei14.email
138.201.205.25
8447
Plesk Installer + Updates



www.zwei14.email
138.201.205.25
8880
Plesk Administration (http)
open
http://138.201.205.25:8880/
Http-Status: 303
Redirect: http://www.zwei14.email/login.php?success_redirect_url=%2F
www.zwei14.email
138.201.205.25
8880
Plesk Administration (http)
open
http://138.201.205.25:8880/
Http-Status: 303
Redirect: http://www.zwei14.email/login.php?success_redirect_url=%2F
www.zwei14.email
138.201.205.25
10000
Webmin (http)



www.zwei14.email
138.201.205.25
10000
Webmin (http)



www.zwei14.email
138.201.205.25
10000
Webmin (https)



www.zwei14.email
138.201.205.25
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=61911cad-f68f-455d-a7fb-e10ab60dee38


Last Result: https://check-your-website.server-daten.de/?q=zwei14.email - 2022-08-05 16:14:53


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=zwei14.email" target="_blank">Check this Site: zwei14.email</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro