Check DNS, Urls + Redirects, Certificates and Content of your Website



N

No trusted Certificate

Checked:
07.11.2019 07:40:35


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
wuwi.dnshome.de
A
212.86.43.230
Schulzendorf/Brandenburg/Germany (DE) - DNS:NET Internet Service GmbH
No Hostname found
yes
1
0

AAAA

yes


www.wuwi.dnshome.de

Name Error
yes
1
0


2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 22545, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2019, 00:00:00 +, Signature-Inception: 31.10.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: de
de
2 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



RRSIG-Owner de., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 20.11.2019, 05:00:00 +, Signature-Inception: 07.11.2019, 04:00:00 +, KeyTag 22545, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 26008, Flags 256



Public Key with Algorithm 8, KeyTag 39227, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner de., Algorithm: 8, 1 Labels, original TTL: 7200 sec, Signature-expiration: 21.11.2019, 12:00:00 +, Signature-Inception: 31.10.2019, 12:00:00 +, KeyTag 39227, Signer-Name: de



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 39227 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 39227, DigestType 2 and Digest "qrcwg7nvcOSl6UdppBisEuiH/DwIde8gbDRR3EC2xPo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: dnshome.de
dnshome.de
1 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



RRSIG-Owner dnshome.de., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 14.11.2019, 05:01:05 +, Signature-Inception: 07.11.2019, 05:01:05 +, KeyTag 26008, Signer-Name: de



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26008 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 64035, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner dnshome.de., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2019, 00:00:00 +, Signature-Inception: 31.10.2019, 00:00:00 +, KeyTag 64035, Signer-Name: dnshome.de



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 64035 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 64035, DigestType 2 and Digest "n3cwG1PobGooN43knm2gSPGzKYFwA9fHag5eglVaUPo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: wuwi.dnshome.de
wuwi.dnshome.de
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "dd1li8eipspfnmsduhhdvm1t4utpdcjm" between the hashed NSEC3-owner "dd1li8eipspfnmsduhhdvm1t4utpdcjm" and the hashed NextOwner "dd1li8eipspfnmsduhhdvm1t4utpdcjn". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner dd1li8eipspfnmsduhhdvm1t4utpdcjm.dnshome.de., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2019, 00:00:00 +, Signature-Inception: 31.10.2019, 00:00:00 +, KeyTag 64035, Signer-Name: dnshome.de



0 DNSKEY RR found






RRSIG Type 1 validates the A - Result: 212.86.43.230
Validated: RRSIG-Owner wuwi.dnshome.de., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 21.11.2019, 00:00:00 +, Signature-Inception: 31.10.2019, 00:00:00 +, KeyTag 64035, Signer-Name: dnshome.de



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, RRSIG



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, RRSIG



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, RRSIG



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: No Bitmap?



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG



RRSIG Type 50, expiration 2019-11-21 00:00:00 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, RRSIG

Zone: www.wuwi.dnshome.de
www.wuwi.dnshome.de
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "p27a7dgcb395gl709fetvpb7oj7bsanc" between the hashed NSEC3-owner "p27a7dgcb395gl709fetvpb7oj7bsanb" and the hashed NextOwner "p27a7dgcb395gl709fetvpb7oj7bsand". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner p27a7dgcb395gl709fetvpb7oj7bsanb.dnshome.de., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 21.11.2019, 00:00:00 +, Signature-Inception: 31.10.2019, 00:00:00 +, KeyTag 64035, Signer-Name: dnshome.de


3. Name Servers

DomainNameserverNS-IP
www.wuwi.dnshome.de
  ns1.dnshome.de

wuwi.dnshome.de
  ns1.dnshome.de / ns1.dnshome.de
185.233.106.232
Karlsruhe/Baden-Württemberg/Germany (DE) - netcup GmbH


 
2a03:4000:24:688::6e73:31
Karlsruhe/Baden-Württemberg/Germany (DE) - NETCUP-GMBH

dnshome.de
  ns1.dnshome.de / ns1.dnshome.de


  ns2.dnshome.de / ns2.dnshome.de

de
  a.nic.de / ns-2.de.de8.bind


  f.nic.de / ns-1.de.de1.bind


  l.de.net / ns-1.de.fr1.bind


  n.de.net / s3.amx


  s.de.net / ns-3.de.de9.bind


  z.nic.de / ns-1.de.de8.bind


4. SOA-Entries


Domain:de
Zone-Name:
Primary:f.nic.de
Mail:its.denic.de
Serial:2019110729
Refresh:7200
Retry:7200
Expire:3600000
TTL:7200
num Entries:6


Domain:dnshome.de
Zone-Name:
Primary:ns1.dnshome.de
Mail:hostmaster.dnshome.de
Serial:2019030501
Refresh:14400
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:wuwi.dnshome.de
Zone-Name:
Primary:ns1.dnshome.de
Mail:hostmaster.dnshome.de
Serial:2019030501
Refresh:14400
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:www.wuwi.dnshome.de
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://wuwi.dnshome.de/
212.86.43.230
302
https://wuwi.dnshome.de/
Html is minified: 100.00 %
0.106
A
Date: Thu, 07 Nov 2019 06:40:55 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains; preload
Location: https://wuwi.dnshome.de/
Content-Length: 208
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://wuwi.dnshome.de/
212.86.43.230
302
https://wuwi.dnshome.de/index.php/login
2.937
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Thu, 07 Nov 2019 06:40:56 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-a1d4Y1lMWC95Nnl0Q3hzNmFtT0hIOHQxcjlzNDJ4OTBtUUNaVTlKdS9RMD06M3dRVkJlKzFyK0djTzM0SlB4bkpjdmxDeTROdGl6QSt6M243QktJdnBVaz0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
X-Frame-Options: SAMEORIGIN
Set-Cookie: ocbahythduap=dd5t4mhfmt18ieqdhvienoel0e; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,oc_sessionPassphrase=WbbnFbF3WkIudP53cKsMTb0ca5oXelevINl0FxlERGHzHNhvU3Wx6jKYc08aM48XznXLN5fNB%2FSdbs8pZhBt8XO2FIRndFNh%2BNUbIuKxkqIGlVSyQj1zocuhHI7h4IaL; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,__Host-nc_sameSiteCookielax=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure,__Host-nc_sameSiteCookiestrict=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure
Strict-Transport-Security: max-age=15768000; includeSubDomains; preload
Upgrade: h2,h2c
Connection: Upgrade, close
Location: https://wuwi.dnshome.de/index.php/login
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Robots-Tag: none
X-Download-Options: noopen
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
Content-Length: 0
Content-Type: text/html; charset=UTF-8

• https://wuwi.dnshome.de/index.php/login
GZip used - 2013 / 7428 - 72.90 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 108.45 %
3.156
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Thu, 07 Nov 2019 06:40:59 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Pragma: no-cache
X-Frame-Options: SAMEORIGIN
Cache-Control: no-cache, no-store, must-revalidate
Content-Security-Policy: default-src 'none';base-uri 'none';manifest-src 'self';script-src 'self';style-src 'self' 'unsafe-inline';img-src 'self' data: blob:;font-src 'self' data:;connect-src 'self';media-src 'self';frame-ancestors 'self';worker-src 'self' blob:
Set-Cookie: ocbahythduap=5r3ba1fglfqqsmdf33proj2rk8; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,oc_sessionPassphrase=1V8oyFZS%2BryeFZuUUO17rDfidFt9qFHCsYI2Oh71IX6WhyTjliBSTQwEcJ4nFrXp%2B7xEdE4da0qfjA5rO9O8GEaXbB8enfTsX42ge2kTdtTEJ8jW78B4TuteWdTkA%2FnI; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,__Host-nc_sameSiteCookielax=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure,__Host-nc_sameSiteCookiestrict=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure
Strict-Transport-Security: max-age=15768000; includeSubDomains; preload
Upgrade: h2,h2c
Connection: Upgrade, close
Vary: Accept-Encoding
Content-Encoding: gzip
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Robots-Tag: none
X-Download-Options: noopen
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
Content-Length: 2013
Content-Type: text/html; charset=UTF-8

• http://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
212.86.43.230
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
0.124
A
Visible Content:
Date: Thu, 07 Nov 2019 06:40:58 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains; preload
Location: https://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 277
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://wuwi.dnshome.de/index.php/login
2.876
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Visible Content:
Date: Thu, 07 Nov 2019 06:41:02 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-K3BXbmFaQjMrN3lFZXR0KzhZbEtCMUZYaUdvemJPQ2x5VG1QblVKcU1NTT06bEtLVExhZzhzZmppUGVneGhQZ2hmV1lBelIxMFBiSE9pSGFrK0FBRFovWT0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
X-Frame-Options: SAMEORIGIN
Set-Cookie: ocbahythduap=g782mv02cq5crlsiaiv7pk12qq; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,oc_sessionPassphrase=JIlEs5fWoiurnHGSHFtjAnRQq7FUiwMzLV0PWjvWJHD9bk%2B%2FnL8pFHgsysbuvqA9idqzb47yLt2jErsjB3dkmSVtzrIMxcnlsN%2BqJhy8u6L269VcpcD%2BPi6Mbsz%2BRq9a; Path=/; Domain=wuwi.dnshome.de; HttpOnly; Secure,__Host-nc_sameSiteCookielax=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure,__Host-nc_sameSiteCookiestrict=true; Path=/; Domain=wuwi.dnshome.de; Expires=2101-01-01 00:59:59; HttpOnly; Secure
Strict-Transport-Security: max-age=15768000; includeSubDomains; preload
Upgrade: h2,h2c
Connection: Upgrade, close
Location: https://wuwi.dnshome.de/index.php/login
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
X-Robots-Tag: none
X-Download-Options: noopen
X-Permitted-Cross-Domain-Policies: none
Referrer-Policy: no-referrer
Content-Length: 0
Content-Type: text/html; charset=UTF-8

7. Comments


1. General Results, most used to calculate the result

Aname "wuwi.dnshome.de" is domain, public suffix is "dnshome.de", top-level-domain-type is "country-code", Country is Germany, tld-manager is "DENIC eG"
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://wuwi.dnshome.de/ 212.86.43.230
302
https://wuwi.dnshome.de/index.php/login
correct redirect https to https
Ahttps://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
302
https://wuwi.dnshome.de/index.php/login
correct redirect https to https
Agood: destination is https
Agood - only one version with Http-Status 200
Agood: one preferred version: non-www is preferred
Agood: every cookie sent via https is marked as secure
Agood: every https has a Strict Transport Security Header
Agood: HSTS has includeSubdomains - directive
Agood: HSTS has preload directive
Warning: HSTS preload sent, but not in Preload-List. Never send a preload directive if you don't know what preload means. Check https://hstspreload.org/ to learn the basics about the Google-Preload list. If you send a preload directive, you should **immediately** add your domain to the HSTS preload list via https://hstspreload.org/ . If Google accepts the domain, so the status is "pending": Note that new entries are hardcoded into the Chrome source code and can take several months before they reach the stable version. So you will see this message some months. If you don't want that or if you don't understand "preload", but if you send a preload directive and if you have correct A-redirects, everybody can add your domain to that list. Then you may have problems, it's not easy to undo that. So if you don't want your domain preloaded, remove the preload directive.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Ahttp://wuwi.dnshome.de/ 212.86.43.230
302
https://wuwi.dnshome.de/
correct redirect http - https with the same domain name
Bwarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 15768000 seconds = 182 days found
Nhttps://wuwi.dnshome.de/ 212.86.43.230
302
https://wuwi.dnshome.de/index.php/login
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://wuwi.dnshome.de/index.php/login
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://wuwi.dnshome.de/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
302
https://wuwi.dnshome.de/index.php/login
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors

2. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: n.de.net: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (s3.amx). COOKIE: ok. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns1.dnshome.de: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: Every https result with status 200 supports GZip.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
Warning: CSS / JavaScript found without GZip support. Send these ressources with GZip. 4 external CSS / JavaScript files without GZip found - 15 with GZip, 19 complete
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 0 external CSS / JavaScript files without Cache-Control-Header, 1 with Cache-Control, but no max-age, 3 with Cache-Control max-age too short (minimum 7 days), 15 with Cache-Control long enough, 19 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 0 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 1 with Cache-Control max-age too short (minimum 7 days), 1 with Cache-Control long enough, 2 complete.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://wuwi.dnshome.de/ 212.86.43.230
302

Warning: HSTS header sent via http has no effect
ADuration: 64257 milliseconds, 64.257 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
wuwi.dnshome.de
wuwi.dnshome.de
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
wuwi.dnshome.de
wuwi.dnshome.de
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
no Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
no Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=archlinux


wuwi.dnshome.de
212.86.43.230
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

wuwi.dnshome.de
212.86.43.230
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
no Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
no Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=archlinux


9. Certificates

1.
1.
CN=archlinux
14.01.2019
11.01.2029
expires in 3102 days
archlinux - 1 entry
1.
1.
CN=archlinux
14.01.2019

11.01.2029
expires in 3102 days
archlinux - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008DC01C299534EC96
Thumbprint:353673ED2796AE452290C5FB1B740C3213FDE287
SHA256 / Certificate:d2OHTjxtk255/ydAcpX+n+XTQ1CRIJ5w9gEZwjlsgQQ=
SHA256 hex / Cert (DANE * 0 1):7763874e3c6d936e79ff27407295fe9fe5d3435091209e70f60119c2396c8104
SHA256 hex / PublicKey (DANE * 1 1):05bde0ec7606151a8b64e2991d9efc1f25663a220babc3358a71309589479c0e
SHA256 hex / Subject Public Key Information (SPKI):a5cb8a1015c2369e67fab32a91f593651c57dcd00e0b92a16552dc7d49f20d5b
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0
0
5

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1230212853
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-11-07 18:20:35
2020-02-05 18:20:35
wuwi.dnshome.de - 1 entries


1211302287
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-10-28 21:16:28
2020-01-26 21:16:28
wuwi.dnshome.de - 1 entries


1099101784
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-08-29 09:27:07
2019-11-27 09:27:07
wuwi.dnshome.de - 1 entries


888881369
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-05-01 03:27:24
2019-07-30 03:27:24
wuwi.dnshome.de - 1 entries


788663010
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-03-01 10:42:04
2019-05-30 10:42:04
wuwi.dnshome.de - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2084132553
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-11-07 17:20:35
2020-02-05 17:20:35
wuwi.dnshome.de
1 entries


2048917902
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-10-28 20:16:28
2020-01-26 20:16:28
wuwi.dnshome.de
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
wuwi.dnshome.de
0

no CAA entry found
1
0
dnshome.de
0

no CAA entry found
1
0
de
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
wuwi.dnshome.de

ok
1
0
_acme-challenge.wuwi.dnshome.de

Name Error - The domain name does not exist
1
0
_acme-challenge.wuwi.dnshome.de.wuwi.dnshome.de

Name Error - The domain name does not exist
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=67de94f0-7baa-4e59-863b-0f5cf687c1c9


Last Result: https://check-your-website.server-daten.de/?q=wuwi.dnshome.de - 2019-11-26 08:01:08


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=wuwi.dnshome.de" target="_blank">Check this Site: wuwi.dnshome.de</a>