Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

N

 

No trusted Certificate

 

Checked:
17.02.2024 17:24:01

 

Older results

 

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
snowfox.at
A
66.96.162.141
Jacksonville/Florida/United States (US) - Newfold Digital, Inc.
Hostname: 141.162.96.66.static.eigbox.net
yes
1
0

A
90.152.144.7
Stumm/Tyrol/Austria (AT) - A1 Telekom Austira AG
Hostname: 90-152-144-7.static.highway.a1.net
yes
1
0

AAAA

yes


www.snowfox.at
A
90.152.144.7
Stumm/Tyrol/Austria (AT) - A1 Telekom Austira AG
Hostname: 90-152-144-7.static.highway.a1.net
yes
1
0

AAAA

yes


*.snowfox.at
A
90.152.144.7
yes



A
66.96.162.141
yes



AAAA

yes



CNAME

yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 30903, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.03.2024, 00:00:00 +, Signature-Inception: 10.02.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: at

at
2 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 1253, DigestType 2 and Digest uhfBuss/tJ93YK0ffnHherOe4N8+nTvyP9PXDWzxcZ4=






DS with Algorithm 13, KeyTag 18942, DigestType 2 and Digest rl8L1zyPSPPVXNxAcPlAeHMXbDZN5LySv5aIdoXm5V8=






1 RRSIG RR to validate DS RR found






RRSIG-Owner at., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 01.03.2024, 05:00:00 +, Signature-Inception: 17.02.2024, 04:00:00 +, KeyTag 30903, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30903 used to validate the DS RRSet in the parent zone






4 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 1253, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 6345, Flags 256






Public Key with Algorithm 13, KeyTag 8460, Flags 256






Public Key with Algorithm 13, KeyTag 18942, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner at., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 26.02.2024, 11:10:04 +, Signature-Inception: 12.02.2024, 14:56:46 +, KeyTag 18942, Signer-Name: at






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 18942 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 18942, DigestType 2 and Digest "rl8L1zyPSPPVXNxAcPlAeHMXbDZN5LySv5aIdoXm5V8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: snowfox.at

snowfox.at
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "k9reo9hero0uh85kq8sdpjfcbh4nv1t4" between the hashed NSEC3-owner "k9r0bqchtoqcmh31feu7ugt3s1t8d7s9" and the hashed NextOwner "k9sevdcsg57o6knobioqcm3p266h23dl". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner k9r0bqchtoqcmh31feu7ugt3s1t8d7s9.at., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 24.02.2024, 02:38:46 +, Signature-Inception: 09.02.2024, 04:56:46 +, KeyTag 6345, Signer-Name: at






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "fjscbioio98ccv4od6ka4d7oh5bgrn00" as Owner. That's the Hash of "at" with the NextHashedOwnerName "fjt2g70q50o0d96php0gc6s8vr9dva7s". So that domain name is the Closest Encloser of "snowfox.at". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner fjscbioio98ccv4od6ka4d7oh5bgrn00.at., Algorithm: 13, 2 Labels, original TTL: 10800 sec, Signature-expiration: 24.02.2024, 07:28:25 +, Signature-Inception: 10.02.2024, 22:01:16 +, KeyTag 6345, Signer-Name: at






0 DNSKEY RR found









Zone: www.snowfox.at

www.snowfox.at
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.snowfox.at
  ns1.domain.com / 67m64

snowfox.at
  ns1.domain.com / 67m45
172.64.52.73
Toronto/Ontario/Canada (CA) - Cloudflare, Inc.


  ns2.domain.com / 67m50
172.64.53.117
Toronto/Ontario/Canada (CA) - Cloudflare, Inc.

at
  d.ns.at / id-d-FRA-01-at


  dns.nic.at


  j.ns.at / s2.amx


  n.ns.at / id-n-AMS-02-at


  ns1.univie.ac.at / id-01-NIG-02-at


  ns2.univie.ac.at / id-02-FRA-05-at


  ns9.univie.ac.at / ns-2.at.de8


  r.ns.at / tld-all-ffm1@53010


  u.ns.at / id-u-LON-02-at

 

4. SOA-Entries


Domain:at
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:at
Zone-Name:at
Primary:dns.nic.at
Mail:domain-admin.univie.ac.at
Serial:1708185602
Refresh:10800
Retry:3600
Expire:604800
TTL:10800
num Entries:8


Domain:snowfox.at
Zone-Name:snowfox.at
Primary:ns1.domain.com
Mail:dnsadmin.domain.com
Serial:2022071665
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:www.snowfox.at
Zone-Name:snowfox.at
Primary:ns1.domain.com
Mail:dnsadmin.domain.com
Serial:2022071665
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://snowfox.at/, address used: https://snowfox.at/, Screenshot created 2024-02-17 17:41:51 +00:0 url is insecure, certificate invalid

 

Mobil (412px x 732px)

 

1085 milliseconds

 

Screenshot mobile - https://snowfox.at/
Mobil + Landscape (732px x 412px)

 

1074 milliseconds

 

Screenshot mobile landscape - https://snowfox.at/
Screen (1280px x 1680px)

 

1180 milliseconds

 

Screenshot Desktop - https://snowfox.at/

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport412732
content Size412732

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://snowfox.at/
66.96.162.141
403

Html is minified: 100.00 %
0.280
M
Forbidden
Date: Sat, 17 Feb 2024 16:24:34 GMT
Connection: close
Server: Apache/2
Age: 0
Content-Type: text/html; charset=iso-8859-1
Content-Length: 209

• http://snowfox.at/
90.152.144.7
-14


10.027
T
Timeout - The operation has timed out.

• http://www.snowfox.at/
90.152.144.7
-14


10.030
T
Timeout - The operation has timed out.

• https://snowfox.at/
66.96.162.141
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
403

Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
4.903
N
Forbidden
Certificate error: RemoteCertificateNameMismatch
Date: Sat, 17 Feb 2024 16:24:54 GMT
Connection: close
Server: Apache/2
Age: 0
Content-Type: text/html; charset=iso-8859-1
Content-Length: 209

• https://snowfox.at/
90.152.144.7
-14


10.016
T
Timeout - The operation has timed out.

• https://www.snowfox.at/
90.152.144.7
-14


10.030
T
Timeout - The operation has timed out.

• http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
66.96.162.141
Inline-JavaScript (∑/total): 2/210 Inline-CSS (∑/total): 1/116
404

Html is minified: 317.58 %
Other inline scripts (∑/total): 1/210
0.233
A
Not Found
Visible Content:
Date: Sat, 17 Feb 2024 16:25:20 GMT
Connection: close
Server: Apache/2
Accept-Ranges: bytes
Age: 0
Content-Type: text/html
Content-Length: 867
Last-Modified: Fri, 10 Jan 2020 16:05:10 GMT

• http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.152.144.7
-14


10.014
T
Timeout - The operation has timed out.
Visible Content:

• http://www.snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.152.144.7
-14


10.027
T
Timeout - The operation has timed out.
Visible Content:

• https://90.152.144.7/
90.152.144.7
-14


10.013
T
Timeout - The operation has timed out.

• https://66.96.162.141/
66.96.162.141
482

Html is minified: 100.00 %
4.810
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Sat, 17 Feb 2024 16:25:40 GMT
Transfer-Encoding: chunked
Connection: close
Content-Type: application/octet-stream

 

7. Comments


1. General Results, most used to calculate the result

Aname "snowfox.at" is domain, public suffix is ".at", top-level-domain is ".at", top-level-domain-type is "country-code", Country is Austria, tld-manager is "nic.at GmbH", num .at-domains preloaded: 907 (complete: 239099)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: snowfox.at has 2 different ip addresses (authoritative).
Warning: Only one ip address found: www.snowfox.at has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: snowfox.at has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.snowfox.at has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):2 complete Content-Type - header (3 urls)
http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 66.96.162.141


Url with incomplete Content-Type - header - missing charset
Bhttps://snowfox.at/ 66.96.162.141
403

Missing HSTS-Header
CError - no version with Http-Status 200
HFatal error: No https - result with http-status 200, no encryption
Ihttp://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 66.96.162.141
404

Content problems or problems with resources included - http links, files doesn't exist, different Content-Type definitions. Not used to calculate the result because it's a http - check. But listed so you should fix it.
Khttp://snowfox.at/ 66.96.162.141, Status 403

http://snowfox.at/ 90.152.144.7, Status -14
Configuration problem - different ip addresses with different status
Khttps://snowfox.at/ 66.96.162.141, Status 403

https://snowfox.at/ 90.152.144.7, Status -14
Configuration problem - different ip addresses with different status
Khttp://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 66.96.162.141, Status 404

http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.152.144.7, Status -14
Configuration problem - different ip addresses with different status
Mhttp://snowfox.at/ 66.96.162.141
403

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://snowfox.at/ 66.96.162.141
403

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://66.96.162.141/ 66.96.162.141
482

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://snowfox.at/ 66.96.162.141
403

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://66.96.162.141/ 66.96.162.141
482

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nsnowfox.at:25


Error - Certificate isn't trusted, RemoteCertificateChainErrors
Nsnowfox.at:587


Error - Certificate isn't trusted, RemoteCertificateChainErrors
Nsnowfox.at:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nsnowfox.at:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Osnowfox.at / 66.96.162.141 / 587

ECDHE-RSA-RC4-SHA
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 25

ECDHE-RSA-RC4-SHA
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 25

RC4-SHA
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 25

RC4-MD5
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 587

RC4-SHA
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 587

RC4-MD5
Old connection: Insecure Cipher Suite found. Such active Cipher Suites allow downgrades. Remove all insecure Cipher Suites
Osnowfox.at / 66.96.162.141 / 587

AECDH-AES256-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 25

AECDH-AES256-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 25

AECDH-AES128-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 25

AECDH-RC4-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 587

AECDH-AES128-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 587

AECDH-RC4-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 25

AECDH-DES-CBC3-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 587

AECDH-DES-CBC3-SHA
Old connection: Insecure Cipher Suite without Authentication found (_anon_ = Anonymous in the IANA-Name). Remove these Cipher Suites.
Osnowfox.at / 66.96.162.141 / 25


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 16 Cipher Suites without Forward Secrecy found
Osnowfox.at / 66.96.162.141 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 16 Cipher Suites without Forward Secrecy found
Osnowfox.at / 66.96.162.141 / 587


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 16 Cipher Suites without Forward Secrecy found
Osnowfox.at / 66.96.162.141 / 993


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 17 Cipher Suites without Forward Secrecy found
Osnowfox.at / 66.96.162.141 / 995


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 17 Cipher Suites without Forward Secrecy found
Fatal: More then one ip address per domain name found, but checking all ip addresses different http status found.: Domain snowfox.at, 2 ip addresses, 2 different http results.
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain www.snowfox.at, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.snowfox.at

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)

Fsnowfox.at 66.96.162.141
Content-Security-Policy
Critical: Missing Header:
Fsnowfox.at 66.96.162.141
X-Content-Type-Options
Critical: Missing Header:
Fsnowfox.at 66.96.162.141
Referrer-Policy
Critical: Missing Header:
Fsnowfox.at 66.96.162.141
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 7 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 7 Queries complete, 7 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: ns1.domain.com, ns2.domain.com, 2 Name Servers included in Delegation: ns1.domain.com, ns2.domain.com, 2 Name Servers included in 1 Zone definitions: ns1.domain.com, ns2.domain.com, 1 Name Servers listed in SOA.Primary: ns1.domain.com.
AGood: Only one SOA.Primary Name Server found.: ns1.domain.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.domain.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.domain.com, ns2.domain.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: domain.com
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: CA
AInfo: Ipv4-Subnet-list: 2 Name Servers, 1 different subnets (first Byte): 172., 1 different subnets (first two Bytes): 172.64., 2 different subnets (first three Bytes): 172.64.52., 172.64.53.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: dns.nic.at: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.domain.com: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (67m64). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.domain.com / 172.64.52.73: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (67m45). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.domain.com / 172.64.53.117: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (67m50). COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.152.144.7
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.152.144.7
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 66.96.162.141
404

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
AGood: All CSS / JavaScript files are sent compressed (gzip, deflate, br checked). That reduces the content of the files. 1 external CSS / JavaScript files found
AGood: All CSS / JavaScript files are sent with a long Cache-Control header (minimum 7 days). So the browser can re-use these files, no download is required. 1 external CSS / JavaScript files with long Cache-Control max-age found
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
AInfo: Different Server-Headers found
ADuration: 1085556 milliseconds, 1085.556 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
snowfox.at
66.96.162.141
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
snowfox.at
66.96.162.141
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=*.bizland.com


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


66.96.162.141
66.96.162.141
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

66.96.162.141
66.96.162.141
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=*.bizland.com


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


snowfox.at
66.96.162.141
25
Certificate/chain invalid
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

snowfox.at
66.96.162.141
25
Certificate/chain invalid
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


snowfox.at
66.96.162.141
587
Certificate/chain invalid
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

snowfox.at
66.96.162.141
587
Certificate/chain invalid
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


snowfox.at
66.96.162.141
993
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

snowfox.at
66.96.162.141
993
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=*.domain.com


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


snowfox.at
66.96.162.141
995
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

snowfox.at
66.96.162.141
995
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=*.domain.com


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

 

9. Certificates

1.
1.
CN=*.bizland.com
02.08.2023
02.09.2024
91 days expired
*.bizland.com, bizland.com - 2 entries
1.
1.
CN=*.bizland.com
02.08.2023

02.09.2024
91 days expired


*.bizland.com, bizland.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:009B7761D21F2724DBBE1B490BC2B76277
Thumbprint:3039628016156D94CEA8CFCE231A2DB77C8622E8
SHA256 / Certificate:aHdU6rFX4qjau0ZodijQYE3atYGoWmxlhyMVOHb0ses=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):127103d11006d520a35c75b088c3f76468b5ce64a7298fa8550200e5bb490620
SHA256 hex / Subject Public Key Information (SPKI):127103d11006d520a35c75b088c3f76468b5ce64a7298fa8550200e5bb490620 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.bizland.com
02.08.2023
02.09.2024
91 days expired
*.bizland.com, bizland.com - 2 entries

2.
CN=*.bizland.com
02.08.2023

02.09.2024
91 days expired


*.bizland.com, bizland.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:009B7761D21F2724DBBE1B490BC2B76277
Thumbprint:3039628016156D94CEA8CFCE231A2DB77C8622E8
SHA256 / Certificate:aHdU6rFX4qjau0ZodijQYE3atYGoWmxlhyMVOHb0ses=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):127103d11006d520a35c75b088c3f76468b5ce64a7298fa8550200e5bb490620
SHA256 hex / Subject Public Key Information (SPKI):127103d11006d520a35c75b088c3f76468b5ce64a7298fa8550200e5bb490620 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2221 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2221 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2221 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2221 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 4796 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 4796 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1491 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1491 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1491 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1491 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=smtp.eigbox.net, OU=Domain Control Validated - RapidSSL(R), OU=See www.rapidssl.com/resources/cps (c)14, OU=GT01039293, SERIALNUMBER=KidCHkf7RTB4zhlKyrw8Q-U9GjTMdjY0
16.04.2014
17.06.2016
3090 days expired
smtp.eigbox.net - 1 entry
2.
1.
CN=smtp.eigbox.net, OU=Domain Control Validated - RapidSSL(R), OU=See www.rapidssl.com/resources/cps (c)14, OU=GT01039293, SERIALNUMBER=KidCHkf7RTB4zhlKyrw8Q-U9GjTMdjY0
16.04.2014

17.06.2016
3090 days expired


smtp.eigbox.net - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:123B0E
Thumbprint:6313C589B515488294AD804ED3A42B084CC61BE7
SHA256 / Certificate:n6g4YuMiv4k27eaSjoWovMn/8dtG0HCdD8Bm0M5YIxc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9635bd091f9643c11a3e71d3ca8391f178cad14306b9fa4b61540039fe617bf1
SHA256 hex / Subject Public Key Information (SPKI):9635bd091f9643c11a3e71d3ca8391f178cad14306b9fa4b61540039fe617bf1 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://rapidssl-ocsp.geotrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.


2.
CN=RapidSSL CA, O="GeoTrust, Inc.", C=US
19.02.2010
18.02.2020
1749 days expired


2.
CN=RapidSSL CA, O="GeoTrust, Inc.", C=US
19.02.2010

18.02.2020
1749 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:0236D1
Thumbprint:C039A3269EE4B8E82D00C53FA797B5A19E836F47
SHA256 / Certificate:bVvJeUYccmThcQAQzX1Oo+xX+hEhXwT/pRauYZWasrI=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):953d3d80f51e41f6d8ae5c51b69b07ae30db963f51a73faeeda8df0ab838a833
SHA256 hex / Subject Public Key Information (SPKI):953d3d80f51e41f6d8ae5c51b69b07ae30db963f51a73faeeda8df0ab838a833
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.geotrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




3.
CN=GeoTrust Global CA, O=GeoTrust Inc., C=US
21.05.2002
21.05.2022
926 days expired


3.
CN=GeoTrust Global CA, O=GeoTrust Inc., C=US
21.05.2002

21.05.2022
926 days expired




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:023456
Thumbprint:DE28F4A4FFE5B92FA3C503D1A349A7F9962A8212
SHA256 / Certificate:/4VqLSUdzYjTZlb0UBJnmM+rqt5AeZxyLeTStds2pzo=
SHA256 hex / Cert (DANE * 0 1):ff856a2d251dcd88d36656f450126798cfabaade40799c722de4d2b5db36a73a
SHA256 hex / PublicKey (DANE * 1 1):87af34d66fb3f2fdf36e09111e9aba2f6f44b207f3863f3d0b54b25023909aa5
SHA256 hex / Subject Public Key Information (SPKI):87af34d66fb3f2fdf36e09111e9aba2f6f44b207f3863f3d0b54b25023909aa5
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




3.
1.
CN=*.domain.com
08.09.2023
09.10.2024
54 days expired
*.domain.com, domain.com - 2 entries
3.
1.
CN=*.domain.com
08.09.2023

09.10.2024
54 days expired


*.domain.com, domain.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:599797023F13EF55DC9CFE5D0E4CBB63
Thumbprint:803F5F4EEEF62B39E982874D0B5CD92392F8345A
SHA256 / Certificate:lQpTxGcvgty3G8qt/0QjKJZAxdxyDaETRfclTDk5WWc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):16302aefb76aa539423b9b1f1f6428296e6ff54c0f444187371816d367542db9
SHA256 hex / Subject Public Key Information (SPKI):16302aefb76aa539423b9b1f1f6428296e6ff54c0f444187371816d367542db9 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.domain.com
08.09.2023
09.10.2024
54 days expired
*.domain.com, domain.com - 2 entries

2.
CN=*.domain.com
08.09.2023

09.10.2024
54 days expired


*.domain.com, domain.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:599797023F13EF55DC9CFE5D0E4CBB63
Thumbprint:803F5F4EEEF62B39E982874D0B5CD92392F8345A
SHA256 / Certificate:lQpTxGcvgty3G8qt/0QjKJZAxdxyDaETRfclTDk5WWc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):16302aefb76aa539423b9b1f1f6428296e6ff54c0f444187371816d367542db9
SHA256 hex / Subject Public Key Information (SPKI):16302aefb76aa539423b9b1f1f6428296e6ff54c0f444187371816d367542db9 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2221 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2221 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2221 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2221 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 4796 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 4796 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1491 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1491 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1491 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1491 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
0
3

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
6753938919
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-02-14 16:33:04
2024-05-14 16:33:03
snowfox.at, www.snowfox.at - 2 entries


6743106585
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-02-12 21:39:34
2024-05-12 21:39:33
snowfox.at - 1 entries


6742035899
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-02-12 16:57:55
2024-05-12 16:57:54
*.snowfox.at, snowfox.at - 2 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
0
5

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
12076908385
precert
CN=R3, O=Let's Encrypt, C=US
2024-02-14 15:33:04
2024-05-14 14:33:03
snowfox.at, www.snowfox.at
2 entries


12058695715
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-02-12 20:39:34
2024-05-12 19:39:33
snowfox.at
1 entries


12056873594
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-02-12 15:57:55
2024-05-12 14:57:54
*.snowfox.at, snowfox.at
2 entries


11033347224
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-11-08 04:44:00
2024-02-06 04:43:59
www.snowfox.at
1 entries


10539257503
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-09-08 20:30:54
2023-12-07 21:30:53
www.snowfox.at
1 entries


 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
66.96.162.141
iframe

1

1


0
0
0


script

1
32,954 Bytes
0
0
1
1
0
0
-1

 

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
http://snowfox.at/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
66.96.162.141
iframe
src
http://www.searchvity.com/


1
http-link, change to https















script
src
//ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js
200

1
ok
Missing defer / async attribute. text/javascript; charset=UTF-8
X-Content-Type-Options nosniff found





Cache-Control: public, max-age=31536000, stale-while-revalidate=2592000 - with long duration found.
Compression required: 32954 Bytes






Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

 

sha256-iaFenEC8axSAnyNu6M0+0epCOTwfbKVceFXNd5s/ki4=
sha384-aBL3Lzi6c9LNDGvpHkZrrm3ZVsIwohDD7CDozL0pk8FwCrfmV7H9w8j3L7ikEv6h
sha512-YHQNqPhxuCY2ddskIbDlZfwY6Vx3L3w9WRbyJCY81xpqLmrM6rL2+LocBgeVHwGY9SXYfQWJ+lcEWx1fKS2s8A==

 

<script src="//ajax.googleapis.com/ajax/libs/jquery/1.10.2/jquery.min.js" crossorigin="anonymous" integrity="sha256-iaFenEC8axSAnyNu6M0+0epCOTwfbKVceFXNd5s/ki4=" />


 

12. Html-Parsing via https://validator.nu/ / https://validator.w3.org/nu/ (started 2024-09-28, 09:00, alpha)

  Unfortunately, there are differences between the first used validator.nu and validator.w3.org/nu/ - switched to validator.w3.org/nu/. Looks like some error messages (link - fetchpriority attribute) of validator.nu are obsolete, not seen in the w3.org-version and not found in the current specification: link may have a fetchpriority attribute.

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.domain.com, ns2.domain.com

 

QNr.DomainTypeNS used
1
com
NS
h.root-servers.net (2001:500:1::53)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.domain.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: lee.ns.cloudflare.com, sarah.ns.cloudflare.com

Answer: lee.ns.cloudflare.com
108.162.193.129, 172.64.33.129, 173.245.59.129, 2606:4700:58::adf5:3b81, 2803:f800:50::6ca2:c181, 2a06:98c1:50::ac40:2181

Answer: sarah.ns.cloudflare.com
108.162.194.218, 162.159.38.218, 172.64.34.218, 2606:4700:50::a29f:26da, 2803:f800:50::6ca2:c2da, 2a06:98c1:50::ac40:22da
3
ns2.domain.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: lee.ns.cloudflare.com, sarah.ns.cloudflare.com

Answer: lee.ns.cloudflare.com
108.162.193.129, 172.64.33.129, 173.245.59.129, 2606:4700:58::adf5:3b81, 2803:f800:50::6ca2:c181, 2a06:98c1:50::ac40:2181

Answer: sarah.ns.cloudflare.com
108.162.194.218, 162.159.38.218, 172.64.34.218, 2606:4700:50::a29f:26da, 2803:f800:50::6ca2:c2da, 2a06:98c1:50::ac40:22da
4
ns1.domain.com: 172.64.52.73
A
lee.ns.cloudflare.com (2606:4700:58::adf5:3b81)
5
ns1.domain.com: No AAAA record found
AAAA
lee.ns.cloudflare.com (2606:4700:58::adf5:3b81)
6
ns2.domain.com: 172.64.53.117
A
lee.ns.cloudflare.com (2606:4700:58::adf5:3b81)
7
ns2.domain.com: No AAAA record found
AAAA
lee.ns.cloudflare.com (2606:4700:58::adf5:3b81)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.snowfox.at
0

no CAA entry found
1
0
snowfox.at
0

no CAA entry found
1
0
at
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
snowfox.at
protonmail-verification=8bd13c2bea416f53666a29918c58951572299e93
ok
1
0
snowfox.at
v=spf1 include:_spf.protonmail.ch mx ~all ip4:66.96.128.0/18 include:websitewelcome.com ?all
ok
1
0
www.snowfox.at

ok
1
0
_acme-challenge.snowfox.at
zpPuXNG5ltO9alxZbpQC4Rd1Z3pdl0c0x1iimnMNkf0
looks good, correct length, correct characters
1
0
_acme-challenge.www.snowfox.at

Name Error - The domain name does not exist
1
0
_acme-challenge.snowfox.at.snowfox.at

perhaps wrong
1
0
_acme-challenge.www.snowfox.at.snowfox.at

perhaps wrong
1
0
_acme-challenge.www.snowfox.at.www.snowfox.at

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

snowfox.at
10
mail.protonmail.ch
03ok

A


185.70.42.128
03ok

A


185.205.70.128
03ok

A


176.119.200.128
03ok

CNAME


00ok
MX

snowfox.at
20
mailsec.protonmail.ch
03ok

A


176.119.200.129
03ok

A


185.70.42.129
03ok

A


185.205.70.129
03ok

CNAME


00ok
MX

snowfox.at
30
mail.snowfox.at
03ok

A


66.96.162.141
01ok

CNAME


00ok
_dmarc
TXT
_dmarc.snowfox.at

v=DMARC1; p=none
ok

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
snowfox.at
66.96.162.141
25
31 Ciphers198.43 secSMTP
16 without, 15 FS
48.39 %
snowfox.at
66.96.162.141
443
44 Ciphers182.88 sec
16 without, 28 FS
63.64 %
snowfox.at
66.96.162.141
587
31 Ciphers198.17 secSMTP (encrypted, submission)
16 without, 15 FS
48.39 %
snowfox.at
66.96.162.141
993
28 Ciphers135.50 secIMAP (encrypted)
17 without, 11 FS
39.29 %
snowfox.at
66.96.162.141
995
28 Ciphers134.87 secPOP3 (encrypted)
17 without, 11 FS
39.29 %
Complete

5
162 Ciphers
32.40 Ciphers/Check
849.85 sec169.97 sec/Check
82 without, 80 FS
49.38 %

Details
DomainIPPortCipher (OpenSsl / IANA)
snowfox.at
66.96.162.141
25
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
31 Ciphers, 198.43 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

DH
RSA
AES(256)
SHA256




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

DH
RSA
AES(128)
SHA256




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA

DH
RSA
Camellia(256)
SHA1




DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

DH
RSA
AES(256)
SHA1




CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA

RSA
RSA
Camellia(256)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA

DH
RSA
Camellia(128)
SHA1




DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

DH
RSA
AES(128)
SHA1




DHE-RSA-SEED-SHA
(Weak)
SSLv3
0x00,0x9A
FS

TLS_DHE_RSA_WITH_SEED_CBC_SHA

DH
RSA
SEED(128)
SHA1




CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA

RSA
RSA
Camellia(128)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1




SEED-SHA
(Weak)
SSLv3
0x00,0x96
No FS

TLS_RSA_WITH_SEED_CBC_SHA

RSA
RSA
SEED(128)
SHA1




ECDHE-RSA-RC4-SHA
(Insecure)
SSLv3
0xC0,0x11
No FS

TLS_ECDHE_RSA_WITH_RC4_128_SHA

ECDH
RSA
RC4(128)
SHA1




RC4-SHA
(Insecure)
SSLv3
0x00,0x05
No FS

TLS_RSA_WITH_RC4_128_SHA

RSA
RSA
RC4(128)
SHA1




RC4-MD5
(Insecure)
SSLv3
0x00,0x04
No FS

TLS_RSA_WITH_RC4_128_MD5

RSA
RSA
RC4(128)
MD5




AECDH-AES256-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x19
No FS

TLS_ECDH_anon_WITH_AES_256_CBC_SHA

ECDH
None
AES(256)
SHA1




AECDH-DES-CBC3-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x17
No FS

TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA

ECDH
None
3DES(168)
SHA1




AECDH-AES128-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x18
No FS

TLS_ECDH_anon_WITH_AES_128_CBC_SHA

ECDH
None
AES(128)
SHA1




AECDH-RC4-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x16
No FS

TLS_ECDH_anon_WITH_RC4_128_SHA

ECDH
None
RC4(128)
SHA1



443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
44 Ciphers, 182.88 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x53
FS

TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384

DH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xAA
FS

TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256

DH
RSA
CHACHA20/POLY1305(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x61
FS

TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384

ECDH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-AES256-CCM8
(Secure)
TLSv1.2
0xC0,0xA3
FS

TLS_DHE_RSA_WITH_AES_256_CCM_8

DH
RSA
AESCCM8(256)
AEAD




DHE-RSA-AES256-CCM
(Secure)
TLSv1.2
0xC0,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_CCM

DH
RSA
AESCCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x52
FS

TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256

DH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x60
FS

TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256

ECDH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-CCM8
(Secure)
TLSv1.2
0xC0,0xA2
FS

TLS_DHE_RSA_WITH_AES_128_CCM_8

DH
RSA
AESCCM8(128)
AEAD




DHE-RSA-AES128-CCM
(Secure)
TLSv1.2
0xC0,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_CCM

DH
RSA
AESCCM(128)
AEAD




ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384

ECDH
RSA
Camellia(256)
SHA384




DHE-RSA-CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC4
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256

DH
RSA
Camellia(256)
SHA256




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

DH
RSA
AES(256)
SHA256




CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC0
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256

RSA
RSA
Camellia(256)
SHA256




ARIA256-GCM-SHA384
(Weak)
TLSv1.2
0xC0,0x51
No FS

TLS_RSA_WITH_ARIA_256_GCM_SHA384

RSA
RSA
ARIAGCM(256)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




AES256-CCM8
(Weak)
TLSv1.2
0xC0,0xA1
No FS

TLS_RSA_WITH_AES_256_CCM_8

RSA
RSA
AESCCM8(256)
AEAD




AES256-CCM
(Weak)
TLSv1.2
0xC0,0x9D
No FS

TLS_RSA_WITH_AES_256_CCM

RSA
RSA
AESCCM(256)
AEAD




ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

ECDH
RSA
Camellia(128)
SHA256




DHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBE
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

DH
RSA
Camellia(128)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

DH
RSA
AES(128)
SHA256




CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBA
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256

RSA
RSA
Camellia(128)
SHA256




ARIA128-GCM-SHA256
(Weak)
TLSv1.2
0xC0,0x50
No FS

TLS_RSA_WITH_ARIA_128_GCM_SHA256

RSA
RSA
ARIAGCM(128)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




AES128-CCM8
(Weak)
TLSv1.2
0xC0,0xA0
No FS

TLS_RSA_WITH_AES_128_CCM_8

RSA
RSA
AESCCM8(128)
AEAD




AES128-CCM
(Weak)
TLSv1.2
0xC0,0x9C
No FS

TLS_RSA_WITH_AES_128_CCM

RSA
RSA
AESCCM(128)
AEAD




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA

DH
RSA
Camellia(256)
SHA1




DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

DH
RSA
AES(256)
SHA1




CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA

RSA
RSA
Camellia(256)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA

DH
RSA
Camellia(128)
SHA1




DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

DH
RSA
AES(128)
SHA1




CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA

RSA
RSA
Camellia(128)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1



587
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
31 Ciphers, 198.17 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

DH
RSA
AES(256)
SHA256




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

DH
RSA
AES(128)
SHA256




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA

DH
RSA
Camellia(256)
SHA1




DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

DH
RSA
AES(256)
SHA1




CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA

RSA
RSA
Camellia(256)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA

DH
RSA
Camellia(128)
SHA1




DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

DH
RSA
AES(128)
SHA1




DHE-RSA-SEED-SHA
(Weak)
SSLv3
0x00,0x9A
FS

TLS_DHE_RSA_WITH_SEED_CBC_SHA

DH
RSA
SEED(128)
SHA1




CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA

RSA
RSA
Camellia(128)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1




SEED-SHA
(Weak)
SSLv3
0x00,0x96
No FS

TLS_RSA_WITH_SEED_CBC_SHA

RSA
RSA
SEED(128)
SHA1




ECDHE-RSA-RC4-SHA
(Insecure)
SSLv3
0xC0,0x11
No FS

TLS_ECDHE_RSA_WITH_RC4_128_SHA

ECDH
RSA
RC4(128)
SHA1




RC4-SHA
(Insecure)
SSLv3
0x00,0x05
No FS

TLS_RSA_WITH_RC4_128_SHA

RSA
RSA
RC4(128)
SHA1




RC4-MD5
(Insecure)
SSLv3
0x00,0x04
No FS

TLS_RSA_WITH_RC4_128_MD5

RSA
RSA
RC4(128)
MD5




AECDH-AES256-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x19
No FS

TLS_ECDH_anon_WITH_AES_256_CBC_SHA

ECDH
None
AES(256)
SHA1




AECDH-DES-CBC3-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x17
No FS

TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA

ECDH
None
3DES(168)
SHA1




AECDH-AES128-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x18
No FS

TLS_ECDH_anon_WITH_AES_128_CBC_SHA

ECDH
None
AES(128)
SHA1




AECDH-RC4-SHA
(Fatal Insecure - no authentication)
SSLv3
0xC0,0x16
No FS

TLS_ECDH_anon_WITH_RC4_128_SHA

ECDH
None
RC4(128)
SHA1



993
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
28 Ciphers, 135.50 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x61
FS

TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384

ECDH
RSA
ARIAGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




ECDHE-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x60
FS

TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256

ECDH
RSA
ARIAGCM(128)
AEAD




ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384

ECDH
RSA
Camellia(256)
SHA384




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC0
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256

RSA
RSA
Camellia(256)
SHA256




ARIA256-GCM-SHA384
(Weak)
TLSv1.2
0xC0,0x51
No FS

TLS_RSA_WITH_ARIA_256_GCM_SHA384

RSA
RSA
ARIAGCM(256)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




AES256-CCM8
(Weak)
TLSv1.2
0xC0,0xA1
No FS

TLS_RSA_WITH_AES_256_CCM_8

RSA
RSA
AESCCM8(256)
AEAD




AES256-CCM
(Weak)
TLSv1.2
0xC0,0x9D
No FS

TLS_RSA_WITH_AES_256_CCM

RSA
RSA
AESCCM(256)
AEAD




ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

ECDH
RSA
Camellia(128)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBA
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256

RSA
RSA
Camellia(128)
SHA256




ARIA128-GCM-SHA256
(Weak)
TLSv1.2
0xC0,0x50
No FS

TLS_RSA_WITH_ARIA_128_GCM_SHA256

RSA
RSA
ARIAGCM(128)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




AES128-CCM8
(Weak)
TLSv1.2
0xC0,0xA0
No FS

TLS_RSA_WITH_AES_128_CCM_8

RSA
RSA
AESCCM8(128)
AEAD




AES128-CCM
(Weak)
TLSv1.2
0xC0,0x9C
No FS

TLS_RSA_WITH_AES_128_CCM

RSA
RSA
AESCCM(128)
AEAD




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA

RSA
RSA
Camellia(256)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA

RSA
RSA
Camellia(128)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1




SEED-SHA
(Weak)
SSLv3
0x00,0x96
No FS

TLS_RSA_WITH_SEED_CBC_SHA

RSA
RSA
SEED(128)
SHA1



995
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
28 Ciphers, 134.87 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x61
FS

TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384

ECDH
RSA
ARIAGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




ECDHE-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x60
FS

TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256

ECDH
RSA
ARIAGCM(128)
AEAD




ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384

ECDH
RSA
Camellia(256)
SHA384




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC0
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256

RSA
RSA
Camellia(256)
SHA256




ARIA256-GCM-SHA384
(Weak)
TLSv1.2
0xC0,0x51
No FS

TLS_RSA_WITH_ARIA_256_GCM_SHA384

RSA
RSA
ARIAGCM(256)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




AES256-CCM8
(Weak)
TLSv1.2
0xC0,0xA1
No FS

TLS_RSA_WITH_AES_256_CCM_8

RSA
RSA
AESCCM8(256)
AEAD




AES256-CCM
(Weak)
TLSv1.2
0xC0,0x9D
No FS

TLS_RSA_WITH_AES_256_CCM

RSA
RSA
AESCCM(256)
AEAD




ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

ECDH
RSA
Camellia(128)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBA
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256

RSA
RSA
Camellia(128)
SHA256




ARIA128-GCM-SHA256
(Weak)
TLSv1.2
0xC0,0x50
No FS

TLS_RSA_WITH_ARIA_128_GCM_SHA256

RSA
RSA
ARIAGCM(128)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




AES128-CCM8
(Weak)
TLSv1.2
0xC0,0xA0
No FS

TLS_RSA_WITH_AES_128_CCM_8

RSA
RSA
AESCCM8(128)
AEAD




AES128-CCM
(Weak)
TLSv1.2
0xC0,0x9C
No FS

TLS_RSA_WITH_AES_128_CCM

RSA
RSA
AESCCM(128)
AEAD




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA

RSA
RSA
Camellia(256)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA

RSA
RSA
Camellia(128)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1




SEED-SHA
(Weak)
SSLv3
0x00,0x96
No FS

TLS_RSA_WITH_SEED_CBC_SHA

RSA
RSA
SEED(128)
SHA1

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
snowfox.at
66.96.162.141
21
FTP
open
220 domaincom FTP Server Ready

snowfox.at
66.96.162.141
21
FTP
open
220 domaincom FTP Server Ready

snowfox.at
66.96.162.141
22
SSH



snowfox.at
66.96.162.141
22
SSH



snowfox.at
66.96.162.141
25
SMTP
open
220 ESMTP Sat, 17 Feb 2024 11:26:14 -0500: UCE strictly prohibited

 

Answer EHLO: 250-bosauthsmtp09.yourhostingaccount.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 34603008 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-CHUNKING 250-STARTTLS 250 HELP

 

Answer AUTH LOGIN: 334 VXNlcm5hbWU6
Mail certificate is invalid
snowfox.at
66.96.162.141
25
SMTP
open
220 ESMTP Sat, 17 Feb 2024 11:26:14 -0500: UCE strictly prohibited
Mail certificate is invalid

Answer EHLO: 250-bosauthsmtp09.yourhostingaccount.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 34603008 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-CHUNKING 250-STARTTLS 250 HELP Good: STARTTLS found

Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
snowfox.at
66.96.162.141
53
DNS



snowfox.at
66.96.162.141
53
DNS



snowfox.at
66.96.162.141
110
POP3
open
+OK Dovecot ready.

snowfox.at
66.96.162.141
110
POP3
open
+OK Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
snowfox.at
66.96.162.141
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE UNSELECT LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

snowfox.at
66.96.162.141
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE UNSELECT LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
snowfox.at
66.96.162.141
465
SMTP (encrypted)
open


snowfox.at
66.96.162.141
465
SMTP (encrypted)
open


snowfox.at
66.96.162.141
587
SMTP (encrypted, submission)
open
220 ESMTP Sat, 17 Feb 2024 11:26:14 -0500: UCE strictly prohibited

 

Answer EHLO: 250-bosauthsmtp09.yourhostingaccount.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 34603008 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-CHUNKING 250-STARTTLS 250 HELP

 

Answer AUTH LOGIN: 334 VXNlcm5hbWU6
Mail certificate is invalid
snowfox.at
66.96.162.141
587
SMTP (encrypted, submission)
open
220 ESMTP Sat, 17 Feb 2024 11:26:14 -0500: UCE strictly prohibited
Mail certificate is invalid

Answer EHLO: 250-bosauthsmtp09.yourhostingaccount.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 34603008 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-CHUNKING 250-STARTTLS 250 HELP Good: STARTTLS found

Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
snowfox.at
66.96.162.141
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE UNSELECT LITERAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is invalid
snowfox.at
66.96.162.141
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE UNSELECT LITERAL+ AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is invalid
snowfox.at
66.96.162.141
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is invalid
snowfox.at
66.96.162.141
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is invalid
snowfox.at
66.96.162.141
1433
MS SQL



snowfox.at
66.96.162.141
1433
MS SQL



snowfox.at
66.96.162.141
2082
cPanel (http)



snowfox.at
66.96.162.141
2082
cPanel (http)



snowfox.at
66.96.162.141
2083
cPanel (https)



snowfox.at
66.96.162.141
2083
cPanel (https)



snowfox.at
66.96.162.141
2086
WHM (http)



snowfox.at
66.96.162.141
2086
WHM (http)



snowfox.at
66.96.162.141
2087
WHM (https)



snowfox.at
66.96.162.141
2087
WHM (https)



snowfox.at
66.96.162.141
2089
cPanel Licensing



snowfox.at
66.96.162.141
2089
cPanel Licensing



snowfox.at
66.96.162.141
2095
cPanel Webmail (http)



snowfox.at
66.96.162.141
2095
cPanel Webmail (http)



snowfox.at
66.96.162.141
2096
cPanel Webmail (https)



snowfox.at
66.96.162.141
2096
cPanel Webmail (https)



snowfox.at
66.96.162.141
2222
DirectAdmin (http)
open
http://66.96.162.141:2222/
Http-Status: -16
UnknownError - Received an invalid status line: 'SSH-2.0-domaincom FTP Server Ready'.

snowfox.at
66.96.162.141
2222
DirectAdmin (http)
open
http://66.96.162.141:2222/
Http-Status: -16
UnknownError - Received an invalid status line: 'SSH-2.0-domaincom FTP Server Ready'.

snowfox.at
66.96.162.141
2222
DirectAdmin (https)
open
https://66.96.162.141:2222/
Http-Status: -16
UnknownError - The SSL connection could not be established, see inner exception. - Unable to read data from the transport connection (FF: PR_CONNECT_RESET_ERROR)

snowfox.at
66.96.162.141
2222
DirectAdmin (https)
open
https://66.96.162.141:2222/
Http-Status: -16
UnknownError - The SSL connection could not be established, see inner exception. - Unable to read data from the transport connection (FF: PR_CONNECT_RESET_ERROR)

snowfox.at
66.96.162.141
3306
mySql



snowfox.at
66.96.162.141
3306
mySql



snowfox.at
66.96.162.141
5224
Plesk Licensing



snowfox.at
66.96.162.141
5224
Plesk Licensing



snowfox.at
66.96.162.141
5432
PostgreSQL



snowfox.at
66.96.162.141
5432
PostgreSQL



snowfox.at
66.96.162.141
8080
Ookla Speedtest (http)



snowfox.at
66.96.162.141
8080
Ookla Speedtest (http)



snowfox.at
66.96.162.141
8080
Ookla Speedtest (https)



snowfox.at
66.96.162.141
8080
Ookla Speedtest (https)



snowfox.at
66.96.162.141
8083
VestaCP http



snowfox.at
66.96.162.141
8083
VestaCP http



snowfox.at
66.96.162.141
8083
VestaCP https



snowfox.at
66.96.162.141
8083
VestaCP https



snowfox.at
66.96.162.141
8443
Plesk Administration (https)



snowfox.at
66.96.162.141
8443
Plesk Administration (https)



snowfox.at
66.96.162.141
8447
Plesk Installer + Updates



snowfox.at
66.96.162.141
8447
Plesk Installer + Updates



snowfox.at
66.96.162.141
8880
Plesk Administration (http)



snowfox.at
66.96.162.141
8880
Plesk Administration (http)



snowfox.at
66.96.162.141
10000
Webmin (http)



snowfox.at
66.96.162.141
10000
Webmin (http)



snowfox.at
66.96.162.141
10000
Webmin (https)



snowfox.at
66.96.162.141
10000
Webmin (https)



snowfox.at
90.152.144.7
21
FTP



snowfox.at
90.152.144.7
21
FTP



snowfox.at
90.152.144.7
22
SSH



snowfox.at
90.152.144.7
22
SSH



snowfox.at
90.152.144.7
25
SMTP



snowfox.at
90.152.144.7
25
SMTP



snowfox.at
90.152.144.7
53
DNS



snowfox.at
90.152.144.7
53
DNS



snowfox.at
90.152.144.7
110
POP3



snowfox.at
90.152.144.7
110
POP3



snowfox.at
90.152.144.7
143
IMAP



snowfox.at
90.152.144.7
143
IMAP



snowfox.at
90.152.144.7
465
SMTP (encrypted)



snowfox.at
90.152.144.7
465
SMTP (encrypted)



snowfox.at
90.152.144.7
587
SMTP (encrypted, submission)



snowfox.at
90.152.144.7
587
SMTP (encrypted, submission)



snowfox.at
90.152.144.7
993
IMAP (encrypted)



snowfox.at
90.152.144.7
993
IMAP (encrypted)



snowfox.at
90.152.144.7
995
POP3 (encrypted)



snowfox.at
90.152.144.7
995
POP3 (encrypted)



snowfox.at
90.152.144.7
1433
MS SQL



snowfox.at
90.152.144.7
1433
MS SQL



snowfox.at
90.152.144.7
2082
cPanel (http)



snowfox.at
90.152.144.7
2082
cPanel (http)



snowfox.at
90.152.144.7
2083
cPanel (https)



snowfox.at
90.152.144.7
2083
cPanel (https)



snowfox.at
90.152.144.7
2086
WHM (http)



snowfox.at
90.152.144.7
2086
WHM (http)



snowfox.at
90.152.144.7
2087
WHM (https)



snowfox.at
90.152.144.7
2087
WHM (https)



snowfox.at
90.152.144.7
2089
cPanel Licensing



snowfox.at
90.152.144.7
2089
cPanel Licensing



snowfox.at
90.152.144.7
2095
cPanel Webmail (http)



snowfox.at
90.152.144.7
2095
cPanel Webmail (http)



snowfox.at
90.152.144.7
2096
cPanel Webmail (https)



snowfox.at
90.152.144.7
2096
cPanel Webmail (https)



snowfox.at
90.152.144.7
2222
DirectAdmin (http)



snowfox.at
90.152.144.7
2222
DirectAdmin (http)



snowfox.at
90.152.144.7
2222
DirectAdmin (https)



snowfox.at
90.152.144.7
2222
DirectAdmin (https)



snowfox.at
90.152.144.7
3306
mySql



snowfox.at
90.152.144.7
3306
mySql



snowfox.at
90.152.144.7
5224
Plesk Licensing



snowfox.at
90.152.144.7
5224
Plesk Licensing



snowfox.at
90.152.144.7
5432
PostgreSQL



snowfox.at
90.152.144.7
5432
PostgreSQL



snowfox.at
90.152.144.7
8080
Ookla Speedtest (http)



snowfox.at
90.152.144.7
8080
Ookla Speedtest (http)



snowfox.at
90.152.144.7
8080
Ookla Speedtest (https)



snowfox.at
90.152.144.7
8080
Ookla Speedtest (https)



snowfox.at
90.152.144.7
8083
VestaCP http



snowfox.at
90.152.144.7
8083
VestaCP http



snowfox.at
90.152.144.7
8083
VestaCP https



snowfox.at
90.152.144.7
8083
VestaCP https



snowfox.at
90.152.144.7
8443
Plesk Administration (https)



snowfox.at
90.152.144.7
8443
Plesk Administration (https)



snowfox.at
90.152.144.7
8447
Plesk Installer + Updates



snowfox.at
90.152.144.7
8447
Plesk Installer + Updates



snowfox.at
90.152.144.7
8880
Plesk Administration (http)



snowfox.at
90.152.144.7
8880
Plesk Administration (http)



snowfox.at
90.152.144.7
10000
Webmin (http)



snowfox.at
90.152.144.7
10000
Webmin (http)



snowfox.at
90.152.144.7
10000
Webmin (https)



snowfox.at
90.152.144.7
10000
Webmin (https)



www.snowfox.at
90.152.144.7
21
FTP



www.snowfox.at
90.152.144.7
21
FTP



www.snowfox.at
90.152.144.7
22
SSH



www.snowfox.at
90.152.144.7
22
SSH



www.snowfox.at
90.152.144.7
25
SMTP



www.snowfox.at
90.152.144.7
25
SMTP



www.snowfox.at
90.152.144.7
53
DNS



www.snowfox.at
90.152.144.7
53
DNS



www.snowfox.at
90.152.144.7
110
POP3



www.snowfox.at
90.152.144.7
110
POP3



www.snowfox.at
90.152.144.7
143
IMAP



www.snowfox.at
90.152.144.7
143
IMAP



www.snowfox.at
90.152.144.7
465
SMTP (encrypted)



www.snowfox.at
90.152.144.7
465
SMTP (encrypted)



www.snowfox.at
90.152.144.7
587
SMTP (encrypted, submission)



www.snowfox.at
90.152.144.7
587
SMTP (encrypted, submission)



www.snowfox.at
90.152.144.7
993
IMAP (encrypted)



www.snowfox.at
90.152.144.7
993
IMAP (encrypted)



www.snowfox.at
90.152.144.7
995
POP3 (encrypted)



www.snowfox.at
90.152.144.7
995
POP3 (encrypted)



www.snowfox.at
90.152.144.7
1433
MS SQL



www.snowfox.at
90.152.144.7
1433
MS SQL



www.snowfox.at
90.152.144.7
2082
cPanel (http)



www.snowfox.at
90.152.144.7
2082
cPanel (http)



www.snowfox.at
90.152.144.7
2083
cPanel (https)



www.snowfox.at
90.152.144.7
2083
cPanel (https)



www.snowfox.at
90.152.144.7
2086
WHM (http)



www.snowfox.at
90.152.144.7
2086
WHM (http)



www.snowfox.at
90.152.144.7
2087
WHM (https)



www.snowfox.at
90.152.144.7
2087
WHM (https)



www.snowfox.at
90.152.144.7
2089
cPanel Licensing



www.snowfox.at
90.152.144.7
2089
cPanel Licensing



www.snowfox.at
90.152.144.7
2095
cPanel Webmail (http)



www.snowfox.at
90.152.144.7
2095
cPanel Webmail (http)



www.snowfox.at
90.152.144.7
2096
cPanel Webmail (https)



www.snowfox.at
90.152.144.7
2096
cPanel Webmail (https)



www.snowfox.at
90.152.144.7
2222
DirectAdmin (http)



www.snowfox.at
90.152.144.7
2222
DirectAdmin (http)



www.snowfox.at
90.152.144.7
2222
DirectAdmin (https)



www.snowfox.at
90.152.144.7
2222
DirectAdmin (https)



www.snowfox.at
90.152.144.7
3306
mySql



www.snowfox.at
90.152.144.7
3306
mySql



www.snowfox.at
90.152.144.7
5224
Plesk Licensing



www.snowfox.at
90.152.144.7
5224
Plesk Licensing



www.snowfox.at
90.152.144.7
5432
PostgreSQL



www.snowfox.at
90.152.144.7
5432
PostgreSQL



www.snowfox.at
90.152.144.7
8080
Ookla Speedtest (http)



www.snowfox.at
90.152.144.7
8080
Ookla Speedtest (http)



www.snowfox.at
90.152.144.7
8080
Ookla Speedtest (https)



www.snowfox.at
90.152.144.7
8080
Ookla Speedtest (https)



www.snowfox.at
90.152.144.7
8083
VestaCP http



www.snowfox.at
90.152.144.7
8083
VestaCP http



www.snowfox.at
90.152.144.7
8083
VestaCP https



www.snowfox.at
90.152.144.7
8083
VestaCP https



www.snowfox.at
90.152.144.7
8443
Plesk Administration (https)



www.snowfox.at
90.152.144.7
8443
Plesk Administration (https)



www.snowfox.at
90.152.144.7
8447
Plesk Installer + Updates



www.snowfox.at
90.152.144.7
8447
Plesk Installer + Updates



www.snowfox.at
90.152.144.7
8880
Plesk Administration (http)



www.snowfox.at
90.152.144.7
8880
Plesk Administration (http)



www.snowfox.at
90.152.144.7
10000
Webmin (http)



www.snowfox.at
90.152.144.7
10000
Webmin (http)



www.snowfox.at
90.152.144.7
10000
Webmin (https)



www.snowfox.at
90.152.144.7
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=85dee9b0-2961-4d15-90fa-adc77a74e7d1

 

Last Result: https://check-your-website.server-daten.de/?q=snowfox.at - 2024-02-17 17:24:01

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=snowfox.at" target="_blank">Check this Site: snowfox.at</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=snowfox.at