Check DNS, Urls + Redirects, Certificates and Content of your Website



L

Loop - it's impossible to use this site

Checked:
04.08.2022 16:18:44


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
rekiny.wroclaw.pl
A
88.198.200.67
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH
Hostname: static.88.198.200.67.clients.your-server.de
yes
1
0

AAAA

yes


www.rekiny.wroclaw.pl
A
88.198.200.67
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH
Hostname: static.88.198.200.67.clients.your-server.de
yes
1
0

AAAA

yes


*.rekiny.wroclaw.pl
A
88.198.200.67
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 20826, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2022, 00:00:00 +, Signature-Inception: 31.07.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: pl
pl
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 38491, DigestType 2 and Digest 5u32YhmaRL4He9ab5s4mkC+NIuWHXJ8jBYZuBVYFSfI=



1 RRSIG RR to validate DS RR found



RRSIG-Owner pl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 17.08.2022, 05:00:00 +, Signature-Inception: 04.08.2022, 04:00:00 +, KeyTag 20826, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20826 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 31164, Flags 256



Public Key with Algorithm 8, KeyTag 38491, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner pl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.08.2022, 12:00:00 +, Signature-Inception: 31.07.2022, 12:00:00 +, KeyTag 38491, Signer-Name: pl



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 38491 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 38491, DigestType 2 and Digest "5u32YhmaRL4He9ab5s4mkC+NIuWHXJ8jBYZuBVYFSfI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: wroclaw.pl
wroclaw.pl
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 34102, DigestType 2 and Digest WKvpu1xsIDabxWY8ml+KXXJULrI1kbMeV4oj+1u1B/Q=



1 RRSIG RR to validate DS RR found



RRSIG-Owner wroclaw.pl., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.08.2022, 12:00:00 +, Signature-Inception: 31.07.2022, 12:00:00 +, KeyTag 31164, Signer-Name: pl



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 31164 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 9924, Flags 256



Public Key with Algorithm 8, KeyTag 34102, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner wroclaw.pl., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.08.2022, 12:00:00 +, Signature-Inception: 31.07.2022, 12:00:00 +, KeyTag 34102, Signer-Name: wroclaw.pl



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34102 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34102, DigestType 2 and Digest "WKvpu1xsIDabxWY8ml+KXXJULrI1kbMeV4oj+1u1B/Q=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: rekiny.wroclaw.pl
rekiny.wroclaw.pl
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "pp3pob3rhq0dh93vp5m7677lkq1hhs8j" between the hashed NSEC3-owner "potv30d0t0qsrdf8kg6k67k9qmap0mdt" and the hashed NextOwner "pqo5thphh459ckt3hatenq11a7j116ta". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner potv30d0t0qsrdf8kg6k67k9qmap0mdt.wroclaw.pl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 30.08.2022, 12:00:00 +, Signature-Inception: 31.07.2022, 12:00:00 +, KeyTag 9924, Signer-Name: wroclaw.pl



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "3evh0o3blf8gn1urhhufml5rora9m81o" as Owner. That's the Hash of "wroclaw.pl" with the NextHashedOwnerName "3frqn3avu78rlfh45s2eaod2n8kmqkul". So that domain name is the Closest Encloser of "rekiny.wroclaw.pl". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 3evh0o3blf8gn1urhhufml5rora9m81o.wroclaw.pl., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 30.08.2022, 12:00:00 +, Signature-Inception: 31.07.2022, 12:00:00 +, KeyTag 9924, Signer-Name: wroclaw.pl



0 DNSKEY RR found




Zone: www.rekiny.wroclaw.pl
www.rekiny.wroclaw.pl
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.rekiny.wroclaw.pl
  hydrogen.ns.hetzner.com / nbg1-dns-aut1a.hetzner.company

rekiny.wroclaw.pl
  helium.ns.hetzner.de / dus1-dns-aut1a.hetzner.company
193.47.99.5
Düsseldorf/North Rhine-Westphalia/Germany (DE) - myLoc managed IT AG


 
2001:67c:192c::add:5
Düsseldorf/North Rhine-Westphalia/Germany (DE) - myLoc managed IT AG


  hydrogen.ns.hetzner.com / nbg1-dns-aut1a.hetzner.company
213.133.100.98
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:0:1::add:1098
Gunzenhausen/Bavaria/Germany (DE) - Hetzner Online GmbH


  oxygen.ns.hetzner.com / fsn1-dns-aut1b.hetzner.company
88.198.229.192
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:0:1::add:2992
Gunzenhausen/Bavaria/Germany (DE) - Hetzner Online GmbH

wroclaw.pl
  a-dns.pl / Polish ccTLD infrastructure
194.181.87.156
Warsaw/Mazovia/Poland (PL) - Naukowa I Akademicka Siec Komputerowa Instytut Badawczy


 
2001:a10:121:1::156
Warsaw/Mazovia/Poland (PL) - Naukowa I Akademicka Siec Komputerowa Instytut Badawczy


  b-dns.pl / b-nask
192.195.72.53
Warsaw/Mazovia/Poland (PL) - Naukowa I Akademicka Siec Komputerowa Instytut Badawczy


 
2001:7f9:c::53
Warsaw/Mazovia/Poland (PL) - Naukowa I Akademicka Siec Komputerowa Instytut Badawczy


  c-dns.pl / Polish ccTLD infrastructure
93.190.128.146
Prague/Hlavni mesto Praha/Czechia (CZ) - NIX.CZ z.s.p.o.


 
2a02:38:14::146
Prague/Hlavni mesto Praha/Czechia (CZ) - NIX.CZ PUBLIC NET


  d-dns.pl / LHR4
185.159.197.48
Stockholm/Stockholm County/Sweden (SE) - CIRA Canadian Internet Registration Authority Autorit Canadienne pour les enreg


 
2620:10a:80aa::48
Ottawa/Ontario/Canada (CA) - CIRA Canadian Internet Registration Authority Autorit Canadienne pour les enreg


  e-dns.pl / Polish ccTLD infrastructure
46.28.245.82
Warsaw/Mazovia/Poland (PL) - Telecitygroup International Limited


  f-dns.pl / tld-all-ber1
194.0.25.29
Salzburg/Austria (AT) - nic.at GmbH


 
2001:678:20::29
Salzburg/Austria (AT) - nic.at GmbH


  g-dns.pl / Polish ccTLD infrastructure
149.156.1.252
Krakow/Lesser Poland/Poland (PL) - Academic Computer Centre CYFRONET AGH


 
2001:6d8:1001:1::252
Warsaw/Mazovia/Poland (PL) - ACK CYFRONET AGH


  h-dns.pl / FRA2
185.159.198.48
Stockholm/Stockholm County/Sweden (SE) - CIRA Canadian Internet Registration Authority Autorit Canadienne pour les enreg


 
2620:10a:80ab::48
Frankfurt am Main/Hesse/Germany (DE) - CIRA Canadian Internet Registration Authority Autorit Canadienne pour les enreg


  i-dns.pl / TLD_Host2.Frankfurt_Node1
156.154.100.15
New York/United States (US) - NeuStar, Inc.


 
2001:502:2eda::15
Sterling/Virginia/United States (US) - NeuStar, Inc.

pl
  a-dns.pl / Polish ccTLD infrastructure


  b-dns.pl / b-nask


  c-dns.pl / Polish ccTLD infrastructure


  d-dns.pl / LHR4


  e-dns.pl / Polish ccTLD infrastructure


  f-dns.pl / tld-all-ber1


  g-dns.pl / Polish ccTLD infrastructure


  h-dns.pl / FRA2


  i-dns.pl / TLD_Host2.Frankfurt_Node1


4. SOA-Entries


Domain:pl
Zone-Name:pl
Primary:a-dns.pl
Mail:dnsmaster.nask.pl
Serial:1659610843
Refresh:900
Retry:300
Expire:2592000
TTL:3600
num Entries:9


Domain:wroclaw.pl
Zone-Name:wroclaw.pl
Primary:a-dns.pl
Mail:dnsmaster.nask.pl
Serial:1659610833
Refresh:900
Retry:300
Expire:2592000
TTL:3600
num Entries:17


Domain:rekiny.wroclaw.pl
Zone-Name:rekiny.wroclaw.pl
Primary:hydrogen.ns.hetzner.com
Mail:dns.hetzner.com
Serial:2022071472
Refresh:86400
Retry:10800
Expire:3600000
TTL:3600
num Entries:6


Domain:www.rekiny.wroclaw.pl
Zone-Name:rekiny.wroclaw.pl
Primary:hydrogen.ns.hetzner.com
Mail:dns.hetzner.com
Serial:2022071472
Refresh:86400
Retry:10800
Expire:3600000
TTL:3600
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://www.rekiny.wroclaw.pl/
88.198.200.67
301
https://www.rekiny.wroclaw.pl/
Html is minified: 107.78 %
0.054
A
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:19:58 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: https://www.rekiny.wroclaw.pl/
X-Robots-Tag: noindex nofollow

• http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/

301
http://rekiny.wroclaw.pl/
Html is minified: 107.78 %
0.080
D
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:11 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: http://rekiny.wroclaw.pl/
X-Robots-Tag: noindex nofollow

• http://rekiny.wroclaw.pl/
88.198.200.67 GZip used - 7671 / 29297 - 73.82 %
200

Html is minified: 142.97 %
0.070
H
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:19:58 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-Robots-Tag: noindex nofollow
Content-Encoding: gzip

• https://rekiny.wroclaw.pl/
88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
Html is minified: 108.97 %
3.177
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:19:58 GMT
Content-Type: text/html
Content-Length: 170
Connection: close
Location: http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
X-Robots-Tag: noindex nofollow

• https://www.rekiny.wroclaw.pl/
88.198.200.67
301
http://www.rekiny.wroclaw.pl/
Html is minified: 107.78 %
3.130
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:03 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: http://www.rekiny.wroclaw.pl/
X-Robots-Tag: noindex nofollow

• http://rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
88.198.200.67
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
http://rekiny.wroclaw.pl/
Html is minified: 107.78 %
0.057
D
Visible Content: 301 Moved Permanently nginx/1.14.0 (Ubuntu)
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:07 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: http://rekiny.wroclaw.pl/
X-Robots-Tag: noindex nofollow

• http://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
88.198.200.67
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 107.78 %
0.053
A
Visible Content: 301 Moved Permanently nginx/1.14.0 (Ubuntu)
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:07 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: https://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
X-Robots-Tag: noindex nofollow

• https://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
http://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 107.78 %
3.080
N
Certificate error: RemoteCertificateNameMismatch
Visible Content: 301 Moved Permanently nginx/1.14.0 (Ubuntu)
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:11 GMT
Content-Type: text/html
Content-Length: 194
Connection: close
Location: http://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
X-Robots-Tag: noindex nofollow

• https://88.198.200.67/
88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
Html is minified: 108.97 %
3.150
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx/1.14.0 (Ubuntu)
Date: Thu, 04 Aug 2022 14:20:08 GMT
Content-Type: text/html
Content-Length: 170
Connection: close
Location: http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
X-Robots-Tag: noindex nofollow

7. Comments


1. General Results, most used to calculate the result

Aname "rekiny.wroclaw.pl" is domain, public suffix is ".wroclaw.pl", top-level-domain is ".pl", top-level-domain-type is "country-code", Country is Poland, tld-manager is "Research and Academic Computer Network", num .pl-domains preloaded: 1131 (complete: 175327)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: rekiny.wroclaw.pl has only one ip address.
Warning: Only one ip address found: www.rekiny.wroclaw.pl has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: rekiny.wroclaw.pl has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.rekiny.wroclaw.pl has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
Agood - only one version with Http-Status 200
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Ahttp://www.rekiny.wroclaw.pl/ 88.198.200.67
301
https://www.rekiny.wroclaw.pl/
correct redirect http - https with the same domain name
Bhttps://rekiny.wroclaw.pl/ 88.198.200.67
302

Missing HSTS-Header
Bhttps://www.rekiny.wroclaw.pl/ 88.198.200.67
301

Missing HSTS-Header
Bhttps://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
301

Missing HSTS-Header
Dhttp://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
301
http://rekiny.wroclaw.pl/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 88.198.200.67
301
http://rekiny.wroclaw.pl/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Fhttps://rekiny.wroclaw.pl/ 88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
wrong redirect https - http - never redirect https to http
Fhttps://www.rekiny.wroclaw.pl/ 88.198.200.67
301
http://www.rekiny.wroclaw.pl/
wrong redirect https - http - never redirect https to http
Fhttps://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
301
http://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
wrong redirect https - http - never redirect https to http
Fhttps://88.198.200.67/ 88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
wrong redirect https - http - never redirect https to http
Hfatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Lhttp://www.rekiny.wroclaw.pl/ 88.198.200.67
301
https://www.rekiny.wroclaw.pl/
Error two - step - loop
Lhttp://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 88.198.200.67
301
https://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Error two - step - loop
Nhttps://rekiny.wroclaw.pl/ 88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.rekiny.wroclaw.pl/ 88.198.200.67
301
http://www.rekiny.wroclaw.pl/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
301
http://www.rekiny.wroclaw.pl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://88.198.200.67/ 88.198.200.67
302
http://rekiny.wroclaw.pl/landing_rekiny_wroclaw/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain rekiny.wroclaw.pl, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.rekiny.wroclaw.pl, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 11 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 11 Queries complete, 11 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.7 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: helium.ns.hetzner.de, hydrogen.ns.hetzner.com, oxygen.ns.hetzner.com, 3 Name Servers included in Delegation: helium.ns.hetzner.de, hydrogen.ns.hetzner.com, oxygen.ns.hetzner.com, 3 Name Servers included in 1 Zone definitions: helium.ns.hetzner.de, hydrogen.ns.hetzner.com, oxygen.ns.hetzner.com, 1 Name Servers listed in SOA.Primary: hydrogen.ns.hetzner.com.
AGood: Only one SOA.Primary Name Server found.: hydrogen.ns.hetzner.com.
AGood: SOA.Primary Name Server included in the delegation set.: hydrogen.ns.hetzner.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: helium.ns.hetzner.de, hydrogen.ns.hetzner.com, oxygen.ns.hetzner.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 3 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 3 Name Servers, 2 Top Level Domains: de, com
AGood: Name Servers with different domain names found.: 2 different Domains found
Warning: All Name Servers from the same Country / IP location.: 3 Name Servers, 1 Countries: DE
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 193., 213., 88., 3 different subnets (first two Bytes): 193.47., 213.133., 88.198., 3 different subnets (first three Bytes): 193.47.99., 213.133.100., 88.198.229.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 2 different subnets (first block): 2001:, 2a01:, 2 different subnets (first two blocks): 2001:067c:, 2a01:04f8:, 2 different subnets (first three blocks): 2001:067c:192c:, 2a01:04f8:0000:, 2 different subnets (first four blocks): 2001:067c:192c:0000:, 2a01:04f8:0000:0001:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 361100 milliseconds, 361.100 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
rekiny.wroclaw.pl
88.198.200.67
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
rekiny.wroclaw.pl
88.198.200.67
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
Chain - too much certificates, don't send root certificates
1CN=zrzuty.rekiny.wroclaw.pl

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.rekiny.wroclaw.pl
88.198.200.67
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.rekiny.wroclaw.pl
88.198.200.67
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
Chain - too much certificates, don't send root certificates
1CN=zrzuty.rekiny.wroclaw.pl

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.rekiny.wroclaw.pl
www.rekiny.wroclaw.pl
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.rekiny.wroclaw.pl
www.rekiny.wroclaw.pl
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
Chain - too much certificates, don't send root certificates
1CN=zrzuty.rekiny.wroclaw.pl

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


88.198.200.67
88.198.200.67
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

88.198.200.67
88.198.200.67
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
Chain - too much certificates, don't send root certificates
1CN=zrzuty.rekiny.wroclaw.pl

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


9. Certificates

1.
1.
CN=zrzuty.rekiny.wroclaw.pl
13.06.2022
11.09.2022
17 days expired
zrzuty.rekiny.wroclaw.pl - 1 entry
1.
1.
CN=zrzuty.rekiny.wroclaw.pl
13.06.2022

11.09.2022
17 days expired
zrzuty.rekiny.wroclaw.pl - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:033A7C326BDB6896E856F0C2ECA65B59234B
Thumbprint:499A2D6D14FAC9E5D3E004172BEEC2ADE5B96616
SHA256 / Certificate:g5ucHYo5wE23miJgYbyWgchJqEJiI3zr0uPLm4f84s8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):ea7ff0cc62d6948790da77fdc5df00c6c1e9873a72cdb02106add036155bdcdb
SHA256 hex / Subject Public Key Information (SPKI):ea7ff0cc62d6948790da77fdc5df00c6c1e9873a72cdb02106add036155bdcdb (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1083 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1083 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4632 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4632 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3803153280
leaf cert
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
2022-06-04 00:00:00
2022-09-02 23:59:59
autodiscover.rekiny.wroclaw.pl, cpanel.rekiny.wroclaw.pl, cpcalendars.rekiny.wroclaw.pl, cpcontacts.rekiny.wroclaw.pl, ipv6.rekiny.wroclaw.pl, mail.rekiny.wroclaw.pl, rekiny.wroclaw.pl, webdisk.rekiny.wroclaw.pl, webmail.rekiny.wroclaw.pl, www.rekiny.wroclaw.pl - 10 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: helium.ns.hetzner.de, hydrogen.ns.hetzner.com, oxygen.ns.hetzner.com

QNr.DomainTypeNS used
1
de
NS
h.root-servers.net (2001:500:1::53)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
2
helium.ns.hetzner.de
NS
a.nic.de (2001:678:2::53)

Answer: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de

Answer: ns1.your-server.de
213.133.106.251, 2a01:4f8:d0a:2006::2

Answer: ns3.second-ns.de
193.47.99.4, 2001:67c:192c::add:b3
3
com
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
4
hydrogen.ns.hetzner.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de

Answer: ns.second-ns.com
213.239.204.242, 2a01:4f8:0:a101::b:1
5
oxygen.ns.hetzner.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de

Answer: ns.second-ns.com
213.239.204.242, 2a01:4f8:0:a101::b:1
6
helium.ns.hetzner.de: 193.47.99.5
A
ns.second-ns.com (2a01:4f8:0:a101::b:1)
7
helium.ns.hetzner.de: 2001:67c:192c::add:5
AAAA
ns.second-ns.com (2a01:4f8:0:a101::b:1)
8
hydrogen.ns.hetzner.com: 213.133.100.98
A
ns.second-ns.com (2a01:4f8:0:a101::b:1)
9
hydrogen.ns.hetzner.com: 2a01:4f8:0:1::add:1098
AAAA
ns.second-ns.com (2a01:4f8:0:a101::b:1)
10
oxygen.ns.hetzner.com: 88.198.229.192
A
ns.second-ns.com (2a01:4f8:0:a101::b:1)
11
oxygen.ns.hetzner.com: 2a01:4f8:0:1::add:2992
AAAA
ns.second-ns.com (2a01:4f8:0:a101::b:1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.rekiny.wroclaw.pl
0

no CAA entry found
1
0
rekiny.wroclaw.pl
0

no CAA entry found
1
0
wroclaw.pl
0

no CAA entry found
1
0
pl
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rekiny.wroclaw.pl

ok
1
0
www.rekiny.wroclaw.pl

ok
1
0
_acme-challenge.rekiny.wroclaw.pl

missing entry or wrong length
1
0
_acme-challenge.www.rekiny.wroclaw.pl

missing entry or wrong length
1
0
_acme-challenge.rekiny.wroclaw.pl.rekiny.wroclaw.pl

perhaps wrong
1
0
_acme-challenge.www.rekiny.wroclaw.pl.rekiny.wroclaw.pl

perhaps wrong
1
0
_acme-challenge.www.rekiny.wroclaw.pl.www.rekiny.wroclaw.pl

perhaps wrong
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

rekiny.wroclaw.pl
10
mail.rekiny.wroclaw.pl
0
1
ok


A


91.211.222.69
0
1
ok


AAAA


2001:678:63c:0:9:5bd3:dc25:3
0
1
ok


CNAME



0
0
ok

_dmarc
TXT
_dmarc.rekiny.wroclaw.pl


0
0
ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
rekiny.wroclaw.pl
88.198.200.67
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
19 Ciphers, 118.66 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1
www.rekiny.wroclaw.pl
88.198.200.67
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
19 Ciphers, 118.97 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=ceb4e5f4-e48a-4ffb-a074-164704b470c4


Last Result: https://check-your-website.server-daten.de/?q=rekiny.wroclaw.pl - 2022-08-04 16:36:03


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=rekiny.wroclaw.pl" target="_blank">Check this Site: rekiny.wroclaw.pl</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro