Check DNS, Urls + Redirects, Certificates and Content of your Website



N

No trusted Certificate

Checked:
23.02.2021 11:58:05


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
2020.rapportannuel.finances.belgium.be

Name Error
yes
1
0
www.2020.rapportannuel.finances.belgium.be

Name Error
yes
1
0
2020.rapportannuel.finances.belgium.be
A
193.191.245.42
Brussels/Brussels Capital/Belgium (BE) - BELNET
No Hostname found
no


*.rapportannuel.finances.belgium.be
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.2020.rapportannuel.finances.belgium.be
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: be
be
2 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 12664, DigestType 2 and Digest dRQemxGIqVp6hVv0fieKdCpePy3e7Y6ZXXSdSPLw5y0=



DS with Algorithm 8, KeyTag 52756, DigestType 2 and Digest VIWsM918ftI36ipL0mlzHIFpYP4YEEICRIS1zspuzJ8=



1 RRSIG RR to validate DS RR found



RRSIG-Owner be., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2021, 05:00:00 +, Signature-Inception: 23.02.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone



5 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 12664, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 41553, Flags 256



Public Key with Algorithm 8, KeyTag 46794, Flags 256



Public Key with Algorithm 8, KeyTag 52756, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 59085, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner be., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.04.2021, 02:38:48 +, Signature-Inception: 17.12.2020, 09:25:22 +, KeyTag 52756, Signer-Name: be



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 52756 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 52756, DigestType 2 and Digest "VIWsM918ftI36ipL0mlzHIFpYP4YEEICRIS1zspuzJ8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: belgium.be
belgium.be
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "h4dlnfs4sap5vd9h5daasrndebf4ucha" between the hashed NSEC3-owner "h4dl90ijglpld2fr6b2l8kghhq5re3oq" and the hashed NextOwner "h4dlucgvcn8c5enei7vstuueqgduo829". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner h4dl90ijglpld2fr6b2l8kghhq5re3oq.be., Algorithm: 8, 2 Labels, original TTL: 600 sec, Signature-expiration: 16.03.2021, 04:01:35 +, Signature-Inception: 22.02.2021, 20:14:22 +, KeyTag 46794, Signer-Name: be



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "ba141snrnoe1rc9mddgrest23g657rir" as Owner. That's the Hash of "be" with the NextHashedOwnerName "ba175a6m75itntd2do5riqlcvm45gsmr". So that domain name is the Closest Encloser of "belgium.be". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner ba141snrnoe1rc9mddgrest23g657rir.be., Algorithm: 8, 2 Labels, original TTL: 600 sec, Signature-expiration: 07.03.2021, 02:31:35 +, Signature-Inception: 12.02.2021, 23:51:55 +, KeyTag 46794, Signer-Name: be



0 DNSKEY RR found




Zone: finances.belgium.be
finances.belgium.be
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: rapportannuel.finances.belgium.be
rapportannuel.finances.belgium.be
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: 2020.rapportannuel.finances.belgium.be
2020.rapportannuel.finances.belgium.be
0 DS RR in the parent zone found

Zone: www.2020.rapportannuel.finances.belgium.be
www.2020.rapportannuel.finances.belgium.be
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.2020.rapportannuel.finances.belgium.be
  auth-ns-ha-fin.secaas.intra

2020.rapportannuel.finances.belgium.be
  auth-ns-ha-fin.secaas.intra

rapportannuel.finances.belgium.be
  auth-ns-ha-fin.secaas.intra


  ns2.skynet.be
195.238.3.18
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns3.skynet.be
195.238.25.138
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns4.skynet.be
195.238.25.139
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns9.minfin.be
193.191.216.84
Antwerp/Flanders/Belgium (BE) - BELNET

finances.belgium.be
  ns2.skynet.be
195.238.3.18
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns3.skynet.be
195.238.25.138
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns4.skynet.be
195.238.25.139
Brussels/Brussels Capital/Belgium (BE) - Proximus NV


  ns9.minfin.be
193.191.216.84
Antwerp/Flanders/Belgium (BE) - BELNET

belgium.be
  dns1w.fgov.be
193.191.212.2
Schaarbeek/Brussels Capital/Belgium (BE) - BELNET


  dns2s.belgium.be
193.191.213.2
Schaarbeek/Brussels Capital/Belgium (BE) - BELNET


  dns3a.westeurope.cloudapp.azure.com
40.118.83.67
Amsterdam/North Holland/Netherlands (NL) - Microsoft Corporation


  ns2.yourict.net

be
  a.nsset.be / amsterdam1.ns.prodng.dc3.be


  b.ns.dns.be / amsterdam2.ns.prodng.dc3.be


  c.ns.dns.be / prague1.ns.prodng.dc3.be


  d.ns.dns.be / stockholm1.ns.prodng.dc3.be


  y.ns.dns.be / dns3.frpar1


  z.nsset.be / tld-all-ber1


4. SOA-Entries


Domain:be
Zone-Name:be
Primary:a.nsset.be
Mail:be-hostmaster.dnsbelgium.be
Serial:1028000020
Refresh:3600
Retry:1800
Expire:2419200
TTL:600
num Entries:6


Domain:belgium.be
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:belgium.be
Zone-Name:belgium.be
Primary:ns2.yourict.net
Mail:webmaster.belgium.fgov.be
Serial:2010003600
Refresh:10800
Retry:3600
Expire:2419200
TTL:900
num Entries:3


Domain:finances.belgium.be
Zone-Name:finances.belgium.be
Primary:ns9.minfin.be
Mail:hostmaster.minfin.be
Serial:10
Refresh:10800
Retry:3600
Expire:2419200
TTL:900
num Entries:4


Domain:rapportannuel.finances.belgium.be
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:rapportannuel.finances.belgium.be
Zone-Name:rapportannuel.finances.belgium.be
Primary:auth-ns-ha-fin.secaas.intra
Mail:hostmaster.minfin.be
Serial:8
Refresh:10800
Retry:3600
Expire:2419200
TTL:900
num Entries:4


Domain:2020.rapportannuel.finances.belgium.be
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:www.2020.rapportannuel.finances.belgium.be
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://2020.rapportannuel.finances.belgium.be, address used: https://2020.rapportannuel.finances.belgium.be/, Screenshot created 2021-02-23 12:02:29 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

341 milliseconds

Screenshot mobile - https://2020.rapportannuel.finances.belgium.be/
Mobil + Landscape (732px x 412px)

348 milliseconds

Screenshot mobile landscape - https://2020.rapportannuel.finances.belgium.be/
Screen (1280px x 1680px)

526 milliseconds

Screenshot Desktop - https://2020.rapportannuel.finances.belgium.be/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396716
content Size4791191

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-256, and AES_256_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://2020.rapportannuel.finances.belgium.be/
193.191.245.42
302
https://2020.rapportannuel.finances.belgium.be/
0.047
A
Location: https://2020.rapportannuel.finances.belgium.be/
Server: BigIP
Connection: close
Content-Length: 0

• https://2020.rapportannuel.finances.belgium.be/
193.191.245.42 GZip used - 1595 / 3985 - 59.97 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/1484
403

Html is minified: 177.11 %
3.420
N
Forbidden
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 23 Feb 2021 10:58:55 GMT
X-XSS-Protection: 1; mode=block
X-Frame-options: DENY
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=2592000; includeSubDomains
Expect-CT: enforce, max-age=30
Last-Modified: Fri, 09 Oct 2020 01:25:39 GMT
ETag: "f91-5b132d388eac0-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 1595
Content-Type: text/html; charset=UTF-8
Set-Cookie: BIGipServerF2W-APP-STATIC-PR.app~POOL_F2W-APP-STATIC-PR=rd2o00000000000000000000ffff0a190b0ao8080; path=/; Httponly,TS0125127e=01d2e30d3255df5f439345f9b4e1566e4ecc17e4eb32197e01c86b899cd80a862d0f3369e38af72121611455f1ddf37ca90f4575623909d124faec320be3d5a927faa299bd; Path=/,TS0100ea0f=01d2e30d323559632a369343408761a5959eae41bede5307f1b5fe7a08b2008d502b42890410b4de6e6dc1079dc33c6d8264365d174c32e6541589de62401bfc00c8522734dc8a427e7ff79bd6223c5513a5034ae2; Path=/
Age: 0
X-Cache: MISS
X-Cache-Hits: 0
Connection: close

• http://2020.rapportannuel.finances.belgium.be/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
193.191.245.42
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.037
A
Not Found
Visible Content: Challenge-response token not found.
Content-Type: text/plain; charset=utf-8
Server: BigIP
Connection: close
Content-Length: 36

• https://193.191.245.42/
193.191.245.42
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
3.247
N
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 121)
The requested URL was rejected. Please consult with your administrator. Your support ID is: 3096933156813178357 [Go Back]
Cache-Control: no-cache
Connection: close
Pragma: no-cache
Content-Type: text/html; charset=utf-8
Content-Length: 246

7. Comments


1. General Results, most used to calculate the result

Aname "2020.rapportannuel.finances.belgium.be" is subdomain, public suffix is ".be", top-level-domain is ".be", top-level-domain-type is "country-code", Country is Belgium, tld-manager is "DNS Belgium vzw/asbl", num .be-domains preloaded: 878 (complete: 142558)
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Agood: destination is https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Ahttp://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
302
https://2020.rapportannuel.finances.belgium.be/
correct redirect http - https with the same domain name
Bwarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 2592000 seconds = 30 days found
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
BIGipServerF2W-APP-STATIC-PR.app~POOL_F2W-APP-STATIC-PR=rd2o00000000000000000000ffff0a190b0ao8080; path=/; Httponly
Cookie sent via https, but not marked as secure
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
TS0125127e=01d2e30d3255df5f439345f9b4e1566e4ecc17e4eb32197e01c86b899cd80a862d0f3369e38af72121611455f1ddf37ca90f4575623909d124faec320be3d5a927faa299bd; Path=/
Cookie sent via https, but not marked as secure
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
TS0100ea0f=01d2e30d323559632a369343408761a5959eae41bede5307f1b5fe7a08b2008d502b42890410b4de6e6dc1079dc33c6d8264365d174c32e6541589de62401bfc00c8522734dc8a427e7ff79bd6223c5513a5034ae2; Path=/
Cookie sent via https, but not marked as secure
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
BIGipServerF2W-APP-STATIC-PR.app~POOL_F2W-APP-STATIC-PR=rd2o00000000000000000000ffff0a190b0ao8080; path=/; Httponly
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
TS0125127e=01d2e30d3255df5f439345f9b4e1566e4ecc17e4eb32197e01c86b899cd80a862d0f3369e38af72121611455f1ddf37ca90f4575623909d124faec320be3d5a927faa299bd; Path=/
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403
TS0100ea0f=01d2e30d323559632a369343408761a5959eae41bede5307f1b5fe7a08b2008d502b42890410b4de6e6dc1079dc33c6d8264365d174c32e6541589de62401bfc00c8522734dc8a427e7ff79bd6223c5513a5034ae2; Path=/
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Mhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://2020.rapportannuel.finances.belgium.be/ 193.191.245.42
403

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://193.191.245.42/ 193.191.245.42
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch

2. DNS- and NameServer - Checks

AInfo:: 3 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 3 Queries complete, 3 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns2.skynet.be (195.238.3.18), ns9.minfin.be (193.191.216.84), ns2.skynet.be (195.238.3.18), ns3.skynet.be (195.238.25.138), ns4.skynet.be (195.238.25.139)
AGood (1 - 3.0):: An average of 0.8 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 5 different Name Servers found: auth-ns-ha-fin.secaas.intra, ns2.skynet.be, ns3.skynet.be, ns4.skynet.be, ns9.minfin.be, 4 Name Servers included in Delegation: ns2.skynet.be, ns3.skynet.be, ns4.skynet.be, ns9.minfin.be, 4 Name Servers included in 2 Zone definitions: ns2.skynet.be, ns3.skynet.be, ns4.skynet.be, ns9.minfin.be, 1 Name Servers listed in SOA.Primary: auth-ns-ha-fin.secaas.intra.
AGood: Only one SOA.Primary Name Server found.: auth-ns-ha-fin.secaas.intra.
Error: SOA.Primary Name Server not included in the delegation set.: auth-ns-ha-fin.secaas.intra.


AInfo: Ipv4-Subnet-list: 4 Name Servers, 2 different subnets (first Byte): 193., 195., 2 different subnets (first two Bytes): 193.191., 195.238., 3 different subnets (first three Bytes): 193.191.216., 195.238.25., 195.238.3.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
Nameserver doesn't pass all EDNS-Checks: auth-ns-ha-fin.secaas.intra: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: auth-ns-ha-fin.secaas.intra: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: auth-ns-ha-fin.secaas.intra: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.yourict.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
https://193.191.245.42/ 193.191.245.42
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AGood: All img-elements have a valid alt-attribute.: 1 img-elements found.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 269846 milliseconds, 269.846 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
2020.rapportannuel.finances.belgium.be
193.191.245.42
443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
2020.rapportannuel.finances.belgium.be
193.191.245.42
443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, L=BRUSSEL, C=BE, street=Simon Bolivarlaan 30

2CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


193.191.245.42
193.191.245.42
443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

193.191.245.42
193.191.245.42
443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, L=BRUSSEL, C=BE, street=Simon Bolivarlaan 30

2CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


9. Certificates

1.
1.
CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, STREET=Simon Bolivarlaan 30, L=BRUSSEL, S=Brussel, PostalCode=1000, C=BE
04.05.2020
05.05.2021
264 days expired
*.belgium.be, belgium.be - 2 entries
1.
1.
CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, STREET=Simon Bolivarlaan 30, L=BRUSSEL, S=Brussel, PostalCode=1000, C=BE
04.05.2020

05.05.2021
264 days expired
*.belgium.be, belgium.be - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:0089C0D129EE70A213156A4F4BD4534F7B
Thumbprint:ECD07E8852C566816361D3B1877776F3A305AD20
SHA256 / Certificate:LcgQ7GJmJCax0HkTxIaKwwVBBo5kPoA0yTwewCRGkQM=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6dca2616cc4f7c05ae86c8aa41a9f0354463d25fb281cdf571af4955be9dac87
SHA256 hex / Subject Public Key Information (SPKI):6dca2616cc4f7c05ae86c8aa41a9f0354463d25fb281cdf571af4955be9dac87
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://GEANT.ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, STREET=Simon Bolivarlaan 30, L=BRUSSEL, S=Brussel, PostalCode=1000, C=BE
04.05.2020
05.05.2021
264 days expired
*.belgium.be, belgium.be - 2 entries

2.
CN=*.belgium.be, OU=BOSA DT, O=Federale Overheidsdienst Beleid en Ondersteuning, STREET=Simon Bolivarlaan 30, L=BRUSSEL, S=Brussel, PostalCode=1000, C=BE
04.05.2020

05.05.2021
264 days expired
*.belgium.be, belgium.be - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:0089C0D129EE70A213156A4F4BD4534F7B
Thumbprint:ECD07E8852C566816361D3B1877776F3A305AD20
SHA256 / Certificate:LcgQ7GJmJCax0HkTxIaKwwVBBo5kPoA0yTwewCRGkQM=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6dca2616cc4f7c05ae86c8aa41a9f0354463d25fb281cdf571af4955be9dac87
SHA256 hex / Subject Public Key Information (SPKI):6dca2616cc4f7c05ae86c8aa41a9f0354463d25fb281cdf571af4955be9dac87
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://GEANT.ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL
18.02.2020
02.05.2033
expires in 4116 days


3.
CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL
18.02.2020

02.05.2033
expires in 4116 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:00DA43BD139BD258BB4DD61CACC4F3DBE0
Thumbprint:C2826E266D7405D34EF89762636AE4B36E86CB5E
SHA256 / Certificate:N4NPpepA+/e2EZaVWWLhygVYhyQ15CBmU9P2IN2OmI4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8f4a912bd4b4a146daf5be2db5974aa78d90e13d89f12e0514a3cd1b91531550
SHA256 hex / Subject Public Key Information (SPKI):8f4a912bd4b4a146daf5be2db5974aa78d90e13d89f12e0514a3cd1b91531550
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL
18.02.2020
02.05.2033
expires in 4116 days


4.
CN=GEANT OV RSA CA 4, O=GEANT Vereniging, C=NL
18.02.2020

02.05.2033
expires in 4116 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:00DA43BD139BD258BB4DD61CACC4F3DBE0
Thumbprint:C2826E266D7405D34EF89762636AE4B36E86CB5E
SHA256 / Certificate:N4NPpepA+/e2EZaVWWLhygVYhyQ15CBmU9P2IN2OmI4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8f4a912bd4b4a146daf5be2db5974aa78d90e13d89f12e0514a3cd1b91531550
SHA256 hex / Subject Public Key Information (SPKI):8f4a912bd4b4a146daf5be2db5974aa78d90e13d89f12e0514a3cd1b91531550
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 5839 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 5839 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 2534 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 2534 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 2534 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 2534 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

No data found or small Code-update

Details

Small Code Update - wait one minute


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns2.skynet.be, ns3.skynet.be, ns4.skynet.be, ns9.minfin.be

QNr.DomainTypeNS used
1
be
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.nsset.be, b.ns.dns.be, c.ns.dns.be, d.ns.dns.be, y.ns.dns.be, z.nsset.be
2
ns2.skynet.be: 195.238.3.18
NS
a.nsset.be (2001:678:9::1)

Answer: ns1.skynet.be
195.238.3.17

Answer: ns3.skynet.be
195.238.25.138

Answer: ns4.skynet.be
195.238.25.139
3
ns9.minfin.be: 193.191.216.84
NS
a.nsset.be (2001:678:9::1)

Answer: ns2.skynet.be
195.238.3.18

Answer: ns3.skynet.be
195.238.25.138

Answer: ns4.skynet.be
195.238.25.139


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
rapportannuel.finances.belgium.be
0

no CAA entry found
1
0
finances.belgium.be
0

no CAA entry found
1
0
belgium.be
0

no CAA entry found
1
0
be
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rapportannuel.finances.belgium.be

ok
1
0
_acme-challenge.2020.rapportannuel.finances.belgium.be.rapportannuel.finances.belgium.be

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
2020.rapportannuel.finances.belgium.be
21
FTP



2020.rapportannuel.finances.belgium.be
21
FTP



2020.rapportannuel.finances.belgium.be
22
SSH



2020.rapportannuel.finances.belgium.be
22
SSH



2020.rapportannuel.finances.belgium.be
25
SMTP



2020.rapportannuel.finances.belgium.be
25
SMTP



2020.rapportannuel.finances.belgium.be
53
DNS



2020.rapportannuel.finances.belgium.be
53
DNS



2020.rapportannuel.finances.belgium.be
110
POP3



2020.rapportannuel.finances.belgium.be
110
POP3



2020.rapportannuel.finances.belgium.be
143
IMAP



2020.rapportannuel.finances.belgium.be
143
IMAP



2020.rapportannuel.finances.belgium.be
465
SMTP (encrypted)



2020.rapportannuel.finances.belgium.be
465
SMTP (encrypted)



2020.rapportannuel.finances.belgium.be
587
SMTP (encrypted, submission)



2020.rapportannuel.finances.belgium.be
587
SMTP (encrypted, submission)



2020.rapportannuel.finances.belgium.be
993
IMAP (encrypted)



2020.rapportannuel.finances.belgium.be
993
IMAP (encrypted)



2020.rapportannuel.finances.belgium.be
995
POP3 (encrypted)



2020.rapportannuel.finances.belgium.be
995
POP3 (encrypted)



2020.rapportannuel.finances.belgium.be
1433
MS SQL



2020.rapportannuel.finances.belgium.be
1433
MS SQL



2020.rapportannuel.finances.belgium.be
2082
cPanel (http)



2020.rapportannuel.finances.belgium.be
2082
cPanel (http)



2020.rapportannuel.finances.belgium.be
2083
cPanel (https)



2020.rapportannuel.finances.belgium.be
2083
cPanel (https)



2020.rapportannuel.finances.belgium.be
2086
WHM (http)



2020.rapportannuel.finances.belgium.be
2086
WHM (http)



2020.rapportannuel.finances.belgium.be
2087
WHM (https)



2020.rapportannuel.finances.belgium.be
2087
WHM (https)



2020.rapportannuel.finances.belgium.be
2089
cPanel Licensing



2020.rapportannuel.finances.belgium.be
2089
cPanel Licensing



2020.rapportannuel.finances.belgium.be
2095
cPanel Webmail (http)



2020.rapportannuel.finances.belgium.be
2095
cPanel Webmail (http)



2020.rapportannuel.finances.belgium.be
2096
cPanel Webmail (https)



2020.rapportannuel.finances.belgium.be
2096
cPanel Webmail (https)



2020.rapportannuel.finances.belgium.be
2222
DirectAdmin (http)



2020.rapportannuel.finances.belgium.be
2222
DirectAdmin (http)



2020.rapportannuel.finances.belgium.be
2222
DirectAdmin (https)



2020.rapportannuel.finances.belgium.be
2222
DirectAdmin (https)



2020.rapportannuel.finances.belgium.be
3306
mySql



2020.rapportannuel.finances.belgium.be
3306
mySql



2020.rapportannuel.finances.belgium.be
5224
Plesk Licensing



2020.rapportannuel.finances.belgium.be
5224
Plesk Licensing



2020.rapportannuel.finances.belgium.be
5432
PostgreSQL



2020.rapportannuel.finances.belgium.be
5432
PostgreSQL



2020.rapportannuel.finances.belgium.be
8080
Ookla Speedtest (http)



2020.rapportannuel.finances.belgium.be
8080
Ookla Speedtest (http)



2020.rapportannuel.finances.belgium.be
8080
Ookla Speedtest (https)



2020.rapportannuel.finances.belgium.be
8080
Ookla Speedtest (https)



2020.rapportannuel.finances.belgium.be
8083
VestaCP http



2020.rapportannuel.finances.belgium.be
8083
VestaCP http



2020.rapportannuel.finances.belgium.be
8083
VestaCP https



2020.rapportannuel.finances.belgium.be
8083
VestaCP https



2020.rapportannuel.finances.belgium.be
8443
Plesk Administration (https)



2020.rapportannuel.finances.belgium.be
8443
Plesk Administration (https)



2020.rapportannuel.finances.belgium.be
8447
Plesk Installer + Updates



2020.rapportannuel.finances.belgium.be
8447
Plesk Installer + Updates



2020.rapportannuel.finances.belgium.be
8880
Plesk Administration (http)



2020.rapportannuel.finances.belgium.be
8880
Plesk Administration (http)



2020.rapportannuel.finances.belgium.be
10000
Webmin (http)



2020.rapportannuel.finances.belgium.be
10000
Webmin (http)



2020.rapportannuel.finances.belgium.be
10000
Webmin (https)



2020.rapportannuel.finances.belgium.be
10000
Webmin (https)



193.191.245.42
21
FTP



193.191.245.42
21
FTP



193.191.245.42
22
SSH



193.191.245.42
22
SSH



193.191.245.42
25
SMTP



193.191.245.42
25
SMTP



193.191.245.42
53
DNS



193.191.245.42
53
DNS



193.191.245.42
110
POP3



193.191.245.42
110
POP3



193.191.245.42
143
IMAP



193.191.245.42
143
IMAP



193.191.245.42
465
SMTP (encrypted)



193.191.245.42
465
SMTP (encrypted)



193.191.245.42
587
SMTP (encrypted, submission)



193.191.245.42
587
SMTP (encrypted, submission)



193.191.245.42
993
IMAP (encrypted)



193.191.245.42
993
IMAP (encrypted)



193.191.245.42
995
POP3 (encrypted)



193.191.245.42
995
POP3 (encrypted)



193.191.245.42
1433
MS SQL



193.191.245.42
1433
MS SQL



193.191.245.42
2082
cPanel (http)



193.191.245.42
2082
cPanel (http)



193.191.245.42
2083
cPanel (https)



193.191.245.42
2083
cPanel (https)



193.191.245.42
2086
WHM (http)



193.191.245.42
2086
WHM (http)



193.191.245.42
2087
WHM (https)



193.191.245.42
2087
WHM (https)



193.191.245.42
2089
cPanel Licensing



193.191.245.42
2089
cPanel Licensing



193.191.245.42
2095
cPanel Webmail (http)



193.191.245.42
2095
cPanel Webmail (http)



193.191.245.42
2096
cPanel Webmail (https)



193.191.245.42
2096
cPanel Webmail (https)



193.191.245.42
2222
DirectAdmin (http)



193.191.245.42
2222
DirectAdmin (http)



193.191.245.42
2222
DirectAdmin (https)



193.191.245.42
2222
DirectAdmin (https)



193.191.245.42
3306
mySql



193.191.245.42
3306
mySql



193.191.245.42
5224
Plesk Licensing



193.191.245.42
5224
Plesk Licensing



193.191.245.42
5432
PostgreSQL



193.191.245.42
5432
PostgreSQL



193.191.245.42
8080
Ookla Speedtest (http)



193.191.245.42
8080
Ookla Speedtest (http)



193.191.245.42
8080
Ookla Speedtest (https)



193.191.245.42
8080
Ookla Speedtest (https)



193.191.245.42
8083
VestaCP http



193.191.245.42
8083
VestaCP http



193.191.245.42
8083
VestaCP https



193.191.245.42
8083
VestaCP https



193.191.245.42
8443
Plesk Administration (https)



193.191.245.42
8443
Plesk Administration (https)



193.191.245.42
8447
Plesk Installer + Updates



193.191.245.42
8447
Plesk Installer + Updates



193.191.245.42
8880
Plesk Administration (http)



193.191.245.42
8880
Plesk Administration (http)



193.191.245.42
10000
Webmin (http)



193.191.245.42
10000
Webmin (http)



193.191.245.42
10000
Webmin (https)



193.191.245.42
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=ec59aa3e-d03a-4524-bc80-c6f476d07609


Last Result: https://check-your-website.server-daten.de/?q=2020.rapportannuel.finances.belgium.be - 2021-02-24 10:05:08


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=2020.rapportannuel.finances.belgium.be" target="_blank">Check this Site: 2020.rapportannuel.finances.belgium.be</a>