Check DNS, Urls + Redirects, Certificates and Content of your Website



N

No trusted Certificate

Checked:
14.05.2022 16:36:11


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
5.181.80.126
A
5.181.80.126
Sopot/Plovdiv/Bulgaria (BG) - Tamatiya EOOD
Hostname: ip-80-126-bullethost.net
yes



2. DNSSEC


No DNSSEC - Informations found


3. Name Servers


No Nameserver entries found


4. SOA-Entries


No SOA entries found

5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://5.181.80.126/
5.181.80.126 GZip used - 1167 / 3231 - 63.88 %
200

Html is minified: 318.33 %
0.094
H
small visible content (num chars: 45)
Success! Your new web server is ready to use.
Server: nginx
Date: Sat, 14 May 2022 14:36:16 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 1167
Connection: close
Last-Modified: Wed, 11 May 2022 12:20:56 GMT
ETag: "c9f-5debb7929dde3-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip

• https://5.181.80.126/
5.181.80.126
301
http://5.181.80.126/
Html is minified: 109.46 %
2.580
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Sat, 14 May 2022 14:36:16 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: http://5.181.80.126/

• http://5.181.80.126/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
5.181.80.126 GZip used - 1422 / 3302 - 56.94 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/1664
404

Html is minified: 234.85 %
0.083
A
Not Found
Visible Content: Page Not Found Oops! We couldn't find the page that you're looking for. Please check the address and try again. Error Code: 404
Server: nginx
Date: Sat, 14 May 2022 14:36:19 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
Last-Modified: Wed, 11 May 2022 12:20:56 GMT
ETag: W/"ce6-5debb7929ed83"
Content-Encoding: gzip

• https://5.181.80.126/
5.181.80.126
301
http://5.181.80.126/
Html is minified: 109.46 %
2.410
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Sat, 14 May 2022 14:36:19 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: http://5.181.80.126/

7. Comments


1. General Results, most used to calculate the result

Aname "5.181.80.126" is ipv4 address, public suffix is not defined
Agood: All ip addresses are public addresses
Agood - only one version with Http-Status 200
AGood: No cookie sent via http.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://5.181.80.126/ 5.181.80.126
301

Missing HSTS-Header
Fhttps://5.181.80.126/ 5.181.80.126
301
http://5.181.80.126/
wrong redirect https - http - never redirect https to http
Fhttps://5.181.80.126/ 5.181.80.126
301
http://5.181.80.126/
wrong redirect https - http - never redirect https to http
Hfatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Nhttps://5.181.80.126/ 5.181.80.126
301
http://5.181.80.126/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://5.181.80.126/ 5.181.80.126
301
http://5.181.80.126/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N5.181.80.126:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N5.181.80.126:8083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch

2. DNS- and NameServer - Checks


3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
ADuration: 24400 milliseconds, 24.400 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
5.181.80.126
5.181.80.126
443
name does not match
Tls12
ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok
5.181.80.126
5.181.80.126
443
name does not match
Tls12

ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


5.181.80.126
5.181.80.126
443
name does not match
Tls12
ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok

5.181.80.126
5.181.80.126
443
name does not match
Tls12

ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0


5.181.80.126
5.181.80.126
465
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

5.181.80.126
5.181.80.126
465
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0


5.181.80.126
5.181.80.126
8083
name does not match
Tls12
ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok

5.181.80.126
5.181.80.126
8083
name does not match
Tls12

ECDH Ephermal
384
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


9. Certificates

1.
1.
CN=cp.secretgermanjodel.observer
11.05.2022
09.08.2022
expires in 75 days
cp.secretgermanjodel.observer - 1 entry
1.
1.
CN=cp.secretgermanjodel.observer
11.05.2022

09.08.2022
expires in 75 days
cp.secretgermanjodel.observer - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04B4D3F8C245A59B4573B91DB69B36694131
Thumbprint:00D2C2474999C7EC34EE3858F57F081CAC1C260A
SHA256 / Certificate:CTj+op9IkhOgF9IgwfvewOkaPK0+gKMmqHBGRJyZWSQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):af59e45764025d7013c55ee139ab3603d7cfdc9a0a531f6f1ba2142cb43fdae7
SHA256 hex / Subject Public Key Information (SPKI):af59e45764025d7013c55ee139ab3603d7cfdc9a0a531f6f1ba2142cb43fdae7 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1208 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1208 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4757 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4757 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:


No NameServer - IP address - Informations found


13. CAA - Entries

No CAA entries found


14. TXT - Entries

No TXT entries found


15. Portchecks

Domain or IPPortDescriptionResultAnswer
5.181.80.126
21
FTP
open
220 Welcome! Please note that all activity is logged.

5.181.80.126
21
FTP
open
220 Welcome! Please note that all activity is logged.

5.181.80.126
22
SSH



5.181.80.126
22
SSH



5.181.80.126
25
SMTP
open
220 ip-80-126-bullethost.net

5.181.80.126
25
SMTP
open
220 ip-80-126-bullethost.net

5.181.80.126
53
DNS
open


5.181.80.126
53
DNS
open


5.181.80.126
110
POP3
open
+OK Mail Delivery Agent

5.181.80.126
110
POP3
open
+OK Mail Delivery Agent

5.181.80.126
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Mail Delivery Agent

5.181.80.126
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Mail Delivery Agent

5.181.80.126
465
SMTP (encrypted)
open
220 ip-80-126-bullethost.net
Mail certificate is invalid
5.181.80.126
465
SMTP (encrypted)
open
220 ip-80-126-bullethost.net
Mail certificate is invalid
5.181.80.126
587
SMTP (encrypted, submission)
open
220 ip-80-126-bullethost.net

5.181.80.126
587
SMTP (encrypted, submission)
open
220 ip-80-126-bullethost.net

5.181.80.126
993
IMAP (encrypted)
open


5.181.80.126
993
IMAP (encrypted)
open


5.181.80.126
995
POP3 (encrypted)
open


5.181.80.126
995
POP3 (encrypted)
open


5.181.80.126
1433
MS SQL



5.181.80.126
1433
MS SQL



5.181.80.126
2082
cPanel (http)



5.181.80.126
2082
cPanel (http)



5.181.80.126
2083
cPanel (https)



5.181.80.126
2083
cPanel (https)



5.181.80.126
2086
WHM (http)



5.181.80.126
2086
WHM (http)



5.181.80.126
2087
WHM (https)



5.181.80.126
2087
WHM (https)



5.181.80.126
2089
cPanel Licensing



5.181.80.126
2089
cPanel Licensing



5.181.80.126
2095
cPanel Webmail (http)



5.181.80.126
2095
cPanel Webmail (http)



5.181.80.126
2096
cPanel Webmail (https)



5.181.80.126
2096
cPanel Webmail (https)



5.181.80.126
2222
DirectAdmin (http)



5.181.80.126
2222
DirectAdmin (http)



5.181.80.126
2222
DirectAdmin (https)



5.181.80.126
2222
DirectAdmin (https)



5.181.80.126
3306
mySql



5.181.80.126
3306
mySql



5.181.80.126
5224
Plesk Licensing



5.181.80.126
5224
Plesk Licensing



5.181.80.126
5432
PostgreSQL



5.181.80.126
5432
PostgreSQL



5.181.80.126
8080
Ookla Speedtest (http)



5.181.80.126
8080
Ookla Speedtest (http)



5.181.80.126
8080
Ookla Speedtest (https)



5.181.80.126
8080
Ookla Speedtest (https)



5.181.80.126
8083
VestaCP http
open
http://5.181.80.126:8083/
Http-Status: 302
Redirect: https://5.181.80.126:8083/
5.181.80.126
8083
VestaCP http
open
http://5.181.80.126:8083/
Http-Status: 302
Redirect: https://5.181.80.126:8083/
5.181.80.126
8083
VestaCP https
open
https://5.181.80.126:8083/
Http-Status: 302
Certificate is invalid Redirect: /login/
5.181.80.126
8083
VestaCP https
open
https://5.181.80.126:8083/
Http-Status: 302
Certificate is invalid Redirect: /login/
5.181.80.126
8443
Plesk Administration (https)



5.181.80.126
8443
Plesk Administration (https)



5.181.80.126
8447
Plesk Installer + Updates



5.181.80.126
8447
Plesk Installer + Updates



5.181.80.126
8880
Plesk Administration (http)



5.181.80.126
8880
Plesk Administration (http)



5.181.80.126
10000
Webmin (http)



5.181.80.126
10000
Webmin (http)



5.181.80.126
10000
Webmin (https)



5.181.80.126
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=5413b5e4-2b54-4747-a6a4-38abf4f0fd70


Last Result: https://check-your-website.server-daten.de/?q=5.181.80.126 - 2022-05-14 16:36:11


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=5.181.80.126" target="_blank">Check this Site: 5.181.80.126</a>