Check DNS, Urls + Redirects, Certificates and Content of your Website




N

No trusted Certificate

Checked:
24.01.2023 21:41:04


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
51.222.32.176
A
51.222.32.176
Beauharnois/Quebec/Canada (CA) - OVH Hosting
Hostname: ip176.ip-51-222-32.net
yes



2. DNSSEC


No DNSSEC - Informations found


3. Name Servers


No Nameserver entries found


4. SOA-Entries


No SOA entries found

5. Screenshots

Startaddress: https://51.222.32.176/, address used: https://51.222.32.176/, Screenshot created 2023-01-24 21:41:24 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

280 milliseconds

Screenshot mobile - https://51.222.32.176/
Mobil + Landscape (732px x 412px)

284 milliseconds

Screenshot mobile landscape - https://51.222.32.176/
Screen (1280px x 1680px)

593 milliseconds

Screenshot Desktop - https://51.222.32.176/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396716
content Size8101258

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://51.222.32.176/
51.222.32.176 GZip used - 3138 / 10918 - 71.26 %
200

Html is minified: 223.78 %
0.270
H
Date: Tue, 24 Jan 2023 20:41:09 GMT
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Fri, 30 Dec 2022 02:46:31 GMT
ETag: "2aa6-5f1029be1adb0-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 3138
Connection: close
Content-Type: text/html

• https://51.222.32.176/
51.222.32.176 GZip used - 3138 / 10918 - 71.26 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/2866
200

Html is minified: 223.78 %
3.763
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 24 Jan 2023 20:41:10 GMT
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Fri, 30 Dec 2022 02:46:31 GMT
ETag: "2aa6-5f1029be1adb0-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 3138
Connection: close
Content-Type: text/html

• http://51.222.32.176/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
51.222.32.176
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.213
A
Not Found
Visible Content: Not Found The requested URL was not found on this server. Apache/2.4.41 (Ubuntu) Server at 51.222.32.176 Port 80
Date: Tue, 24 Jan 2023 20:41:14 GMT
Server: Apache/2.4.41 (Ubuntu)
Content-Length: 275
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://51.222.32.176/
51.222.32.176 GZip used - 3138 / 10918 - 71.26 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/2866
200

Html is minified: 223.78 %
3.516
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 24 Jan 2023 20:41:15 GMT
Server: Apache/2.4.41 (Ubuntu)
Last-Modified: Fri, 30 Dec 2022 02:46:31 GMT
ETag: "2aa6-5f1029be1adb0-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 3138
Connection: close
Content-Type: text/html

7. Comments



1. General Results, most used to calculate the result

Aname "51.222.32.176" is ipv4 address, public suffix is not defined
AGood: All ip addresses are public addresses
AGood: No cookie sent via http.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (4 urls)
http://51.222.32.176/ 51.222.32.176


Url with incomplete Content-Type - header - missing charset
https://51.222.32.176/ 51.222.32.176


Url with incomplete Content-Type - header - missing charset
https://51.222.32.176/ 51.222.32.176


Url with incomplete Content-Type - header - missing charset
Bhttps://51.222.32.176/ 51.222.32.176
200

Missing HSTS-Header
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Nhttps://51.222.32.176/ 51.222.32.176
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://51.222.32.176/ 51.222.32.176
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.51.222.32.176

2. Header-Checks (alpha, started 2022-10-23, may be buggy / incomplete)

F51.222.32.176 51.222.32.176
Content-Security-Policy
Critical: Missing Header:
F51.222.32.176 51.222.32.176
X-Content-Type-Options
Critical: Missing Header:
F51.222.32.176 51.222.32.176
Referrer-Policy
Critical: Missing Header:
F51.222.32.176 51.222.32.176
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks


4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 supports GZip.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://51.222.32.176/ 51.222.32.176
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All images with internal compression not sent via GZip. Images (.png, .jpg) are already compressed, so an additional GZip isn't helpful. 1 images (type image/png, image/jpg) found without additional GZip. Not required because these images are already compressed
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 2 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 2 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AGood: All img-elements have a valid alt-attribute.: 2 img-elements found.
ADuration: 33434 milliseconds, 33.434 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
51.222.32.176
51.222.32.176
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
51.222.32.176
51.222.32.176
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=wifi.uaifacil.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


51.222.32.176
51.222.32.176
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

51.222.32.176
51.222.32.176
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=wifi.uaifacil.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


9. Certificates

1.
1.
CN=wifi.uaifacil.com
24.01.2023
24.04.2023
expires in 83 days
wifi.uaifacil.com - 1 entry
1.
1.
CN=wifi.uaifacil.com
24.01.2023

24.04.2023
expires in 83 days
wifi.uaifacil.com - 1 entry

KeyalgorithmEC Public Key (256 bit, prime256v1)
Signatur:SHA256 With RSA-Encryption
Serial Number:035C5DB25926395252C05FE3B5F4EB31EBEB
Thumbprint:2B5FA12DB0C7F43726B07AB6A1DF6C2442B57F68
SHA256 / Certificate:unE4s/5gBqRNI10Wsrqz/Va0UrDWrSJuNYMKhyy+h+Q=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):4e2e7e4cb96ffd30c7ceb78079fa40c0a07d2a263d0271bceab1dc6c4b04273c
SHA256 hex / Subject Public Key Information (SPKI):4e2e7e4cb96ffd30c7ceb78079fa40c0a07d2a263d0271bceab1dc6c4b04273c (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 958 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 958 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4507 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4507 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://51.222.32.176/
51.222.32.176
a

3

0


0
0
0


img

1
3,338 Bytes
0
1
0
0
0
0


meta
other
1

0


0
0
0

https://51.222.32.176/
51.222.32.176
a

3

0


0
0
0


img

1

0


0
0
0


meta
other
1

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://51.222.32.176/
51.222.32.176
a

/manual


1
ok








a

/manual


1
ok








a

http://httpd.apache.org/docs/2.4/mod/mod_userdir.html


1
ok








a

http://httpd.apache.org/docs/2.4/mod/mod_userdir.html


1
ok








a

https://bugs.launchpad.net/ubuntu/+source/apache2


1
ok








a

https://bugs.launchpad.net/ubuntu/+source/apache2


1
ok








img
src
/icons/ubuntu-logo.png
200

1
ok
alt: Ubuntu Logoimage/png, missing X-Content-Type-Options nosniff

No Cache-Control header
No GZip - 3338 Bytes






img
src
/icons/ubuntu-logo.png
200

1
ok
alt: Ubuntu Logoimage/png, missing X-Content-Type-Options nosniff

No Cache-Control header
No GZip - 3338 Bytes






meta
Content-Type
text/html; charset=UTF-8


1
ok








meta
Content-Type
text/html; charset=UTF-8


1
ok







51.222.32.176
a

/manual


1
ok








a

/manual


1
ok








a

http://httpd.apache.org/docs/2.4/mod/mod_userdir.html


1
ok








a

http://httpd.apache.org/docs/2.4/mod/mod_userdir.html


1
ok








a

https://bugs.launchpad.net/ubuntu/+source/apache2


1
ok








a

https://bugs.launchpad.net/ubuntu/+source/apache2


1
ok








img
src
/icons/ubuntu-logo.png


1
ok
alt: Ubuntu Logo








img
src
/icons/ubuntu-logo.png


1
ok
alt: Ubuntu Logo








meta
Content-Type
text/html; charset=UTF-8


1
ok








meta
Content-Type
text/html; charset=UTF-8


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:


No NameServer - IP address - Informations found


13. CAA - Entries

No CAA entries found


14. TXT - Entries

No TXT entries found


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

No DomainServiceEntries entries found



16. Cipher Suites

No results


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=4029ad51-6e35-4e3c-ae18-72e6687f9a6a


Last Result: https://check-your-website.server-daten.de/?q=51.222.32.176 - 2023-01-24 21:41:04


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=51.222.32.176" target="_blank">Check this Site: 51.222.32.176</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro