Check DNS, Urls + Redirects, Certificates and Content of your Website




N

No trusted Certificate

Checked:
14.01.2020 13:55:50


Older results

No older results found


1. IP-Addresses

HostTIP-Addressis auth.∑ Queries∑ Timeout
81.169.205.236
A
81.169.205.236
Berlin/Land Berlin/Germany (DE) - Strato AG
Hostname: www.formateins.de
yes



2. DNSSEC


No DNSSEC - Informations found


3. Name Servers


No Nameserver entries found


4. SOA-Entries


No SOA entries found

5. Screenshots (Beta)

Startaddress: https://81.169.205.236, address used: https://81.169.205.236/, Screenshot created 2020-01-14 13:56:15 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

317 milliseconds

Screenshot mobile - https://81.169.205.236/
Screen (1280px x 1680px)

432 milliseconds

Screenshot Desktop - https://81.169.205.236/
Mobil + Landscape (732px x 412px)

334 milliseconds

Screenshot mobile landscape - https://81.169.205.236/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396732
content Size396771

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-256, and AES_128_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
Domainname Http-StatusredirectSec.G
• http://81.169.205.236/
81.169.205.236 GZip used - 1218 / 3750 - 67.52 %
200

Html is minified: 132.98 %
0.030
H
Date: Tue, 14 Jan 2020 12:55:54 GMT
Server: Apache
Last-Modified: Sat, 23 Jun 2018 12:39:32 GMT
ETag: "ea6-56f4e70b895b1-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
X-Powered-By: PleskLin
Content-Length: 1218
Connection: close
Content-Type: text/html

• https://81.169.205.236/
81.169.205.236 GZip used - 1218 / 3750 - 67.52 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 132.98 %
3.344
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 14 Jan 2020 12:55:54 GMT
Server: Apache
Last-Modified: Sat, 23 Jun 2018 12:39:32 GMT
ETag: "ea6-56f4e70b895b1-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
X-Powered-By: PleskLin
Content-Length: 1218
Connection: close
Content-Type: text/html

• http://81.169.205.236/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
81.169.205.236
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.030
A
Not Found
Visible Content: Not Found The requested URL /.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de was not found on this server. Apache Server at 81.169.205.236 Port 80
Date: Tue, 14 Jan 2020 12:55:57 GMT
Server: Apache
Content-Length: 331
Connection: close
Content-Type: text/html; charset=iso-8859-1

7. Comments


Aname "81.169.205.236" is ipv4 address, public suffix is not defined
Agood: All ip addresses are public addresses
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (3 urls)
http://81.169.205.236/ 81.169.205.236


Url with incomplete Content-Type - header - missing charset
https://81.169.205.236/ 81.169.205.236


Url with incomplete Content-Type - header - missing charset
Bhttps://81.169.205.236/ 81.169.205.236
200

Missing HSTS-Header
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Nhttps://81.169.205.236/ 81.169.205.236
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N81.169.205.236:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N81.169.205.236:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N81.169.205.236:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N81.169.205.236:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 supports GZip.
AGood: No https + http status 200 with inline CSS / JavaScript found
https://81.169.205.236/ 81.169.205.236
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://81.169.205.236/ 81.169.205.236
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All CSS / JavaScript files are sent with GZip. That reduces the content of the files. 1 external CSS / JavaScript files found
AGood: All images with internal compression not sent via GZip. Images (.png, .jpg) are already compressed, so an additional GZip isn't helpful. 1 images (type image/png, image/jpg) found without additional GZip. Not required because these images are already compressed
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 29283 milliseconds, 29.283 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
81.169.205.236
81.169.205.236
443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
81.169.205.236
81.169.205.236
443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN  Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN Tls.1.2
Tls.1.1
Tls.1.0
Chain (complete)
1CN=www.portalservices.de

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US

81.169.205.236
81.169.205.236
465
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
81.169.205.236
81.169.205.236
465
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
  Tls.1.2
Tls.1.1
Tls.1.0
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=Plesk, OU=Plesk, O=Odin, L=Seattle, C=US, emailAddress=info@plesk.com

81.169.205.236
81.169.205.236
993
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
81.169.205.236
81.169.205.236
993
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
  Tls.1.2
Tls.1.1
Tls.1.0
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=Plesk, OU=Plesk, O=Odin, L=Seattle, C=US, emailAddress=info@plesk.com

81.169.205.236
81.169.205.236
995
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
81.169.205.236
81.169.205.236
995
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
  Tls.1.2
Tls.1.1
Tls.1.0
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=Plesk, OU=Plesk, O=Odin, L=Seattle, C=US, emailAddress=info@plesk.com

81.169.205.236
81.169.205.236
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
81.169.205.236
81.169.205.236
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN  Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN Tls.1.2
Tls.1.1
Tls.1.0
Chain (complete)
1CN=www.portalservices.de

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=www.portalservices.de
15.12.2019
14.03.2020
expires in 53 days
www.portalservices.de - 1 entry
1.
1.
CN=www.portalservices.de
15.12.2019

14.03.2020
expires in 53 days
www.portalservices.de - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:038428DAD5A3035D47823A97980E4B4A6B01
Thumbprint:0CA3F92663EAF14CBE7C8297210A69CC8DBA0C76
SHA256 / Certificate:kbefCTO1N1wwbXDLRZyr3lX1BucE/U6tK0CV/7I35aQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):fe8ec04add7a5058f6a2ed98b779a2adc1ac59e6095d52bf617cbd117adc5564
OCSP - Url:http://ocsp.int-x3.letsencrypt.org
OCSP - must staple:no
Certificate Transparency:yes


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016
17.03.2021
expires in 421 days


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016

17.03.2021
expires in 421 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0A0141420000015385736A0B85ECA708
Thumbprint:E6A3B45B062D509B3382282D196EFE97D5956CCB
SHA256 / Certificate:JYR9Zo608E/dQLErawdAxWfafQJDCOtsLJb+QdneIY0=
SHA256 hex / Cert (DANE * 0 1):25847d668eb4f04fdd40b12b6b0740c567da7d024308eb6c2c96fe41d9de218d
SHA256 hex / PublicKey (DANE * 1 1):60b87575447dcba2a36b7d11ac09fb24a9db406fee12d2cc90180517616e8a18
OCSP - Url:http://isrg.trustid.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:no


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 618 days


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 618 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no


2.
1.
E=info@plesk.com, CN=Plesk, OU=Plesk, O=Odin, L=Seattle, S=Washington, C=US
30.08.2016
30.08.2017
874 days expired

2.
1.
E=info@plesk.com, CN=Plesk, OU=Plesk, O=Odin, L=Seattle, S=Washington, C=US
30.08.2016

30.08.2017
874 days expired


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:57C5634F
Thumbprint:5C56ACA8AEC2B03EF0A47DFAE72F283FDAF71760
SHA256 / Certificate:sHYoN99fpRiBKHjM0jAe6+vY6K2wL7EVihPXFNawfTc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):924d87374dc7acd8d77a894520d46a6b32df4d574dd464727c271a87ac1f34a6
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow (Update 2020-01-11: Should now work again - code updated. Old message: currently no newer certificates - read Crt.sh has stopped - Letsencrypt-forum - may work next week again - 2019-12-02 - but I must check the code).

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://81.169.205.236/
81.169.205.236
a

12

0







img

1
18,187 Bytes
0
1
0





link
stylesheet
1
1,434 Bytes
0
1
0





link
other
1
113,459 Bytes
0
1
0





meta
other
5

0






Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://81.169.205.236/
81.169.205.236
a

https://plus.google.com/communities/109881979300958500728


1
ok








a

https://support.plesk.com/


1
ok








a

https://talk.plesk.com/


1
ok








a

https://twitter.com/Plesk


1
ok








a

https://www.facebook.com/Plesk


1
ok








a

https://www.plesk.com


5
ok








a

https://www.plesk.com/


1
ok








a

https://www.plesk.com/blog/


1
ok








img
src
img/logo.png
200
image/png

1
ok

No Cache-Control header
No GZip - 18187 Bytes






link
shortcut icon
favicon.ico
200
image/vnd.microsoft.icon

1
ok

No Cache-Control header
No GZip - 113459 Bytes






link
stylesheet
css/style.css
200
text/css

1
ok

No Cache-Control - header
GZip: 1434/4621 Bytes




local SRI possible, possible hash-values:

sha256-Ge/Oja19jsyhwAicWDd2fLHpMYJdJQ9OM2KnAC/rYKc=
sha384-UFqz6K1fx71pbj3M89td6sknbOnMCPUenp0K1ISuFQ6VnD3ScWvIUwAo1qbeT53N
sha512-3NsTkLwNFY0Y5IcvyHCtmVCC5RdlrouYp/O2jqcwPNxxlRgI8xEAJMPjqMtxfSLxDhSLtyLASotD1kYe/xehkQ==

<link rel="stylesheet" href="css/style.css" crossorigin="anonymous" integrity="sha256-Ge/Oja19jsyhwAicWDd2fLHpMYJdJQ9OM2KnAC/rYKc=" />



Content loaded via url("...")

../img/blog.png1
../img/facebook.png1
../img/forum.png1
../img/globe.png1
../img/google-plus.png1
../img/knowledge-base.png1
../img/twitter.png1
//fonts.googleapis.com/css?family=Open+Sans:300,400,600&subset=latin,latin-ext,cyrillic,cyrillic-ext,greek,greek-ext,vietnamese1

meta

utf-8


1
ok








meta
Cache-Control
no-cache


1
ok








meta
X-UA-Compatible
IE=edge,chrome=1


1
ok








meta
copyright
Copyright 1999-2015. Parallels IP Holdings GmbH. All Rights Reserved.


1
ok








meta
viewport
width=device-width, initial-scale=1.0, maximum-scale=1.0


1
ok








12. CAA - Entries

No CAA entries found


13. TXT - Entries

No TXT entries found


14. Portchecks

Domain or IPPortDescriptionResultAnswer
81.169.205.236
21
FTP
open
220 ProFTPD Server (ProFTPD) [81.169.205.236]

81.169.205.236
21
FTP
open
220 ProFTPD Server (ProFTPD) [81.169.205.236]

81.169.205.236
22
SSH
open
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13

81.169.205.236
22
SSH
open
SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.13

81.169.205.236
25
SMTP
open
220 www.formateins.de ESMTP Postfix (Ubuntu)

81.169.205.236
25
SMTP
open
220 www.formateins.de ESMTP Postfix (Ubuntu)

81.169.205.236
53
DNS



81.169.205.236
53
DNS



81.169.205.236
110
POP3
open
+OK Hello there. <17719.1579006558@localhost.localdomain>

81.169.205.236
110
POP3
open
+OK Hello there. <17719.1579006558@localhost.localdomain>

81.169.205.236
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE ACL ACL2=UNION STARTTLS] Courier-IMAP ready. Copyright 1998-2017 Double Precision, Inc. See COPYING for distribution information.

81.169.205.236
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE ACL ACL2=UNION STARTTLS] Courier-IMAP ready. Copyright 1998-2017 Double Precision, Inc. See COPYING for distribution information.

81.169.205.236
465
SMTP (encrypted)
open
220 www.formateins.de ESMTP Postfix (Ubuntu)
Mail certificate is invalid
81.169.205.236
465
SMTP (encrypted)
open
220 www.formateins.de ESMTP Postfix (Ubuntu)
Mail certificate is invalid
81.169.205.236
587
SMTP (encrypted, submission)



81.169.205.236
587
SMTP (encrypted, submission)



81.169.205.236
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE ACL ACL2=UNION] Courier-IMAP ready. Copyright 1998-2017 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
81.169.205.236
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 UIDPLUS CHILDREN NAMESPACE THREAD=ORDEREDSUBJECT THREAD=REFERENCES SORT QUOTA AUTH=CRAM-MD5 AUTH=CRAM-SHA1 AUTH=CRAM-SHA256 AUTH=PLAIN IDLE ACL ACL2=UNION] Courier-IMAP ready. Copyright 1998-2017 Double Precision, Inc. See COPYING for distribution information.
Mail certificate is invalid
81.169.205.236
995
POP3 (encrypted)
open
+OK Hello there. <17741.1579006567@localhost.localdomain>
Mail certificate is invalid
81.169.205.236
995
POP3 (encrypted)
open
+OK Hello there. <17741.1579006567@localhost.localdomain>
Mail certificate is invalid
81.169.205.236
1433
MS SQL



81.169.205.236
1433
MS SQL



81.169.205.236
2082
cPanel (http)



81.169.205.236
2082
cPanel (http)



81.169.205.236
2083
cPanel (https)



81.169.205.236
2083
cPanel (https)



81.169.205.236
2086
WHM (http)



81.169.205.236
2086
WHM (http)



81.169.205.236
2087
WHM (https)



81.169.205.236
2087
WHM (https)



81.169.205.236
2089
cPanel Licensing



81.169.205.236
2089
cPanel Licensing



81.169.205.236
2095
cPanel Webmail (http)



81.169.205.236
2095
cPanel Webmail (http)



81.169.205.236
2096
cPanel Webmail (https)



81.169.205.236
2096
cPanel Webmail (https)



81.169.205.236
2222
DirectAdmin (http)



81.169.205.236
2222
DirectAdmin (http)



81.169.205.236
2222
DirectAdmin (https)



81.169.205.236
2222
DirectAdmin (https)



81.169.205.236
3306
mySql



81.169.205.236
3306
mySql



81.169.205.236
5224
Plesk Licensing



81.169.205.236
5224
Plesk Licensing



81.169.205.236
5432
PostgreSQL



81.169.205.236
5432
PostgreSQL



81.169.205.236
8080
Ookla Speedtest (http)



81.169.205.236
8080
Ookla Speedtest (http)



81.169.205.236
8080
Ookla Speedtest (https)



81.169.205.236
8080
Ookla Speedtest (https)



81.169.205.236
8083
VestaCP http



81.169.205.236
8083
VestaCP http



81.169.205.236
8083
VestaCP https



81.169.205.236
8083
VestaCP https



81.169.205.236
8443
Plesk Administration (https)
open
https://81.169.205.236:8443/
Http-Status: 200
Certificate is invalid
81.169.205.236
8443
Plesk Administration (https)
open
https://81.169.205.236:8443/
Http-Status: 200
Certificate is invalid
81.169.205.236
8447
Plesk Installer + Updates



81.169.205.236
8447
Plesk Installer + Updates



81.169.205.236
8880
Plesk Administration (http)
open
http://81.169.205.236:8880/
Http-Status: 200

81.169.205.236
8880
Plesk Administration (http)
open
http://81.169.205.236:8880/
Http-Status: 200

81.169.205.236
10000
Webmin (http)



81.169.205.236
10000
Webmin (http)



81.169.205.236
10000
Webmin (https)



81.169.205.236
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=abd351a0-3479-4f25-89fc-181b067f6ff5


Last Result: https://check-your-website.server-daten.de/?q=81.169.205.236 - 2020-01-14 13:55:50


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=81.169.205.236" target="_blank">Check this Site: 81.169.205.236</a>