Check DNS, Urls + Redirects, Certificates and Content of your Website




N

No trusted Certificate

Checked:
18.03.2023 14:30:22


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
amethyst.dynv6.net
A
46.142.4.73
Dresden/Saxony/Germany (DE) - 1&1 Versatel Deutschland GmbH
Hostname: 73-4-142-46.pool.kielnet.net
yes
1
0

AAAA
2001:9e8:af:2200:dea6:32ff:fe2c:13b
Dresden/Saxony/Germany (DE) - 1&1 Versatel Deutschland GmbH

yes


www.amethyst.dynv6.net
A

yes
1
0

AAAA

yes


*.amethyst.dynv6.net
A

yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 951, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.04.2023, 00:00:00 +, Signature-Inception: 12.03.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: net
net
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=



1 RRSIG RR to validate DS RR found



RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 31.03.2023, 05:00:00 +, Signature-Inception: 18.03.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 27254, Flags 256



Public Key with Algorithm 8, KeyTag 35886, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 25.03.2023, 17:28:30 +, Signature-Inception: 10.03.2023, 17:23:30 +, KeyTag 35886, Signer-Name: net



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35886 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest "eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: dynv6.net
dynv6.net
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "oi6dibn2el5qkpkjhc77dnl9s59ed5um" between the hashed NSEC3-owner "oi6bo5120e2uson550gbsf4thj5u4a6l" and the hashed NextOwner "oi6dq5hihdm2r3817tage1dta7apnc8m". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner oi6bo5120e2uson550gbsf4thj5u4a6l.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 22.03.2023, 06:13:58 +, Signature-Inception: 15.03.2023, 05:03:58 +, KeyTag 27254, Signer-Name: net



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "dynv6.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 23.03.2023, 06:18:20 +, Signature-Inception: 16.03.2023, 05:08:20 +, KeyTag 27254, Signer-Name: net



0 DNSKEY RR found




Zone: amethyst.dynv6.net
amethyst.dynv6.net
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.amethyst.dynv6.net
www.amethyst.dynv6.net
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.amethyst.dynv6.net
  ns1.dynv6.net

amethyst.dynv6.net
  ns1.dynv6.com
95.216.144.82
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


 
2a01:4f9:c010:95b::
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


  ns1.dynv6.net


  ns2.dynv6.com
5.45.100.251
Karlsruhe/Baden-Wurttemberg/Germany (DE) - netcup GmbH


 
2a03:4000:6:569::
Bremen/Germany (DE) - netcup GmbH


  ns3.dynv6.com
159.69.43.243
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:1c1c:4c96::
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH

dynv6.net
  ns1.dynv6.net


  ns2.dynv6.net


  ns3.dynv6.net

net
  a.gtld-servers.net / nnn1-fra6


  b.gtld-servers.net / nnn1-elpar7


  c.gtld-servers.net / nnn1-fra6


  d.gtld-servers.net / nnn1-fra6


  e.gtld-servers.net / nnn1-fra6


  f.gtld-servers.net / nnn1-fra5


  g.gtld-servers.net / nnn1-fra5


  h.gtld-servers.net / nnn1-fra5


  i.gtld-servers.net / nnn1-fra5


  j.gtld-servers.net / nnn1-nlams-1a


  k.gtld-servers.net / nnn1-nlams-1b


  l.gtld-servers.net / nnn1-nlams-1a


  m.gtld-servers.net / nnn1-nlams-1b


4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1679146193
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1679146208
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:8


Domain:dynv6.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:3


Domain:amethyst.dynv6.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:amethyst.dynv6.net
Zone-Name:amethyst.dynv6.net
Primary:ns1.dynv6.net
Mail:hostmaster.dyvn6.net
Serial:0
Refresh:3600
Retry:900
Expire:604800
TTL:180
num Entries:6


Domain:www.amethyst.dynv6.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://amethyst.dynv6.net/
46.142.4.73
302
https://amethyst.dynv6.net/
Html is minified: 100.00 %
0.093
A
Date: Sat, 18 Mar 2023 13:31:09 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains
Location: https://amethyst.dynv6.net/
Content-Length: 211
Connection: close
Content-Type: text/html; charset=iso-8859-1

• http://amethyst.dynv6.net/
2001:9e8:af:2200:dea6:32ff:fe2c:13b
-14

10.033
T
Timeout - The operation has timed out

• https://amethyst.dynv6.net/
46.142.4.73
302
https://amethyst.dynv6.net/index.php/login
2.384
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Sat, 18 Mar 2023 13:31:19 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-WC95dUcxR3d4K1h4S2VTbTZTK21OY01ENEU4cXpLN0I1d0lpTnkzcXFHdz06S1piVVZTWGNqTkNmRWEzSnJVblhEUHRxcFhkQW1aaTdyVk5wZmdMU3dCND0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
Set-Cookie: oc_sessionPassphrase=sezc7f3FGoe%2FRtQeT5n7TrZfKwUTs3Ishpv6S5qcdK2YY5zqrNz9TxptxLEjwPRdcSGVbthEtY5NYSuevJloe3tw8YwbiyAxV26NFzDSIziWb%2BE9KNIhNoGICM%2FikF2a; path=/; secure; HttpOnly; SameSite=Lax,oc0hps7n1yzw=m35grhek1t4biequdqg2e3o03f; path=/; secure; HttpOnly; SameSite=Lax,__Host-nc_sameSiteCookielax=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=lax,__Host-nc_sameSiteCookiestrict=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=strict
Strict-Transport-Security: max-age=15768000; includeSubDomains
Referrer-Policy: no-referrer
X-Content-Type-Options: nosniff
X-Download-Options: noopen
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: none
X-XSS-Protection: 1; mode=block
Upgrade: h2,h2c
Connection: Upgrade, close
Location: https://amethyst.dynv6.net/index.php/login
Content-Length: 0
Content-Type: text/html; charset=UTF-8

• https://amethyst.dynv6.net/
2001:9e8:af:2200:dea6:32ff:fe2c:13b
-14

10.033
T
Timeout - The operation has timed out

• https://amethyst.dynv6.net/index.php/login

-14

10.027
T
Timeout - The operation has timed out

• http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
46.142.4.73
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
0.097
A
Visible Content: Found The document has moved here .
Date: Sat, 18 Mar 2023 13:31:32 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains
Location: https://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 280
Connection: close
Content-Type: text/html; charset=iso-8859-1

• http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2001:9e8:af:2200:dea6:32ff:fe2c:13b
-14

10.046
T
Timeout - The operation has timed out
Visible Content:

• https://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

-14

10.037
T
Timeout - The operation has timed out
Visible Content:

• https://46.142.4.73/
46.142.4.73
400

Html is minified: 103.61 %
2.353
N
Bad Request
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Sat, 18 Mar 2023 13:31:44 GMT
Server: Apache
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-bjl5RnZtaHp5YkFldnE4L2xFUnBGMVRLc0Rsa2ZDclRqV2NodlVYNXhyMD06NXE3RGkxMEJzTmhOOHNKc3BERW1MMnoraEZRTUNGaWYrU3BrM2pDTWo5TT0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
Set-Cookie: oc_sessionPassphrase=V%2F7dIYFKvTEPPFG8d1TrfAJWrNnmcrHneVlVYpGrS4G79nsR26XmF20dngpCSiDBrQzwm3lbkyB4BtHrU893648Q7HqMkh82pap46RiSXIOIq4EuYdF1iAepvh0ykH%2B7; path=/; secure; HttpOnly; SameSite=Lax,oc0hps7n1yzw=cee6pdhufi1aovu6hn9e6d2i52; path=/; secure; HttpOnly; SameSite=Lax,__Host-nc_sameSiteCookielax=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=lax,__Host-nc_sameSiteCookiestrict=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=strict
Strict-Transport-Security: max-age=15768000; includeSubDomains
Referrer-Policy: no-referrer
X-Content-Type-Options: nosniff
X-Download-Options: noopen
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: none
X-XSS-Protection: 1; mode=block
Upgrade: h2,h2c
Connection: Upgrade, close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

• https://[2001:09e8:00af:2200:dea6:32ff:fe2c:013b]/
2001:9e8:af:2200:dea6:32ff:fe2c:13b
-14

10.043
T
Timeout - The operation has timed out

7. Comments


1. General Results, most used to calculate the result

Aname "amethyst.dynv6.net" is domain, public suffix is ".dynv6.net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 8481 (complete: 220007)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: amethyst.dynv6.net has 2 different ip addresses (authoritative).
AGood: Ipv4 and Ipv6 addresses per domain name found: amethyst.dynv6.net has 1 ipv4, 1 ipv6 addresses
AGood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
AGood: every cookie sent via https is marked as secure
AGood: Every cookie has a SameSite Attribute with a correct value Strict/Lax/None
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Ahttp://amethyst.dynv6.net/ 46.142.4.73
302
https://amethyst.dynv6.net/
Correct redirect http - https with the same domain name
BWarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 15768000 seconds = 182 days found
CError - no version with Http-Status 200
HFatal error: No https - result with http-status 200, no encryption
Khttp://amethyst.dynv6.net/ 46.142.4.73, Status 302

http://amethyst.dynv6.net/ 2001:9e8:af:2200:dea6:32ff:fe2c:13b, Status -14
Configuration problem - different ip addresses with different status
Khttps://amethyst.dynv6.net/ 46.142.4.73, Status 302

https://amethyst.dynv6.net/ 2001:9e8:af:2200:dea6:32ff:fe2c:13b, Status -14
Configuration problem - different ip addresses with different status
Khttp://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 46.142.4.73, Status 302

http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2001:9e8:af:2200:dea6:32ff:fe2c:13b, Status -14
Configuration problem - different ip addresses with different status
Mhttps://46.142.4.73/ 46.142.4.73
400

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://amethyst.dynv6.net/ 46.142.4.73
302
https://amethyst.dynv6.net/index.php/login
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://46.142.4.73/ 46.142.4.73
400

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Oamethyst.dynv6.net / 46.142.4.73 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain amethyst.dynv6.net, 2 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.amethyst.dynv6.net

2. Header-Checks (alpha, started 2022-10-23, may be buggy / incomplete)

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 12 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 12 Queries complete, 12 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 4.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns1.dynv6.com, ns1.dynv6.net, ns2.dynv6.com, ns3.dynv6.com, 3 Name Servers included in Delegation: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com, 3 Name Servers included in 2 Zone definitions: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com, 1 Name Servers listed in SOA.Primary: ns1.dynv6.net.
AGood: Only one SOA.Primary Name Server found.: ns1.dynv6.net.
Error: SOA.Primary Name Server not included in the delegation set.: ns1.dynv6.net.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com
AGood: All Name Server Domain Names have a Public Suffix.
Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1

AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 3 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 3 Name Servers, 1 Top Level Domain: com
AGood: Name Servers with different domain names found.: 2 different Domains found
AGood: Name servers with different Country locations found: 3 Name Servers, 2 Countries: DE, FI
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 159., 5., 95., 3 different subnets (first two Bytes): 159.69., 5.45., 95.216., 3 different subnets (first three Bytes): 159.69.43., 5.45.100., 95.216.144.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 2 different subnets (first block): 2a01:, 2a03:, 3 different subnets (first two blocks): 2a01:04f8:, 2a01:04f9:, 2a03:4000:, 3 different subnets (first three blocks): 2a01:04f8:1c1c:, 2a01:04f9:c010:, 2a03:4000:0006:, 3 different subnets (first four blocks): 2a01:04f8:1c1c:4c96:, 2a01:04f9:c010:095b:, 2a03:4000:0006:0569:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns1.dynv6.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns2.dynv6.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns3.dynv6.com
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 95.216.144.82: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 2a01:4f9:c010:95b::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.com / 5.45.100.251: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.com / 2a03:4000:6:569::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.com / 159.69.43.243: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.com / 2a01:4f8:1c1c:4c96::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2001:9e8:af:2200:dea6:32ff:fe2c:13b
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2001:9e8:af:2200:dea6:32ff:fe2c:13b, Status -14

http://amethyst.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 46.142.4.73, Status 302
Fatal: Check of /.well-known/acme-challenge/random-filename has different answers checking ipv6 / ipv4. Ipv6 doesn't have the expected result http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 validation may not work. Checking the validation file in /.well-known/acme-challenge Letsencrypt prefers ipv6. Two options: Remove your ipv6 / AAAA DNS entry or (better) fix your ipv6, so your webserver handles ipv6 correct. Perhaps add "Listen [::]:80". Don't use <VirtualHost ip-address:80>, switch to <VirtualHost *:80>. If you use IIS, check your bindings. Don't select a single ip address. Use this tool to check your raw ipv6 address. Add your domain name in the "Hostname" - field. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://amethyst.dynv6.net/ 46.142.4.73
302

Warning: HSTS header sent via http has no effect
ADuration: 222347 milliseconds, 222.347 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
amethyst.dynv6.net
46.142.4.73
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
amethyst.dynv6.net
46.142.4.73
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate
1CN=fv-az201-189


46.142.4.73
46.142.4.73
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

46.142.4.73
46.142.4.73
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate
1CN=fv-az201-189


9. Certificates

1.
1.
CN=fv-az201-189
17.08.2022
14.08.2032
expires in 3427 days
fv-az201-189 - 1 entry
1.
1.
CN=fv-az201-189
17.08.2022

14.08.2032
expires in 3427 days
fv-az201-189 - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:643313947C2FB72DEC2D9D1CDDEBA1B92499E2E7
Thumbprint:C79E08B0F3CA2C5EE144B2F4EC130FF60C6DB9DC
SHA256 / Certificate:MfwkD8jq8ikiQj5Ecl0+oLASvz4VIBBrX0nw2t9HnNM=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5c2b729051c8651989261e2a591393ba24313e6cf8ebacd709f42f1b366ace59
SHA256 hex / Subject Public Key Information (SPKI):5c2b729051c8651989261e2a591393ba24313e6cf8ebacd709f42f1b366ace59 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com

QNr.DomainTypeNS used
1
com
NS
g.root-servers.net (2001:500:12::d0d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.dynv6.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
3
ns2.dynv6.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
4
ns3.dynv6.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
5
de
NS
b.root-servers.net (2001:500:200::b)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
6
ns1.digineo.de: 2a03:4000:6:568::1, 5.45.100.168
NS
a.nic.de (2001:678:2::53)

Answer: ns2.digineo.de
195.201.93.228, 2a01:4f8:1c1c:5172::1

Answer: ns3.digineo.de
185.117.215.53, 2a06:8781::53
7
ns1.dynv6.com: 95.216.144.82
A
ns1.digineo.de (2a03:4000:6:568::1)
8
ns1.dynv6.com: 2a01:4f9:c010:95b::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)
9
ns2.dynv6.com: 5.45.100.251
A
ns1.digineo.de (2a03:4000:6:568::1)
10
ns2.dynv6.com: 2a03:4000:6:569::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)
11
ns3.dynv6.com: 159.69.43.243
A
ns1.digineo.de (2a03:4000:6:568::1)
12
ns3.dynv6.com: 2a01:4f8:1c1c:4c96::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.amethyst.dynv6.net
0

no CAA entry found
1
0
amethyst.dynv6.net
0

no CAA entry found
1
0
dynv6.net
-3

Name Error - The domain name does not exist
1
0
net
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
amethyst.dynv6.net

ok
1
0
www.amethyst.dynv6.net

ok
1
0
_acme-challenge.amethyst.dynv6.net

missing entry or wrong length
1
0
_acme-challenge.www.amethyst.dynv6.net

missing entry or wrong length
1
0
_acme-challenge.amethyst.dynv6.net.amethyst.dynv6.net

perhaps wrong
1
0
_acme-challenge.www.amethyst.dynv6.net.amethyst.dynv6.net

perhaps wrong
1
0
_acme-challenge.www.amethyst.dynv6.net.www.amethyst.dynv6.net

perhaps wrong
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
_dmarc
TXT
_dmarc.amethyst.dynv6.net


0
0
ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
amethyst.dynv6.net
46.142.4.73
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
19 Ciphers, 84.50 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
RSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=c6ae0b1a-792f-4704-af43-a4bd78a714d7


Last Result: https://check-your-website.server-daten.de/?q=amethyst.dynv6.net - 2023-03-18 14:30:22


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=amethyst.dynv6.net" target="_blank">Check this Site: amethyst.dynv6.net</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro