Check DNS, Urls + Redirects, Certificates and Content of your Website




X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
03.04.2024 03:00:01


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
amoriea.rf.gd
A
185.27.134.95
Gosforth/England/United Kingdom (GB) - UK-IFASTNET
No Hostname found
yes
1
0

AAAA

yes


www.amoriea.rf.gd
A
185.27.134.95
Gosforth/England/United Kingdom (GB) - UK-IFASTNET
No Hostname found
yes
1
0

AAAA

yes


*.rf.gd
A

yes



AAAA

yes



CNAME
11776.BODIS.COM
yes


*.amoriea.rf.gd
A

yes



AAAA

yes



CNAME
11776.BODIS.COM
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 5613, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 30903, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.04.2024, 00:00:00 +, Signature-Inception: 01.04.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: gd
gd
1 DS RR in the parent zone found



DS with Algorithm 7, KeyTag 51039, DigestType 2 and Digest vzah7F0pmFZhI95mC72FfR0lIxcphz5fU5mmQcHOwT8=



1 RRSIG RR to validate DS RR found



RRSIG-Owner gd., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.04.2024, 18:00:00 +, Signature-Inception: 02.04.2024, 17:00:00 +, KeyTag 5613, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 5613 used to validate the DS RRSet in the parent zone



6 DNSKEY RR found



Public Key with Algorithm 7, KeyTag 4824, Flags 256



Public Key with Algorithm 7, KeyTag 22608, Flags 256



Public Key with Algorithm 13, KeyTag 30567, Flags 256



Public Key with Algorithm 7, KeyTag 51039, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 60461, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 64358, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner gd., Algorithm: 7, 1 Labels, original TTL: 3600 sec, Signature-expiration: 24.04.2024, 10:48:39 +, Signature-Inception: 25.03.2024, 13:42:34 +, KeyTag 51039, Signer-Name: gd



RRSIG-Owner gd., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 24.04.2024, 10:48:39 +, Signature-Inception: 25.03.2024, 13:42:34 +, KeyTag 60461, Signer-Name: gd



Status: Good - Algorithmus 7 and DNSKEY with KeyTag 51039 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 60461 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 7, KeyTag 51039, DigestType 2 and Digest "vzah7F0pmFZhI95mC72FfR0lIxcphz5fU5mmQcHOwT8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: rf.gd
rf.gd
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "1888k4h6qgbe6pqo7pjgflfrfefqh3tj" between the hashed NSEC3-owner "135i499oqqb9imp1h68cklkrn84l8pee" and the hashed NextOwner "18rq4rlvhu0ds7es0at6qotmdlsa1um4". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 135i499oqqb9imp1h68cklkrn84l8pee.gd., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 25.04.2024, 14:03:50 +, Signature-Inception: 26.03.2024, 04:39:45 +, KeyTag 22608, Signer-Name: gd



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "1888k4h6qgbe6pqo7pjgflfrfefqh3tj" between the hashed NSEC3-owner "135i499oqqb9imp1h68cklkrn84l8pee" and the hashed NextOwner "18rq4rlvhu0ds7es0at6qotmdlsa1um4". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 135i499oqqb9imp1h68cklkrn84l8pee.gd., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 25.04.2024, 14:03:50 +, Signature-Inception: 26.03.2024, 04:39:45 +, KeyTag 64358, Signer-Name: gd



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "2hl66jlqrci0089ngjb0o7m8iapgad5r" as Owner. That's the Hash of "gd" with the NextHashedOwnerName "2i4ivrpe28h3p03tu2if8rmg4378skmf". So that domain name is the Closest Encloser of "rf.gd". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 2hl66jlqrci0089ngjb0o7m8iapgad5r.gd., Algorithm: 7, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 08:02:08 +, Signature-Inception: 12.03.2024, 05:22:40 +, KeyTag 22608, Signer-Name: gd



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "2hl66jlqrci0089ngjb0o7m8iapgad5r" as Owner. That's the Hash of "gd" with the NextHashedOwnerName "2i4ivrpe28h3p03tu2if8rmg4378skmf". So that domain name is the Closest Encloser of "rf.gd". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 2hl66jlqrci0089ngjb0o7m8iapgad5r.gd., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 11.04.2024, 08:02:08 +, Signature-Inception: 12.03.2024, 05:22:40 +, KeyTag 30567, Signer-Name: gd



0 DNSKEY RR found




Zone: amoriea.rf.gd
amoriea.rf.gd
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.amoriea.rf.gd
www.amoriea.rf.gd
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.amoriea.rf.gd
  ns1.infinityfree.com / ovh2.dns.byet.org

amoriea.rf.gd
  ns1.infinityfree.com / ovh2.dns.byet.org
198.251.90.216
Cheyenne/Wyoming/United States (US) - FranTech Solutions

rf.gd
  ns1.byet.org / ovh2.dns.byet.org
198.251.90.216
Cheyenne/Wyoming/United States (US) - FranTech Solutions


  ns1.infinityfree.com / ovh2.dns.byet.org
198.251.90.216
Cheyenne/Wyoming/United States (US) - FranTech Solutions


  ns1.rf.gd / ovh2.dns.byet.org
198.251.90.216
Cheyenne/Wyoming/United States (US) - FranTech Solutions


  ns2.byet.org / dns-1.byetcluster.com
198.251.86.153
Las Vegas/Nevada/United States (US) - FranTech Solutions


  ns2.infinityfree.com / ovh.dns.byet.org
198.251.86.153
Las Vegas/Nevada/United States (US) - FranTech Solutions


  ns2.rf.gd / ovh2.dns.byet.org
198.251.86.152
Las Vegas/Nevada/United States (US) - FranTech Solutions


  ns3.byet.org / ovh2.dns.byet.org
198.251.86.154
Las Vegas/Nevada/United States (US) - FranTech Solutions


  ns4.byet.org / ovh2.dns.byet.org
198.251.86.153
Las Vegas/Nevada/United States (US) - FranTech Solutions


  ns5.byet.org / ovh2.dns.byet.org
198.251.86.152
Las Vegas/Nevada/United States (US) - FranTech Solutions

gd
  a.nic.gd / SFQY-BG7AF9-XTW0MS


  b.nic.gd / PDUS-VJ5JVS-CTI2KM


  c.nic.gd / SFQY-BG7AF9-XTW0MS


  d.nic.gd / PDUS-VJ5JVS-CTI2KM


  ns0.centralnic.net


4. SOA-Entries


Domain:gd
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:gd
Zone-Name:gd
Primary:ns0.centralnic.net
Mail:hostmaster.centralnic.net
Serial:2118179956
Refresh:900
Retry:1800
Expire:6048000
TTL:3600
num Entries:4


Domain:rf.gd
Zone-Name:rf.gd
Primary:ns1.rf.gd
Mail:support.rf.gd
Serial:2006112402
Refresh:28800
Retry:7200
Expire:604800
TTL:86400
num Entries:9


Domain:amoriea.rf.gd
Zone-Name:amoriea.rf.gd
Primary:ns1.infinityfree.com
Mail:support.amoriea.rf.gd
Serial:2006112402
Refresh:28800
Retry:7200
Expire:604800
TTL:86400
num Entries:1


Domain:www.amoriea.rf.gd
Zone-Name:amoriea.rf.gd
Primary:ns1.infinityfree.com
Mail:support.amoriea.rf.gd
Serial:2006112402
Refresh:28800
Retry:7200
Expire:604800
TTL:86400
num Entries:1


5. Screenshots

Startaddress: https://amoriea.rf.gd/, address used: https://amoriea.rf.gd/, Screenshot created 2024-04-03 03:09:18 +00:0

Mobil (412px x 732px)

1087 milliseconds

Screenshot mobile - https://amoriea.rf.gd/
Mobil + Landscape (732px x 412px)

1081 milliseconds

Screenshot mobile landscape - https://amoriea.rf.gd/
Screen (1280px x 1680px)

1201 milliseconds

Screenshot Desktop - https://amoriea.rf.gd/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://amoriea.rf.gd/
185.27.134.95 No GZip used - 718 / 824 - 87.14 % possible
200

Html is minified: 371.17 %
0.066
H
Server: nginx
Date: Wed, 03 Apr 2024 01:00:41 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 824
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• http://www.amoriea.rf.gd/
185.27.134.95 No GZip used - 721 / 828 - 87.08 % possible
200

Html is minified: 372.97 %
0.067
H
Server: nginx
Date: Wed, 03 Apr 2024 01:00:41 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 828
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• https://amoriea.rf.gd/
185.27.134.95 No GZip used - 718 / 825 - 87.03 % possible
Inline-JavaScript (∑/total): 2/586 Inline-CSS (∑/total): 0/0
200

Html is minified: 371.62 %
1.590
J
Server: nginx
Date: Wed, 03 Apr 2024 01:00:41 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 825
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• https://www.amoriea.rf.gd/
185.27.134.95 No GZip used - 721 / 829 - 86.97 % possible
Inline-JavaScript (∑/total): 2/590 Inline-CSS (∑/total): 0/0
200

Html is minified: 373.42 %
0.954
J
Server: nginx
Date: Wed, 03 Apr 2024 01:00:44 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 829
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• http://amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
185.27.134.95 No GZip used - 773 / 893 - 86.56 % possible
Inline-JavaScript (∑/total): 2/654 Inline-CSS (∑/total): 0/0
200

Html is minified: 402.25 %
0.073
J
Visible Content:
Server: nginx
Date: Wed, 03 Apr 2024 01:00:46 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 893
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• http://www.amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
185.27.134.95 No GZip used - 777 / 897 - 86.62 % possible
Inline-JavaScript (∑/total): 2/658 Inline-CSS (∑/total): 0/0
200

Html is minified: 404.05 %
0.067
J
Visible Content:
Server: nginx
Date: Wed, 03 Apr 2024 01:00:46 GMT
Connection: close
Cache-Control: no-cache
Content-Type: text/html
Content-Length: 897
Expires: Thu, 01 Jan 1970 00:00:01 GMT

• https://185.27.134.95/
185.27.134.95
-16

0.073
P
UnknownError - The SSL connection could not be established, see inner exception. - Authentication failed because the remote party sent a TLS alert: 'InternalError' (FF: SSL_ERROR_INTERNAL_ERROR_ALERT)

7. Comments


1. General Results, most used to calculate the result

Aname "amoriea.rf.gd" is subdomain, public suffix is ".gd", top-level-domain is ".gd", top-level-domain-type is "country-code", Country is Grenada, tld-manager is "The National Telecommunications Regulatory Commission (NTRC)", num .gd-domains preloaded: 27 (complete: 240622)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: amoriea.rf.gd has only one ip address.
Warning: Only one ip address found: www.amoriea.rf.gd has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: amoriea.rf.gd has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.amoriea.rf.gd has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (6 urls)
http://amoriea.rf.gd/ 185.27.134.95


Url with incomplete Content-Type - header - missing charset
http://www.amoriea.rf.gd/ 185.27.134.95


Url with incomplete Content-Type - header - missing charset
https://amoriea.rf.gd/ 185.27.134.95


Url with incomplete Content-Type - header - missing charset
https://www.amoriea.rf.gd/ 185.27.134.95


Url with incomplete Content-Type - header - missing charset
http://amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95


Url with incomplete Content-Type - header - missing charset
http://www.amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95


Url with incomplete Content-Type - header - missing charset
Bhttps://amoriea.rf.gd/ 185.27.134.95
200

Missing HSTS-Header
Bhttps://www.amoriea.rf.gd/ 185.27.134.95
200

Missing HSTS-Header
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Jhttps://amoriea.rf.gd/ 185.27.134.95
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttps://www.amoriea.rf.gd/ 185.27.134.95
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttp://amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttp://www.amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Oamoriea.rf.gd / 185.27.134.95 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 14 Cipher Suites without Forward Secrecy found
Owww.amoriea.rf.gd / 185.27.134.95 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 14 Cipher Suites without Forward Secrecy found
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain amoriea.rf.gd, 1 ip addresses.
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain www.amoriea.rf.gd, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.amoriea.rf.gd

2. Header-Checks

Famoriea.rf.gd 185.27.134.95
Content-Security-Policy
Critical: Missing Header:
Famoriea.rf.gd 185.27.134.95
X-Content-Type-Options
Critical: Missing Header:
Famoriea.rf.gd 185.27.134.95
Referrer-Policy
Critical: Missing Header:
Famoriea.rf.gd 185.27.134.95
Permissions-Policy
Critical: Missing Header:
Fwww.amoriea.rf.gd 185.27.134.95
Content-Security-Policy
Critical: Missing Header:
Fwww.amoriea.rf.gd 185.27.134.95
X-Content-Type-Options
Critical: Missing Header:
Fwww.amoriea.rf.gd 185.27.134.95
Referrer-Policy
Critical: Missing Header:
Fwww.amoriea.rf.gd 185.27.134.95
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 4 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 1 Name Servers.
AInfo:: 4 Queries complete, 4 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 4.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 1 different Name Servers found: ns1.infinityfree.com, 1 Name Servers included in Delegation: ns1.infinityfree.com, 1 Name Servers included in 1 Zone definitions: ns1.infinityfree.com, 1 Name Servers listed in SOA.Primary: ns1.infinityfree.com.
AGood: Only one SOA.Primary Name Server found.: ns1.infinityfree.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.infinityfree.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.infinityfree.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 1 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 1 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: infinityfree.com
Warning: All Name Servers from the same Country / IP location.: 1 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 1 Name Servers, 1 different subnets (first Byte): 198., 1 different subnets (first two Bytes): 198.251., 1 different subnets (first three Bytes): 198.251.90.
XFatal: All Name Server IPv4 addresses from the same subnet. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.:
XFatal: Only one Name Server IPv4 address found. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.
AGood: Nameserver supports TCP connections: 1 good Nameserver
AGood: Nameserver supports Echo Capitalization: 1 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 1 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 1 good Nameserver
Nameserver doesn't pass all EDNS-Checks: a.nic.gd: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (SFQY-BG7AF9-XTW0MS). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.nic.gd: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (SFQY-BG7AF9-XTW0MS). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns0.centralnic.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

https://amoriea.rf.gd/ 185.27.134.95
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.amoriea.rf.gd/ 185.27.134.95
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://amoriea.rf.gd/ 185.27.134.95
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.amoriea.rf.gd/ 185.27.134.95
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://amoriea.rf.gd/ 185.27.134.95
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://www.amoriea.rf.gd/ 185.27.134.95
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://amoriea.rf.gd/ 185.27.134.95
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
https://www.amoriea.rf.gd/ 185.27.134.95
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
http://amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
http://www.amoriea.rf.gd/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.95
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
Warning: CSS / JavaScript found without GZip support. Send these ressources with GZip. 4 external CSS / JavaScript files without GZip found - 0 with GZip, 4 complete
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 4 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 4 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 577724 milliseconds, 577.724 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
amoriea.rf.gd
185.27.134.95
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
amoriea.rf.gd
185.27.134.95
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2


www.amoriea.rf.gd
185.27.134.95
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.amoriea.rf.gd
185.27.134.95
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2


9. Certificates

1.
1.
CN=amoriea.rf.gd
02.04.2024
01.07.2024
expires in 74 days
amoriea.rf.gd, *.amoriea.rf.gd - 2 entries
1.
1.
CN=amoriea.rf.gd
02.04.2024

01.07.2024
expires in 74 days
amoriea.rf.gd, *.amoriea.rf.gd - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0081E1E6B4AB4197B013DD14727959BCE7
Thumbprint:037113CC9B9FBE603D99755469E0E145E52EA031
SHA256 / Certificate:T7/SyDMGUeSVz+upi0zeGEsUVYn49J+WZCCLAxufZFE=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0fa81e3cb183e1d4dacbad2642502759388bddef890db9137c04b46df5d19612
SHA256 hex / Subject Public Key Information (SPKI):0fa81e3cb183e1d4dacbad2642502759388bddef890db9137c04b46df5d19612 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.pki.goog/s/gts1p5/EhswWtnI7qs
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


2.
CN=amoriea.rf.gd
02.04.2024
01.07.2024
expires in 74 days
amoriea.rf.gd, *.amoriea.rf.gd - 2 entries

2.
CN=amoriea.rf.gd
02.04.2024

01.07.2024
expires in 74 days
amoriea.rf.gd, *.amoriea.rf.gd - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0081E1E6B4AB4197B013DD14727959BCE7
Thumbprint:037113CC9B9FBE603D99755469E0E145E52EA031
SHA256 / Certificate:T7/SyDMGUeSVz+upi0zeGEsUVYn49J+WZCCLAxufZFE=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0fa81e3cb183e1d4dacbad2642502759388bddef890db9137c04b46df5d19612
SHA256 hex / Subject Public Key Information (SPKI):0fa81e3cb183e1d4dacbad2642502759388bddef890db9137c04b46df5d19612 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.pki.goog/s/gts1p5/EhswWtnI7qs
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
13.08.2020
30.09.2027
expires in 1260 days


3.
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
13.08.2020

30.09.2027
expires in 1260 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0203BC50A32753F0918022EDF1
Thumbprint:9C0B252A678A087FBEE496A44377F7556AC605E7
SHA256 / Certificate:l9QgA+EyVSlGCX8g75VfWxzVcKpDcteAAzpl775pdY0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f3559fd766dc2e51474007c996ec67cd9e85ae0fa827d3d663f5abc2eafcbe24
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.pki.goog/gtsr1
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
13.08.2020
30.09.2027
expires in 1260 days


4.
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
13.08.2020

30.09.2027
expires in 1260 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0203BC50A32753F0918022EDF1
Thumbprint:9C0B252A678A087FBEE496A44377F7556AC605E7
SHA256 / Certificate:l9QgA+EyVSlGCX8g75VfWxzVcKpDcteAAzpl775pdY0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f3559fd766dc2e51474007c996ec67cd9e85ae0fa827d3d663f5abc2eafcbe24
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.pki.goog/gtsr1
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=GTS Root R1, O=Google Trust Services LLC, C=US
19.06.2020
28.01.2028
expires in 1380 days


5.
CN=GTS Root R1, O=Google Trust Services LLC, C=US
19.06.2020

28.01.2028
expires in 1380 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:77BD0D6CDB36F91AEA210FC4F058D30D
Thumbprint:08745487E891C19E3078C1F2A07E452950EF36F6
SHA256 / Certificate:PuAnjfcfo8ElxM1IfwHXdGlOb8V+DNlMJO/XaRM5GOU=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):871a9194f4eed5b312ff40c84c1d524aed2f778bbff25f138cf81f680a7adc67
SHA256 hex / Subject Public Key Information (SPKI):871a9194f4eed5b312ff40c84c1d524aed2f778bbff25f138cf81f680a7adc67
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.pki.goog/gsr1
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


6.
CN=GTS Root R1, O=Google Trust Services LLC, C=US
22.06.2016
22.06.2036
expires in 4448 days


6.
CN=GTS Root R1, O=Google Trust Services LLC, C=US
22.06.2016

22.06.2036
expires in 4448 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:6E47A9C54B470C0DEC33D089B91CF4E1
Thumbprint:E1C950E6EF22F84C5645728B922060D7D5A7A3E8
SHA256 / Certificate:KldUceMTQLwhWBy9LPE+FYRjID7OlLz508wZa/CaVHI=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):871a9194f4eed5b312ff40c84c1d524aed2f778bbff25f138cf81f680a7adc67
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



7.
CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
01.09.1998
28.01.2028
expires in 1380 days


7.
CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
01.09.1998

28.01.2028
expires in 1380 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:040000000001154B5AC394
Thumbprint:B1BC968BD4F49D622AA89A81F2150152A41D829C
SHA256 / Certificate:69QQQOS7PsdCyeOB0x7ypBpItmhclufO88HfbNQzHJk=
SHA256 hex / Cert (DANE * 0 1):ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA256 hex / PublicKey (DANE * 1 1):2bcee858158cf5465fc9d76f0dfa312fef25a4dca8501da9b46b67d1fbfa1b64
SHA256 hex / Subject Public Key Information (SPKI):2bcee858158cf5465fc9d76f0dfa312fef25a4dca8501da9b46b67d1fbfa1b64
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7053464504
precert
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
2024-04-02 21:05:27
2024-07-01 21:05:26
*.amoriea.rf.gd, amoriea.rf.gd - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
12581545493
precert
CN=GTS CA 1P5, O=Google Trust Services LLC, C=US
2024-04-02 19:05:27
2024-07-01 19:05:26
*.amoriea.rf.gd, amoriea.rf.gd
2 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://amoriea.rf.gd/
185.27.134.95
script

1
13,733 Bytes
0
1
0
0
0
0

https://www.amoriea.rf.gd/
185.27.134.95
script

1
13,733 Bytes
0
1
0
0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://amoriea.rf.gd/
185.27.134.95
script
src
/aes.js
200

1
ok
Missing defer / async attribute. application/javascript, missing X-Content-Type-Options nosniff

No Cache-Control - header
GZip required: 13733 Bytes




local SRI possible, possible hash-values:

sha256-UGlCWxITRrNvcwkQ0FQC1Qkg/CF4sB4Mh4txr07x65Y=
sha384-aaSFXsBqBPSHl4l3VhKKaIxBn6QnoMPL7zMR5d9OwB072HtY7w8lJP7lJcwcZaUP
sha512-Uc0Umyh26QYhr8V5+xcuJTVIqFHUwgIYHh+rqBL1vrGunM+fFTE39gxWngWnncsnIXbgEm7OrFQxYgjSaZponw==

<script src="/aes.js" crossorigin="anonymous" integrity="sha256-UGlCWxITRrNvcwkQ0FQC1Qkg/CF4sB4Mh4txr07x65Y=" />



https://www.amoriea.rf.gd/
185.27.134.95
script
src
/aes.js
200

1
ok
Missing defer / async attribute. application/javascript, missing X-Content-Type-Options nosniff

No Cache-Control - header
GZip required: 13733 Bytes




local SRI possible, possible hash-values:

sha256-UGlCWxITRrNvcwkQ0FQC1Qkg/CF4sB4Mh4txr07x65Y=
sha384-aaSFXsBqBPSHl4l3VhKKaIxBn6QnoMPL7zMR5d9OwB072HtY7w8lJP7lJcwcZaUP
sha512-Uc0Umyh26QYhr8V5+xcuJTVIqFHUwgIYHh+rqBL1vrGunM+fFTE39gxWngWnncsnIXbgEm7OrFQxYgjSaZponw==

<script src="/aes.js" crossorigin="anonymous" integrity="sha256-UGlCWxITRrNvcwkQ0FQC1Qkg/CF4sB4Mh4txr07x65Y=" />




12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.infinityfree.com

QNr.DomainTypeNS used
1
com
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.infinityfree.com
NS
e.gtld-servers.net (2001:502:1ca1::30)

Answer: beth.ns.cloudflare.com, paul.ns.cloudflare.com

Answer: beth.ns.cloudflare.com
108.162.192.103, 172.64.32.103, 173.245.58.103, 2606:4700:50::adf5:3a67, 2803:f800:50::6ca2:c067, 2a06:98c1:50::ac40:2067

Answer: paul.ns.cloudflare.com
108.162.193.135, 172.64.33.135, 173.245.59.135, 2606:4700:58::adf5:3b87, 2803:f800:50::6ca2:c187, 2a06:98c1:50::ac40:2187
3
ns1.infinityfree.com: 198.251.90.216
A
beth.ns.cloudflare.com (2606:4700:50::adf5:3a67)
4
ns1.infinityfree.com: No AAAA record found
AAAA
beth.ns.cloudflare.com (2606:4700:50::adf5:3a67)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.amoriea.rf.gd
0

no CAA entry found
1
0
amoriea.rf.gd
0

no CAA entry found
1
0
rf.gd
0

no CAA entry found
1
0
gd
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rf.gd
google-site-verification=bzpldra_k1onajwemu1kldgqnr-p9koma5rum30rhho
ok
1
0
amoriea.rf.gd

ok
1
0
www.amoriea.rf.gd

ok
1
0
_acme-challenge.amoriea.rf.gd


1
0
_acme-challenge.www.amoriea.rf.gd

Name Error - The domain name does not exist
1
0
_acme-challenge.amoriea.rf.gd.rf.gd

Name Error - The domain name does not exist
1
0
_acme-challenge.amoriea.rf.gd.amoriea.rf.gd


1
0
_acme-challenge.www.amoriea.rf.gd.amoriea.rf.gd


1
0
_acme-challenge.www.amoriea.rf.gd.www.amoriea.rf.gd

Name Error - The domain name does not exist
1
0


15. DomainService - Entries

No DomainServiceEntries entries found



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
amoriea.rf.gd
185.27.134.95
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
36 Ciphers, 132.90 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-CCM8
(Secure)
TLSv1.2
0xC0,0xA3
FS

TLS_DHE_RSA_WITH_AES_256_CCM_8
DH
RSA
AESCCM8(256)
AEAD



DHE-RSA-AES256-CCM
(Secure)
TLSv1.2
0xC0,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_CCM
DH
RSA
AESCCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-CCM8
(Secure)
TLSv1.2
0xC0,0xA2
FS

TLS_DHE_RSA_WITH_AES_128_CCM_8
DH
RSA
AESCCM8(128)
AEAD



DHE-RSA-AES128-CCM
(Secure)
TLSv1.2
0xC0,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_CCM
DH
RSA
AESCCM(128)
AEAD



ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
ECDH
RSA
Camellia(256)
SHA384



DHE-RSA-CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC4
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
DH
RSA
Camellia(256)
SHA256



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC0
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
RSA
RSA
Camellia(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



AES256-CCM8
(Weak)
TLSv1.2
0xC0,0xA1
No FS

TLS_RSA_WITH_AES_256_CCM_8
RSA
RSA
AESCCM8(256)
AEAD



AES256-CCM
(Weak)
TLSv1.2
0xC0,0x9D
No FS

TLS_RSA_WITH_AES_256_CCM
RSA
RSA
AESCCM(256)
AEAD



ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
ECDH
RSA
Camellia(128)
SHA256



DHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBE
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
DH
RSA
Camellia(128)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBA
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
RSA
RSA
Camellia(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



AES128-CCM8
(Weak)
TLSv1.2
0xC0,0xA0
No FS

TLS_RSA_WITH_AES_128_CCM_8
RSA
RSA
AESCCM8(128)
AEAD



AES128-CCM
(Weak)
TLSv1.2
0xC0,0x9C
No FS

TLS_RSA_WITH_AES_128_CCM
RSA
RSA
AESCCM(128)
AEAD



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1
www.amoriea.rf.gd
185.27.134.95
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
36 Ciphers, 133.39 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
DH
RSA
AESGCM(256)
AEAD



DHE-RSA-AES256-CCM8
(Secure)
TLSv1.2
0xC0,0xA3
FS

TLS_DHE_RSA_WITH_AES_256_CCM_8
DH
RSA
AESCCM8(256)
AEAD



DHE-RSA-AES256-CCM
(Secure)
TLSv1.2
0xC0,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_CCM
DH
RSA
AESCCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
DH
RSA
AESGCM(128)
AEAD



DHE-RSA-AES128-CCM8
(Secure)
TLSv1.2
0xC0,0xA2
FS

TLS_DHE_RSA_WITH_AES_128_CCM_8
DH
RSA
AESCCM8(128)
AEAD



DHE-RSA-AES128-CCM
(Secure)
TLSv1.2
0xC0,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_CCM
DH
RSA
AESCCM(128)
AEAD



ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
ECDH
RSA
Camellia(256)
SHA384



DHE-RSA-CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC4
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256
DH
RSA
Camellia(256)
SHA256



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
DH
RSA
AES(256)
SHA256



CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC0
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
RSA
RSA
Camellia(256)
SHA256



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



AES256-CCM8
(Weak)
TLSv1.2
0xC0,0xA1
No FS

TLS_RSA_WITH_AES_256_CCM_8
RSA
RSA
AESCCM8(256)
AEAD



AES256-CCM
(Weak)
TLSv1.2
0xC0,0x9D
No FS

TLS_RSA_WITH_AES_256_CCM
RSA
RSA
AESCCM(256)
AEAD



ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
ECDH
RSA
Camellia(128)
SHA256



DHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBE
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
DH
RSA
Camellia(128)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256
DH
RSA
AES(128)
SHA256



CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBA
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
RSA
RSA
Camellia(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



AES128-CCM8
(Weak)
TLSv1.2
0xC0,0xA0
No FS

TLS_RSA_WITH_AES_128_CCM_8
RSA
RSA
AESCCM8(128)
AEAD



AES128-CCM
(Weak)
TLSv1.2
0xC0,0x9C
No FS

TLS_RSA_WITH_AES_128_CCM
RSA
RSA
AESCCM(128)
AEAD



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA
DH
RSA
Camellia(256)
SHA1



DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA
DH
RSA
AES(256)
SHA1



CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x84
No FS

TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
RSA
RSA
Camellia(256)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA
DH
RSA
Camellia(128)
SHA1



DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA
DH
RSA
AES(128)
SHA1



CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x41
No FS

TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
RSA
RSA
Camellia(128)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=882cb599-83c3-4667-9b25-27d78293ad63


Last Result: https://check-your-website.server-daten.de/?q=amoriea.rf.gd - 2024-04-03 03:00:01


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=amoriea.rf.gd" target="_blank">Check this Site: amoriea.rf.gd</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro