Check DNS, Urls + Redirects, Certificates and Content of your Website



X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
08.04.2021 04:42:27


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
cerospam.org
A
148.72.155.173
St Louis/Missouri/United States (US) - GoDaddy.com
Hostname: mail.cike.ws
yes
1
0

AAAA

yes


www.cerospam.org
A
148.72.155.173
St Louis/Missouri/United States (US) - GoDaddy.com
Hostname: mail.cike.ws
yes
1
0

AAAA

yes


*.cerospam.org
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14631, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.04.2021, 00:00:00 +, Signature-Inception: 01.04.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: org
org
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=



1 RRSIG RR to validate DS RR found



RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 20.04.2021, 17:00:00 +, Signature-Inception: 07.04.2021, 16:00:00 +, KeyTag 14631, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14631 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 27558, Flags 256



Public Key with Algorithm 8, KeyTag 30453, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 23.04.2021, 05:36:56 +, Signature-Inception: 02.04.2021, 04:36:56 +, KeyTag 26974, Signer-Name: org



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: cerospam.org
cerospam.org
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "v3bfvpfqsfrn7sm8kkerfs97am9sf3it" between the hashed NSEC3-owner "v3b9rosq4700q83ol8te79vesa3te2q3" and the hashed NextOwner "v3bgu04th3kre9513fuq3u4g11d2gfj8". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner v3b9rosq4700q83ol8te79vesa3te2q3.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 23.04.2021, 05:36:56 +, Signature-Inception: 02.04.2021, 04:36:56 +, KeyTag 27558, Signer-Name: org



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "d6n22mffurrkkhup4jscmntse266m0lq" as Owner. That's the Hash of "org" with the NextHashedOwnerName "d6n6gr81bv9d3ce1vsg6fn5bau7ub671". So that domain name is the Closest Encloser of "cerospam.org". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner d6n22mffurrkkhup4jscmntse266m0lq.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 29.04.2021, 02:42:10 +, Signature-Inception: 08.04.2021, 01:42:10 +, KeyTag 27558, Signer-Name: org



0 DNSKEY RR found




Zone: www.cerospam.org
www.cerospam.org
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.cerospam.org
  cerospam.org

cerospam.org
U  cerospam.cike.net
45.81.5.67
Los Angeles/California/United States (US) - DediPath


  cerospam.cike.ws


  cerospam.org
148.72.155.173
St Louis/Missouri/United States (US) - GoDaddy.com

org
  a0.org.afilias-nst.info / ns000b.app18.ams2.afilias-nst.info


  a2.org.afilias-nst.info / LHR6


  b0.org.afilias-nst.org / ns000b.app10.ams2.afilias-nst.info


  b2.org.afilias-nst.org / LHR7


  c0.org.afilias-nst.info / app3.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  d0.org.afilias-nst.org / ns000b.app25.ams2.afilias-nst.info


4. SOA-Entries


Domain:org
Zone-Name:org
Primary:a0.org.afilias-nst.info
Mail:noc.afilias-nst.info
Serial:2014312977
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:6


Domain:cerospam.org
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:cerospam.org
Zone-Name:cerospam.org
Primary:cerospam.org
Mail:admin.cerospam.org
Serial:2021040322
Refresh:3600
Retry:3600
Expire:86400
TTL:120
num Entries:1


Domain:www.cerospam.org
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://cerospam.org, address used: https://cerospam.org/, Screenshot created 2021-04-08 04:46:59 +00:0

Mobil (412px x 732px)

385 milliseconds

Screenshot mobile - https://cerospam.org/
Mobil + Landscape (732px x 412px)

388 milliseconds

Screenshot mobile landscape - https://cerospam.org/
Screen (1280px x 1680px)

906 milliseconds

Screenshot Desktop - https://cerospam.org/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396732
content Size3961166

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with X25519, and AES_256_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://cerospam.org/
148.72.155.173
301
https://cerospam.org/
Html is minified: 109.46 %
0.246
A
Server: nginx
Date: Thu, 08 Apr 2021 02:45:50 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://cerospam.org/

• http://www.cerospam.org/
148.72.155.173
301
https://www.cerospam.org/
Html is minified: 109.46 %
0.236
A
Server: nginx
Date: Thu, 08 Apr 2021 02:45:50 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://www.cerospam.org/

• https://cerospam.org/
148.72.155.173 GZip used - 310 / 464 - 33.19 %
Inline-JavaScript (∑/total): 2/33 Inline-CSS (∑/total): 0/0
200

Html is minified: 119.28 %
4.787
B
small visible content (num chars: 49)
This is a default webpage generated for by Plesk.
Server: nginx
Date: Thu, 08 Apr 2021 02:45:51 GMT
Content-Type: text/html
Last-Modified: Thu, 08 Apr 2021 00:20:40 GMT
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
ETag: W/"606e4c58-1d0"
X-Powered-By: PleskLin
Content-Encoding: gzip

• https://www.cerospam.org/
148.72.155.173 GZip used - 310 / 464 - 33.19 %
Inline-JavaScript (∑/total): 2/33 Inline-CSS (∑/total): 0/0
200

Html is minified: 119.28 %
4.564
B
small visible content (num chars: 49)
This is a default webpage generated for by Plesk.
Server: nginx
Date: Thu, 08 Apr 2021 02:45:57 GMT
Content-Type: text/html
Last-Modified: Thu, 08 Apr 2021 00:20:40 GMT
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
ETag: W/"606e4c58-1d0"
X-Powered-By: PleskLin
Content-Encoding: gzip

• http://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
148.72.155.173
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
0.243
A
Visible Content: 301 Moved Permanently nginx
Server: nginx
Date: Thu, 08 Apr 2021 02:46:02 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• http://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
148.72.155.173
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
0.234
A
Visible Content: 301 Moved Permanently nginx
Server: nginx
Date: Thu, 08 Apr 2021 02:46:02 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• https://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
GZip used - 462 / 808 - 42.82 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 111.29 %
4.467
A
Not Found
Visible Content: Server Error 404 Page Not Found This page either doesn't exist, or it moved somewhere else. That's what you can do Reload Page Back to Previous Page Home Page
Server: nginx
Date: Thu, 08 Apr 2021 02:46:08 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
ETag: W/"606e4c67-328"
Content-Encoding: gzip

• https://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
GZip used - 462 / 808 - 42.82 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 111.29 %
4.470
A
Not Found
Visible Content: Server Error 404 Page Not Found This page either doesn't exist, or it moved somewhere else. That's what you can do Reload Page Back to Previous Page Home Page
Server: nginx
Date: Thu, 08 Apr 2021 02:46:13 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
ETag: W/"606e4c67-328"
Content-Encoding: gzip

• https://148.72.155.173/
148.72.155.173
303
https://148.72.155.173/login.php?success_redirect_url=%2F
4.560
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Thu, 08 Apr 2021 02:46:02 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Expires: Fri, 28 May 1999 00:00:00 GMT
Last-Modified: Thu, 08 Apr 2021 02:46:02 GMT
Cache-Control: no-store, no-cache, must-revalidate,post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Location: https://148.72.155.173/login.php?success_redirect_url=%2F

• https://148.72.155.173/login.php?success_redirect_url=%2F

303
https://148.72.155.173/login_up.php?success_redirect_url=%2F
4.333
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Thu, 08 Apr 2021 02:46:18 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Expires: Fri, 28 May 1999 00:00:00 GMT
Last-Modified: Thu, 08 Apr 2021 02:46:18 GMT
Cache-Control: no-store, no-cache, must-revalidate,post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Location: https://148.72.155.173/login_up.php?success_redirect_url=%2F

• https://148.72.155.173/login_up.php?success_redirect_url=%2F
GZip used - 5034 / 14070 - 64.22 %
Inline-JavaScript (∑/total): 10/12071 Inline-CSS (∑/total): 0/0
200

Html is minified: 939.88 %
4.380
N
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 0)
Server: nginx
Date: Thu, 08 Apr 2021 02:46:23 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
Expires: Fri, 28 May 1999 00:00:00 GMT
Last-Modified: Thu, 08 Apr 2021 02:46:23 GMT
Cache-Control: no-store, no-cache, must-revalidate,post-check=0, pre-check=0
Pragma: no-cache
P3P: CP="NON COR CURa ADMa OUR NOR UNI COM NAV STA"
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
Content-Encoding: gzip

7. Comments


1. General Results, most used to calculate the result

Aname "cerospam.org" is domain, public suffix is ".org", top-level-domain is ".org", top-level-domain-type is "generic", tld-manager is "Public Interest Registry (PIR)", num .org-domains preloaded: 5296 (complete: 151507)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: cerospam.org has only one ip address.
Warning: Only one ip address found: www.cerospam.org has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: cerospam.org has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.cerospam.org has no ipv6 address.
Ahttps://148.72.155.173/login.php?success_redirect_url=%2F
303
https://148.72.155.173/login_up.php?success_redirect_url=%2F
correct redirect https to https
Ahttps://148.72.155.173/ 148.72.155.173
303
https://148.72.155.173/login.php?success_redirect_url=%2F
correct redirect https to https
Agood: destination is https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (5 urls)
https://cerospam.org/ 148.72.155.173


Url with incomplete Content-Type - header - missing charset
https://www.cerospam.org/ 148.72.155.173


Url with incomplete Content-Type - header - missing charset
https://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
Ahttp://cerospam.org/ 148.72.155.173
301
https://cerospam.org/
correct redirect http - https with the same domain name
Ahttp://www.cerospam.org/ 148.72.155.173
301
https://www.cerospam.org/
correct redirect http - https with the same domain name
Bhttps://cerospam.org/ 148.72.155.173
200

Missing HSTS-Header
Bhttps://www.cerospam.org/ 148.72.155.173
200

Missing HSTS-Header
Bhttps://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
Bhttps://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Nhttps://148.72.155.173/login.php?success_redirect_url=%2F
303
https://148.72.155.173/login_up.php?success_redirect_url=%2F
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://148.72.155.173/ 148.72.155.173
303
https://148.72.155.173/login.php?success_redirect_url=%2F
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://148.72.155.173/login_up.php?success_redirect_url=%2F
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Ncerospam.org:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.cerospam.org:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N148.72.155.173:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
XFatal error: Nameserver doesn't support TCP connection: cerospam.cike.net / 45.81.5.67: Fatal error - no NameServer IP-Address or connection. Details: One or more errors occurred. - Es konnte keine Verbindung hergestellt werden, da der Zielcomputer die Verbindung verweigerte 45.81.5.67:53
XFatal error: Nameserver doesn't support TCP connection: cerospam.org / 148.72.155.173: Refused
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain cerospam.org, 1 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain www.cerospam.org, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 17 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 17 Queries complete, 14 with IPv6, 2 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
Bad (greater 8):: An average of 8.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: cerospam.cike.net, cerospam.cike.ws, cerospam.org, 2 Name Servers included in Delegation: cerospam.cike.net, cerospam.cike.ws, 0 Name Servers included in 1 Zone definitions: , 1 Name Servers listed in SOA.Primary: cerospam.org.
AGood: Only one SOA.Primary Name Server found.: cerospam.org.
Error: SOA.Primary Name Server not included in the delegation set.: cerospam.org.
AGood: All Name Server Domain Names have a Public Suffix.
Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1

AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 2 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 2 Name Servers, 2 Top Level Domains: org, net
AGood: Name Servers with different domain names found.: 3 different Domains found
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 2 Name Servers, 2 different subnets (first Byte): 148., 45., 2 different subnets (first two Bytes): 148.72., 45.81., 2 different subnets (first three Bytes): 148.72.155., 45.81.5.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: cerospam.cike.net
Nameserver doesn't pass all EDNS-Checks: cerospam.cike.net / 45.81.5.67: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: cerospam.cike.ws: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: cerospam.org: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: cerospam.org / 148.72.155.173: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: d0.org.afilias-nst.org: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (ns000b.app25.ams2.afilias-nst.info). COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://cerospam.org/ 148.72.155.173
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.cerospam.org/ 148.72.155.173
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://148.72.155.173/login_up.php?success_redirect_url=%2F
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://cerospam.org/ 148.72.155.173
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.cerospam.org/ 148.72.155.173
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://148.72.155.173/login_up.php?success_redirect_url=%2F
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://cerospam.org/ 148.72.155.173
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://www.cerospam.org/ 148.72.155.173
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://148.72.155.173/login_up.php?success_redirect_url=%2F
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://cerospam.org/ 148.72.155.173
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
https://www.cerospam.org/ 148.72.155.173
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
https://148.72.155.173/login_up.php?success_redirect_url=%2F
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 6 script elements without defer/async.
AGood: All CSS / JavaScript files are sent with GZip. That reduces the content of the files. 4 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 10 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 2 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 12 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
4.467 seconds
Warning: 404 needs more then one second
https://www.cerospam.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
4.470 seconds
Warning: 404 needs more then one second
ADuration: 278647 milliseconds, 278.647 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
cerospam.org
148.72.155.173
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
cerospam.org
148.72.155.173
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=cerospam.org

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.cerospam.org
148.72.155.173
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cerospam.org
148.72.155.173
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=cerospam.org

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


cerospam.org
cerospam.org
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

cerospam.org
cerospam.org
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=cerospam.org

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.cerospam.org
www.cerospam.org
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cerospam.org
www.cerospam.org
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=cerospam.org

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


148.72.155.173
148.72.155.173
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

148.72.155.173
148.72.155.173
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=mail.cike.ws

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


148.72.155.173
148.72.155.173
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

148.72.155.173
148.72.155.173
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=mail.cike.ws

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cerospam.org
cerospam.org
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

cerospam.org
cerospam.org
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=mail.cike.ws

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cerospam.org
www.cerospam.org
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cerospam.org
www.cerospam.org
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=mail.cike.ws

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


148.72.155.173
148.72.155.173
8443
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

148.72.155.173
148.72.155.173
8443
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=mail.cike.ws

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


9. Certificates

1.
1.
CN=cerospam.org
08.04.2021
09.04.2022
expires in 359 days
cerospam.org, www.cerospam.org - 2 entries
1.
1.
CN=cerospam.org
08.04.2021

09.04.2022
expires in 359 days
cerospam.org, www.cerospam.org - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:168A866F2F7D54504AE45A965064D5B6
Thumbprint:380BC8F47950C6F8D0053C501A16A71F52E6C4A6
SHA256 / Certificate:20uOf33aVQRvJDemAAfEuYg6TeDGA0iqcAbmlcHNCro=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6672051eb5874d89a04a37df6f850579d3180f69079d56a5b72261164f3eb819
SHA256 hex / Subject Public Key Information (SPKI):a02bd120b0f32a7ff5384a3055d489aa07e5211b368363d02e483c5dfd36bd87
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=cerospam.org
08.04.2021
09.04.2022
expires in 359 days
cerospam.org, www.cerospam.org - 2 entries

2.
CN=cerospam.org
08.04.2021

09.04.2022
expires in 359 days
cerospam.org, www.cerospam.org - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:168A866F2F7D54504AE45A965064D5B6
Thumbprint:380BC8F47950C6F8D0053C501A16A71F52E6C4A6
SHA256 / Certificate:20uOf33aVQRvJDemAAfEuYg6TeDGA0iqcAbmlcHNCro=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6672051eb5874d89a04a37df6f850579d3180f69079d56a5b72261164f3eb819
SHA256 hex / Subject Public Key Information (SPKI):a02bd120b0f32a7ff5384a3055d489aa07e5211b368363d02e483c5dfd36bd87
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3548 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3548 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3548 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3548 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 6123 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 6123 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):00900315f64f7673565b9b22273ed3a56d67c2e2c9cf930ce845ccfed80af0ce
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 2818 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 2818 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):63884fb1d9ecd7b1980db95b3d6dd59cc12d9a45c095827d26d5c984d296aa36
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 2818 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 2818 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):5e51ec78f23e09948a90b1ae6c9f4980845ecfe73ff72022406c9bd81adff4d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=mail.cike.ws
30.03.2021
31.03.2022
expires in 350 days
mail.cike.ws, www.mail.cike.ws - 2 entries
2.
1.
CN=mail.cike.ws
30.03.2021

31.03.2022
expires in 350 days
mail.cike.ws, www.mail.cike.ws - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00B22F59FF7019995D3130840F6E50CFC4
Thumbprint:77EA4C852BABC86A83096CD1C293D39934A65A65
SHA256 / Certificate:yMbjcxvNOFqXC4jE9xXj2z1doMiNXJ+46RsCz7mGIHQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):1155d35b603c0bced48d0b932c53aface57d493d5ffa9d9cdb1c478e10fb9dbb
SHA256 hex / Subject Public Key Information (SPKI):5c799b2ff94a85a8a3f7580b837d755240d19a5b3ba8d3b697d297c74d6bbde5
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=mail.cike.ws
30.03.2021
31.03.2022
expires in 350 days
mail.cike.ws, www.mail.cike.ws - 2 entries

2.
CN=mail.cike.ws
30.03.2021

31.03.2022
expires in 350 days
mail.cike.ws, www.mail.cike.ws - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00B22F59FF7019995D3130840F6E50CFC4
Thumbprint:77EA4C852BABC86A83096CD1C293D39934A65A65
SHA256 / Certificate:yMbjcxvNOFqXC4jE9xXj2z1doMiNXJ+46RsCz7mGIHQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):1155d35b603c0bced48d0b932c53aface57d493d5ffa9d9cdb1c478e10fb9dbb
SHA256 hex / Subject Public Key Information (SPKI):5c799b2ff94a85a8a3f7580b837d755240d19a5b3ba8d3b697d297c74d6bbde5
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3548 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3548 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3548 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3548 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 6123 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 6123 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):00900315f64f7673565b9b22273ed3a56d67c2e2c9cf930ce845ccfed80af0ce
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 2818 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 2818 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):63884fb1d9ecd7b1980db95b3d6dd59cc12d9a45c095827d26d5c984d296aa36
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 2818 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 2818 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):5e51ec78f23e09948a90b1ae6c9f4980845ecfe73ff72022406c9bd81adff4d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2426166007
precert
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
2021-04-03 00:00:00
2022-04-02 23:59:59
*.cerospam.org, cerospam.org, sni.cloudflaressl.com - 3 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
1
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4343244336
precert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2021-04-07 22:00:00
2022-04-08 21:59:59
cerospam.org, www.cerospam.org
2 entries


4322102159
precert
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
2021-04-02 22:00:00
2022-04-02 21:59:59
*.cerospam.org, cerospam.org, sni.cloudflaressl.com
3 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://cerospam.org/
148.72.155.173
meta
other
2

0


0
0
0


script

1

0
0
1
1
0
0
-1
https://www.cerospam.org/
148.72.155.173
meta
other
2

0


0
0
0


script

1

0
0
1
1
0
0
-1
https://148.72.155.173/login_up.php?success_redirect_url=%2F
link
stylesheet
2

0


0
0
0


link
other
1

0


0
0
0


meta
other
8

0


0
0
0


script

6

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://cerospam.org/
148.72.155.173
meta

utf-8


1
ok








meta
copyright
Copyright 1999-2021. Plesk International GmbH. All rights reserved.


1
ok








script
src
https://assets.plesk.com/static/default-website-content/public/default-website-index.js
200

1
ok
Missing defer / async attribute. application/javascript; charset=utf-8, missing X-Content-Type-Options nosniff

Cache-Control: max-age=600 - max-age too short.
GZip: 6869/20638 Bytes




Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

sha256-M2klHOuQ+7bKrbbzZmT5xyUBoJhI0WRp6zuRgj6kUXI=
sha384-x3NDHrW+72ZjoNuP661pc/atb2LdFFL9r7lP1TJ9EvKxHotYalKY1GkwWhgk60l4
sha512-DI5LkbFu2AV2s/Id2ShYLlpBl8kbmaI4Z9xyx1KOQRFQceOA3NYbjBnt5z1mvTkG7CI9E2dQel7sVsoy58gGEQ==

<script src="https://assets.plesk.com/static/default-website-content/public/default-website-index.js" crossorigin="anonymous" integrity="sha256-M2klHOuQ+7bKrbbzZmT5xyUBoJhI0WRp6zuRgj6kUXI=" />



https://www.cerospam.org/
148.72.155.173
meta

utf-8


1
ok








meta
copyright
Copyright 1999-2021. Plesk International GmbH. All rights reserved.


1
ok








script
src
https://assets.plesk.com/static/default-website-content/public/default-website-index.js
200

1
ok
Missing defer / async attribute. application/javascript; charset=utf-8, missing X-Content-Type-Options nosniff

Cache-Control: max-age=600 - max-age too short.
GZip: 6869/20638 Bytes




Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

sha256-M2klHOuQ+7bKrbbzZmT5xyUBoJhI0WRp6zuRgj6kUXI=
sha384-x3NDHrW+72ZjoNuP661pc/atb2LdFFL9r7lP1TJ9EvKxHotYalKY1GkwWhgk60l4
sha512-DI5LkbFu2AV2s/Id2ShYLlpBl8kbmaI4Z9xyx1KOQRFQceOA3NYbjBnt5z1mvTkG7CI9E2dQel7sVsoy58gGEQ==

<script src="https://assets.plesk.com/static/default-website-content/public/default-website-index.js" crossorigin="anonymous" integrity="sha256-M2klHOuQ+7bKrbbzZmT5xyUBoJhI0WRp6zuRgj6kUXI=" />



https://148.72.155.173/login_up.php?success_redirect_url=%2F

link
shortcut icon
/favicon.ico?1616649320


1
ok








link
stylesheet
/cp/theme/css/main.css?1616649289


1
ok








link
stylesheet
/ui-library/plesk-ui-library.css?1616649286


1
ok








meta

utf-8


1
ok








meta
X-UA-Compatible
IE=edge,chrome=1


1
ok








meta
forgery_protection_token
a29bc9eca05fe2a8884ad05cee29b1d9


1
ok








meta
format-detection
telephone=no


1
ok








meta
plesk-build
1800210325.10


1
ok








meta
plesk-revision
e5a6bfface98f8934d483a7a2fcdcc53195bda68


1
ok








meta
SKYPE_TOOLBAR
SKYPE_TOOLBAR_PARSER_COMPATIBLE


1
ok








meta
viewport
width=device-width, initial-scale=1.0, maximum-scale=1.0


1
ok








script
src
/cp/javascript/externals/prototype.js?1616649289


1
ok
Missing defer / async attribute.








script
src
/cp/javascript/externals/require.js?1616649289


1
ok
Missing defer / async attribute.








script
src
/cp/javascript/main.js?1616649289


1
ok
Missing defer / async attribute.








script
src
/cp/javascript/vendors.js?1616649289


1
ok
Missing defer / async attribute.








script
src
/modules/letsencrypt/global.js?1617272494


1
ok
Missing defer / async attribute.








script
src
/ui-library/plesk-ui-library.min.js?1616649286


1
ok
Missing defer / async attribute.








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: cerospam.cike.net, cerospam.org

QNr.DomainTypeNS used
1
net
NS
h.root-servers.net (2001:500:1::53)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
cerospam.cike.net
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: lisa.ns.cloudflare.com, peyton.ns.cloudflare.com
3
org
NS
b.root-servers.net (2001:500:200::b)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
4
cerospam.org
NS
a0.org.afilias-nst.info (2001:500:e::1)

Answer: cerospam.cike.net, cerospam.cike.ws
5
com
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
6
lisa.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
7
peyton.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
8
ws
NS
m.root-servers.net (2001:dc3::35)

Answer: ns2.dns.ws, ns3.dns.ws, ns4.dns.ws, ns5.dns.ws, ns6.dns.ws, ns7.dns.ws
10
lisa.ns.cloudflare.com: 108.162.192.131, 172.64.32.131, 173.245.58.131
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
11
lisa.ns.cloudflare.com: 2606:4700:50::adf5:3a83, 2803:f800:50::6ca2:c083, 2a06:98c1:50::ac40:2083
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
12
peyton.ns.cloudflare.com: 108.162.193.221, 172.64.33.221, 173.245.59.221
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
13
peyton.ns.cloudflare.com: 2606:4700:58::adf5:3bdd, 2803:f800:50::6ca2:c1dd, 2a06:98c1:50::ac40:21dd
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
14
cerospam.cike.net: 45.81.5.67
A
lisa.ns.cloudflare.com (2803:f800:50::6ca2:c083)
15
cerospam.cike.net: No AAAA record found
AAAA
lisa.ns.cloudflare.com (2803:f800:50::6ca2:c083)
16
cerospam.org: 148.72.155.173
A
cerospam.cike.net (45.81.5.67)
17
cerospam.org: No AAAA record found
AAAA
cerospam.cike.net (45.81.5.67)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.cerospam.org
-4

Not Implemented - The name server does not support the requested kind of query
1
0
cerospam.org
-4

Not Implemented - The name server does not support the requested kind of query
1
0
org



6
6


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
cerospam.org
v=spf1 +a +mx +a:mail.cike.ws -all
ok
1
0
www.cerospam.org

ok
1
0
_acme-challenge.cerospam.org

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cerospam.org

Name Error - The domain name does not exist
1
0
_acme-challenge.cerospam.org.cerospam.org

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cerospam.org.cerospam.org

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cerospam.org.www.cerospam.org

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
cerospam.org
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

cerospam.org
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

cerospam.org
22
SSH
open
SSH-2.0-OpenSSH_7.4

cerospam.org
22
SSH
open
SSH-2.0-OpenSSH_7.4

cerospam.org
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

cerospam.org
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

cerospam.org
53
DNS
open


cerospam.org
53
DNS
open


cerospam.org
110
POP3
open
+OK Dovecot ready. <e72f.3990.606e6e88.PTLXRXzeg7FLkAkUPU+B7g==@mail.cike.ws>

cerospam.org
110
POP3
open
+OK Dovecot ready. <e72f.3990.606e6e88.PTLXRXzeg7FLkAkUPU+B7g==@mail.cike.ws>

cerospam.org
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

cerospam.org
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

cerospam.org
465
SMTP (encrypted)
open


cerospam.org
465
SMTP (encrypted)
open


cerospam.org
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

cerospam.org
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

cerospam.org
993
IMAP (encrypted)
open


cerospam.org
993
IMAP (encrypted)
open


cerospam.org
995
POP3 (encrypted)
open


cerospam.org
995
POP3 (encrypted)
open


cerospam.org
1433
MS SQL



cerospam.org
1433
MS SQL



cerospam.org
2082
cPanel (http)



cerospam.org
2082
cPanel (http)



cerospam.org
2083
cPanel (https)



cerospam.org
2083
cPanel (https)



cerospam.org
2086
WHM (http)



cerospam.org
2086
WHM (http)



cerospam.org
2087
WHM (https)



cerospam.org
2087
WHM (https)



cerospam.org
2089
cPanel Licensing



cerospam.org
2089
cPanel Licensing



cerospam.org
2095
cPanel Webmail (http)



cerospam.org
2095
cPanel Webmail (http)



cerospam.org
2096
cPanel Webmail (https)



cerospam.org
2096
cPanel Webmail (https)



cerospam.org
2222
DirectAdmin (http)



cerospam.org
2222
DirectAdmin (http)



cerospam.org
2222
DirectAdmin (https)



cerospam.org
2222
DirectAdmin (https)



cerospam.org
3306
mySql
open


cerospam.org
3306
mySql
open


cerospam.org
5224
Plesk Licensing



cerospam.org
5224
Plesk Licensing



cerospam.org
5432
PostgreSQL



cerospam.org
5432
PostgreSQL



cerospam.org
8080
Ookla Speedtest (http)



cerospam.org
8080
Ookla Speedtest (http)



cerospam.org
8080
Ookla Speedtest (https)



cerospam.org
8080
Ookla Speedtest (https)



cerospam.org
8083
VestaCP http



cerospam.org
8083
VestaCP http



cerospam.org
8083
VestaCP https



cerospam.org
8083
VestaCP https



cerospam.org
8443
Plesk Administration (https)
open
https://cerospam.org:8443/
Http-Status: 303
Certificate is invalid Redirect: https://cerospam.org:8443/login.php?success_redirect_url=%2F
cerospam.org
8443
Plesk Administration (https)
open
https://cerospam.org:8443/
Http-Status: 303
Certificate is invalid Redirect: https://cerospam.org:8443/login.php?success_redirect_url=%2F
cerospam.org
8447
Plesk Installer + Updates



cerospam.org
8447
Plesk Installer + Updates



cerospam.org
8880
Plesk Administration (http)
open
http://cerospam.org:8880/
Http-Status: 303
Redirect: http://cerospam.org:8880/login.php?success_redirect_url=%2F
cerospam.org
8880
Plesk Administration (http)
open
http://cerospam.org:8880/
Http-Status: 303
Redirect: http://cerospam.org:8880/login.php?success_redirect_url=%2F
cerospam.org
10000
Webmin (http)



cerospam.org
10000
Webmin (http)



cerospam.org
10000
Webmin (https)



cerospam.org
10000
Webmin (https)



www.cerospam.org
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

www.cerospam.org
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

www.cerospam.org
22
SSH
open
SSH-2.0-OpenSSH_7.4

www.cerospam.org
22
SSH
open
SSH-2.0-OpenSSH_7.4

www.cerospam.org
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

www.cerospam.org
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

www.cerospam.org
53
DNS
open


www.cerospam.org
53
DNS
open


www.cerospam.org
110
POP3
open
+OK Dovecot ready. <e72f.3995.606e6e88.o5uZDy54HpnhCd5jEfRYJA==@mail.cike.ws>

www.cerospam.org
110
POP3
open
+OK Dovecot ready. <e72f.3995.606e6e88.o5uZDy54HpnhCd5jEfRYJA==@mail.cike.ws>

www.cerospam.org
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

www.cerospam.org
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

www.cerospam.org
465
SMTP (encrypted)
open


www.cerospam.org
465
SMTP (encrypted)
open


www.cerospam.org
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

www.cerospam.org
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

www.cerospam.org
993
IMAP (encrypted)
open


www.cerospam.org
993
IMAP (encrypted)
open


www.cerospam.org
995
POP3 (encrypted)
open


www.cerospam.org
995
POP3 (encrypted)
open


www.cerospam.org
1433
MS SQL



www.cerospam.org
1433
MS SQL



www.cerospam.org
2082
cPanel (http)



www.cerospam.org
2082
cPanel (http)



www.cerospam.org
2083
cPanel (https)



www.cerospam.org
2083
cPanel (https)



www.cerospam.org
2086
WHM (http)



www.cerospam.org
2086
WHM (http)



www.cerospam.org
2087
WHM (https)



www.cerospam.org
2087
WHM (https)



www.cerospam.org
2089
cPanel Licensing



www.cerospam.org
2089
cPanel Licensing



www.cerospam.org
2095
cPanel Webmail (http)



www.cerospam.org
2095
cPanel Webmail (http)



www.cerospam.org
2096
cPanel Webmail (https)



www.cerospam.org
2096
cPanel Webmail (https)



www.cerospam.org
2222
DirectAdmin (http)



www.cerospam.org
2222
DirectAdmin (http)



www.cerospam.org
2222
DirectAdmin (https)



www.cerospam.org
2222
DirectAdmin (https)



www.cerospam.org
3306
mySql
open


www.cerospam.org
3306
mySql
open


www.cerospam.org
5224
Plesk Licensing



www.cerospam.org
5224
Plesk Licensing



www.cerospam.org
5432
PostgreSQL



www.cerospam.org
5432
PostgreSQL



www.cerospam.org
8080
Ookla Speedtest (http)



www.cerospam.org
8080
Ookla Speedtest (http)



www.cerospam.org
8080
Ookla Speedtest (https)



www.cerospam.org
8080
Ookla Speedtest (https)



www.cerospam.org
8083
VestaCP http



www.cerospam.org
8083
VestaCP http



www.cerospam.org
8083
VestaCP https



www.cerospam.org
8083
VestaCP https



www.cerospam.org
8443
Plesk Administration (https)
open
https://www.cerospam.org:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.cerospam.org:8443/login.php?success_redirect_url=%2F
www.cerospam.org
8443
Plesk Administration (https)
open
https://www.cerospam.org:8443/
Http-Status: 303
Certificate is invalid Redirect: https://www.cerospam.org:8443/login.php?success_redirect_url=%2F
www.cerospam.org
8447
Plesk Installer + Updates



www.cerospam.org
8447
Plesk Installer + Updates



www.cerospam.org
8880
Plesk Administration (http)
open
http://www.cerospam.org:8880/
Http-Status: 303
Redirect: http://www.cerospam.org:8880/login.php?success_redirect_url=%2F
www.cerospam.org
8880
Plesk Administration (http)
open
http://www.cerospam.org:8880/
Http-Status: 303
Redirect: http://www.cerospam.org:8880/login.php?success_redirect_url=%2F
www.cerospam.org
10000
Webmin (http)



www.cerospam.org
10000
Webmin (http)



www.cerospam.org
10000
Webmin (https)



www.cerospam.org
10000
Webmin (https)



148.72.155.173
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

148.72.155.173
21
FTP
open
220 ProFTPD Server (ProFTPD) [148.72.155.173]

148.72.155.173
22
SSH
open
SSH-2.0-OpenSSH_7.4

148.72.155.173
22
SSH
open
SSH-2.0-OpenSSH_7.4

148.72.155.173
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

148.72.155.173
25
SMTP
open
220 mail.cike.ws ESMTP Postfix

148.72.155.173
53
DNS
open


148.72.155.173
53
DNS
open


148.72.155.173
110
POP3
open
+OK Dovecot ready. <e72f.3993.606e6e88.PTHl1nrXROHxglLlhkn/9g==@mail.cike.ws>

148.72.155.173
110
POP3
open
+OK Dovecot ready. <e72f.3993.606e6e88.PTHl1nrXROHxglLlhkn/9g==@mail.cike.ws>

148.72.155.173
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

148.72.155.173
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN AUTH=DIGEST-MD5 AUTH=CRAM-MD5] Dovecot ready.

148.72.155.173
465
SMTP (encrypted)
open


148.72.155.173
465
SMTP (encrypted)
open


148.72.155.173
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

148.72.155.173
587
SMTP (encrypted, submission)
open
220 mail.cike.ws ESMTP Postfix

148.72.155.173
993
IMAP (encrypted)
open


148.72.155.173
993
IMAP (encrypted)
open


148.72.155.173
995
POP3 (encrypted)
open


148.72.155.173
995
POP3 (encrypted)
open


148.72.155.173
1433
MS SQL



148.72.155.173
1433
MS SQL



148.72.155.173
2082
cPanel (http)



148.72.155.173
2082
cPanel (http)



148.72.155.173
2083
cPanel (https)



148.72.155.173
2083
cPanel (https)



148.72.155.173
2086
WHM (http)



148.72.155.173
2086
WHM (http)



148.72.155.173
2087
WHM (https)



148.72.155.173
2087
WHM (https)



148.72.155.173
2089
cPanel Licensing



148.72.155.173
2089
cPanel Licensing



148.72.155.173
2095
cPanel Webmail (http)



148.72.155.173
2095
cPanel Webmail (http)



148.72.155.173
2096
cPanel Webmail (https)



148.72.155.173
2096
cPanel Webmail (https)



148.72.155.173
2222
DirectAdmin (http)



148.72.155.173
2222
DirectAdmin (http)



148.72.155.173
2222
DirectAdmin (https)



148.72.155.173
2222
DirectAdmin (https)



148.72.155.173
3306
mySql
open


148.72.155.173
3306
mySql
open


148.72.155.173
5224
Plesk Licensing



148.72.155.173
5224
Plesk Licensing



148.72.155.173
5432
PostgreSQL



148.72.155.173
5432
PostgreSQL



148.72.155.173
8080
Ookla Speedtest (http)



148.72.155.173
8080
Ookla Speedtest (http)



148.72.155.173
8080
Ookla Speedtest (https)



148.72.155.173
8080
Ookla Speedtest (https)



148.72.155.173
8083
VestaCP http



148.72.155.173
8083
VestaCP http



148.72.155.173
8083
VestaCP https



148.72.155.173
8083
VestaCP https



148.72.155.173
8443
Plesk Administration (https)
open
https://148.72.155.173:8443/
Http-Status: 303
Certificate is invalid Redirect: https://148.72.155.173:8443/login.php?success_redirect_url=%2F
148.72.155.173
8443
Plesk Administration (https)
open
https://148.72.155.173:8443/
Http-Status: 303
Certificate is invalid Redirect: https://148.72.155.173:8443/login.php?success_redirect_url=%2F
148.72.155.173
8447
Plesk Installer + Updates



148.72.155.173
8447
Plesk Installer + Updates



148.72.155.173
8880
Plesk Administration (http)
open
http://148.72.155.173:8880/
Http-Status: 303
Redirect: http://148.72.155.173:8880/login.php?success_redirect_url=%2F
148.72.155.173
8880
Plesk Administration (http)
open
http://148.72.155.173:8880/
Http-Status: 303
Redirect: http://148.72.155.173:8880/login.php?success_redirect_url=%2F
148.72.155.173
10000
Webmin (http)



148.72.155.173
10000
Webmin (http)



148.72.155.173
10000
Webmin (https)



148.72.155.173
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=93f8ee0e-ca73-4982-8df6-cc2a065a4609


Last Result: https://check-your-website.server-daten.de/?q=cerospam.org - 2021-04-08 04:42:27


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=cerospam.org" target="_blank">Check this Site: cerospam.org</a>