Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

N

 

No trusted Certificate

 

Checked:
15.04.2025 04:43:11

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
citjamf.cit.nih.gov
A
156.40.76.9
Hyattsville/Maryland/United States (US) - National Institutes of Health
Hostname: citjamf.cit.nih.gov
yes
2
1

AAAA

yes


www.citjamf.cit.nih.gov

Name Error
yes
1
0
*.cit.nih.gov
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.citjamf.cit.nih.gov
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 53148, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 02.05.2025, 00:00:00 +, Signature-Inception: 11.04.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: gov

gov
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 2536, DigestType 2 and Digest C68mt7vzE6hZBG/Tse5J3fujOTTPs+cXwh4qKTXC8lk=






1 RRSIG RR to validate DS RR found






RRSIG-Owner gov., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 27.04.2025, 17:00:00 +, Signature-Inception: 14.04.2025, 16:00:00 +, KeyTag 53148, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53148 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 2536, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 35496, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner gov., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 10.06.2025, 11:05:54 +, Signature-Inception: 10.04.2025, 11:05:54 +, KeyTag 2536, Signer-Name: gov






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2536 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2536, DigestType 2 and Digest "C68mt7vzE6hZBG/Tse5J3fujOTTPs+cXwh4qKTXC8lk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: nih.gov

nih.gov
2 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 25564, DigestType 2 and Digest IMKQVV+rx3MZ5W6zV1AHQAa3Prq6MeCnq1q3tfjcM7w=






DS with Algorithm 8, KeyTag 36469, DigestType 2 and Digest Tdj5xMRFt1iNK4/UivenVHd6zgAlIcBcGZLbHPLwnu0=






1 RRSIG RR to validate DS RR found






RRSIG-Owner nih.gov., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 16.04.2025, 03:43:15 +, Signature-Inception: 14.04.2025, 01:43:15 +, KeyTag 35496, Signer-Name: gov






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35496 used to validate the DS RRSet in the parent zone






5 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 25564, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 36469, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 37119, Flags 256






Public Key with Algorithm 8, KeyTag 48219, Flags 256






Public Key with Algorithm 8, KeyTag 61038, Flags 256






3 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner nih.gov., Algorithm: 8, 2 Labels, original TTL: 172800 sec, Signature-expiration: 18.04.2025, 05:44:57 +, Signature-Inception: 14.04.2025, 05:33:49 +, KeyTag 25564, Signer-Name: nih.gov






RRSIG-Owner nih.gov., Algorithm: 8, 2 Labels, original TTL: 172800 sec, Signature-expiration: 18.04.2025, 05:44:57 +, Signature-Inception: 14.04.2025, 05:33:49 +, KeyTag 36469, Signer-Name: nih.gov






RRSIG-Owner nih.gov., Algorithm: 8, 2 Labels, original TTL: 172800 sec, Signature-expiration: 18.04.2025, 05:44:57 +, Signature-Inception: 14.04.2025, 05:33:49 +, KeyTag 61038, Signer-Name: nih.gov






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 25564 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 36469 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 61038 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 25564, DigestType 2 and Digest "IMKQVV+rx3MZ5W6zV1AHQAa3Prq6MeCnq1q3tfjcM7w=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 36469, DigestType 2 and Digest "Tdj5xMRFt1iNK4/UivenVHd6zgAlIcBcGZLbHPLwnu0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: cit.nih.gov

cit.nih.gov
4 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 20290, DigestType 1 and Digest ZTOoVqizZHOtZS7xyroJClR3pkE=






DS with Algorithm 8, KeyTag 20290, DigestType 2 and Digest ot0J7L091Kb6GN4QoZS48S9fGmVYqREfc4WLPDBNleA=






DS with Algorithm 8, KeyTag 34087, DigestType 1 and Digest 8WDYqILoJed8/WjmF6gQbFKbefw=






DS with Algorithm 8, KeyTag 34087, DigestType 2 and Digest LdzPfqSVHteX1S29iX2PmOynz+mgfmuLW4WC7tJH1h8=






1 RRSIG RR to validate DS RR found






RRSIG-Owner cit.nih.gov., Algorithm: 8, 3 Labels, original TTL: 7200 sec, Signature-expiration: 18.04.2025, 08:12:47 +, Signature-Inception: 14.04.2025, 07:22:18 +, KeyTag 61038, Signer-Name: nih.gov






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 61038 used to validate the DS RRSet in the parent zone






4 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 9063, Flags 256






Public Key with Algorithm 8, KeyTag 20290, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 30603, Flags 256






Public Key with Algorithm 8, KeyTag 34087, Flags 257 (SEP = Secure Entry Point)






3 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner cit.nih.gov., Algorithm: 8, 3 Labels, original TTL: 172800 sec, Signature-expiration: 19.04.2025, 00:08:38 +, Signature-Inception: 14.04.2025, 23:45:28 +, KeyTag 20290, Signer-Name: cit.nih.gov






RRSIG-Owner cit.nih.gov., Algorithm: 8, 3 Labels, original TTL: 172800 sec, Signature-expiration: 19.04.2025, 00:08:38 +, Signature-Inception: 14.04.2025, 23:45:28 +, KeyTag 30603, Signer-Name: cit.nih.gov






RRSIG-Owner cit.nih.gov., Algorithm: 8, 3 Labels, original TTL: 172800 sec, Signature-expiration: 19.04.2025, 00:08:38 +, Signature-Inception: 14.04.2025, 23:45:28 +, KeyTag 34087, Signer-Name: cit.nih.gov






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20290 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30603 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34087 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20290, DigestType 2 and Digest "ot0J7L091Kb6GN4QoZS48S9fGmVYqREfc4WLPDBNleA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20290, DigestType 1 and Digest "ZTOoVqizZHOtZS7xyroJClR3pkE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34087, DigestType 1 and Digest "8WDYqILoJed8/WjmF6gQbFKbefw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34087, DigestType 2 and Digest "LdzPfqSVHteX1S29iX2PmOynz+mgfmuLW4WC7tJH1h8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: citjamf.cit.nih.gov

citjamf.cit.nih.gov
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" between the hashed NSEC3-owner "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" and the hashed NextOwner "08mev4su48k8si0ag1osc0hrleodo1jn". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






0 DNSKEY RR found












RRSIG Type 1 validates the A - Result: 156.40.76.9
Validated: RRSIG-Owner citjamf.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 28800 sec, Signature-expiration: 18.04.2025, 16:29:15 +, Signature-Inception: 14.04.2025, 16:10:28 +, KeyTag 30603, Signer-Name: cit.nih.gov






CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" equal the hashed NSEC3-owner "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" and the hashed NextOwner "08mev4su48k8si0ag1osc0hrleodo1jn". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NoData-Proof required and found.






TXT-Query sends a valid NSEC3 RR as result with the hashed query name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" equal the hashed NSEC3-owner "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" and the hashed NextOwner "08mev4su48k8si0ag1osc0hrleodo1jn". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NoData-Proof required and found.






AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" equal the hashed NSEC3-owner "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" and the hashed NextOwner "08mev4su48k8si0ag1osc0hrleodo1jn". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NoData-Proof required and found.






TLSA-Query (_443._tcp.citjamf.cit.nih.gov) sends a valid NSEC3 RR as result with the hashed owner name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" (unhashed: citjamf.cit.nih.gov). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "fgpese62oclbld54m5hcq4pb09gt53s2" (unhashed: _tcp.citjamf.cit.nih.gov) with the owner "fglavefvjcs7vk5ate9tb7eqmrj80u7q" and the NextOwner "fgq8o1scg0stbn9gsib70sdknrhv7oh3". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, RRSIG Validated: RRSIG-Owner fglavefvjcs7vk5ate9tb7eqmrj80u7q.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 16:50:09 +, Signature-Inception: 14.04.2025, 15:55:55 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "qappr8avm9pb3qenjgo846thjc0qnbah" (unhashed: *.citjamf.cit.nih.gov) with the owner "qanrmjvr9t7o8192qsfhepgbe4d0tapd" and the NextOwner "qarnlhdr54kn38js27ohd19e9bcntf3e". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: A, RRSIG Validated: RRSIG-Owner qanrmjvr9t7o8192qsfhepgbe4d0tapd.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 16:26:50 +, Signature-Inception: 14.04.2025, 15:38:32 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NXDomain-Proof required and found.






CAA-Query sends a valid NSEC3 RR as result with the hashed query name "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" equal the hashed NSEC3-owner "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" and the hashed NextOwner "08mev4su48k8si0ag1osc0hrleodo1jn". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






Status: Good. NoData-Proof required and found.



Zone: www.citjamf.cit.nih.gov

www.citjamf.cit.nih.gov
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "fdub38hsoqatr1q8bbllg4tpuemmvket" between the hashed NSEC3-owner "fdfge6tjtrk45thnp51nsfdact4behjr" and the hashed NextOwner "fe9153j1c68p2vr58qdt2m54ob6nvfva". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner fdfge6tjtrk45thnp51nsfdact4behjr.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:34:35 +, Signature-Inception: 14.04.2025, 17:43:55 +, KeyTag 30603, Signer-Name: cit.nih.gov






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "08kei6j2cl2j34ni78ki3qu9r3lrn0ia" as Owner. That's the Hash of "citjamf.cit.nih.gov" with the NextHashedOwnerName "08mev4su48k8si0ag1osc0hrleodo1jn". So that domain name is the Closest Encloser of "www.citjamf.cit.nih.gov". Opt-Out: False.
Bitmap: A, RRSIG Validated: RRSIG-Owner 08kei6j2cl2j34ni78ki3qu9r3lrn0ia.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 18:17:48 +, Signature-Inception: 14.04.2025, 18:12:12 +, KeyTag 30603, Signer-Name: cit.nih.gov






The ClosestEncloser says, that "*.citjamf.cit.nih.gov" with the Hash "qappr8avm9pb3qenjgo846thjc0qnbah" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "qanrmjvr9t7o8192qsfhepgbe4d0tapd" and the Next Owner "qarnlhdr54kn38js27ohd19e9bcntf3e", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: A, RRSIG Validated: RRSIG-Owner qanrmjvr9t7o8192qsfhepgbe4d0tapd.cit.nih.gov., Algorithm: 8, 4 Labels, original TTL: 900 sec, Signature-expiration: 18.04.2025, 16:26:50 +, Signature-Inception: 14.04.2025, 15:38:32 +, KeyTag 30603, Signer-Name: cit.nih.gov

 

3. Name Servers

DomainNameserverNS-IP
www.citjamf.cit.nih.gov
  nihblox5.nih.gov

citjamf.cit.nih.gov
T  nihblox5.nih.gov
137.187.10.155
Grasonville/Maryland/United States (US) - National Institutes of Health

cit.nih.gov
  nihblox5.nih.gov


T  ns.nih.gov
128.231.128.251
Chevy Chase/Maryland/United States (US) - National Institutes of Health


 
2607:f220:404:101::80e7:80fb
Ashburn/Virginia/United States (US) - National Institutes of Health


T  ns2.nih.gov
128.231.64.1
District Heights/Maryland/United States (US) - National Institutes of Health


 
2607:f220:418:4101::80e7:401
Rockville/Maryland/United States (US) - National Institutes of Health


T  ns3.nih.gov
165.112.4.230
Rockville/Maryland/United States (US) - National Institutes of Health


 
2607:f220:402:1801::a570:4e6
Ashburn/Virginia/United States (US) - National Institutes of Health

nih.gov
  nihblox5.nih.gov


T  ns.nih.gov
128.231.128.251
Chevy Chase/Maryland/United States (US) - National Institutes of Health


 
2607:f220:404:101::80e7:80fb
Ashburn/Virginia/United States (US) - National Institutes of Health


T  ns2.nih.gov
128.231.64.1
District Heights/Maryland/United States (US) - National Institutes of Health


 
2607:f220:418:4101::80e7:401
Rockville/Maryland/United States (US) - National Institutes of Health


T  ns3.nih.gov
165.112.4.230
Rockville/Maryland/United States (US) - National Institutes of Health


T 
2607:f220:402:1801::a570:4e6
Ashburn/Virginia/United States (US) - National Institutes of Health

gov
  a.ns.gov / 67m45


  b.ns.gov / 67m93


  c.ns.gov / 67m108


  d.ns.gov / 67m45

 

4. SOA-Entries


Domain:gov
Zone-Name:gov
Primary:a.ns.gov
Mail:dns.cloudflare.com
Serial:1744684505
Refresh:3600
Retry:900
Expire:604800
TTL:300
num Entries:4


Domain:nih.gov
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:nih.gov
Zone-Name:nih.gov
Primary:nihblox5.nih.gov
Mail:hostmaster.nih.gov
Serial:756934
Refresh:10800
Retry:1080
Expire:2592000
TTL:900
num Entries:6


Domain:cit.nih.gov
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:cit.nih.gov
Zone-Name:cit.nih.gov
Primary:nihblox5.nih.gov
Mail:hostmaster.nih.gov
Serial:2767189
Refresh:10800
Retry:1080
Expire:2592000
TTL:900
num Entries:5


Domain:citjamf.cit.nih.gov
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:www.citjamf.cit.nih.gov
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://citjamf.cit.nih.gov/, address used: https://citjamf.cit.nih.gov/, Screenshot created 2025-04-15 04:50:42 +00:0 url is insecure, certificate invalid

 

Mobil (412px x 732px)

 

1050 milliseconds

 

Screenshot mobile - https://citjamf.cit.nih.gov/
Mobil + Landscape (732px x 412px)

 

1056 milliseconds

 

Screenshot mobile landscape - https://citjamf.cit.nih.gov/
Screen (1280px x 1680px)

 

1130 milliseconds

 

Screenshot Desktop - https://citjamf.cit.nih.gov/

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport412732
content Size412732

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://citjamf.cit.nih.gov/
156.40.76.9
-14


10.026
T
Timeout - The operation has timed out.

• https://citjamf.cit.nih.gov/
156.40.76.9
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 103.96 %
Other inline scripts (∑/total): 0/0
4.997
N
Not Found
Certificate error: RemoteCertificateNameMismatch
Server: Microsoft-HTTPAPI/2.0
Date: Tue, 15 Apr 2025 02:48:27 GMT
Connection: close
Content-Type: text/html; charset=us-ascii
Content-Length: 315

• http://citjamf.cit.nih.gov/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
156.40.76.9
-14


10.023
T
Timeout - The operation has timed out.
Visible Content:

• https://156.40.76.9/
156.40.76.9
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 103.96 %
Other inline scripts (∑/total): 0/0
4.667
N
Not Found
Certificate error: RemoteCertificateNameMismatch
Server: Microsoft-HTTPAPI/2.0
Date: Tue, 15 Apr 2025 02:48:44 GMT
Connection: close
Content-Type: text/html; charset=us-ascii
Content-Length: 315

 

7. Comments


1. General Results, most used to calculate the result

Aname "citjamf.cit.nih.gov" is subdomain, public suffix is ".gov", top-level-domain is ".gov", top-level-domain-type is "sponsored", tld-manager is "General Services Administration Attn: QTDC, 2E08 (.gov Domain Registration)", num .gov-domains preloaded: 5117 (complete: 270180)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: citjamf.cit.nih.gov has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: citjamf.cit.nih.gov has no ipv6 address.
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://citjamf.cit.nih.gov/ 156.40.76.9
404

Missing HSTS-Header
CError - no version with Http-Status 200
HFatal error: No https - result with http-status 200, no encryption
Mhttps://citjamf.cit.nih.gov/ 156.40.76.9
404

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://156.40.76.9/ 156.40.76.9
404

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://citjamf.cit.nih.gov/ 156.40.76.9
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://156.40.76.9/ 156.40.76.9
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
OOld connection: SHA1 as Hash Algorithm is deprecated. Switch to SHA256 or SHA384. If your certificate has SHA256, first check your domain via ssllabs.com and update weak Cipher Suites. Forward Secrecy support is required. The part "Cipher Suites" should have a preference. First Cipher Suite with SHA instead of SHA256 or higher - that's the problem, change that. If that doesn't help, check if there is an old Firewall / router or something else, that supports only SHA1. Update that component.
XFatal error: Nameserver doesn't support TCP connection: nihblox5.nih.gov / 137.187.10.155: Timeout
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain citjamf.cit.nih.gov, 1 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.citjamf.cit.nih.gov

2. Header-Checks

Fcitjamf.cit.nih.gov 156.40.76.9
Content-Security-Policy
Critical: Missing Header:
Fcitjamf.cit.nih.gov 156.40.76.9
X-Content-Type-Options
Critical: Missing Header:
Fcitjamf.cit.nih.gov 156.40.76.9
Referrer-Policy
Critical: Missing Header:
Fcitjamf.cit.nih.gov 156.40.76.9
Permissions-Policy
Critical: Missing Header:
Bcitjamf.cit.nih.gov 156.40.76.9
Cross-Origin-Embedder-Policy
Info: Missing Header
Bcitjamf.cit.nih.gov 156.40.76.9
Cross-Origin-Opener-Policy
Info: Missing Header
Bcitjamf.cit.nih.gov 156.40.76.9
Cross-Origin-Resource-Policy
Info: Missing Header

3. DNS- and NameServer - Checks

AInfo:: 10 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 10 Queries complete, 10 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: nihblox5.nih.gov, ns.nih.gov, ns2.nih.gov, ns3.nih.gov, 3 Name Servers included in Delegation: ns.nih.gov, ns2.nih.gov, ns3.nih.gov, 3 Name Servers included in 2 Zone definitions: ns.nih.gov, ns2.nih.gov, ns3.nih.gov, 1 Name Servers listed in SOA.Primary: nihblox5.nih.gov.
AGood: Only one SOA.Primary Name Server found.: nihblox5.nih.gov.
Error: SOA.Primary Name Server not included in the delegation set.: nihblox5.nih.gov.
AGood: All Name Server Domain Names have a Public Suffix.
Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1

AInfo: Ipv4-Subnet-list: 3 Name Servers, 2 different subnets (first Byte): 128., 165., 2 different subnets (first two Bytes): 128.231., 165.112., 3 different subnets (first three Bytes): 128.231.128., 128.231.64., 165.112.4.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 1 different subnets (first block): 2607:, 1 different subnets (first two blocks): 2607:f220:, 3 different subnets (first three blocks): 2607:f220:0402:, 2607:f220:0404:, 2607:f220:0418:, 3 different subnets (first four blocks): 2607:f220:0402:1801:, 2607:f220:0404:0101:, 2607:f220:0418:4101:
AGood: Name Server IPv6 addresses from different subnets found.
XNameserver Timeout checking Echo Capitalization: nihblox5.nih.gov / 137.187.10.155
XNameserver Timeout checking Echo Capitalization: ns.nih.gov / 128.231.128.251
XNameserver Timeout checking Echo Capitalization: ns2.nih.gov / 128.231.64.1
XNameserver Timeout checking Echo Capitalization: ns3.nih.gov / 165.112.4.230
XNameserver Timeout checking EDNS512: nihblox5.nih.gov / 137.187.10.155
XNameserver Timeout checking EDNS512: ns.nih.gov / 128.231.128.251
XNameserver Timeout checking EDNS512: ns2.nih.gov / 128.231.64.1
XNameserver Timeout checking EDNS512: ns3.nih.gov / 165.112.4.230
XNameserver Timeout checking EDNS512: ns3.nih.gov / 2607:f220:402:1801::a570:4e6
Nameserver doesn't pass all EDNS-Checks: nihblox5.nih.gov: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: nihblox5.nih.gov: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: nihblox5.nih.gov: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: nihblox5.nih.gov / 137.187.10.155: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns.nih.gov / 128.231.128.251: OP100: fatal timeout. FLAGS: fatal timeout. V1: ok. V1OP100: fatal timeout. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns.nih.gov / 2607:f220:404:101::80e7:80fb: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns2.nih.gov / 128.231.64.1: OP100: fatal timeout. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: fatal timeout. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.nih.gov / 128.231.64.1: OP100: fatal timeout. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: fatal timeout. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns2.nih.gov / 2607:f220:418:4101::80e7:401: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns2.nih.gov / 2607:f220:418:4101::80e7:401: OP100: fatal timeout. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: fatal timeout. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.nih.gov / 165.112.4.230: OP100: ok. FLAGS: fatal timeout. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: fatal timeout. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.nih.gov / 165.112.4.230: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: fatal timeout. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.nih.gov / 2607:f220:402:1801::a570:4e6: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.nih.gov / 2607:f220:402:1801::a570:4e6: OP100: ok. FLAGS: ok. V1: ok. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: amazon.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: digicert.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: entrust.net is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: godaddy.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: identrust.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: networksolutions.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: sectigo.com is allowed to create certificates
Warning: Unknown CAA found: networksolutions.com isn't defined. Unknown entry. May be wrong written, may be not longer valid. May be a missing entry in this tool.

4. Content- and Performance-critical Checks

http://citjamf.cit.nih.gov/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 156.40.76.9
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://citjamf.cit.nih.gov/ 156.40.76.9
404
4.997 seconds
Warning: 404 needs more then one second
https://156.40.76.9/ 156.40.76.9
404
4.667 seconds
Warning: 404 needs more then one second
ADuration: 458047 milliseconds, 458.047 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
citjamf.cit.nih.gov
156.40.76.9
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha1
not supported
weak
citjamf.cit.nih.gov
156.40.76.9
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha1
not supported
weak
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=citjamfdmz.nih.gov, O=US Department of Health and Human Services, L=Washington, C=US, ST=District of Columbia


2CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US


156.40.76.9
156.40.76.9
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha1
not supported
weak

156.40.76.9
156.40.76.9
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha1
not supported
weak
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=citjamfdmz.nih.gov, O=US Department of Health and Human Services, L=Washington, C=US, ST=District of Columbia


2CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US

 

9. Certificates

1.
1.
CN=citjamfdmz.nih.gov, O=US Department of Health and Human Services, L=Washington, S=District of Columbia, C=US
27.03.2025
26.04.2026
expires in 363 days
citjamfdmz.nih.gov - 1 entry
1.
1.
CN=citjamfdmz.nih.gov, O=US Department of Health and Human Services, L=Washington, S=District of Columbia, C=US
27.03.2025

26.04.2026
expires in 363 days


citjamfdmz.nih.gov - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:400195D8B6E8E3D90323E284E869E1D4
Thumbprint:A473B73B495B8234929F744EE44659733FF74C73
SHA256 / Certificate:l8dXL7efVVbF/pFY3qs43eh+PV2oYxW4RDhJnGv/9cc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):274562c48a843a1eab36ccdef2f0f2bef19d2fe3c24c7ad3d4c400b62e47ced9
SHA256 hex / Subject Public Key Information (SPKI):274562c48a843a1eab36ccdef2f0f2bef19d2fe3c24c7ad3d4c400b62e47ced9 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://commercial.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
12.12.2019
12.12.2029
expires in 1689 days


2.
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
12.12.2019

12.12.2029
expires in 1689 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:40016EFB0A205CFAEBE18F71D73ABB78
Thumbprint:3C97CBB4491FC8D63D12B4890C28548164198EDB
SHA256 / Certificate:i7L2iD/tKJpSG6J8R4SClQh04UPKzOxvwCWZDAxGgT4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):11ea695d391af31c89703421b8a768f572f82d644e1c463b975a991b9e65308a
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://commercial.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US
16.01.2014
16.01.2034
expires in 3185 days


3.
CN=IdenTrust Commercial Root CA 1, O=IdenTrust, C=US
16.01.2014

16.01.2034
expires in 3185 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0A0142800000014523C844B500000002
Thumbprint:DF717EAA4AD94EC9558499602D48DE5FBCF03A25
SHA256 / Certificate:XVZJm+TS4IvPytCKPjhyPVBQO95waUjkL1VgMBnlKK4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):07e854f26a7cbd389927aa041bfef1b6cd21dd143818ad947dc655a9e587fe88
SHA256 hex / Subject Public Key Information (SPKI):07e854f26a7cbd389927aa041bfef1b6cd21dd143818ad947dc655a9e587fe88
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7802282866
precert
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
2024-07-26 15:44:36
2025-08-25 15:43:36
citjamf.cit.nih.gov, citjamf.nih.gov - 2 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
13896589031
precert
CN=HydrantID Server CA O1, OU=HydrantID Trusted Certificate Service, O=IdenTrust, C=US
2024-07-26 13:44:36
2025-08-25 13:43:36
citjamf.cit.nih.gov, citjamf.nih.gov
2 entries


 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://citjamf.cit.nih.gov/
156.40.76.9
meta
other
1

0


0
0
0

https://156.40.76.9/
156.40.76.9
meta
other
1

0


0
0
0

 

Details (currently limited to 500 rows - some problems with spam users)

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://citjamf.cit.nih.gov/
156.40.76.9
meta
Content-Type
text/html; charset=us-ascii


1
ok














https://156.40.76.9/
156.40.76.9
meta
Content-Type
text/html; charset=us-ascii


1
ok














 

12. Html-Parsing via https://validator.w3.org/nu/


No https result http status 200 and Content-Type text/html or text/xml found, no Html-Parsing - Check

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns.nih.gov, ns2.nih.gov, ns3.nih.gov

 

QNr.DomainTypeNS used
1
gov
NS
b.root-servers.net (2001:500:200::b)

Answer: a.ns.gov, b.ns.gov, c.ns.gov, d.ns.gov
2
ns.nih.gov
NS
a.ns.gov (2001:503:ff40::1)

Answer: a.ns.gov
3
ns2.nih.gov
NS
a.ns.gov (2001:503:ff40::1)

Answer: a.ns.gov
4
ns3.nih.gov
NS
a.ns.gov (2001:503:ff40::1)

Answer: a.ns.gov
5
ns.nih.gov: 128.231.128.251
A
a.ns.gov (2001:503:ff40::1)
6
ns.nih.gov: No AAAA record found
AAAA
a.ns.gov (2001:503:ff40::1)
7
ns2.nih.gov: 128.231.64.1
A
a.ns.gov (2001:503:ff40::1)
8
ns2.nih.gov: No AAAA record found
AAAA
a.ns.gov (2001:503:ff40::1)
9
ns3.nih.gov: 165.112.4.230
A
a.ns.gov (2001:503:ff40::1)
10
ns3.nih.gov: No AAAA record found
AAAA
a.ns.gov (2001:503:ff40::1)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
citjamf.cit.nih.gov
0

no CAA entry found
1
0
cit.nih.gov
5
issue
amazon.com
1
0

5
issue
digicert.com
1
0

5
issue
entrust.net
1
0

5
issue
godaddy.com
1
0

5
issue
identrust.com
1
0

5
issue
letsencrypt.org
1
0

5
issue
networksolutions.com
1
0

5
issue
sectigo.com
1
0
nih.gov



3
3
gov
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
cit.nih.gov
google-site-verification=K_8FGlKfF0JpfR71pjEeSXTp40RMqyhJ120Z_qZHAg4
ok
1
0
cit.nih.gov
kBUTd0MUZTZ1hUYBzjXSVX1eSGJd9Ar2EbexYfAW993n2AnFTYrZqd2ja11HyACpMpFt0vNfSPFgGgY41JkoPg==
ok
1
0
cit.nih.gov
v=spf1 include:nih.gov ~all
ok
1
0
citjamf.cit.nih.gov

ok
1
0
_acme-challenge.citjamf.cit.nih.gov

Name Error - The domain name does not exist
1
0
_acme-challenge.citjamf.cit.nih.gov.cit.nih.gov

Name Error - The domain name does not exist
1
0
_acme-challenge.citjamf.cit.nih.gov.citjamf.cit.nih.gov

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
citjamf.cit.nih.gov
156.40.76.9
443
6 Ciphers73.99 sec
0 without, 6 FS
100.00 %
Complete

1
6 Ciphers
6.00 Ciphers/Check
73.99 sec73.99 sec/Check
0 without, 6 FS
100.00 %

Details
DomainIPPortCipher (OpenSsl / IANA)
citjamf.cit.nih.gov
156.40.76.9
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
6 Ciphers, 73.99 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=5476f2ea-4279-4c9a-8e53-b6a7ff5042c6

 

Last Result: https://check-your-website.server-daten.de/?q=citjamf.cit.nih.gov - 2025-04-15 04:43:11

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=citjamf.cit.nih.gov" target="_blank">Check this Site: citjamf.cit.nih.gov</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=citjamf.cit.nih.gov