Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
15.12.2023 11:36:41

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
click.thermenresorts.nl
CNAME
public.deployteq.net
yes
1
0

A
3.124.166.220
Frankfurt am Main/Hesse/Germany (DE) - Amazon Technologies Inc.
Hostname: ec2-3-124-166-220.eu-central-1.compute.amazonaws.com
yes



A
52.58.216.177
Frankfurt am Main/Hesse/Germany (DE) - Amazon Technologies Inc.
Hostname: ec2-52-58-216-177.eu-central-1.compute.amazonaws.com
yes


www.click.thermenresorts.nl

Name Error
yes
1
0
*.thermenresorts.nl
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.click.thermenresorts.nl
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 46780, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 31.12.2023, 00:00:00 +, Signature-Inception: 10.12.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: nl

nl
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 17153, DigestType 2 and Digest xd/dyR51MlYqNfPCzTCCOJS+CPIBAfGr9FyKuXOfP0k=






1 RRSIG RR to validate DS RR found






RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 28.12.2023, 05:00:00 +, Signature-Inception: 15.12.2023, 04:00:00 +, KeyTag 46780, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46780 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 17153, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 52707, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner nl., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 24.12.2023, 16:38:37 +, Signature-Inception: 10.12.2023, 21:37:30 +, KeyTag 17153, Signer-Name: nl






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 17153 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 17153, DigestType 2 and Digest "xd/dyR51MlYqNfPCzTCCOJS+CPIBAfGr9FyKuXOfP0k=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: thermenresorts.nl

thermenresorts.nl
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 3760, DigestType 2 and Digest P6IbnLt/wtfGNNxou/AuVGc75VoOHj8R105yfDI9jLo=






1 RRSIG RR to validate DS RR found






RRSIG-Owner thermenresorts.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 25.12.2023, 08:17:56 +, Signature-Inception: 11.12.2023, 02:07:28 +, KeyTag 52707, Signer-Name: nl






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 52707 used to validate the DS RRSet in the parent zone






1 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 3760, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner thermenresorts.nl., Algorithm: 13, 2 Labels, original TTL: 43200 sec, Signature-expiration: 28.12.2023, 00:00:00 +, Signature-Inception: 07.12.2023, 00:00:00 +, KeyTag 3760, Signer-Name: thermenresorts.nl






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 3760 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 3760, DigestType 2 and Digest "P6IbnLt/wtfGNNxou/AuVGc75VoOHj8R105yfDI9jLo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: click.thermenresorts.nl

click.thermenresorts.nl
0 DS RR in the parent zone found






RRSIG Type 5 validates the CNAME - Result: public.deployteq.net
Validated: RRSIG-Owner click.thermenresorts.nl., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 28.12.2023, 00:00:00 +, Signature-Inception: 07.12.2023, 00:00:00 +, KeyTag 3760, Signer-Name: thermenresorts.nl



Zone: www.click.thermenresorts.nl

www.click.thermenresorts.nl
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "7falblu75rk8m2t2ip70cjmqllqnpprr" between the hashed NSEC3-owner "6b1frte6trk4sjk4ecj31tlqjdarch4p" and the hashed NextOwner "bh1cv4sqsblii2rm0ppagd4judgh4m62". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 6b1frte6trk4sjk4ecj31tlqjdarch4p.thermenresorts.nl., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 28.12.2023, 00:00:00 +, Signature-Inception: 07.12.2023, 00:00:00 +, KeyTag 3760, Signer-Name: thermenresorts.nl






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "4k8a1l77gg9b7ip4kdacgq796lfk7r45" as Owner. That's the Hash of "click.thermenresorts.nl" with the NextHashedOwnerName "51s63rirt56kosbfoh8q5eds3nc5ivpj". So that domain name is the Closest Encloser of "www.click.thermenresorts.nl". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 4k8a1l77gg9b7ip4kdacgq796lfk7r45.thermenresorts.nl., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 28.12.2023, 00:00:00 +, Signature-Inception: 07.12.2023, 00:00:00 +, KeyTag 3760, Signer-Name: thermenresorts.nl






The ClosestEncloser says, that "*.click.thermenresorts.nl" with the Hash "tfngtolb62k0rli4gpquf22dfpelmnut" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "t9mcao4r89orau1llc6s4sqb3e4hf4r9" and the Next Owner "u1p41mhdapmod6ibm10vrpp53mbvn70a", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: A, RRSIG Validated: RRSIG-Owner t9mcao4r89orau1llc6s4sqb3e4hf4r9.thermenresorts.nl., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 28.12.2023, 00:00:00 +, Signature-Inception: 07.12.2023, 00:00:00 +, KeyTag 3760, Signer-Name: thermenresorts.nl



Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 46780, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 31.12.2023, 00:00:00 +, Signature-Inception: 10.12.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: net

net
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=






1 RRSIG RR to validate DS RR found






RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 28.12.2023, 05:00:00 +, Signature-Inception: 15.12.2023, 04:00:00 +, KeyTag 46780, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46780 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 44222, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.12.2023, 15:10:35 +, Signature-Inception: 09.12.2023, 15:05:35 +, KeyTag 37331, Signer-Name: net






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: deployteq.net

deployteq.net
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "aju3lj1tobd3a20mk7m77q8038ldq420" between the hashed NSEC3-owner "aju34marcuhi7sclh53o8ve6a0ari2tv" and the hashed NextOwner "aju4955jggqp76hvl7mm3tm0q6jr0kr6". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner aju34marcuhi7sclh53o8ve6a0ari2tv.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 20.12.2023, 08:27:55 +, Signature-Inception: 13.12.2023, 07:17:55 +, KeyTag 44222, Signer-Name: net






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "deployteq.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 20.12.2023, 08:23:25 +, Signature-Inception: 13.12.2023, 07:13:25 +, KeyTag 44222, Signer-Name: net






0 DNSKEY RR found









Zone: public.deployteq.net

public.deployteq.net
0 DS RR in the parent zone found






0 DNSKEY RR found







 

3. Name Servers

DomainNameserverNS-IP
www.click.thermenresorts.nl
  ns1.shockmedia.nl

thermenresorts.nl
  ns1.shockmedia.nl / ns1.shockmedia.nl
31.7.0.53
Almelo/Overijssel/The Netherlands (NL) - Previder B.V.


 
2a03:9700::53
Almelo/Overijssel/The Netherlands (NL) - SHOCKMEDIAV6


  ns2.shockmedia.nl / ns2
45.63.42.250
Amsterdam/North Holland/The Netherlands (NL) - The Constant Company


 
2001:19f0:5001:3169:5400:2ff:fe53:7a44
Amsterdam/North Holland/The Netherlands (NL) - The Constant Company


  ns3.shockmedia.nl / ns3.shockmedia.nl
3.74.8.24
Frankfurt am Main/Hesse/Germany (DE) - Amazon Technologies Inc.


 
2a05:d014:133d:1200:bfd:ccd2:7453:bd9b
Frankfurt am Main/Hesse/Germany (DE) - Amazon.com, Inc.

nl
  ns1.dns.nl / eqx-fr2-ns02-159


  ns3.dns.nl / tld-all-ffm1@53024


  ns4.dns.nl / FRA2


public.deployteq.net
  ns-1355.awsdns-41.org / 051c157d564ea65e10dbb292b295d911 -
205.251.197.75
London/England/United Kingdom (GB) - Amazon.com


 
2600:9000:5305:4b00::1
London/England/United Kingdom (GB) - Amazon.com

deployteq.net
  ns-1355.awsdns-41.org / c51bf8de29bd8918e5f59740fa1e966a -
205.251.197.75
London/England/United Kingdom (GB) - Amazon.com


 
2600:9000:5305:4b00::1
London/England/United Kingdom (GB) - Amazon.com


  ns-1985.awsdns-56.co.uk / b6e0d3892ef102c9b0590e2f17a2dfa0 -
205.251.199.193
Herndon/Virginia/United States (US) - Amazon.com


 
2600:9000:5307:c100::1
Seattle/Washington/United States (US) - Amazon.com


  ns-373.awsdns-46.com / 958dba0a19c99922f1ae25fe6fc8bf0e -
205.251.193.117
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5301:7500::1
Seattle/Washington/United States (US) - Amazon.com


  ns-810.awsdns-37.net / 159eab5e241c3ebc63009cd0c818f871 -
205.251.195.42
Sterling/Virginia/United States (US) - Amazon.com


 
2600:9000:5303:2a00::1
Seattle/Washington/United States (US) - Amazon.com

net
  a.gtld-servers.net / nnn1-par6


  b.gtld-servers.net / nnn1-eltxl1


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-par6


  e.gtld-servers.net / nnn1-par6


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-gblon-3


  k.gtld-servers.net / nnn1-gblon-3


  l.gtld-servers.net / nnn1-gblon-3


  m.gtld-servers.net / nnn1-gblon-3

 

4. SOA-Entries


Domain:nl
Zone-Name:nl
Primary:ns1.dns.nl
Mail:hostmaster.domain-registry.nl
Serial:2023121520
Refresh:3600
Retry:600
Expire:2419200
TTL:600
num Entries:3


Domain:thermenresorts.nl
Zone-Name:thermenresorts.nl
Primary:ns1.shockmedia.nl
Mail:hostmaster.shockmedia.nl
Serial:2023121101
Refresh:10800
Retry:1800
Expire:345600
TTL:43200
num Entries:6


Domain:www.click.thermenresorts.nl
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1



Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1702636584
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:4


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1702636599
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:9


Domain:deployteq.net
Zone-Name:deployteq.net
Primary:ns-1355.awsdns-41.org
Mail:awsdns-hostmaster.amazon.com
Serial:1
Refresh:7200
Retry:900
Expire:1209600
TTL:86400
num Entries:8


Domain:public.deployteq.net
Zone-Name:deployteq.net
Primary:ns-1355.awsdns-41.org
Mail:awsdns-hostmaster.amazon.com
Serial:1
Refresh:7200
Retry:900
Expire:1209600
TTL:86400
num Entries:2


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://click.thermenresorts.nl/
3.124.166.220
301
https://click.thermenresorts.nl/
Html is minified: 109.46 %
0.046
A
Server: nginx
Date: Fri, 15 Dec 2023 10:38:05 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://click.thermenresorts.nl/
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• http://click.thermenresorts.nl/
52.58.216.177
301
https://click.thermenresorts.nl/
Html is minified: 109.46 %
0.047
A
Server: nginx
Date: Fri, 15 Dec 2023 10:38:05 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://click.thermenresorts.nl/
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• https://click.thermenresorts.nl/
3.124.166.220
302
https://click.thermenresorts.nl/themes/default/main/html/login.html

1.937
A
Server: nginx
Date: Fri, 15 Dec 2023 10:38:05 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Location: /themes/default/main/html/login.html
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• https://click.thermenresorts.nl/
52.58.216.177
302
https://click.thermenresorts.nl/themes/default/main/html/login.html

1.813
A
Server: nginx
Date: Fri, 15 Dec 2023 10:38:08 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Location: /themes/default/main/html/login.html
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• https://click.thermenresorts.nl/themes/default/main/html/login.html

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 106.29 %
Other inline scripts (∑/total): 0/0
1.670
A
small visible content (num chars: 15)
<!DOCTYPE html>
Server: nginx
Date: Fri, 15 Dec 2023 10:38:19 GMT
Content-Type: text/html
Last-Modified: Sun, 10 Dec 2023 21:39:22 GMT
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
ETag: W/"6576300a-a9"
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex
Content-Encoding: gzip

• http://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
3.124.166.220
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
Other inline scripts (∑/total): 0/0
0.047
A
Visible Content: 301 Moved Permanently nginx
Server: nginx
Date: Fri, 15 Dec 2023 10:38:11 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• http://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
52.58.216.177
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
Other inline scripts (∑/total): 0/0
0.047
A
Visible Content: 301 Moved Permanently nginx
Server: nginx
Date: Fri, 15 Dec 2023 10:38:11 GMT
Content-Type: text/html
Content-Length: 162
Connection: close
Location: https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 109.46 %
Other inline scripts (∑/total): 0/0
2.657
A
Not Found
Visible Content: 404 Not Found nginx/1.18.0 (Ubuntu)
Server: nginx
Date: Fri, 15 Dec 2023 10:38:23 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Vary: Accept-Encoding
Content-Encoding: gzip

• https://3.124.166.220/
3.124.166.220
302
https://click.thermenresorts.nl/themes/default/main/html/login.html

2.687
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Fri, 15 Dec 2023 10:38:11 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Location: /themes/default/main/html/login.html
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

• https://52.58.216.177/
52.58.216.177
302
https://click.thermenresorts.nl/themes/default/main/html/login.html

2.640
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx
Date: Fri, 15 Dec 2023 10:38:15 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Location: /themes/default/main/html/login.html
Content-Security-Policy: frame-ancestors 'self'
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
X-Robots-Tag: noindex

 

7. Comments


1. General Results, most used to calculate the result

Aname "click.thermenresorts.nl" is subdomain, public suffix is ".nl", top-level-domain is ".nl", top-level-domain-type is "country-code", Country is Netherlands (the), tld-manager is "SIDN (Stichting Internet Domeinregistratie Nederland)", num .nl-domains preloaded: 4933 (complete: 231048)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: click.thermenresorts.nl has 2 different ip addresses (authoritative).
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: click.thermenresorts.nl has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://click.thermenresorts.nl/ 3.124.166.220
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Correct redirect https to https
Ahttps://click.thermenresorts.nl/ 52.58.216.177
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Correct redirect https to https
Ahttps://3.124.166.220/ 3.124.166.220
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Correct redirect https to https
Ahttps://52.58.216.177/ 52.58.216.177
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
Warning: HSTS preload sent, but not in Preload-List. Never send a preload directive if you don't know what preload means. Check https://hstspreload.org/ to learn the basics about the Google-Preload list. If you send a preload directive, you should **immediately** add your domain to the HSTS preload list via https://hstspreload.org/ . If Google accepts the domain, so the status is "pending": Note that new entries are hardcoded into the Chrome source code and can take several months before they reach the stable version. So you will see this message some months. If you don't want that or if you don't understand "preload", but if you send a preload directive and if you have correct A-redirects, everybody can add your domain to that list. Then you may have problems, it's not easy to undo that. So if you don't want your domain preloaded, remove the preload directive.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (2 urls)
https://click.thermenresorts.nl/themes/default/main/html/login.html


Url with incomplete Content-Type - header - missing charset
https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
Ahttp://click.thermenresorts.nl/ 3.124.166.220
301
https://click.thermenresorts.nl/
Correct redirect http - https with the same domain name
Ahttp://click.thermenresorts.nl/ 52.58.216.177
301
https://click.thermenresorts.nl/
Correct redirect http - https with the same domain name
Bhttps://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
Nhttps://3.124.166.220/ 3.124.166.220
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://52.58.216.177/ 52.58.216.177
302
https://click.thermenresorts.nl/themes/default/main/html/login.html
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain click.thermenresorts.nl, 2 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain click.thermenresorts.nl, 2 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.click.thermenresorts.nl

2. Header-Checks

Aclick.thermenresorts.nl
Content-Security-Policy
Ok: Header without syntax errors found: frame-ancestors 'self'
F

Bad: Missing default-src directive. A default-src directive is used if one of the specialized fetch directives (child-src, connect-src, font-src, frame-src, img-src, manifest-src, media-src, object-src, prefetch-src, script-src, style-src, worker-src) isn't defined. Missing default-src, all sources are allowed, that's bad. A default-src with 'none' or 'self' blocks that.
E

Bad: No form-action directive found. Use one to limit the form - action - destinations. form-action is a navigation-directive, so default-src isn't used.
A

Good: frame-ancestors directive found. That limits pages who are allowed to use this page in a frame / iframe / object / embed / applet. frame-ancestors is a navigation-directive, so default-src isn't used.
E

Bad: No base-uri directive found. Use one to limit the URLs which can be used in a document's <base> element. Because it's a document directive, default-src isn't used, so an own directive is required.
F

Critical: No object-src and no default-src as fallback defined. So object / embed / applet can load every resource. That's fatal.
F

Critical: No script-src and no default-src as fallback defined. So scripts are unlimited. That's fatal.
A
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
X-Frame-Options
Ok: Header without syntax errors found: SAMEORIGIN
B

Info: Header is deprecated. May not longer work in modern browsers. SAMEORIGIN. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1; mode=block
B

Info: Header is deprecated. May not longer work in modern browsers. 1; mode=block
Fclick.thermenresorts.nl
Referrer-Policy
Critical: Missing Header:
Fclick.thermenresorts.nl
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.shockmedia.nl (2a03:9700::53, 31.7.0.53), ns2.shockmedia.nl (2001:19f0:5001:3169:5400:2ff:fe53:7a44, 45.63.42.250), ns3.shockmedia.nl (2a05:d014:133d:1200:bfd:ccd2:7453:bd9b, 3.74.8.24)
AGood (1 - 3.0):: An average of 0.7 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: ns1.shockmedia.nl, ns2.shockmedia.nl, ns3.shockmedia.nl, 3 Name Servers included in Delegation: ns1.shockmedia.nl, ns2.shockmedia.nl, ns3.shockmedia.nl, 3 Name Servers included in 1 Zone definitions: ns1.shockmedia.nl, ns2.shockmedia.nl, ns3.shockmedia.nl, 1 Name Servers listed in SOA.Primary: ns1.shockmedia.nl.
AGood: Only one SOA.Primary Name Server found.: ns1.shockmedia.nl.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.shockmedia.nl.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 3., 31., 45., 3 different subnets (first two Bytes): 3.74., 31.7., 45.63., 3 different subnets (first three Bytes): 3.74.8., 31.7.0., 45.63.42.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 3 different subnets (first block): 2001:, 2a03:, 2a05:, 3 different subnets (first two blocks): 2001:19f0:, 2a03:9700:, 2a05:d014:, 3 different subnets (first three blocks): 2001:19f0:5001:, 2a03:9700:0000:, 2a05:d014:133d:, 3 different subnets (first four blocks): 2001:19f0:5001:3169:, 2a03:9700:0000:0000:, 2a05:d014:133d:1200:
AExcellent: Every Name Server IPv6-address starts with an unique Hex-block
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.shockmedia.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: digicert.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: entrust.net is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: globalsign.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: sectigo.com is allowed to create certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://click.thermenresorts.nl/ 3.124.166.220
301

Warning: HSTS header sent via http has no effect
http://click.thermenresorts.nl/ 52.58.216.177
301

Warning: HSTS header sent via http has no effect
https://click.thermenresorts.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
2.657 seconds
Warning: 404 needs more then one second
ADuration: 245413 milliseconds, 245.413 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
click.thermenresorts.nl
click.thermenresorts.nl
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
click.thermenresorts.nl
click.thermenresorts.nl
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=click.thermenresorts.nl


2CN=R3, O=Let's Encrypt, C=US


click.thermenresorts.nl
3.124.166.220
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

click.thermenresorts.nl
3.124.166.220
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=click.thermenresorts.nl


2CN=R3, O=Let's Encrypt, C=US


click.thermenresorts.nl
52.58.216.177
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

click.thermenresorts.nl
52.58.216.177
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=click.thermenresorts.nl


2CN=R3, O=Let's Encrypt, C=US


click.thermenresorts.nl
click.thermenresorts.nl
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
supported
ok

click.thermenresorts.nl
click.thermenresorts.nl
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=click.thermenresorts.nl


2CN=R3, O=Let's Encrypt, C=US


3.124.166.220
3.124.166.220
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
supported
ok

3.124.166.220
3.124.166.220
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=myclang.com


2CN=R3, O=Let's Encrypt, C=US


52.58.216.177
52.58.216.177
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
supported
ok

52.58.216.177
52.58.216.177
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=myclang.com


2CN=R3, O=Let's Encrypt, C=US

 

9. Certificates

1.
1.
CN=click.thermenresorts.nl
21.09.2023
20.12.2023
509 days expired
click.thermenresorts.nl - 1 entry
1.
1.
CN=click.thermenresorts.nl
21.09.2023

20.12.2023
509 days expired


click.thermenresorts.nl - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03BE6EC6078A9F3104A778FEFA177A3483A8
Thumbprint:1AE6D7F500D7CD441E767AC6FFFC03ECAA4244F0
SHA256 / Certificate:g1x9Wg6ghStfA8l3hKB2wgux4Ae28CuRaS03+GF8vkA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):812c2fb6c7758a0b89d7368d1bc08996cee3211173f4e0116acc60e36b763d0e
SHA256 hex / Subject Public Key Information (SPKI):812c2fb6c7758a0b89d7368d1bc08996cee3211173f4e0116acc60e36b763d0e (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 126 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 126 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3675 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3675 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=myclang.com
22.11.2023
20.02.2024
447 days expired
*.login.myclang.com, *.myclang.com, *.secure.myclang.com, myclang.com - 4 entries
2.
1.
CN=myclang.com
22.11.2023

20.02.2024
447 days expired


*.login.myclang.com, *.myclang.com, *.secure.myclang.com, myclang.com - 4 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04277FA1F6575209FB52768ED8C079AB5A8C
Thumbprint:413C9FDF4DC322154AE97A532FF49091F9BE1A8C
SHA256 / Certificate:XEEwecv7mFJZOc0HNAwtQWlT8F4uggbhCc6ZQG0nfYs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5be7aac95e6f1236cc6b55f4479cb931d0cced3f11aec2926574af6e564fd074
SHA256 hex / Subject Public Key Information (SPKI):5be7aac95e6f1236cc6b55f4479cb931d0cced3f11aec2926574af6e564fd074 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 126 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 126 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3675 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3675 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
5885849199
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-09-21 07:16:46
2023-12-20 07:16:45
click.thermenresorts.nl - 1 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
0
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
10674218777
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-09-21 05:16:46
2023-12-20 06:16:45
click.thermenresorts.nl
1 entries


9767946589
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-06-26 04:42:29
2023-09-24 04:42:28
click.thermenresorts.nl
1 entries


 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://click.thermenresorts.nl/themes/default/main/html/login.html
meta
other
2

0


0
0
0

 

Details (currently limited to 500 rows - some problems with spam users)

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://click.thermenresorts.nl/themes/default/main/html/login.html

meta
charset
UTF-8


1
ok















meta
refresh
0;/clang/build/production/ClangUI/index.html


1
ok














 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.shockmedia.nl, ns2.shockmedia.nl, ns3.shockmedia.nl

 

QNr.DomainTypeNS used
1
nl
NS
d.root-servers.net (2001:500:2d::d)

Answer: ns1.dns.nl, ns3.dns.nl, ns4.dns.nl
2
ns1.shockmedia.nl: 2a03:9700::53, 31.7.0.53
NS
ns1.dns.nl (2001:678:2c:0:194:0:28:53)

Answer: ns2.shockmedia.nl
2001:19f0:5001:3169:5400:2ff:fe53:7a44, 45.63.42.250

Answer: ns3.shockmedia.nl
2a05:d014:133d:1200:bfd:ccd2:7453:bd9b, 3.74.8.24

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
click.thermenresorts.nl



1
0
public.deployteq.net
5
issue
digicert.com
1
0

5
issue
entrust.net
1
0

5
issue
globalsign.com
1
0

5
issue
letsencrypt.org
1
0

5
issue
sectigo.com
1
0
thermenresorts.nl
0

no CAA entry found
1
0
deployteq.net
0

no CAA entry found
1
0
net
0

no CAA entry found
1
0
nl
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
thermenresorts.nl

ok
1
0
click.thermenresorts.nl


1
0
_acme-challenge.public.deployteq.net

missing entry or wrong length
1
0
_acme-challenge.click.thermenresorts.nl

Name Error - The domain name does not exist
1
0
_acme-challenge.click.thermenresorts.nl.thermenresorts.nl

Name Error - The domain name does not exist
1
0
_acme-challenge.public.deployteq.net.public.deployteq.net

perhaps wrong
1
0
_acme-challenge.click.thermenresorts.nl.click.thermenresorts.nl

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

public.deployteq.net
10
mail.msdp1.com
01ok

A


176.110.104.100
01ok

CNAME


00ok

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
click.thermenresorts.nl
3.124.166.220
443
6 Ciphers37.15 sec
0 without, 6 FS
100.00 %
click.thermenresorts.nl
52.58.216.177
443
6 Ciphers37.02 sec
0 without, 6 FS
100.00 %
Complete

2
12 Ciphers
6.00 Ciphers/Check
74.18 sec37.09 sec/Check
0 without, 12 FS
100.00 %

Details
DomainIPPortCipher (OpenSsl / IANA)
click.thermenresorts.nl
3.124.166.220
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
6 Ciphers, 37.15 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1


52.58.216.177
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
6 Ciphers, 37.02 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=e6890abc-4b30-47d4-9108-29ef70a293fe

 

Last Result: https://check-your-website.server-daten.de/?q=click.thermenresorts.nl - 2023-12-15 11:36:41

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=click.thermenresorts.nl" target="_blank">Check this Site: click.thermenresorts.nl</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=click.thermenresorts.nl