Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
27.04.2020 18:42:07

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
crmv2.jinni.technology
A
193.31.222.38
Port Heiden/Alaska/United States (US) - Continent 8 LLC
No Hostname found
yes
1
0

AAAA

yes


www.crmv2.jinni.technology

Name Error
yes
1
0

 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 48903, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 12.05.2020, 00:00:00 +, Signature-Inception: 21.04.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: technology

technology
2 DS RR in the parent zone found






1 RRSIG RR to validate DS RR found






RRSIG-Owner technology., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.05.2020, 05:00:00 +, Signature-Inception: 27.04.2020, 04:00:00 +, KeyTag 48903, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 48903 used to validate the DS RRSet in the parent zone






4 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 9619, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 32256, Flags 256






Public Key with Algorithm 8, KeyTag 42111, Flags 256






Public Key with Algorithm 8, KeyTag 59974, Flags 257 (SEP = Secure Entry Point)






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner technology., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.05.2020, 04:18:56 +, Signature-Inception: 23.04.2020, 04:04:44 +, KeyTag 42111, Signer-Name: technology






RRSIG-Owner technology., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.05.2020, 04:18:56 +, Signature-Inception: 23.04.2020, 04:04:44 +, KeyTag 59974, Signer-Name: technology






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42111 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59974 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 59974, DigestType 1 and Digest "XC5qrn44YdEOi22FJfja7o5BUR4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 59974, DigestType 2 and Digest "kOJzFiPadfXG7ogcSJJ87zwjETpmPOW6fqUETCSTyss=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: jinni.technology

jinni.technology
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "6mss9je4vari0s36pq6la9evorm7l5ju" between the hashed NSEC3-owner "6lms0gr4lqdrdovkaff1guveojh9snbh" and the hashed NextOwner "6nigdommcpkfn8t1odcksotnnq8cmcrq". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 6lms0gr4lqdrdovkaff1guveojh9snbh.technology., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 23.05.2020, 17:47:06 +, Signature-Inception: 23.04.2020, 17:00:38 +, KeyTag 42111, Signer-Name: technology






0 DNSKEY RR found









Zone: crmv2.jinni.technology

crmv2.jinni.technology
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: www.crmv2.jinni.technology

www.crmv2.jinni.technology
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.crmv2.jinni.technology
  cruz.ns.cloudflare.com

crmv2.jinni.technology
  cruz.ns.cloudflare.com / 67m24
173.245.58.88
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
2606:4700:50::adf5:3a58
San Francisco/California/United States (US) - Cloudflare, Inc.

jinni.technology
  cruz.ns.cloudflare.com / 67m8


  dean.ns.cloudflare.com / 67m30

technology
  demand.alpha.aridns.net.au / dns4.frpar1


  demand.beta.aridns.net.au / dns1.defra1


  demand.delta.aridns.net.au / dns3.frpar1


  demand.gamma.aridns.net.au / dns2.defra1

 

4. SOA-Entries


Domain:technology
Zone-Name:
Primary:demand.alpha.aridns.net.au
Mail:hostmaster.donuts.co
Serial:1588005184
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:4


Domain:jinni.technology
Zone-Name:
Primary:cruz.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2033921360
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:2


Domain:crmv2.jinni.technology
Zone-Name:
Primary:cruz.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2033921360
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:2


Domain:www.crmv2.jinni.technology
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://crmv2.jinni.technology, address used: https://crmv2.jinni.technology/, Screenshot created 2020-04-27 18:44:45 +00:0

 

Mobil (412px x 732px)

 

693 milliseconds

 

Screenshot mobile - https://crmv2.jinni.technology/
Mobil + Landscape (732px x 412px)

 

709 milliseconds

 

Screenshot mobile landscape - https://crmv2.jinni.technology/
Screen (1280px x 1680px)

 

1915 milliseconds

 

Screenshot Desktop - https://crmv2.jinni.technology/

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport412732
content Size412732

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_128_GCM.

 

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://crmv2.jinni.technology/
193.31.222.38
301
https://crmv2.jinni.technology/
Html is minified: 173.80 %
0.133
A
Date: Mon, 27 Apr 2020 16:42:30 GMT
Server: Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1
location: https://crmv2.jinni.technology/
Set-Cookie: YTSID=cfdd8a60b7720d5ddf1e86f0d1876d58; Path=/; Domain=crmv2.jinni.technology; HttpOnly
Expires: Mon, 27 Apr 2020 16:42:30 GMT
Cache-Control: private, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
last-modified: Mon, 27 Apr 2020 16:42:30 GMT
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
referrer-policy: no-referrer
strict-transport-security: max-age=31536000; includeSubDomains; preload
expect-ct: enforce; max-age=3600
access-control-allow-methods: GET, POST, PUT, DELETE
x-robots-tag: none
x-permitted-cross-domain-policies: none
content-security-policy: connect-src 'self' https://crm-api.jinni.technology
Access-Control-Allow-Origin: *
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

• https://crmv2.jinni.technology/
193.31.222.38
Inline-JavaScript (∑/total): 6/3786 Inline-CSS (∑/total): 0/0
200

Html is minified: 173.80 %
Other inline scripts (∑/total): 6/3786
3.647
A
small visible content (num chars: 17)
LBL_USER Password
Date: Mon, 27 Apr 2020 16:42:31 GMT
Server: Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1
Set-Cookie: YTSID=d22741e40e3540271458b3e4e9943962; Path=/; Domain=crmv2.jinni.technology; HttpOnly; Secure
Expires: Mon, 27 Apr 2020 16:42:31 GMT
Cache-Control: private, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
last-modified: Mon, 27 Apr 2020 16:42:31 GMT
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
referrer-policy: no-referrer
strict-transport-security: max-age=31536000; includeSubDomains; preload
expect-ct: enforce; max-age=3600
access-control-allow-methods: GET, POST, PUT, DELETE
x-robots-tag: none
x-permitted-cross-domain-policies: none
content-security-policy: connect-src 'self' https://crm-api.jinni.technology
Vary: Accept-Encoding
Content-Encoding: gzip
Access-Control-Allow-Origin: *
Content-Length: 3298
Connection: close
Content-Type: text/html; charset=UTF-8

• http://crmv2.jinni.technology/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
193.31.222.38
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/600
404

Html is minified: 192.90 %
Other inline scripts (∑/total): 0/0
0.090
A
Not Found
Visible Content: crmv2.jinni.technology 404 Page Not Found It seems that the page you were trying to reach does not exist anymore, or maybe it has just moved. You can start again from the home or go back to previous page .
Date: Mon, 27 Apr 2020 16:42:34 GMT
Server: Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1
Last-Modified: Fri, 06 Sep 2019 11:21:30 GMT
ETag: "5a1-591e0a3d48ecb"
Accept-Ranges: bytes
Content-Length: 1441
Connection: close
Content-Type: text/html

• https://193.31.222.38/
193.31.222.38
301
https://crmv2.jinni.technology/
Html is minified: 166.61 %
3.610
N
Certificate error: RemoteCertificateNameMismatch
Date: Mon, 27 Apr 2020 16:42:35 GMT
Server: Apache/2.4.29 (Ubuntu) mod_fcgid/2.3.9 OpenSSL/1.1.1
location: https://crmv2.jinni.technology/
Set-Cookie: YTSID=44d29973c7e414fefb77f2356012bfdb; Path=/; Domain=193.31.222.38; HttpOnly; Secure
Expires: Mon, 27 Apr 2020 16:42:35 GMT
Cache-Control: private, no-cache, no-store, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
last-modified: Mon, 27 Apr 2020 16:42:35 GMT
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
referrer-policy: no-referrer
strict-transport-security: max-age=31536000; includeSubDomains; preload
expect-ct: enforce; max-age=3600
access-control-allow-methods: GET, POST, PUT, DELETE
x-robots-tag: none
x-permitted-cross-domain-policies: none
content-security-policy: default-src 'self' blob:; img-src 'self' data: a.tile.openstreetmap.org b.tile.openstreetmap.org c.tile.openstreetmap.org ; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' blob:; form-action 'self' ;connect-src 'self';
Access-Control-Allow-Origin: *
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8

 

7. Comments


1. General Results, most used to calculate the result

Aname "crmv2.jinni.technology" is subdomain, public suffix is "technology", top-level-domain-type is "generic", tld-manager is "Binky Moon, LLC"
AGood: All ip addresses are public addresses
Warning: Only one ip address found: crmv2.jinni.technology has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: crmv2.jinni.technology has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://193.31.222.38/ 193.31.222.38
301
https://crmv2.jinni.technology/
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: every cookie sent via https is marked as secure
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
AGood: HSTS has includeSubdomains - directive
AGood: HSTS has preload directive
Warning: HSTS preload sent, but not in Preload-List. Never send a preload directive if you don't know what preload means. Check https://hstspreload.org/ to learn the basics about the Google-Preload list. If you send a preload directive, you should **immediately** add your domain to the HSTS preload list via https://hstspreload.org/ . If Google accepts the domain, so the status is "pending": Note that new entries are hardcoded into the Chrome source code and can take several months before they reach the stable version. So you will see this message some months. If you don't want that or if you don't understand "preload", but if you send a preload directive and if you have correct A-redirects, everybody can add your domain to that list. Then you may have problems, it's not easy to undo that. So if you don't want your domain preloaded, remove the preload directive.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (2 urls)
http://crmv2.jinni.technology/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 193.31.222.38


Url with incomplete Content-Type - header - missing charset
Ahttp://crmv2.jinni.technology/ 193.31.222.38
301
https://crmv2.jinni.technology/
Correct redirect http - https with the same domain name
Nhttps://193.31.222.38/ 193.31.222.38
301
https://crmv2.jinni.technology/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Ncrmv2.jinni.technology:8083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N193.31.222.38:8083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors

2. Header-Checks


3. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: cruz.ns.cloudflare.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 and greater 1024 Bytes is compressed (gzip, deflate, br checked).
https://crmv2.jinni.technology/ 193.31.222.38
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://crmv2.jinni.technology/ 193.31.222.38
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://crmv2.jinni.technology/ 193.31.222.38
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
Warning: CSS / JavaScript found without Compression. Compress these ressources, gzip, deflate, br are checked. 1 external CSS / JavaScript files without GZip found - 28 with GZip, 29 complete
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 29 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 29 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 1 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 1 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AGood: All img-elements have a valid alt-attribute.: 1 img-elements found.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://crmv2.jinni.technology/ 193.31.222.38
301

Warning: HSTS header sent via http has no effect
ADuration: 163040 milliseconds, 163.040 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
crmv2.jinni.technology
193.31.222.38
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
crmv2.jinni.technology
193.31.222.38
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=*.jinni.technology, OU=EssentialSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


193.31.222.38
193.31.222.38
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

193.31.222.38
193.31.222.38
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=*.jinni.technology, OU=EssentialSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


4CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE


193.31.222.38
193.31.222.38
8083
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

193.31.222.38
193.31.222.38
8083
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate

1CN=cl-crmv2.com, OU=IT, O=Vesta Control Panel, L=San Francisco, C=US, emailAddress=peter@jinnilotto.com


crmv2.jinni.technology
crmv2.jinni.technology
8083
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

crmv2.jinni.technology
crmv2.jinni.technology
8083
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate

1CN=cl-crmv2.com, OU=IT, O=Vesta Control Panel, L=San Francisco, C=US, emailAddress=peter@jinnilotto.com

 

9. Certificates

1.
1.
CN=*.jinni.technology, OU=EssentialSSL Wildcard, OU=Domain Control Validated
27.04.2019
06.05.2020
1776 days expired
*.jinni.technology, jinni.technology - 2 entries
1.
1.
CN=*.jinni.technology, OU=EssentialSSL Wildcard, OU=Domain Control Validated
27.04.2019

06.05.2020
1776 days expired


*.jinni.technology, jinni.technology - 2 entries

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:061266FE1CF8A103F33D138165556A91
Thumbprint:5943D2CE01A369A77745D09C3186997D9AB998ED
SHA256 / Certificate:DW6MR2GW+X0XxWFMEcYYPfmkCi/NuejGb4tXy0yKxSc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3430ba89eaf8c19d38abf1bae658842e750476a6107613100ac882db40805007
SHA256 hex / Subject Public Key Information (SPKI):3430ba89eaf8c19d38abf1bae658842e750476a6107613100ac882db40805007
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.jinni.technology, OU=EssentialSSL Wildcard, OU=Domain Control Validated
27.04.2019
06.05.2020
1776 days expired
*.jinni.technology, jinni.technology - 2 entries

2.
CN=*.jinni.technology, OU=EssentialSSL Wildcard, OU=Domain Control Validated
27.04.2019

06.05.2020
1776 days expired


*.jinni.technology, jinni.technology - 2 entries

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:061266FE1CF8A103F33D138165556A91
Thumbprint:5943D2CE01A369A77745D09C3186997D9AB998ED
SHA256 / Certificate:DW6MR2GW+X0XxWFMEcYYPfmkCi/NuejGb4tXy0yKxSc=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3430ba89eaf8c19d38abf1bae658842e750476a6107613100ac882db40805007
SHA256 hex / Subject Public Key Information (SPKI):3430ba89eaf8c19d38abf1bae658842e750476a6107613100ac882db40805007
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2116 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2116 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2116 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2116 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 4691 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 4691 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1386 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1386 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1386 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1386 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
E=peter@jinnilotto.com, CN=cl-crmv2.com, OU=IT, O=Vesta Control Panel, L=San Francisco, S=California, C=US
06.09.2019
05.09.2020
1654 days expired

2.
1.
E=peter@jinnilotto.com, CN=cl-crmv2.com, OU=IT, O=Vesta Control Panel, L=San Francisco, S=California, C=US
06.09.2019

05.09.2020
1654 days expired




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:5E314A9292BA2FE3D4A79AAB6F0D538445089AAA
Thumbprint:8A0546A9564B35CCACFD128042404E77C8BABE26
SHA256 / Certificate:yIDZzENAWsjAR5JQbr0CLsLZpVhBImbIsmsRGP7IrSg=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8fd2931191ef627020e28003f4f6d24ee26a48441d03f932de58d37b648fca25
SHA256 hex / Subject Public Key Information (SPKI):Error parsing Certificate - _AL.Count = 6
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details (currently limited to 500 rows - some problems with spam users)

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

 

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
crmv2.jinni.technology
0

no CAA entry found
1
0
jinni.technology
0

no CAA entry found
1
0
technology
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
jinni.technology

ok
1
0
crmv2.jinni.technology

ok
1
0
_acme-challenge.crmv2.jinni.technology

Name Error - The domain name does not exist
1
0
_acme-challenge.crmv2.jinni.technology.jinni.technology

Name Error - The domain name does not exist
1
0
_acme-challenge.crmv2.jinni.technology.crmv2.jinni.technology

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
crmv2.jinni.technology
193.31.222.38
21
FTP



crmv2.jinni.technology
193.31.222.38
21
FTP



crmv2.jinni.technology
193.31.222.38
22
SSH



crmv2.jinni.technology
193.31.222.38
22
SSH



crmv2.jinni.technology
193.31.222.38
25
SMTP



crmv2.jinni.technology
193.31.222.38
25
SMTP



crmv2.jinni.technology
193.31.222.38
53
DNS



crmv2.jinni.technology
193.31.222.38
53
DNS



crmv2.jinni.technology
193.31.222.38
110
POP3



crmv2.jinni.technology
193.31.222.38
110
POP3



crmv2.jinni.technology
193.31.222.38
143
IMAP



crmv2.jinni.technology
193.31.222.38
143
IMAP



crmv2.jinni.technology
193.31.222.38
465
SMTP (encrypted)



crmv2.jinni.technology
193.31.222.38
465
SMTP (encrypted)



crmv2.jinni.technology
193.31.222.38
587
SMTP (encrypted, submission)



crmv2.jinni.technology
193.31.222.38
587
SMTP (encrypted, submission)



crmv2.jinni.technology
193.31.222.38
993
IMAP (encrypted)



crmv2.jinni.technology
193.31.222.38
993
IMAP (encrypted)



crmv2.jinni.technology
193.31.222.38
995
POP3 (encrypted)



crmv2.jinni.technology
193.31.222.38
995
POP3 (encrypted)



crmv2.jinni.technology
193.31.222.38
1433
MS SQL



crmv2.jinni.technology
193.31.222.38
1433
MS SQL



crmv2.jinni.technology
193.31.222.38
2082
cPanel (http)



crmv2.jinni.technology
193.31.222.38
2082
cPanel (http)



crmv2.jinni.technology
193.31.222.38
2083
cPanel (https)



crmv2.jinni.technology
193.31.222.38
2083
cPanel (https)



crmv2.jinni.technology
193.31.222.38
2086
WHM (http)



crmv2.jinni.technology
193.31.222.38
2086
WHM (http)



crmv2.jinni.technology
193.31.222.38
2087
WHM (https)



crmv2.jinni.technology
193.31.222.38
2087
WHM (https)



crmv2.jinni.technology
193.31.222.38
2089
cPanel Licensing



crmv2.jinni.technology
193.31.222.38
2089
cPanel Licensing



crmv2.jinni.technology
193.31.222.38
2095
cPanel Webmail (http)



crmv2.jinni.technology
193.31.222.38
2095
cPanel Webmail (http)



crmv2.jinni.technology
193.31.222.38
2096
cPanel Webmail (https)



crmv2.jinni.technology
193.31.222.38
2096
cPanel Webmail (https)



crmv2.jinni.technology
193.31.222.38
2222
DirectAdmin (http)



crmv2.jinni.technology
193.31.222.38
2222
DirectAdmin (http)



crmv2.jinni.technology
193.31.222.38
2222
DirectAdmin (https)



crmv2.jinni.technology
193.31.222.38
2222
DirectAdmin (https)



crmv2.jinni.technology
193.31.222.38
3306
mySql



crmv2.jinni.technology
193.31.222.38
3306
mySql



crmv2.jinni.technology
193.31.222.38
5224
Plesk Licensing



crmv2.jinni.technology
193.31.222.38
5224
Plesk Licensing



crmv2.jinni.technology
193.31.222.38
5432
PostgreSQL



crmv2.jinni.technology
193.31.222.38
5432
PostgreSQL



crmv2.jinni.technology
193.31.222.38
8080
Ookla Speedtest (http)



crmv2.jinni.technology
193.31.222.38
8080
Ookla Speedtest (http)



crmv2.jinni.technology
193.31.222.38
8080
Ookla Speedtest (https)



crmv2.jinni.technology
193.31.222.38
8080
Ookla Speedtest (https)



crmv2.jinni.technology
193.31.222.38
8083
VestaCP http



crmv2.jinni.technology
193.31.222.38
8083
VestaCP http



crmv2.jinni.technology
193.31.222.38
8083
VestaCP https



crmv2.jinni.technology
193.31.222.38
8083
VestaCP https



crmv2.jinni.technology
193.31.222.38
8443
Plesk Administration (https)



crmv2.jinni.technology
193.31.222.38
8443
Plesk Administration (https)



crmv2.jinni.technology
193.31.222.38
8447
Plesk Installer + Updates



crmv2.jinni.technology
193.31.222.38
8447
Plesk Installer + Updates



crmv2.jinni.technology
193.31.222.38
8880
Plesk Administration (http)



crmv2.jinni.technology
193.31.222.38
8880
Plesk Administration (http)



crmv2.jinni.technology
193.31.222.38
10000
Webmin (http)



crmv2.jinni.technology
193.31.222.38
10000
Webmin (http)



crmv2.jinni.technology
193.31.222.38
10000
Webmin (https)



crmv2.jinni.technology
193.31.222.38
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=eba72782-6094-4e9b-8abc-3e7c4a0c659e

 

Last Result: https://check-your-website.server-daten.de/?q=crmv2.jinni.technology - 2020-04-27 18:42:07

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=crmv2.jinni.technology" target="_blank">Check this Site: crmv2.jinni.technology</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=crmv2.jinni.technology