Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A-

 

Top config, 6 invalid Headers

 

Checked:
11.10.2019 21:47:56

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
cyber.sg
A
82.221.129.17
Reykjavik/Capital Region/Iceland (IS) - Advania Island ehf
Hostname: hengill.orangewebsite.com
yes
2
0

AAAA

yes


www.cyber.sg
CNAME
cyber.sg
yes
1
0

A
82.221.129.17
Reykjavik/Capital Region/Iceland (IS) - Advania Island ehf
Hostname: hengill.orangewebsite.com
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 22545, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.11.2019, 00:00:00 +, Signature-Inception: 11.10.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: sg

sg
1 DS RR in the parent zone found






1 RRSIG RR to validate DS RR found






RRSIG-Owner sg., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.10.2019, 17:00:00 +, Signature-Inception: 11.10.2019, 16:00:00 +, KeyTag 22545, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 5145, Flags 256






Public Key with Algorithm 8, KeyTag 26046, Flags 256






Public Key with Algorithm 8, KeyTag 34234, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner sg., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 06.11.2019, 23:59:59 +, Signature-Inception: 07.10.2019, 00:00:00 +, KeyTag 34234, Signer-Name: sg






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34234 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34234, DigestType 2 and Digest "/qyqA6/k2IQto68DyUrt8QTZmstXKVcrHyAqsXRGgeE=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: cyber.sg

cyber.sg
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "5229mi1s4c15g4mhembpju9o7v57cc3f" between the hashed NSEC3-owner "4u13n9c5as4bf1qe7rjfjkg0qc2ml6dh" and the hashed NextOwner "529gg8mqjqe3n9gmt4cbohl5ij68aeki". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 4u13n9c5as4bf1qe7rjfjkg0qc2ml6dh.sg., Algorithm: 8, 2 Labels, original TTL: 900 sec, Signature-expiration: 10.11.2019, 17:22:25 +, Signature-Inception: 11.10.2019, 17:22:25 +, KeyTag 5145, Signer-Name: sg






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 4179, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 6223, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner cyber.sg., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.11.2019, 07:53:03 +, Signature-Inception: 06.10.2019, 07:53:03 +, KeyTag 4179, Signer-Name: cyber.sg






RRSIG-Owner cyber.sg., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.11.2019, 07:53:03 +, Signature-Inception: 06.10.2019, 07:53:03 +, KeyTag 6223, Signer-Name: cyber.sg






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 4179 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 6223 used to validate the DNSKEY RRSet






Error: DNSKEY 4179 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.






Error: DNSKEY 6223 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.






RRSIG Type 1 validates the A - Result: 82.221.129.17
Validated: RRSIG-Owner cyber.sg., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.11.2019, 07:53:03 +, Signature-Inception: 06.10.2019, 07:53:03 +, KeyTag 6223, Signer-Name: cyber.sg






RRSIG Type 16 validates the TXT - Result: v=spf1 include:mailbox.org brave-ledger-verification=2b11ebe3cd72cee96bd8a75c0b589fd27e2d889189bbb352d690e8d1f02915d5
Validated: RRSIG-Owner cyber.sg., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 05.11.2019, 07:53:03 +, Signature-Inception: 06.10.2019, 07:53:03 +, KeyTag 6223, Signer-Name: cyber.sg






RRSIG Type 50, expiration 2019-11-05 07:53:03 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM






RRSIG Type 50, expiration 2019-11-05 07:53:03 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM






RRSIG Type 50, expiration 2019-11-05 07:53:03 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM






RRSIG Type 50, expiration 2019-11-05 07:53:03 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: CNAME, RRSIG






RRSIG Type 50, expiration 2019-11-05 07:53:03 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM



Zone: www.cyber.sg

www.cyber.sg
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
cyber.sg
  ns31.cloudns.net
109.201.133.111
Roosendaal/North Brabant/Netherlands (NL) - NForce Entertainment B.V.


 
2a00:1768:1001:9::31:1
Roosendaal/North Brabant/Netherlands (NL) - NForce Entertainment B.V.


  ns32.cloudns.net
209.58.140.85
Berkeley/California/United States (US) - Leaseweb USA, Inc.


 
2605:fe80:2100:a013:7::1
San Jose/California/United States (US) - Leaseweb USA, Inc.


  ns33.cloudns.net
54.36.26.145
Roubaix/Hauts-de-France/France (FR) - OVH SAS


  ns34.cloudns.net
185.206.180.104
Frankfurt am Main/Hesse/Germany (DE) - Public Cloud Ltd.


 
2a0b:1640:1:1:1:1:8ec:5a47
Sofia/Sofia-Capital/Bulgaria (BG) - Public Cloud Ltd.

sg
  dsany.sgnic.sg / dns5.ams


  dsany2.sgnic.sg / LHR2


  dsany3.sgnic.sg / STO1


  ns4.apnic.net / ns4-de1.apnic.net


  pch.sgzones.sg / 7.fra.pch

 

4. SOA-Entries


Domain:sg
Zone-Name:
Primary:ds.nic.net.sg
Mail:postmaster.nic.net.sg
Serial:2008768945
Refresh:21600
Retry:1800
Expire:2419200
TTL:900
num Entries:1


Domain:sg
Zone-Name:
Primary:ds.nic.net.sg
Mail:postmaster.nic.net.sg
Serial:2008768953
Refresh:21600
Retry:1800
Expire:2419200
TTL:900
num Entries:4


Domain:cyber.sg
Zone-Name:
Primary:ns31.cloudns.net
Mail:support.cloudns.net
Serial:2019100632
Refresh:7200
Retry:1800
Expire:1209600
TTL:3600
num Entries:7


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://cyber.sg/
82.221.129.17
301
https://cyber.sg/
Html is minified: 102.66 %
0.147
A-
Content-Type: text/html
Content-Length: 617
Date: Fri, 11 Oct 2019 19:48:26 GMT
Server: LiteSpeed
Location: https://cyber.sg/
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Connection: close

• http://www.cyber.sg/
82.221.129.17
301
https://www.cyber.sg/
Html is minified: 102.66 %
0.150
A-
Content-Type: text/html
Content-Length: 617
Date: Fri, 11 Oct 2019 19:48:26 GMT
Server: LiteSpeed
Location: https://www.cyber.sg/
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Connection: close

• https://cyber.sg/
82.221.129.17
301
https://www.cyber.sg/

11.287
A-
Content-Type: text/html; charset=UTF-8
X-Redirect-By: WordPress
Location: https://www.cyber.sg/
Content-Length: 0
Date: Fri, 11 Oct 2019 19:48:34 GMT
Server: LiteSpeed
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Alt-Svc: quic=":443"; ma=2592000; v="35,39,43,44"
Connection: close

• https://www.cyber.sg/
82.221.129.17
Inline-JavaScript (∑/total): 2/2699 Inline-CSS (∑/total): 3/574
200

Html is minified: 158.37 %
Other inline scripts (∑/total): 2/2699
8.917
A-
Content-Type: text/html; charset=UTF-8
Link: <https://www.cyber.sg/wp-json/>; rel="https://api.w.org/"
Transfer-Encoding: chunked
Content-Encoding: gzip
Vary: Accept-Encoding
Date: Fri, 11 Oct 2019 19:48:43 GMT
Server: LiteSpeed
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Alt-Svc: quic=":443"; ma=2592000; v="35,39,43,44"
Connection: close

• http://cyber.sg/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
82.221.129.17
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 101.50 %
Other inline scripts (∑/total): 0/0
0.177
A-
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server! Proudly powered by LiteSpeed Web Server Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.
Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 1148
Date: Fri, 11 Oct 2019 19:48:46 GMT
Server: LiteSpeed
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Connection: close

• http://www.cyber.sg/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
82.221.129.17
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 101.50 %
Other inline scripts (∑/total): 0/0
0.147
A-
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server! Proudly powered by LiteSpeed Web Server Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.
Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 1148
Date: Fri, 11 Oct 2019 19:48:47 GMT
Server: LiteSpeed
Strict-Transport-Security: “max-age=31536000; includeSubDomains”
X-Frame-Options: SAMEORIGIN
X-XSS-Protection: 1; mode=block
X-Content-Type-Options: nosniff
Referrer-Policy: no-referrer
Connection: close

 

7. Comments


1. General Results, most used to calculate the result

Aname "cyber.sg" is domain, public suffix is "sg", top-level-domain-type is "country-code", Country is Singapore, tld-manager is "Singapore Network Information Centre (SGNIC) Pte Ltd"
AGood: All ip addresses are public addresses
AGood: No asked Authoritative Name Server had a timeout
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: www is preferred
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
AGood: HSTS has includeSubdomains - directive
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (3 urls)
http://cyber.sg/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 82.221.129.17


Url with incomplete Content-Type - header - missing charset
http://www.cyber.sg/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 82.221.129.17


Url with incomplete Content-Type - header - missing charset
Ahttp://cyber.sg/ 82.221.129.17
301
https://cyber.sg/
Correct redirect http - https with the same domain name
Ahttp://www.cyber.sg/ 82.221.129.17
301
https://www.cyber.sg/
Correct redirect http - https with the same domain name
N82.221.129.17:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N82.221.129.17:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N82.221.129.17:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N82.221.129.17:2083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N82.221.129.17:2087


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N82.221.129.17:2096


Error - Certificate isn't trusted, RemoteCertificateNameMismatch

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)


3. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 7 good Nameserver
AGood: Nameserver supports Echo Capitalization: 7 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 7 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns33.cloudns.net / 54.36.26.145: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns4.apnic.net: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found (ns4-de1.apnic.net). COOKIE: fatal timeout. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 and greater 1024 Bytes is compressed (gzip, deflate, br checked).
https://www.cyber.sg/ 82.221.129.17
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.cyber.sg/ 82.221.129.17
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
Warning: CSS / JavaScript found without Compression. Compress these ressources, gzip, deflate, br are checked. 1 external CSS / JavaScript files without GZip found - 13 with GZip, 14 complete
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 0 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 1 with Cache-Control max-age too short (minimum 7 days), 13 with Cache-Control long enough, 14 complete.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://cyber.sg/ 82.221.129.17
301

Warning: HSTS header sent via http has no effect
http://www.cyber.sg/ 82.221.129.17
301

Warning: HSTS header sent via http has no effect
ADuration: 134007 milliseconds, 134.007 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
cyber.sg
82.221.129.17
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
cyber.sg
82.221.129.17
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
no Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
82.221.129.17
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok

www.cyber.sg
82.221.129.17
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
no Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
465
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
993
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
995
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
2083
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
2083
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
2087
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
2087
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


cyber.sg
cyber.sg
2096
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

cyber.sg
cyber.sg
2096
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
465
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
993
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
995
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
2083
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
2083
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
2087
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
2087
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


www.cyber.sg
www.cyber.sg
2096
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.cyber.sg
www.cyber.sg
2096
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)

1CN=*.cyber.sg, OU=PositiveSSL Wildcard


2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester


3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


82.221.129.17
82.221.129.17
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
465
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


82.221.129.17
82.221.129.17
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
993
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


82.221.129.17
82.221.129.17
995
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
995
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0

no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


82.221.129.17
82.221.129.17
2083
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
2083
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


82.221.129.17
82.221.129.17
2087
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
2087
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


82.221.129.17
82.221.129.17
2096
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

82.221.129.17
82.221.129.17
2096
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
no Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.orangewebsite.com


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

 

9. Certificates

1.
1.
CN=*.cyber.sg, OU=PositiveSSL Wildcard, OU=Domain Control Validated
18.09.2019
18.09.2021
1175 days expired
*.cyber.sg, cyber.sg - 2 entries
1.
1.
CN=*.cyber.sg, OU=PositiveSSL Wildcard, OU=Domain Control Validated
18.09.2019

18.09.2021
1175 days expired


*.cyber.sg, cyber.sg - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00FF6385F95712EC3C6AD417F4D11AD93F
Thumbprint:26A42BE74E59B1217A0C1D4EB7D37F2E370B9537
SHA256 / Certificate:1NAyUVVbKK8t+xn237Vu4lb+j+g6/YnPHEgunau1BvA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3f8c348813aea7af0b84c605d67afb8ac0475f77a75722544a8157ea307ee089
SHA256 hex / Subject Public Key Information (SPKI):3f8c348813aea7af0b84c605d67afb8ac0475f77a75722544a8157ea307ee089
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.cyber.sg, OU=PositiveSSL Wildcard, OU=Domain Control Validated
18.09.2019
18.09.2021
1175 days expired
*.cyber.sg, cyber.sg - 2 entries

2.
CN=*.cyber.sg, OU=PositiveSSL Wildcard, OU=Domain Control Validated
18.09.2019

18.09.2021
1175 days expired


*.cyber.sg, cyber.sg - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00FF6385F95712EC3C6AD417F4D11AD93F
Thumbprint:26A42BE74E59B1217A0C1D4EB7D37F2E370B9537
SHA256 / Certificate:1NAyUVVbKK8t+xn237Vu4lb+j+g6/YnPHEgunau1BvA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3f8c348813aea7af0b84c605d67afb8ac0475f77a75722544a8157ea307ee089
SHA256 hex / Subject Public Key Information (SPKI):3f8c348813aea7af0b84c605d67afb8ac0475f77a75722544a8157ea307ee089
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2217 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2217 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2217 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2217 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 4792 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 4792 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 1487 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 1487 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 1487 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 1487 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=*.orangewebsite.com
05.10.2019
03.11.2021
1129 days expired
*.orangewebsite.com, orangewebsite.com - 2 entries
2.
1.
CN=*.orangewebsite.com
05.10.2019

03.11.2021
1129 days expired


*.orangewebsite.com, orangewebsite.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0C331745080B3391DCE52E4FC2A25BE3
Thumbprint:1E4F4E30E91A0E8E09FB4F16AB3B036DD8965E19
SHA256 / Certificate:34B6uMTJ3E748/nImElhJJ7jqcGaF0/uogum0a6Y+vA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):758ef43a0e2eb602e2784c5e3945aa089f455fe954866d457fcf8ea766990f4f
SHA256 hex / Subject Public Key Information (SPKI):758ef43a0e2eb602e2784c5e3945aa089f455fe954866d457fcf8ea766990f4f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://status.rapidssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.orangewebsite.com
05.10.2019
03.11.2021
1129 days expired
*.orangewebsite.com, orangewebsite.com - 2 entries

2.
CN=*.orangewebsite.com
05.10.2019

03.11.2021
1129 days expired


*.orangewebsite.com, orangewebsite.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0C331745080B3391DCE52E4FC2A25BE3
Thumbprint:1E4F4E30E91A0E8E09FB4F16AB3B036DD8965E19
SHA256 / Certificate:34B6uMTJ3E748/nImElhJJ7jqcGaF0/uogum0a6Y+vA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):758ef43a0e2eb602e2784c5e3945aa089f455fe954866d457fcf8ea766990f4f
SHA256 hex / Subject Public Key Information (SPKI):758ef43a0e2eb602e2784c5e3945aa089f455fe954866d457fcf8ea766990f4f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://status.rapidssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017
06.11.2027
expires in 1065 days


3.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017

06.11.2027
expires in 1065 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:08A5A246CD4B5C8C83D702B4BBAB5349
Thumbprint:98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
SHA256 / Certificate:x5C0cShEfsC2DyK/y3ldccMm3ZEO4Sy7TMWoYZHrkbw=
SHA256 hex / Cert (DANE * 0 1):c790b47128447ec0b60f22bfcb795d71c326dd910ee12cbb4cc5a86191eb91bc
SHA256 hex / PublicKey (DANE * 1 1):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SHA256 hex / Subject Public Key Information (SPKI):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)




4.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017
06.11.2027
expires in 1065 days


4.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017

06.11.2027
expires in 1065 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:08A5A246CD4B5C8C83D702B4BBAB5349
Thumbprint:98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
SHA256 / Certificate:x5C0cShEfsC2DyK/y3ldccMm3ZEO4Sy7TMWoYZHrkbw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SHA256 hex / Subject Public Key Information (SPKI):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006
10.11.2031
expires in 2530 days


5.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006

10.11.2031
expires in 2530 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:083BE056904246B1A1756AC95991C74A
Thumbprint:A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436
SHA256 / Certificate:Q0ig6URMeMsmXgWNXolEtNhPlmK9Jtslf4k0pEPHAWE=
SHA256 hex / Cert (DANE * 0 1):4348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161
SHA256 hex / PublicKey (DANE * 1 1):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SHA256 hex / Subject Public Key Information (SPKI):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016
10.05.2025
expires in 155 days


6.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016

10.05.2025
expires in 155 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0F5BC3A176CB789E2020C7893C8167B4
Thumbprint:FB20FA8A6A93B375F054814F9E00273EA51A6138
SHA256 / Certificate:bay7iUUTex2tQhGwQ2774G8SrONpBJc7Ra4ldAgj02k=
SHA256 hex / Cert (DANE * 0 1):6dacbb8945137b1dad4211b0436efbe06f12ace36904973b45ae25740823d369
SHA256 hex / PublicKey (DANE * 1 1):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SHA256 hex / Subject Public Key Information (SPKI):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000
13.05.2025
expires in 158 days


7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000

13.05.2025
expires in 158 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:020000B9
Thumbprint:D4DE20D05E66FC53FE1A50882C78DB2852CAE474
SHA256 / Certificate:Fq9XqfZ2sKsSYJWqXrre8iqzERnWRKyVzUuT2/Pyaus=
SHA256 hex / Cert (DANE * 0 1):16af57a9f676b0ab126095aa5ebadef22ab31119d644ac95cd4b93dbf3f26aeb
SHA256 hex / PublicKey (DANE * 1 1):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SHA256 hex / Subject Public Key Information (SPKI):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.nu/ / https://validator.w3.org/nu/ (started 2024-09-28, 09:00, alpha)

  Unfortunately, there are differences between the first used validator.nu and validator.w3.org/nu/ - switched to validator.w3.org/nu/. Looks like some error messages (link - fetchpriority attribute) of validator.nu are obsolete, not seen in the w3.org-version and not found in the current specification: link may have a fetchpriority attribute.

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

 

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.cyber.sg



1
0
cyber.sg
0

no CAA entry found
1
0
sg
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
cyber.sg
brave-ledger-verification=2b11ebe3cd72cee96bd8a75c0b589fd27e2d889189bbb352d690e8d1f02915d5
ok
1
0
cyber.sg
v=spf1 include:mailbox.org
ok
1
0
www.cyber.sg
brave-ledger-verification=2b11ebe3cd72cee96bd8a75c0b589fd27e2d889189bbb352d690e8d1f02915d5
ok
1
0
www.cyber.sg
v=spf1 include:mailbox.org
ok
1
0
_acme-challenge.cyber.sg

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cyber.sg

Name Error - The domain name does not exist
1
0
_acme-challenge.cyber.sg.cyber.sg

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cyber.sg.cyber.sg

Name Error - The domain name does not exist
1
0
_acme-challenge.www.cyber.sg.www.cyber.sg

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
cyber.sg
82.221.129.17
21
FTP



cyber.sg
82.221.129.17
21
FTP



www.cyber.sg
82.221.129.17
21
FTP



www.cyber.sg
82.221.129.17
21
FTP



www.cyber.sg
82.221.129.17
22
SSH



www.cyber.sg
82.221.129.17
22
SSH



cyber.sg
82.221.129.17
22
SSH



cyber.sg
82.221.129.17
22
SSH



www.cyber.sg
82.221.129.17
25
SMTP



www.cyber.sg
82.221.129.17
25
SMTP



cyber.sg
82.221.129.17
25
SMTP



cyber.sg
82.221.129.17
25
SMTP



cyber.sg
82.221.129.17
53
DNS



cyber.sg
82.221.129.17
53
DNS



www.cyber.sg
82.221.129.17
53
DNS



www.cyber.sg
82.221.129.17
53
DNS



www.cyber.sg
82.221.129.17
110
POP3



www.cyber.sg
82.221.129.17
110
POP3



cyber.sg
82.221.129.17
110
POP3



cyber.sg
82.221.129.17
110
POP3



cyber.sg
82.221.129.17
143
IMAP



cyber.sg
82.221.129.17
143
IMAP



www.cyber.sg
82.221.129.17
143
IMAP



www.cyber.sg
82.221.129.17
143
IMAP



www.cyber.sg
82.221.129.17
465
SMTP (encrypted)



www.cyber.sg
82.221.129.17
465
SMTP (encrypted)



cyber.sg
82.221.129.17
465
SMTP (encrypted)



cyber.sg
82.221.129.17
465
SMTP (encrypted)



cyber.sg
82.221.129.17
587
SMTP (encrypted, submission)



cyber.sg
82.221.129.17
587
SMTP (encrypted, submission)



www.cyber.sg
82.221.129.17
587
SMTP (encrypted, submission)



www.cyber.sg
82.221.129.17
587
SMTP (encrypted, submission)



cyber.sg
82.221.129.17
993
IMAP (encrypted)



cyber.sg
82.221.129.17
993
IMAP (encrypted)



www.cyber.sg
82.221.129.17
993
IMAP (encrypted)



www.cyber.sg
82.221.129.17
993
IMAP (encrypted)



www.cyber.sg
82.221.129.17
995
POP3 (encrypted)



www.cyber.sg
82.221.129.17
995
POP3 (encrypted)



cyber.sg
82.221.129.17
995
POP3 (encrypted)



cyber.sg
82.221.129.17
995
POP3 (encrypted)



cyber.sg
82.221.129.17
1433
MS SQL



cyber.sg
82.221.129.17
1433
MS SQL



www.cyber.sg
82.221.129.17
1433
MS SQL



www.cyber.sg
82.221.129.17
1433
MS SQL



www.cyber.sg
82.221.129.17
2082
cPanel (http)



www.cyber.sg
82.221.129.17
2082
cPanel (http)



cyber.sg
82.221.129.17
2082
cPanel (http)



cyber.sg
82.221.129.17
2082
cPanel (http)



cyber.sg
82.221.129.17
2083
cPanel (https)



cyber.sg
82.221.129.17
2083
cPanel (https)



www.cyber.sg
82.221.129.17
2083
cPanel (https)



www.cyber.sg
82.221.129.17
2083
cPanel (https)



www.cyber.sg
82.221.129.17
2086
WHM (http)



www.cyber.sg
82.221.129.17
2086
WHM (http)



cyber.sg
82.221.129.17
2086
WHM (http)



cyber.sg
82.221.129.17
2086
WHM (http)



cyber.sg
82.221.129.17
2087
WHM (https)



cyber.sg
82.221.129.17
2087
WHM (https)



www.cyber.sg
82.221.129.17
2087
WHM (https)



www.cyber.sg
82.221.129.17
2087
WHM (https)



www.cyber.sg
82.221.129.17
2089
cPanel Licensing



www.cyber.sg
82.221.129.17
2089
cPanel Licensing



cyber.sg
82.221.129.17
2089
cPanel Licensing



cyber.sg
82.221.129.17
2089
cPanel Licensing



cyber.sg
82.221.129.17
2095
cPanel Webmail (http)



cyber.sg
82.221.129.17
2095
cPanel Webmail (http)



www.cyber.sg
82.221.129.17
2095
cPanel Webmail (http)



www.cyber.sg
82.221.129.17
2095
cPanel Webmail (http)



www.cyber.sg
82.221.129.17
2096
cPanel Webmail (https)



www.cyber.sg
82.221.129.17
2096
cPanel Webmail (https)



cyber.sg
82.221.129.17
2096
cPanel Webmail (https)



cyber.sg
82.221.129.17
2096
cPanel Webmail (https)



cyber.sg
82.221.129.17
2222
DirectAdmin (http)



cyber.sg
82.221.129.17
2222
DirectAdmin (http)



cyber.sg
82.221.129.17
2222
DirectAdmin (https)



cyber.sg
82.221.129.17
2222
DirectAdmin (https)



www.cyber.sg
82.221.129.17
2222
DirectAdmin (http)



www.cyber.sg
82.221.129.17
2222
DirectAdmin (http)



www.cyber.sg
82.221.129.17
2222
DirectAdmin (https)



www.cyber.sg
82.221.129.17
2222
DirectAdmin (https)



cyber.sg
82.221.129.17
3306
mySql



cyber.sg
82.221.129.17
3306
mySql



www.cyber.sg
82.221.129.17
3306
mySql



www.cyber.sg
82.221.129.17
3306
mySql



www.cyber.sg
82.221.129.17
5224
Plesk Licensing



www.cyber.sg
82.221.129.17
5224
Plesk Licensing



cyber.sg
82.221.129.17
5224
Plesk Licensing



cyber.sg
82.221.129.17
5224
Plesk Licensing



cyber.sg
82.221.129.17
5432
PostgreSQL



cyber.sg
82.221.129.17
5432
PostgreSQL



www.cyber.sg
82.221.129.17
5432
PostgreSQL



www.cyber.sg
82.221.129.17
5432
PostgreSQL



www.cyber.sg
82.221.129.17
8080
Ookla Speedtest (http)



www.cyber.sg
82.221.129.17
8080
Ookla Speedtest (http)



www.cyber.sg
82.221.129.17
8080
Ookla Speedtest (https)



www.cyber.sg
82.221.129.17
8080
Ookla Speedtest (https)



cyber.sg
82.221.129.17
8080
Ookla Speedtest (http)



cyber.sg
82.221.129.17
8080
Ookla Speedtest (http)



cyber.sg
82.221.129.17
8080
Ookla Speedtest (https)



cyber.sg
82.221.129.17
8080
Ookla Speedtest (https)



cyber.sg
82.221.129.17
8083
VestaCP http



cyber.sg
82.221.129.17
8083
VestaCP http



cyber.sg
82.221.129.17
8083
VestaCP https



cyber.sg
82.221.129.17
8083
VestaCP https



www.cyber.sg
82.221.129.17
8083
VestaCP http



www.cyber.sg
82.221.129.17
8083
VestaCP http



www.cyber.sg
82.221.129.17
8083
VestaCP https



www.cyber.sg
82.221.129.17
8083
VestaCP https



www.cyber.sg
82.221.129.17
8443
Plesk Administration (https)



www.cyber.sg
82.221.129.17
8443
Plesk Administration (https)



cyber.sg
82.221.129.17
8443
Plesk Administration (https)



cyber.sg
82.221.129.17
8443
Plesk Administration (https)



cyber.sg
82.221.129.17
8447
Plesk Installer + Updates



cyber.sg
82.221.129.17
8447
Plesk Installer + Updates



www.cyber.sg
82.221.129.17
8447
Plesk Installer + Updates



www.cyber.sg
82.221.129.17
8447
Plesk Installer + Updates



www.cyber.sg
82.221.129.17
8880
Plesk Administration (http)



www.cyber.sg
82.221.129.17
8880
Plesk Administration (http)



cyber.sg
82.221.129.17
8880
Plesk Administration (http)



cyber.sg
82.221.129.17
8880
Plesk Administration (http)



cyber.sg
82.221.129.17
10000
Webmin (http)



cyber.sg
82.221.129.17
10000
Webmin (http)



cyber.sg
82.221.129.17
10000
Webmin (https)



cyber.sg
82.221.129.17
10000
Webmin (https)



www.cyber.sg
82.221.129.17
10000
Webmin (http)



www.cyber.sg
82.221.129.17
10000
Webmin (http)



www.cyber.sg
82.221.129.17
10000
Webmin (https)



www.cyber.sg
82.221.129.17
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=fc3dbe02-f937-43bc-946c-18f08d8032a9

 

Last Result: https://check-your-website.server-daten.de/?q=cyber.sg - 2019-10-11 21:47:56

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=cyber.sg" target="_blank">Check this Site: cyber.sg</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=cyber.sg