Check DNS, Urls + Redirects, Certificates and Content of your Website




V

Connect failure - perhaps firewall

Checked:
20.11.2023 23:48:51


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
foundryvtt.orcashow.linkpc.net
CNAME
orcashow.linkpc.net
yes
3
2

A
72.199.244.168
San Diego/California/United States (US) - Cox Communications Inc.
Hostname: ip72-199-244-168.sd.sd.cox.net
yes


www.foundryvtt.orcashow.linkpc.net

Name Error
yes
4
3
*.orcashow.linkpc.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.foundryvtt.orcashow.linkpc.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 46780, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2023, 00:00:00 +, Signature-Inception: 20.11.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: net
net
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=



1 RRSIG RR to validate DS RR found



RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 03.12.2023, 22:00:00 +, Signature-Inception: 20.11.2023, 21:00:00 +, KeyTag 46780, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46780 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 44222, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.12.2023, 15:10:35 +, Signature-Inception: 19.11.2023, 15:05:35 +, KeyTag 37331, Signer-Name: net



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: linkpc.net
linkpc.net
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "ncdvmqcp6gq4bs4s9k37nn3b0vckbph8" between the hashed NSEC3-owner "ncdt9jn7bcaaj4o2mqggfc847usr1obh" and the hashed NextOwner "nce11age253ntfm0b3ccv3n6smt8u4uh". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner ncdt9jn7bcaaj4o2mqggfc847usr1obh.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 27.11.2023, 08:22:59 +, Signature-Inception: 20.11.2023, 07:12:59 +, KeyTag 44222, Signer-Name: net



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "linkpc.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 26.11.2023, 08:18:04 +, Signature-Inception: 19.11.2023, 07:08:04 +, KeyTag 44222, Signer-Name: net



0 DNSKEY RR found




Zone: orcashow.linkpc.net
orcashow.linkpc.net
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: foundryvtt.orcashow.linkpc.net
foundryvtt.orcashow.linkpc.net
0 DS RR in the parent zone found

Zone: www.foundryvtt.orcashow.linkpc.net
www.foundryvtt.orcashow.linkpc.net
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.foundryvtt.orcashow.linkpc.net
  ns10.dnsexit.com

orcashow.linkpc.net
  ns10.dnsexit.com
96.43.135.22
Kansas City/Missouri/United States (US) - Joe's Datacenter, LLC


T  ns11.dnsexit.com
64.182.103.72
Dallas/Texas/United States (US) - CoreSpace, Inc.


T  ns12.dnsexit.com
66.85.73.245
Cameron/Missouri/United States (US) - Joe's Datacenter


T  ns13.dnsexit.com
104.223.143.26
Los Angeles/California/United States (US) - LayerHost

linkpc.net
  ns10.dnsexit.com
96.43.135.22
Kansas City/Missouri/United States (US) - Joe's Datacenter, LLC


T  ns11.dnsexit.com
64.182.103.72
Dallas/Texas/United States (US) - CoreSpace, Inc.


T  ns12.dnsexit.com
66.85.73.245
Cameron/Missouri/United States (US) - Joe's Datacenter


T  ns13.dnsexit.com
104.223.143.26
Los Angeles/California/United States (US) - LayerHost

net
  a.gtld-servers.net / nnn1-par6


  b.gtld-servers.net / nnn1-eltxl1


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-par6


  e.gtld-servers.net / nnn1-par6


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-gblon-3


  k.gtld-servers.net / nnn1-gblon-3


  l.gtld-servers.net / nnn1-gblon-3


  m.gtld-servers.net / nnn1-gblon-3


4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1700520515
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:10


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1700520530
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:3


Domain:linkpc.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:4


Domain:orcashow.linkpc.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:orcashow.linkpc.net
Zone-Name:orcashow.linkpc.net
Primary:ns10.dnsexit.com
Mail:admin.netdorm.com
Serial:2000060701
Refresh:14400
Retry:2400
Expire:604800
TTL:1200
num Entries:1


Domain:orcashow.linkpc.net
Zone-Name:orcashow.linkpc.net
Primary:ns12.dnsexit.com
Mail:admin.netdorm.com
Serial:2000060701
Refresh:86000
Retry:180000
Expire:1814400
TTL:1200
num Entries:1


Domain:www.foundryvtt.orcashow.linkpc.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks

DomainnameHttp-StatusredirectSec.G
• http://foundryvtt.orcashow.linkpc.net/
72.199.244.168
-14

10.043
T
Timeout - The operation has timed out

• https://foundryvtt.orcashow.linkpc.net/
72.199.244.168
-2

1.640
V
ConnectFailure - Unable to connect to the remote server

• http://foundryvtt.orcashow.linkpc.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
72.199.244.168
-14

10.030
T
Timeout - The operation has timed out
Visible Content:

• https://72.199.244.168/
72.199.244.168
-2

1.610
V
ConnectFailure - Unable to connect to the remote server

7. Comments


1. General Results, most used to calculate the result

Aname "foundryvtt.orcashow.linkpc.net" is subdomain, public suffix is ".net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 8862 (complete: 231048)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: foundryvtt.orcashow.linkpc.net has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: foundryvtt.orcashow.linkpc.net has no ipv6 address.
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Nfoundryvtt.orcashow.linkpc.net:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Vhttps://foundryvtt.orcashow.linkpc.net/ 72.199.244.168
-2

Connect failure - perhaps firewall
Vhttps://72.199.244.168/ 72.199.244.168
-2

Connect failure - perhaps firewall
XFatal error: Nameserver doesn't support TCP connection: ns10.dnsexit.com / 96.43.135.22: Refused
XFatal error: Nameserver doesn't support TCP connection: ns11.dnsexit.com / 64.182.103.72: ServerFailure
XFatal error: Nameserver doesn't support TCP connection: ns12.dnsexit.com / 66.85.73.245: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns13.dnsexit.com / 104.223.143.26: Timeout
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain foundryvtt.orcashow.linkpc.net, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.foundryvtt.orcashow.linkpc.net

2. Header-Checks

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 13 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 13 Queries complete, 5 with IPv6, 8 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
Ok (4 - 8):: An average of 3.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns10.dnsexit.com, ns11.dnsexit.com, ns12.dnsexit.com, ns13.dnsexit.com, 4 Name Servers included in Delegation: ns10.dnsexit.com, ns11.dnsexit.com, ns12.dnsexit.com, ns13.dnsexit.com, 4 Name Servers included in 2 Zone definitions: ns10.dnsexit.com, ns11.dnsexit.com, ns12.dnsexit.com, ns13.dnsexit.com, 2 Name Servers listed in SOA.Primary: ns10.dnsexit.com, ns12.dnsexit.com.
Error: Different SOA.Primary Name Servers found, different SOA Definitions.: ns10.dnsexit.com,ns12.dnsexit.com.
Error: SOA.Primary Name Server not included in the delegation set.: ns10.dnsexit.com,ns12.dnsexit.com.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 4 Name Servers, 4 different subnets (first Byte): 104., 64., 66., 96., 4 different subnets (first two Bytes): 104.223., 64.182., 66.85., 96.43., 4 different subnets (first three Bytes): 104.223.143., 64.182.103., 66.85.73., 96.43.135.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
XNameserver Timeout checking Echo Capitalization: ns11.dnsexit.com / 64.182.103.72
XNameserver Timeout checking Echo Capitalization: ns12.dnsexit.com / 66.85.73.245
XNameserver Timeout checking Echo Capitalization: ns13.dnsexit.com / 104.223.143.26
XNameserver Timeout checking EDNS512: ns11.dnsexit.com / 64.182.103.72
XNameserver Timeout checking EDNS512: ns12.dnsexit.com / 66.85.73.245
XNameserver Timeout checking EDNS512: ns13.dnsexit.com / 104.223.143.26
Nameserver doesn't pass all EDNS-Checks: ns10.dnsexit.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns10.dnsexit.com / 96.43.135.22: OP100: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. FLAGS: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns11.dnsexit.com / 64.182.103.72: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: ok. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns12.dnsexit.com / 66.85.73.245: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns12.dnsexit.com / 66.85.73.245: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns13.dnsexit.com / 104.223.143.26: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns13.dnsexit.com / 104.223.143.26: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://foundryvtt.orcashow.linkpc.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 72.199.244.168
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 647223 milliseconds, 647.223 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
foundryvtt.orcashow.linkpc.net
72.199.244.168
8443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
foundryvtt.orcashow.linkpc.net
72.199.244.168
8443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=orcaland.asuscomm.com

2CN=R3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=orcaland.asuscomm.com
11.11.2023
09.02.2024
expires in 69 days
orcaland.asuscomm.com - 1 entry
1.
1.
CN=orcaland.asuscomm.com
11.11.2023

09.02.2024
expires in 69 days
orcaland.asuscomm.com - 1 entry

KeyalgorithmEC Public Key (256 bit, prime256v1)
Signatur:SHA256 With RSA-Encryption
Serial Number:0378334F87B75666D89F147677A92C16D4EB
Thumbprint:7A0388623C622B0460F0310B2675D7FAE6CA4622
SHA256 / Certificate:lKZ4CzG0v8VJekJbCbeUgoCdFbhe66TBTK8D3PpjfyE=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f15569ed0d0bfc8484e32d5ed6654d0995f86131a46f011b5af4ce7c8ae74f0b
SHA256 hex / Subject Public Key Information (SPKI):f15569ed0d0bfc8484e32d5ed6654d0995f86131a46f011b5af4ce7c8ae74f0b (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 653 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 653 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4202 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4202 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns10.dnsexit.com, ns11.dnsexit.com, ns12.dnsexit.com, ns13.dnsexit.com

QNr.DomainTypeNS used
1
com
NS
m.root-servers.net (2001:dc3::35)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns10.dnsexit.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.dnsexit.com, ns2.dnsexit.com, ns3.dnsexit.com, ns4.dnsexit.com, pm1.dnsexit.com, pm2.dnsexit.com

Answer: ns1.dnsexit.com
162.244.82.74

Answer: ns2.dnsexit.com
96.43.135.18

Answer: ns3.dnsexit.com
204.27.62.66

Answer: ns4.dnsexit.com
69.30.222.218

Answer: pm1.dnsexit.com
162.244.80.162

Answer: pm2.dnsexit.com
38.143.181.18
3
ns11.dnsexit.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.dnsexit.com, ns2.dnsexit.com, ns3.dnsexit.com, ns4.dnsexit.com, pm1.dnsexit.com, pm2.dnsexit.com

Answer: ns1.dnsexit.com
162.244.82.74

Answer: ns2.dnsexit.com
96.43.135.18

Answer: ns3.dnsexit.com
204.27.62.66

Answer: ns4.dnsexit.com
69.30.222.218

Answer: pm1.dnsexit.com
162.244.80.162

Answer: pm2.dnsexit.com
38.143.181.18
4
ns12.dnsexit.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.dnsexit.com, ns2.dnsexit.com, ns3.dnsexit.com, ns4.dnsexit.com, pm1.dnsexit.com, pm2.dnsexit.com

Answer: ns1.dnsexit.com
162.244.82.74

Answer: ns2.dnsexit.com
96.43.135.18

Answer: ns3.dnsexit.com
204.27.62.66

Answer: ns4.dnsexit.com
69.30.222.218

Answer: pm1.dnsexit.com
162.244.80.162

Answer: pm2.dnsexit.com
38.143.181.18
5
ns13.dnsexit.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns1.dnsexit.com, ns2.dnsexit.com, ns3.dnsexit.com, ns4.dnsexit.com, pm1.dnsexit.com, pm2.dnsexit.com

Answer: ns1.dnsexit.com
162.244.82.74

Answer: ns2.dnsexit.com
96.43.135.18

Answer: ns3.dnsexit.com
204.27.62.66

Answer: ns4.dnsexit.com
69.30.222.218

Answer: pm1.dnsexit.com
162.244.80.162

Answer: pm2.dnsexit.com
38.143.181.18
6
ns10.dnsexit.com: 96.43.135.22
A
ns1.dnsexit.com (162.244.82.74)
7
ns10.dnsexit.com: No AAAA record found
AAAA
ns1.dnsexit.com (162.244.82.74)
8
ns11.dnsexit.com: 64.182.103.72
A
ns1.dnsexit.com (162.244.82.74)
9
ns11.dnsexit.com: No AAAA record found
AAAA
ns1.dnsexit.com (162.244.82.74)
10
ns12.dnsexit.com: 66.85.73.245
A
ns1.dnsexit.com (162.244.82.74)
11
ns12.dnsexit.com: No AAAA record found
AAAA
ns1.dnsexit.com (162.244.82.74)
12
ns13.dnsexit.com: 104.223.143.26
A
ns1.dnsexit.com (162.244.82.74)
13
ns13.dnsexit.com: No AAAA record found
AAAA
ns1.dnsexit.com (162.244.82.74)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
foundryvtt.orcashow.linkpc.net



3
2
orcashow.linkpc.net
0

no CAA entry found
3
2
linkpc.net
-5

Refused - The name server refuses to perform the specified operation for policy reasons
1
0
net
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
orcashow.linkpc.net

ok
4
3
foundryvtt.orcashow.linkpc.net


3
2
_acme-challenge.foundryvtt.orcashow.linkpc.net

Name Error - The domain name does not exist
3
2
_acme-challenge.foundryvtt.orcashow.linkpc.net.orcashow.linkpc.net

Name Error - The domain name does not exist
3
2
_acme-challenge.foundryvtt.orcashow.linkpc.net.foundryvtt.orcashow.linkpc.net

Name Error - The domain name does not exist
4
3


15. DomainService - Entries

No DomainServiceEntries entries found



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
foundryvtt.orcashow.linkpc.net
72.199.244.168
8443
ECDHE-ECDSA-CHACHA20-POLY1305
(Recommended)
TLSv1.2
0xCC,0xA9
FS
5 Ciphers, 101.21 sec
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
ECDSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-ECDSA-AES256-GCM-SHA384
(Recommended)
TLSv1.2
0xC0,0x2C
FS

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
ECDH
ECDSA
AESGCM(256)
AEAD



ECDHE-ECDSA-AES128-GCM-SHA256
(Recommended)
TLSv1.2
0xC0,0x2B
FS

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
ECDH
ECDSA
AESGCM(128)
AEAD



ECDHE-ECDSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x24
FS

TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
ECDH
ECDSA
AES(256)
SHA384



ECDHE-ECDSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x23
FS

TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
ECDH
ECDSA
AES(128)
SHA256


17. Portchecks

DomainIPPortDescriptionResultAnswer
foundryvtt.orcashow.linkpc.net
72.199.244.168
21
FTP



foundryvtt.orcashow.linkpc.net
72.199.244.168
21
FTP



foundryvtt.orcashow.linkpc.net
72.199.244.168
22
SSH



foundryvtt.orcashow.linkpc.net
72.199.244.168
22
SSH



foundryvtt.orcashow.linkpc.net
72.199.244.168
25
SMTP



foundryvtt.orcashow.linkpc.net
72.199.244.168
25
SMTP



foundryvtt.orcashow.linkpc.net
72.199.244.168
53
DNS



foundryvtt.orcashow.linkpc.net
72.199.244.168
53
DNS



foundryvtt.orcashow.linkpc.net
72.199.244.168
110
POP3



foundryvtt.orcashow.linkpc.net
72.199.244.168
110
POP3



foundryvtt.orcashow.linkpc.net
72.199.244.168
143
IMAP



foundryvtt.orcashow.linkpc.net
72.199.244.168
143
IMAP



foundryvtt.orcashow.linkpc.net
72.199.244.168
465
SMTP (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
465
SMTP (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
587
SMTP (encrypted, submission)



foundryvtt.orcashow.linkpc.net
72.199.244.168
587
SMTP (encrypted, submission)



foundryvtt.orcashow.linkpc.net
72.199.244.168
993
IMAP (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
993
IMAP (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
995
POP3 (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
995
POP3 (encrypted)



foundryvtt.orcashow.linkpc.net
72.199.244.168
1433
MS SQL



foundryvtt.orcashow.linkpc.net
72.199.244.168
1433
MS SQL



foundryvtt.orcashow.linkpc.net
72.199.244.168
2082
cPanel (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2082
cPanel (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2083
cPanel (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2083
cPanel (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2086
WHM (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2086
WHM (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2087
WHM (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2087
WHM (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2089
cPanel Licensing



foundryvtt.orcashow.linkpc.net
72.199.244.168
2089
cPanel Licensing



foundryvtt.orcashow.linkpc.net
72.199.244.168
2095
cPanel Webmail (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2095
cPanel Webmail (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2096
cPanel Webmail (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2096
cPanel Webmail (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2222
DirectAdmin (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2222
DirectAdmin (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2222
DirectAdmin (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
2222
DirectAdmin (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
3306
mySql



foundryvtt.orcashow.linkpc.net
72.199.244.168
3306
mySql



foundryvtt.orcashow.linkpc.net
72.199.244.168
5224
Plesk Licensing



foundryvtt.orcashow.linkpc.net
72.199.244.168
5224
Plesk Licensing



foundryvtt.orcashow.linkpc.net
72.199.244.168
5432
PostgreSQL



foundryvtt.orcashow.linkpc.net
72.199.244.168
5432
PostgreSQL



foundryvtt.orcashow.linkpc.net
72.199.244.168
8080
Ookla Speedtest (http)
open
http://72.199.244.168:8080/
Http-Status: 302
Redirect: /setup
foundryvtt.orcashow.linkpc.net
72.199.244.168
8080
Ookla Speedtest (http)
open
http://72.199.244.168:8080/
Http-Status: 302
Redirect: /setup
foundryvtt.orcashow.linkpc.net
72.199.244.168
8080
Ookla Speedtest (https)
open
https://72.199.244.168:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

foundryvtt.orcashow.linkpc.net
72.199.244.168
8080
Ookla Speedtest (https)
open
https://72.199.244.168:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

foundryvtt.orcashow.linkpc.net
72.199.244.168
8083
VestaCP http



foundryvtt.orcashow.linkpc.net
72.199.244.168
8083
VestaCP http



foundryvtt.orcashow.linkpc.net
72.199.244.168
8083
VestaCP https



foundryvtt.orcashow.linkpc.net
72.199.244.168
8083
VestaCP https



foundryvtt.orcashow.linkpc.net
72.199.244.168
8443
Plesk Administration (https)
open
https://72.199.244.168:8443/
Http-Status: 200
Certificate is invalid
foundryvtt.orcashow.linkpc.net
72.199.244.168
8443
Plesk Administration (https)
open
https://72.199.244.168:8443/
Http-Status: 200
Certificate is invalid
foundryvtt.orcashow.linkpc.net
72.199.244.168
8447
Plesk Installer + Updates



foundryvtt.orcashow.linkpc.net
72.199.244.168
8447
Plesk Installer + Updates



foundryvtt.orcashow.linkpc.net
72.199.244.168
8880
Plesk Administration (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
8880
Plesk Administration (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
10000
Webmin (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
10000
Webmin (http)



foundryvtt.orcashow.linkpc.net
72.199.244.168
10000
Webmin (https)



foundryvtt.orcashow.linkpc.net
72.199.244.168
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=65b019ed-ec31-4f31-91de-87ad116ecd25


Last Result: https://check-your-website.server-daten.de/?q=foundryvtt.orcashow.linkpc.net - 2023-11-20 23:48:51


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=foundryvtt.orcashow.linkpc.net" target="_blank">Check this Site: foundryvtt.orcashow.linkpc.net</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro