Check DNS, Urls + Redirects, Certificates and Content of your Website





1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
hive.fogelfrei.com
CNAME
fogelfrei.com
yes
1
0

A
84.149.132.236
Moosburg/Bavaria/Germany (DE) - Deutsche Telekom AG
Hostname: p549584ec.dip0.t-ipconnect.de
yes


www.hive.fogelfrei.com

Name Error
yes
1
0
*.fogelfrei.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.hive.fogelfrei.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20038, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 20.09.2024, 00:00:00 +, Signature-Inception: 30.08.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=



1 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.09.2024, 05:00:00 +, Signature-Inception: 05.09.2024, 04:00:00 +, KeyTag 20038, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20038 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 19718, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 59354, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 19.09.2024, 14:02:35 +, Signature-Inception: 04.09.2024, 13:57:35 +, KeyTag 19718, Signer-Name: com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 19718 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest "isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: fogelfrei.com
fogelfrei.com
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 16944, DigestType 2 and Digest FjFAByM1KZUMOXeUkMssq1cNjxmHkTmVB44uJz8Fz10=



1 RRSIG RR to validate DS RR found



RRSIG-Owner fogelfrei.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.09.2024, 01:34:54 +, Signature-Inception: 04.09.2024, 00:24:54 +, KeyTag 59354, Signer-Name: com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 59354 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 16944, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner fogelfrei.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 19.09.2024, 00:00:00 +, Signature-Inception: 29.08.2024, 00:00:00 +, KeyTag 16944, Signer-Name: fogelfrei.com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 16944 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 16944, DigestType 2 and Digest "FjFAByM1KZUMOXeUkMssq1cNjxmHkTmVB44uJz8Fz10=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: hive.fogelfrei.com
hive.fogelfrei.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "fogelfrei.com" and the NextOwner "hive.fogelfrei.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA



RRSIG Type 5 validates the CNAME - Result: fogelfrei.com
Validated: RRSIG-Owner hive.fogelfrei.com., Algorithm: 13, 3 Labels, original TTL: 7200 sec, Signature-expiration: 19.09.2024, 00:00:00 +, Signature-Inception: 29.08.2024, 00:00:00 +, KeyTag 16944, Signer-Name: fogelfrei.com

Zone: www.hive.fogelfrei.com
www.hive.fogelfrei.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "hive.fogelfrei.com" and the NextOwner "wolke.fogelfrei.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC


3. Name Servers

DomainNameserverNS-IP
www.hive.fogelfrei.com
  angus.ns.servercow.de

fogelfrei.com
  angus.ns.servercow.de / angus.ns.servercow.de
5.1.76.153
Frankfurt am Main/Hesse/Germany (DE) - meerfarbig GmbH & Co. KG


 
2a00:f820:417:153::
Frankfurt am Main/Hesse/Germany (DE) - meerfarbig GmbH & Co. KG


  dexter.ns.servercow.net / dexter
45.85.48.12
Willich/North Rhine-Westphalia/Germany (DE) - The Infrastructure Company GmbH


 
2a0e:b680:c:253::
Willich/North Rhine-Westphalia/Germany (DE) - The Infrastructure Company GmbH


  galloway.ns.servercow.com / galloway
94.130.42.192
Ergolding/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:fff2:20:353::
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH

com
  a.gtld-servers.net / nnn1-defra-5


  b.gtld-servers.net / nnn1-elwaw4


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-defra-5


  e.gtld-servers.net / nnn1-par6


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-frmrs-2


  k.gtld-servers.net / nnn1-frmrs-2


  l.gtld-servers.net / nnn1-frmrs-2


  m.gtld-servers.net / nnn1-frmrs-2


4. SOA-Entries


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1725522539
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:2


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1725522554
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:11


Domain:fogelfrei.com
Zone-Name:fogelfrei.com
Primary:angus.ns.servercow.de
Mail:hostmaster.servercow.de
Serial:2024090501
Refresh:14400
Retry:3600
Expire:1209600
TTL:3600
num Entries:6


Domain:www.hive.fogelfrei.com
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://hive.fogelfrei.com/
84.149.132.236
302
http://hive.fogelfrei.com/web/
0.027
D
Server: openresty
Date: Thu, 05 Sep 2024 07:50:11 GMT
Connection: keep-alive
Location: web/
X-Served-By: hive.fogelfrei.com
Content-Length: 0

• http://hive.fogelfrei.com/web/

-101

0.010
R
NameResolutionError (1, 0x80004005). Der angegebene Host ist unbekannt. (hive.fogelfrei.com:80)

• https://hive.fogelfrei.com/
84.149.132.236
302
https://hive.fogelfrei.com/web/
2.553
B
Server: openresty
Date: Thu, 05 Sep 2024 07:50:11 GMT
Connection: keep-alive
Location: web/
X-Served-By: hive.fogelfrei.com
Content-Length: 0

• https://hive.fogelfrei.com/web/

-101

0.007
R
NameResolutionError (1, 0x80004005). Der angegebene Host ist unbekannt. (hive.fogelfrei.com:443)

• http://hive.fogelfrei.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
84.149.132.236 gzip used - 111 / 150 - 26.00 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.29 %
0.026
A
Not Found
Visible Content:
Server: openresty
Date: Thu, 05 Sep 2024 07:50:15 GMT
Transfer-Encoding: chunked
Connection: keep-alive
Content-Type: text/html
Content-Encoding: gzip
Content-Length: 111

• https://84.149.132.236/
84.149.132.236
-103

0.043
P
SecureConnectionError (3, 0x80131501). The SSL connection could not be established, see inner exception. Authentication failed because the remote party sent a TLS alert: '112' (FF: SSL_ERROR_UNRECOGNIZED_NAME_ALERT)

7. Comments


1. General Results, most used to calculate the result

Aname "hive.fogelfrei.com" is subdomain, public suffix is ".com", top-level-domain is ".com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .com-domains preloaded: 94787 (complete: 245733)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: hive.fogelfrei.com has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: hive.fogelfrei.com has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (1 urls)
http://hive.fogelfrei.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 84.149.132.236


Url with incomplete Content-Type - header - missing charset
Bhttps://hive.fogelfrei.com/ 84.149.132.236
302

Missing HSTS-Header
CError - no version with Http-Status 200
Dhttp://hive.fogelfrei.com/ 84.149.132.236
302
http://hive.fogelfrei.com/web/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
HFatal error: No https - result with http-status 200, no encryption
Rhttp://hive.fogelfrei.com/ 84.149.132.236
302
http://hive.fogelfrei.com/web/
Redirect to not existing domain
Rhttps://hive.fogelfrei.com/ 84.149.132.236
302
https://hive.fogelfrei.com/web/
Redirect to not existing domain
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain hive.fogelfrei.com, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.hive.fogelfrei.com

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 13 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 13 Queries complete, 11 with IPv6, 2 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.angus.ns.servercow.de (2a00:f820:417:153::, 5.1.76.153)
Ok (4 - 8):: An average of 4.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 3 Name Servers included in Delegation: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 3 Name Servers included in 1 Zone definitions: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 1 Name Servers listed in SOA.Primary: angus.ns.servercow.de.
AGood: Only one SOA.Primary Name Server found.: angus.ns.servercow.de.
AGood: SOA.Primary Name Server included in the delegation set.: angus.ns.servercow.de.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 45., 5., 94., 3 different subnets (first two Bytes): 45.85., 5.1., 94.130., 3 different subnets (first three Bytes): 45.85.48., 5.1.76., 94.130.42.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 3 different subnets (first block): 2a00:, 2a01:, 2a0e:, 3 different subnets (first two blocks): 2a00:f820:, 2a01:04f8:, 2a0e:b680:, 3 different subnets (first three blocks): 2a00:f820:0417:, 2a01:04f8:fff2:, 2a0e:b680:000c:, 3 different subnets (first four blocks): 2a00:f820:0417:0153:, 2a01:04f8:fff2:0020:, 2a0e:b680:000c:0253:
AExcellent: Every Name Server IPv6-address starts with an unique Hex-block
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: angus.ns.servercow.de: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 96574 milliseconds, 96.574 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
hive.fogelfrei.com
84.149.132.236
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
hive.fogelfrei.com
84.149.132.236
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=hive.fogelfrei.com

2CN=E5, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=hive.fogelfrei.com
05.09.2024
04.12.2024
expires in 85 days
hive.fogelfrei.com - 1 entry
1.
1.
CN=hive.fogelfrei.com
05.09.2024

04.12.2024
expires in 85 days
hive.fogelfrei.com - 1 entry

KeyalgorithmEC Public Key (384 bit, secp384r1)
Signatur:ECDSA SHA384
Serial Number:046DA3F99812FA168940D30E19C9F2BE3829
Thumbprint:4EC6EECF22DECDDAEDB4315B3C3FF491B656AC7C
SHA256 / Certificate:5xNBD8cznDyRv/DZhe7GK5IAULAXHmuIY2umWpuzQFY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):40ce28b966b499e8c94e61a635a6bd0085b07949a7074537e3440f2b99a574a1
SHA256 hex / Subject Public Key Information (SPKI):40ce28b966b499e8c94e61a635a6bd0085b07949a7074537e3440f2b99a574a1 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://e5.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=E5, O=Let's Encrypt, C=US
13.03.2024
13.03.2027
expires in 914 days


2.
CN=E5, O=Let's Encrypt, C=US
13.03.2024

13.03.2027
expires in 914 days


KeyalgorithmEC Public Key (384 bit, secp384r1)
Signatur:SHA256 With RSA-Encryption
Serial Number:00838F6C63CEB1398C6206628315C9FDDE
Thumbprint:5F28D9C589EE4BF31A11B78C72B8D13F079DDC45
SHA256 / Certificate:Xf2zzzGybyPYfAnzoM72QvZAaan7fP4pJwu13A8eFrs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3586d4ecf070578cbd27aedce20b964e48bc149faeb9dad72f46b857869172b8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3919 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3919 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=E5, O=Let's Encrypt, C=US
1
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
14435555026
precert
CN=E5, O=Let's Encrypt, C=US
2024-09-05 04:42:03
2024-12-04 05:42:02
hive.fogelfrei.com
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com

QNr.DomainTypeNS used
1
de
NS
e.root-servers.net (2001:500:a8::e)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
2
angus.ns.servercow.de: 2a00:f820:417:153::, 5.1.76.153
NS
a.nic.de (2001:678:2::53)
3
net
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
4
dexter.ns.servercow.net
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: dns200.anycast.me, ns200.anycast.me
5
com
NS
m.root-servers.net (2001:dc3::35)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
6
galloway.ns.servercow.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de

Answer: ns.second-ns.com
213.239.204.242, 2a01:4f8:0:a101::b:1
7
me
NS
e.root-servers.net (2001:500:a8::e)

Answer: a0.nic.me, a2.nic.me, b0.nic.me, b2.nic.me, c0.nic.me
8
dns200.anycast.me: 46.105.206.200
NS
a0.nic.me (2001:500:53::1)

Answer: ns200.anycast.me
46.105.207.200
9
ns1.your-server.de: 213.133.100.102, 2a01:4f8:0:1::5ddc:1
NS
a.nic.de (2001:678:2::53)

Answer: ns3.second-ns.de
193.47.99.4, 2001:67c:192c::add:b3
10
dexter.ns.servercow.net: 45.85.48.12
A
dns200.anycast.me (46.105.206.200)
11
dexter.ns.servercow.net: 2a0e:b680:c:253::
AAAA
dns200.anycast.me (46.105.206.200)
12
galloway.ns.servercow.com: 94.130.42.192
A
ns.second-ns.com (2a01:4f8:0:a101::b:1)
13
galloway.ns.servercow.com: 2a01:4f8:fff2:20:353::
AAAA
ns.second-ns.com (2a01:4f8:0:a101::b:1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
hive.fogelfrei.com
5
issue
letsencrypt.org
1
0
fogelfrei.com
5
issue
letsencrypt.org
1
0
com
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
fogelfrei.com

ok
1
0
hive.fogelfrei.com


1
0
_acme-challenge.hive.fogelfrei.com

Name Error - The domain name does not exist
1
0
_acme-challenge.hive.fogelfrei.com.fogelfrei.com

Name Error - The domain name does not exist
1
0
_acme-challenge.hive.fogelfrei.com.hive.fogelfrei.com

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SPF-Check is alpha - 2024-06-22, DMARC-Detailcheck is alpha - 2024-07-06, SMTP-TLS-Reporting is alpa - 2024-07-13)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
SPF
TXT
hive.fogelfrei.com

32768TXT expected, but CNAME found. CNAME not allowed, only TXT queries are allowed. See RFC 7208, 4.4.



16. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
hive.fogelfrei.com
84.149.132.236
443
3 Ciphers31.70 sec
0 without, 3 FS
100.00 %
Complete

1
3 Ciphers
3.00 Ciphers/Check
31.70 sec31.70 sec/Check
0 without, 3 FS
100.00 %

Details
DomainIPPortCipher (OpenSsl / IANA)
hive.fogelfrei.com
84.149.132.236
443
ECDHE-ECDSA-CHACHA20-POLY1305
(Recommended)
TLSv1.2
0xCC,0xA9
FS
3 Ciphers, 31.70 sec
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
ECDH
ECDSA
CHACHA20/POLY1305(256)
AEAD



ECDHE-ECDSA-AES256-GCM-SHA384
(Recommended)
TLSv1.2
0xC0,0x2C
FS

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
ECDH
ECDSA
AESGCM(256)
AEAD



ECDHE-ECDSA-AES128-GCM-SHA256
(Recommended)
TLSv1.2
0xC0,0x2B
FS

TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
ECDH
ECDSA
AESGCM(128)
AEAD


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=9105195b-3bd0-46ee-8c77-bc96d217b752


Last Result: https://check-your-website.server-daten.de/?q=hive.fogelfrei.com - 2024-09-05 09:49:24


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=hive.fogelfrei.com" target="_blank">Check this Site: hive.fogelfrei.com</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

QR-Code of this page - https://check-your-website.server-daten.de/?d=hive.fogelfrei.com