Check DNS, Urls + Redirects, Certificates and Content of your Website




P

Tls-Protocol error

Checked:
05.09.2024 09:49:11


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
hive.zeitfogel.com
CNAME
zeitfogel.com
yes
1
0

A
84.149.132.236
Moosburg/Bavaria/Germany (DE) - Deutsche Telekom AG
Hostname: p549584ec.dip0.t-ipconnect.de
yes


www.hive.zeitfogel.com

Name Error
yes
1
0
*.zeitfogel.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.hive.zeitfogel.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20038, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 20.09.2024, 00:00:00 +, Signature-Inception: 30.08.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=



1 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 18.09.2024, 05:00:00 +, Signature-Inception: 05.09.2024, 04:00:00 +, KeyTag 20038, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20038 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 19718, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 59354, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 19.09.2024, 14:02:35 +, Signature-Inception: 04.09.2024, 13:57:35 +, KeyTag 19718, Signer-Name: com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 19718 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest "isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: zeitfogel.com
zeitfogel.com
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 47385, DigestType 2 and Digest Wb5eXpkAo+9EdIZvfoQDd6Q+6F7rTWCGmiaCkHbNDlg=



1 RRSIG RR to validate DS RR found



RRSIG-Owner zeitfogel.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 11.09.2024, 00:58:13 +, Signature-Inception: 03.09.2024, 23:48:13 +, KeyTag 59354, Signer-Name: com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 59354 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 47385, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner zeitfogel.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 19.09.2024, 00:00:00 +, Signature-Inception: 29.08.2024, 00:00:00 +, KeyTag 47385, Signer-Name: zeitfogel.com



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 47385 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 47385, DigestType 2 and Digest "Wb5eXpkAo+9EdIZvfoQDd6Q+6F7rTWCGmiaCkHbNDlg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: hive.zeitfogel.com
hive.zeitfogel.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "zeitfogel.com" and the NextOwner "hive.zeitfogel.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, NS, SOA, RRSIG, NSEC, DNSKEY, CAA



RRSIG Type 5 validates the CNAME - Result: zeitfogel.com
Validated: RRSIG-Owner hive.zeitfogel.com., Algorithm: 13, 3 Labels, original TTL: 7200 sec, Signature-expiration: 19.09.2024, 00:00:00 +, Signature-Inception: 29.08.2024, 00:00:00 +, KeyTag 47385, Signer-Name: zeitfogel.com

Zone: www.hive.zeitfogel.com
www.hive.zeitfogel.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "hive.zeitfogel.com" and the NextOwner "zeitfogel.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC


3. Name Servers

DomainNameserverNS-IP
www.hive.zeitfogel.com
  angus.ns.servercow.de

zeitfogel.com
  angus.ns.servercow.de / angus.ns.servercow.de
5.1.76.153
Frankfurt am Main/Hesse/Germany (DE) - meerfarbig GmbH & Co. KG


 
2a00:f820:417:153::
Frankfurt am Main/Hesse/Germany (DE) - meerfarbig GmbH & Co. KG


  dexter.ns.servercow.net / dexter
45.85.48.12
Willich/North Rhine-Westphalia/Germany (DE) - The Infrastructure Company GmbH


 
2a0e:b680:c:253::
Willich/North Rhine-Westphalia/Germany (DE) - The Infrastructure Company GmbH


  galloway.ns.servercow.com / galloway
94.130.42.192
Ergolding/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:fff2:20:353::
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH

com
  a.gtld-servers.net / nnn1-par6


  b.gtld-servers.net / nnn1-elwaw4


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-defra-5


  e.gtld-servers.net / nnn1-par6


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-frmrs-2


  k.gtld-servers.net / nnn1-frmrs-2


  l.gtld-servers.net / nnn1-frmrs-2


  m.gtld-servers.net / nnn1-frmrs-2


4. SOA-Entries


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1725522539
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:13


Domain:zeitfogel.com
Zone-Name:zeitfogel.com
Primary:angus.ns.servercow.de
Mail:hostmaster.servercow.de
Serial:2024090501
Refresh:14400
Retry:3600
Expire:1209600
TTL:3600
num Entries:6


Domain:www.hive.zeitfogel.com
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://hive.zeitfogel.com/
84.149.132.236 gzip used - 556 / 1033 - 46.18 %
200

Html is minified: 135.03 %
0.043
H
Server: openresty
Date: Thu, 05 Sep 2024 07:50:01 GMT
Transfer-Encoding: chunked
Connection: keep-alive
ETag: W/"66829520-409"
Content-Type: text/html
Last-Modified: Mon, 01 Jul 2024 11:38:08 GMT
Content-Encoding: gzip
Content-Length: 556

• https://hive.zeitfogel.com/
84.149.132.236
-103

0.047
P
SecureConnectionError (3, 0x80131501). The SSL connection could not be established, see inner exception. Authentication failed because the remote party sent a TLS alert: '112' (FF: SSL_ERROR_UNRECOGNIZED_NAME_ALERT)

• http://hive.zeitfogel.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
84.149.132.236 gzip used - 111 / 150 - 26.00 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.29 %
0.026
A
Not Found
Visible Content:
Server: openresty
Date: Thu, 05 Sep 2024 07:50:01 GMT
Transfer-Encoding: chunked
Connection: keep-alive
Content-Type: text/html
Content-Encoding: gzip
Content-Length: 111

• https://84.149.132.236/
84.149.132.236
-103

0.040
P
SecureConnectionError (3, 0x80131501). The SSL connection could not be established, see inner exception. Authentication failed because the remote party sent a TLS alert: '112' (FF: SSL_ERROR_UNRECOGNIZED_NAME_ALERT)

7. Comments


1. General Results, most used to calculate the result

Aname "hive.zeitfogel.com" is subdomain, public suffix is ".com", top-level-domain is ".com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .com-domains preloaded: 94787 (complete: 245733)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: hive.zeitfogel.com has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: hive.zeitfogel.com has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood - only one version with Http-Status 200
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (2 urls)
http://hive.zeitfogel.com/ 84.149.132.236


Url with incomplete Content-Type - header - missing charset
http://hive.zeitfogel.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 84.149.132.236


Url with incomplete Content-Type - header - missing charset
HFatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain hive.zeitfogel.com, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.hive.zeitfogel.com

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 13 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 13 Queries complete, 11 with IPv6, 2 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.angus.ns.servercow.de (2a00:f820:417:153::, 5.1.76.153)
Ok (4 - 8):: An average of 4.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 3 Name Servers included in Delegation: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 3 Name Servers included in 1 Zone definitions: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com, 1 Name Servers listed in SOA.Primary: angus.ns.servercow.de.
AGood: Only one SOA.Primary Name Server found.: angus.ns.servercow.de.
AGood: SOA.Primary Name Server included in the delegation set.: angus.ns.servercow.de.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 45., 5., 94., 3 different subnets (first two Bytes): 45.85., 5.1., 94.130., 3 different subnets (first three Bytes): 45.85.48., 5.1.76., 94.130.42.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 3 different subnets (first block): 2a00:, 2a01:, 2a0e:, 3 different subnets (first two blocks): 2a00:f820:, 2a01:04f8:, 2a0e:b680:, 3 different subnets (first three blocks): 2a00:f820:0417:, 2a01:04f8:fff2:, 2a0e:b680:000c:, 3 different subnets (first four blocks): 2a00:f820:0417:0153:, 2a01:04f8:fff2:0020:, 2a0e:b680:000c:0253:
AExcellent: Every Name Server IPv6-address starts with an unique Hex-block
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: angus.ns.servercow.de: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 64550 milliseconds, 64.550 seconds


8. Connections

No connection informations found. Perhaps only http - connections.


9. Certificates

No certificate informations found. Perhaps only http - connections.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: angus.ns.servercow.de, dexter.ns.servercow.net, galloway.ns.servercow.com

QNr.DomainTypeNS used
1
de
NS
k.root-servers.net (2001:7fd::1)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
2
angus.ns.servercow.de: 2a00:f820:417:153::, 5.1.76.153
NS
a.nic.de (2001:678:2::53)
3
net
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
4
dexter.ns.servercow.net
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: dns200.anycast.me, ns200.anycast.me
5
com
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
6
galloway.ns.servercow.com
NS
e.gtld-servers.net (2001:502:1ca1::30)

Answer: ns.second-ns.com, ns1.your-server.de, ns3.second-ns.de

Answer: ns.second-ns.com
213.239.204.242, 2a01:4f8:0:a101::b:1
7
me
NS
h.root-servers.net (2001:500:1::53)

Answer: a0.nic.me, a2.nic.me, b0.nic.me, b2.nic.me, c0.nic.me
8
dns200.anycast.me: 46.105.206.200
NS
a0.nic.me (2001:500:53::1)

Answer: ns200.anycast.me
46.105.207.200
9
ns1.your-server.de: 213.133.100.102, 2a01:4f8:0:1::5ddc:1
NS
a.nic.de (2001:678:2::53)

Answer: ns3.second-ns.de
193.47.99.4, 2001:67c:192c::add:b3
10
dexter.ns.servercow.net: 45.85.48.12
A
dns200.anycast.me (46.105.206.200)
11
dexter.ns.servercow.net: 2a0e:b680:c:253::
AAAA
dns200.anycast.me (46.105.206.200)
12
galloway.ns.servercow.com: 94.130.42.192
A
ns.second-ns.com (2a01:4f8:0:a101::b:1)
13
galloway.ns.servercow.com: 2a01:4f8:fff2:20:353::
AAAA
ns.second-ns.com (2a01:4f8:0:a101::b:1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
hive.zeitfogel.com
5
issue
letsencrypt.org
1
0
zeitfogel.com
5
issue
letsencrypt.org
1
0
com
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
zeitfogel.com

ok
1
0
hive.zeitfogel.com


1
0
_acme-challenge.hive.zeitfogel.com

Name Error - The domain name does not exist
1
0
_acme-challenge.hive.zeitfogel.com.zeitfogel.com

Name Error - The domain name does not exist
1
0
_acme-challenge.hive.zeitfogel.com.hive.zeitfogel.com

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SPF-Check is alpha - 2024-06-22, DMARC-Detailcheck is alpha - 2024-07-06, SMTP-TLS-Reporting is alpa - 2024-07-13)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
SPF
TXT
hive.zeitfogel.com

32768TXT expected, but CNAME found. CNAME not allowed, only TXT queries are allowed. See RFC 7208, 4.4.



16. Cipher Suites

No results


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=6e08e595-301b-4a05-bcd9-b53f5dbdc047


Last Result: https://check-your-website.server-daten.de/?q=hive.zeitfogel.com - 2024-09-05 09:49:11


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=hive.zeitfogel.com" target="_blank">Check this Site: hive.zeitfogel.com</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

QR-Code of this page - https://check-your-website.server-daten.de/?d=hive.zeitfogel.com