Check DNS, Urls + Redirects, Certificates and Content of your Website



J

General Configuration problem

Checked:
17.09.2022 20:18:34


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
hypera.io
A
198.20.71.142
Chicago/Illinois/United States (US) - SingleHop LLC
Hostname: vz01-phx.stablehost.com
yes
1
0

AAAA

yes


www.hypera.io

Name Error
yes
1
0
*.hypera.io
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 20826, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 30.09.2022, 00:00:00 +, Signature-Inception: 09.09.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: io
io
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=



1 RRSIG RR to validate DS RR found



RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.09.2022, 16:00:00 +, Signature-Inception: 17.09.2022, 15:00:00 +, KeyTag 20826, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20826 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 13608, Flags 256



Public Key with Algorithm 8, KeyTag 49206, Flags 256



Public Key with Algorithm 8, KeyTag 57355, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 08.10.2022, 15:54:13 +, Signature-Inception: 17.09.2022, 14:54:13 +, KeyTag 57355, Signer-Name: io



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 57355 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest "laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: hypera.io
hypera.io
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "t6fg4j61ic49qkj0nrvdqvdk7l342344" between the hashed NSEC3-owner "t6fa68s8laghk1pankt9jfehrp737907" and the hashed NextOwner "t6fr19lklc08jg9v987dhkac9ca8uris". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner t6fa68s8laghk1pankt9jfehrp737907.io., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.10.2022, 15:54:13 +, Signature-Inception: 17.09.2022, 14:54:13 +, KeyTag 13608, Signer-Name: io



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "0d790076pp5pfktg2hrthj5bj6ckckcb" as Owner. That's the Hash of "io" with the NextHashedOwnerName "0d7bd4g2j0sls1qj0ovhk6nsri6v9mik". So that domain name is the Closest Encloser of "hypera.io". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 0d790076pp5pfktg2hrthj5bj6ckckcb.io., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.10.2022, 18:12:46 +, Signature-Inception: 17.09.2022, 17:12:46 +, KeyTag 13608, Signer-Name: io



0 DNSKEY RR found




Zone: www.hypera.io
www.hypera.io
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.hypera.io
  dns1.registrar-servers.com

hypera.io
  dns1.registrar-servers.com / Auth_NC_Host2.Paris_Node1
156.154.132.200
Sterling/Virginia/United States (US) - NeuStar, Inc.


 
2610:a1:1024::200
Sterling/Virginia/United States (US) - NeuStar


  dns2.registrar-servers.com / Auth_NC_Host1.Frankfurt_Node1
156.154.133.200
Sterling/Virginia/United States (US) - NeuStar, Inc.


 
2610:a1:1025::200
Sterling/Virginia/United States (US) - NeuStar

io
  a0.nic.io / app22.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


  a2.nic.io / FRA6


  b0.nic.io / app3.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  c0.nic.io / app3.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


4. SOA-Entries


Domain:io
Zone-Name:io
Primary:a0.nic.io
Mail:hostmaster.donuts.email
Serial:1663438073
Refresh:7200
Retry:900
Expire:1209600
TTL:3600
num Entries:4


Domain:hypera.io
Zone-Name:hypera.io
Primary:dns1.registrar-servers.com
Mail:hostmaster.registrar-servers.com
Serial:1661656350
Refresh:43200
Retry:3600
Expire:604800
TTL:3601
num Entries:4


Domain:www.hypera.io
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because Chrome (used to create the Screenshot) could not load the url. Instead, there was a redirect to "chrome-error://chromewebdata/", so the content of your website isn't visible.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://hypera.io/
198.20.71.142 GZip used - 577 / 980 - 41.12 %
200

Html is minified: 148.04 %
0.333
H
small visible content (num chars: 222)
My Projects IT 4683 - Management of Information Technology and Human Computer Interaction IT 4203 - Advance Web Development IT 4123 - Electronic Commerce Prestashop IT - 4983 Capstone Project: Course Review Management
Connection: close
Content-Type: text/html
Last-Modified: Sat, 17 Sep 2022 18:06:13 GMT
Etag: "3d4-63260c95-f1523ea84f4da6f3;gz"
Accept-Ranges: bytes
Content-Encoding: gzip
Vary: Accept-Encoding
Content-Length: 577
Date: Sat, 17 Sep 2022 18:19:17 GMT
Server: LiteSpeed

• https://hypera.io/
198.20.71.142
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
9.720
J
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 0)
Connection: close
Content-Type: text/html
Last-Modified: Wed, 17 Jun 2020 20:01:21 GMT
Etag: "a3-5eea7691-6382ea22fc56b8cb;;;"
Accept-Ranges: bytes
Content-Length: 163
Date: Sat, 17 Sep 2022 18:19:18 GMT
Server: LiteSpeed
Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000

• http://hypera.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
198.20.71.142
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 101.39 %
0.333
A
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server! Proudly powered by LiteSpeed Web Server Please be advised that LiteSpeed Technologies Inc. is not a web hosting company and, as such, has no control over content found on this site.
Connection: close
Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 1237
Date: Sat, 17 Sep 2022 18:19:28 GMT
Server: LiteSpeed

• https://198.20.71.142/
198.20.71.142
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
8.910
J
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 0)
Connection: close
Content-Type: text/html
Last-Modified: Wed, 17 Jun 2020 20:01:21 GMT
Etag: "a3-5eea7691-6382ea22fc56b8cb;;;"
Accept-Ranges: bytes
Content-Length: 163
Date: Sat, 17 Sep 2022 18:19:29 GMT
Server: LiteSpeed
Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000

7. Comments


1. General Results, most used to calculate the result

Aname "hypera.io" is domain, public suffix is ".io", top-level-domain is ".io", top-level-domain-type is "country-code", Country is British Indian Ocean Territory (the), tld-manager is "IO Top Level Domain Registry", num .io-domains preloaded: 1975 (complete: 199710)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: hypera.io has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: hypera.io has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (4 urls)
http://hypera.io/ 198.20.71.142


Url with incomplete Content-Type - header - missing charset
https://hypera.io/ 198.20.71.142


Url with incomplete Content-Type - header - missing charset
http://hypera.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 198.20.71.142


Url with incomplete Content-Type - header - missing charset
https://198.20.71.142/ 198.20.71.142


Url with incomplete Content-Type - header - missing charset
Bhttps://hypera.io/ 198.20.71.142
200

Missing HSTS-Header
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Jhttps://hypera.io/ 198.20.71.142
200

Fatal: Control Panel error message. Ask your hoster. There is a cPanel-Redirect to the SORRY-page /cgi-sys/defaultwebpage.cgi with additional instructions.
Jhttps://198.20.71.142/ 198.20.71.142
200

Fatal: Control Panel error message. Ask your hoster. There is a cPanel-Redirect to the SORRY-page /cgi-sys/defaultwebpage.cgi with additional instructions.
Nhttps://hypera.io/ 198.20.71.142
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://198.20.71.142/ 198.20.71.142
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhypera.io:2083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhypera.io:2096


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
O
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain hypera.io, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 22 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 22 Queries complete, 22 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Bad (greater 8):: An average of 11.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: dns1.registrar-servers.com, dns2.registrar-servers.com, 2 Name Servers included in Delegation: dns1.registrar-servers.com, dns2.registrar-servers.com, 2 Name Servers included in 1 Zone definitions: dns1.registrar-servers.com, dns2.registrar-servers.com, 1 Name Servers listed in SOA.Primary: dns1.registrar-servers.com.
AGood: Only one SOA.Primary Name Server found.: dns1.registrar-servers.com.
AGood: SOA.Primary Name Server included in the delegation set.: dns1.registrar-servers.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: dns1.registrar-servers.com, dns2.registrar-servers.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: registrar-servers.com
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 2 Name Servers, 1 different subnets (first Byte): 156., 1 different subnets (first two Bytes): 156.154., 2 different subnets (first three Bytes): 156.154.132., 156.154.133.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 1 different subnets (first block): 2610:, 1 different subnets (first two blocks): 2610:00a1:, 2 different subnets (first three blocks): 2610:00a1:1024:, 2610:00a1:1025:, 2 different subnets (first four blocks): 2610:00a1:1024:0000:, 2610:00a1:1025:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 4 good Nameserver
Nameserver doesn't pass all EDNS-Checks: dns1.registrar-servers.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
https://hypera.io/ 198.20.71.142
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://198.20.71.142/ 198.20.71.142
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 935720 milliseconds, 935.720 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
hypera.io
198.20.71.142
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
hypera.io
198.20.71.142
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


198.20.71.142
198.20.71.142
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok

198.20.71.142
198.20.71.142
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2


hypera.io
198.20.71.142
25
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

hypera.io
198.20.71.142
25
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
 
no Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

no Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=hypera.io

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


hypera.io
198.20.71.142
2083
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

hypera.io
198.20.71.142
2083
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=*.stablehost.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


hypera.io
198.20.71.142
2096
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

hypera.io
198.20.71.142
2096
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)
1CN=*.stablehost.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey


9. Certificates

1.
1.
CN=*.stablehost.com, OU=Domain Control Validated
05.06.2015
05.06.2018
1580 days expired
*.stablehost.com, stablehost.com - 2 entries
1.
1.
CN=*.stablehost.com, OU=Domain Control Validated
05.06.2015

05.06.2018
1580 days expired
*.stablehost.com, stablehost.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:11218B0833A6FA360FE90A7F1E47FBF1510E
Thumbprint:095252BD34CEAF314EABF54C6BE5AB5AA25F36D4
SHA256 / Certificate:4JjYjkLuwfbPz7J4KZJYEtCiiWYV+olOrdenf4y0WQQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):63420d2d24029d85481940eafadb02f28a055afaf346b432de05ff739c9e7b6b
SHA256 hex / Subject Public Key Information (SPKI):63420d2d24029d85481940eafadb02f28a055afaf346b432de05ff739c9e7b6b
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp2.globalsign.com/gsalphasha2g2
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)

NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

2.
CN=AlphaSSL CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE
20.02.2014
20.02.2024
expires in 506 days


2.
CN=AlphaSSL CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE
20.02.2014

20.02.2024
expires in 506 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:040000000001444EF03631
Thumbprint:4C27431717565A3A07F3E6D0032C4258949CF9EC
SHA256 / Certificate:7nk2QxmUdO1g79yMzeTTdEWSFoNZOqdRu/juSRo5Hpc=
SHA256 hex / Cert (DANE * 0 1):ee793643199474ed60efdc8ccde4d37445921683593aa751bbf8ee491a391e97
SHA256 hex / PublicKey (DANE * 1 1):6a631e57a81bf50371d197fb16d275f566bfb7607b2a9085ff59f626cdd4b925
SHA256 hex / Subject Public Key Information (SPKI):6a631e57a81bf50371d197fb16d275f566bfb7607b2a9085ff59f626cdd4b925
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.globalsign.com/rootr1
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
01.09.1998
28.01.2028
expires in 1944 days


3.
CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE
01.09.1998

28.01.2028
expires in 1944 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:040000000001154B5AC394
Thumbprint:B1BC968BD4F49D622AA89A81F2150152A41D829C
SHA256 / Certificate:69QQQOS7PsdCyeOB0x7ypBpItmhclufO88HfbNQzHJk=
SHA256 hex / Cert (DANE * 0 1):ebd41040e4bb3ec742c9e381d31ef2a41a48b6685c96e7cef3c1df6cd4331c99
SHA256 hex / PublicKey (DANE * 1 1):2bcee858158cf5465fc9d76f0dfa312fef25a4dca8501da9b46b67d1fbfa1b64
SHA256 hex / Subject Public Key Information (SPKI):2bcee858158cf5465fc9d76f0dfa312fef25a4dca8501da9b46b67d1fbfa1b64
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=hypera.io
17.09.2022
16.12.2022
expires in 75 days
hypera.io - 1 entry
2.
1.
CN=hypera.io
17.09.2022

16.12.2022
expires in 75 days
hypera.io - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03691958D4234B7FEABDD708669AF83C6794
Thumbprint:72D9C45D0FEAE257B4FC519C2DFC51287115EB45
SHA256 / Certificate:5YV/eWtlOxv06YsvJzQ0oFHr+M3wbTYv5AkoY9w/WJ8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2996dac55047b1cfc873e4851ab138918c13edf5f1c741b74e464f800d564b9d
SHA256 hex / Subject Public Key Information (SPKI):2996dac55047b1cfc873e4851ab138918c13edf5f1c741b74e464f800d564b9d (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1079 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1079 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4628 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4628 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
1.
CN=*.stablehost.com
24.05.2022
25.05.2023
expires in 235 days
*.stablehost.com, stablehost.com - 2 entries
3.
1.
CN=*.stablehost.com
24.05.2022

25.05.2023
expires in 235 days
*.stablehost.com, stablehost.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00F16845193C0B8D700A0D831A17F4D6B5
Thumbprint:CAD7A564240F3CAD84E9362642C8DFDDEFE3299E
SHA256 / Certificate:hm7ko00RZMS0krWjIRLLlduFmC8pSETwRHc1kDcLx7s=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bf1149dee29ff3c3b9b062ac43b398b46e8ec152787797f2ae6a197671e630fc
SHA256 hex / Subject Public Key Information (SPKI):bf1149dee29ff3c3b9b062ac43b398b46e8ec152787797f2ae6a197671e630fc (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=*.stablehost.com
24.05.2022
25.05.2023
expires in 235 days
*.stablehost.com, stablehost.com - 2 entries

2.
CN=*.stablehost.com
24.05.2022

25.05.2023
expires in 235 days
*.stablehost.com, stablehost.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00F16845193C0B8D700A0D831A17F4D6B5
Thumbprint:CAD7A564240F3CAD84E9362642C8DFDDEFE3299E
SHA256 / Certificate:hm7ko00RZMS0krWjIRLLlduFmC8pSETwRHc1kDcLx7s=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bf1149dee29ff3c3b9b062ac43b398b46e8ec152787797f2ae6a197671e630fc
SHA256 hex / Subject Public Key Information (SPKI):bf1149dee29ff3c3b9b062ac43b398b46e8ec152787797f2ae6a197671e630fc (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3013 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3013 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 3013 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 3013 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 5588 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 5588 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 2283 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 2283 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 2283 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 2283 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
0
1
1
CN=R3, O=Let's Encrypt, C=US
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4126991293
leaf cert
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
2022-09-01 00:00:00
2022-11-30 23:59:59
hypera.io - 1 entries


4108924493
leaf cert
CN=R3, O=Let's Encrypt, C=US
2022-08-27 06:49:29
2022-11-25 06:49:28
hypera.io - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
1
1
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7450610368
leaf cert
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX
2022-08-31 22:00:00
2022-11-30 22:59:59
hypera.io
1 entries


7418312204
leaf cert
CN=R3, O=Let's Encrypt, C=US
2022-08-27 04:49:29
2022-11-25 05:49:28
hypera.io
1 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://hypera.io/
198.20.71.142
meta
other
2

0


0
0
0

https://198.20.71.142/
198.20.71.142
meta
other
2

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://hypera.io/
198.20.71.142
meta
Cache-control
no-cache


1
ok








meta
refresh
0;URL=/cgi-sys/defaultwebpage.cgi


1
ok







https://198.20.71.142/
198.20.71.142
meta
Cache-control
no-cache


1
ok








meta
refresh
0;URL=/cgi-sys/defaultwebpage.cgi


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: dns1.registrar-servers.com, dns2.registrar-servers.com

QNr.DomainTypeNS used
1
com
NS
b.root-servers.net (2001:500:200::b)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
dns1.registrar-servers.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: edns1.registrar-servers.com, edns2.registrar-servers.com, edns4.ultradns.com, edns4.ultradns.net, edns4.ultradns.org

Answer: edns1.registrar-servers.com
2001:41d0:800:2d2c::2, 51.89.217.44

Answer: edns2.registrar-servers.com
2607:5300:203:7f53::2, 51.222.46.83

Answer: edns4.ultradns.com
2001:502:f3ff::204, 204.74.66.4
3
dns2.registrar-servers.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: edns1.registrar-servers.com, edns2.registrar-servers.com, edns4.ultradns.com, edns4.ultradns.net, edns4.ultradns.org

Answer: edns1.registrar-servers.com
2001:41d0:800:2d2c::2, 51.89.217.44

Answer: edns2.registrar-servers.com
2607:5300:203:7f53::2, 51.222.46.83

Answer: edns4.ultradns.com
2001:502:f3ff::204, 204.74.66.4
4
net
NS
b.root-servers.net (2001:500:200::b)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
5
edns4.ultradns.net
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: pdns196.ultradns.biz, pdns196.ultradns.co.uk, pdns196.ultradns.com, pdns196.ultradns.info, pdns196.ultradns.net, pdns196.ultradns.org

Answer: pdns196.ultradns.net
156.154.65.196, 2610:a1:1014::e8
6
org
NS
g.root-servers.net (2001:500:12::d0d)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
7
edns4.ultradns.org
NS
a0.org.afilias-nst.info (2001:500:e::1)

Answer: pdns196.ultradns.biz, pdns196.ultradns.co.uk, pdns196.ultradns.com, pdns196.ultradns.info, pdns196.ultradns.net, pdns196.ultradns.org

Answer: pdns196.ultradns.org
156.154.67.196, 2001:502:4612::e8
8
biz
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld.biz, b.gtld.biz, c.gtld.biz, w.gtld.biz, x.gtld.biz, y.gtld.biz
9
pdns196.ultradns.biz: 156.154.66.196, 2610:a1:1015::e8
NS
a.gtld.biz (2001:502:ad09::30)
10
uk
NS
e.root-servers.net (2001:500:a8::e)

Answer: dns1.nic.uk, dns2.nic.uk, dns3.nic.uk, dns4.nic.uk, nsa.nic.uk, nsb.nic.uk, nsc.nic.uk, nsd.nic.uk
11
pdns196.ultradns.co.uk: 156.154.69.196, 2610:a1:1017::e8
NS
dns1.nic.uk (2a01:618:400::1)
12
pdns196.ultradns.com: 156.154.64.196, 2001:502:f3ff::e8
NS
a.gtld-servers.net (2001:503:a83e::2:30)
13
info
NS
e.root-servers.net (2001:500:a8::e)

Answer: a0.info.afilias-nst.info, a2.info.afilias-nst.info, b0.info.afilias-nst.org, b2.info.afilias-nst.org, c0.info.afilias-nst.info, d0.info.afilias-nst.org
14
pdns196.ultradns.info: 156.154.68.196, 2610:a1:1016::e8
NS
a0.info.afilias-nst.info (2001:500:19::1)
15
edns4.ultradns.net: 204.74.110.4
A
pdns196.ultradns.biz (2610:a1:1015::e8)
16
edns4.ultradns.net: 2610:a1:1014::204
AAAA
pdns196.ultradns.biz (2610:a1:1015::e8)
17
edns4.ultradns.org: 204.74.111.4
A
pdns196.ultradns.biz (2610:a1:1015::e8)
18
edns4.ultradns.org: 2001:502:4612::204
AAAA
pdns196.ultradns.biz (2610:a1:1015::e8)
19
dns1.registrar-servers.com: 156.154.132.200
A
edns1.registrar-servers.com (2001:41d0:800:2d2c::2)
20
dns1.registrar-servers.com: 2610:a1:1024::200
AAAA
edns1.registrar-servers.com (2001:41d0:800:2d2c::2)
21
dns2.registrar-servers.com: 156.154.133.200
A
edns1.registrar-servers.com (2001:41d0:800:2d2c::2)
22
dns2.registrar-servers.com: 2610:a1:1025::200
AAAA
edns1.registrar-servers.com (2001:41d0:800:2d2c::2)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
hypera.io
0

no CAA entry found
1
0
io
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
hypera.io
v=spf1 include:spf.efwd.registrar-servers.com ~all
ok
1
0
_acme-challenge.hypera.io

Name Error - The domain name does not exist
1
0
_acme-challenge.hypera.io.hypera.io

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

hypera.io
10
eforward1.registrar-servers.com
0
5
ok


A


162.255.118.51
0
1
ok


CNAME



0
0
ok

MX

hypera.io
10
eforward2.registrar-servers.com
0
5
ok


A


162.255.118.52
0
1
ok


CNAME



0
0
ok

MX

hypera.io
10
eforward3.registrar-servers.com
0
5
ok


A


162.255.118.51
0
1
ok


CNAME



0
0
ok

MX

hypera.io
15
eforward4.registrar-servers.com
0
5
ok


A


162.255.118.52
0
1
ok


CNAME



0
0
ok

MX

hypera.io
20
eforward5.registrar-servers.com
0
5
ok


A


162.255.118.51
0
1
ok


CNAME



0
0
ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
hypera.io
198.20.71.142
25
Fatal: 234 Cipher Suites checked, no connection possible. Duration 600 seconds, that's too long. May be a blocking firewall, AutoBan, FailBan etc. Remove that if you want to check your Cipher Suites.
0 Ciphers, 604.14 sec






443
Skipped because of the previous timeout.
0 Ciphers, 0.00 sec






2083
Skipped because of the previous timeout.
0 Ciphers, 0.00 sec






2096
Skipped because of the previous timeout.
0 Ciphers, 0.00 sec





17. Portchecks

DomainIPPortDescriptionResultAnswer
hypera.io
198.20.71.142
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 300 allowed. 220-Local time is now 11:19. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

hypera.io
198.20.71.142
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 300 allowed. 220-Local time is now 11:19. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

hypera.io
198.20.71.142
22
SSH
open
SSH-2.0-OpenSSH_5.3

hypera.io
198.20.71.142
22
SSH
open
SSH-2.0-OpenSSH_5.3

hypera.io
198.20.71.142
25
SMTP
open
220-pcluster04.stablehost.com ESMTP Exim 4.95 #2 Sat, 17 Sep 2022 11:19:44 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

Answer EHLO: 250-pcluster04.stablehost.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP

Answer AUTH LOGIN: 334 VXNlcm5hbWU6

Mail certificate is valid
hypera.io
198.20.71.142
25
SMTP
open
220-pcluster04.stablehost.com ESMTP Exim 4.95 #2 Sat, 17 Sep 2022 11:19:44 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.
Mail certificate is valid
Answer EHLO: 250-pcluster04.stablehost.com Hello intern.server-daten.de [85.215.2.227] 250-SIZE 52428800 250-8BITMIME 250-PIPELINING 250-PIPE_CONNECT 250-AUTH PLAIN LOGIN 250-STARTTLS 250 HELP Good: STARTTLS found
Answer AUTH LOGIN: 334 VXNlcm5hbWU6 Bad: Unencrypted Login allowed
Mail From: openrelay-test@check-your-website.server-daten.de
RCPT TO: openrelay-result@check-your-website.server-daten.de
STARTTLS not working.
hypera.io
198.20.71.142
53
DNS



hypera.io
198.20.71.142
53
DNS



hypera.io
198.20.71.142
110
POP3
open
+OK Dovecot ready.

hypera.io
198.20.71.142
110
POP3
open
+OK Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
hypera.io
198.20.71.142
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

hypera.io
198.20.71.142
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
This port ist unencrypted and deprecated. Don't use it.
hypera.io
198.20.71.142
465
SMTP (encrypted)
open


hypera.io
198.20.71.142
465
SMTP (encrypted)
open


hypera.io
198.20.71.142
587
SMTP (encrypted, submission)
open
220-pcluster04.stablehost.com ESMTP Exim 4.95 #2 Sat, 17 Sep 2022 11:19:44 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

hypera.io
198.20.71.142
587
SMTP (encrypted, submission)
open
220-pcluster04.stablehost.com ESMTP Exim 4.95 #2 Sat, 17 Sep 2022 11:19:44 -0700 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

hypera.io
198.20.71.142
993
IMAP (encrypted)
open


hypera.io
198.20.71.142
993
IMAP (encrypted)
open


hypera.io
198.20.71.142
995
POP3 (encrypted)
open


hypera.io
198.20.71.142
995
POP3 (encrypted)
open


hypera.io
198.20.71.142
1433
MS SQL



hypera.io
198.20.71.142
1433
MS SQL



hypera.io
198.20.71.142
2082
cPanel (http)
open
http://198.20.71.142:2082/
Http-Status: 403
Forbidden

hypera.io
198.20.71.142
2082
cPanel (http)
open
http://198.20.71.142:2082/
Http-Status: 403
Forbidden

hypera.io
198.20.71.142
2083
cPanel (https)
open
https://198.20.71.142:2083/
Http-Status: 403
Forbidden
Certificate is invalid
hypera.io
198.20.71.142
2083
cPanel (https)
open
https://198.20.71.142:2083/
Http-Status: 403
Forbidden
Certificate is invalid
hypera.io
198.20.71.142
2086
WHM (http)



hypera.io
198.20.71.142
2086
WHM (http)



hypera.io
198.20.71.142
2087
WHM (https)



hypera.io
198.20.71.142
2087
WHM (https)



hypera.io
198.20.71.142
2089
cPanel Licensing



hypera.io
198.20.71.142
2089
cPanel Licensing



hypera.io
198.20.71.142
2095
cPanel Webmail (http)
open
http://198.20.71.142:2095/
Http-Status: 403
Forbidden

hypera.io
198.20.71.142
2095
cPanel Webmail (http)
open
http://198.20.71.142:2095/
Http-Status: 403
Forbidden

hypera.io
198.20.71.142
2096
cPanel Webmail (https)
open
https://198.20.71.142:2096/
Http-Status: 403
Forbidden
Certificate is invalid
hypera.io
198.20.71.142
2096
cPanel Webmail (https)
open
https://198.20.71.142:2096/
Http-Status: 403
Forbidden
Certificate is invalid
hypera.io
198.20.71.142
2222
DirectAdmin (http)



hypera.io
198.20.71.142
2222
DirectAdmin (http)



hypera.io
198.20.71.142
2222
DirectAdmin (https)



hypera.io
198.20.71.142
2222
DirectAdmin (https)



hypera.io
198.20.71.142
3306
mySql



hypera.io
198.20.71.142
3306
mySql



hypera.io
198.20.71.142
5224
Plesk Licensing



hypera.io
198.20.71.142
5224
Plesk Licensing



hypera.io
198.20.71.142
5432
PostgreSQL



hypera.io
198.20.71.142
5432
PostgreSQL



hypera.io
198.20.71.142
8080
Ookla Speedtest (http)



hypera.io
198.20.71.142
8080
Ookla Speedtest (http)



hypera.io
198.20.71.142
8080
Ookla Speedtest (https)



hypera.io
198.20.71.142
8080
Ookla Speedtest (https)



hypera.io
198.20.71.142
8083
VestaCP http



hypera.io
198.20.71.142
8083
VestaCP http



hypera.io
198.20.71.142
8083
VestaCP https



hypera.io
198.20.71.142
8083
VestaCP https



hypera.io
198.20.71.142
8443
Plesk Administration (https)



hypera.io
198.20.71.142
8443
Plesk Administration (https)



hypera.io
198.20.71.142
8447
Plesk Installer + Updates



hypera.io
198.20.71.142
8447
Plesk Installer + Updates



hypera.io
198.20.71.142
8880
Plesk Administration (http)



hypera.io
198.20.71.142
8880
Plesk Administration (http)



hypera.io
198.20.71.142
10000
Webmin (http)
open
http://198.20.71.142:10000/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

hypera.io
198.20.71.142
10000
Webmin (http)
open
http://198.20.71.142:10000/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

hypera.io
198.20.71.142
10000
Webmin (https)
open
https://198.20.71.142:10000/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

hypera.io
198.20.71.142
10000
Webmin (https)
open
https://198.20.71.142:10000/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.



Permalink: https://check-your-website.server-daten.de/?i=a3cc1213-ca0f-435f-bbb9-9ae99293d5b8


Last Result: https://check-your-website.server-daten.de/?q=hypera.io - 2022-09-17 20:18:34


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=hypera.io" target="_blank">Check this Site: hypera.io</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro