Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
03.07.2021 06:17:59

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
independentcare.com.au
A
221.121.138.120
Tuggerah/New South Wales/Australia (AU) - Servers Australia Pty. Ltd
Hostname: dmgweb2.diskmanservers.com.au
yes
1
0

AAAA

yes


www.independentcare.com.au
A
221.121.138.120
Tuggerah/New South Wales/Australia (AU) - Servers Australia Pty. Ltd
Hostname: dmgweb2.diskmanservers.com.au
yes
1
0

AAAA

yes


*.independentcare.com.au
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 14631, Flags 256






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 26838, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.07.2021, 00:00:00 +, Signature-Inception: 01.07.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: au

au
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 43126, DigestType 2 and Digest Np2hs6do/f0QcogwxRtZSTwfdPnNIlTaY3INUkm1nUw=






1 RRSIG RR to validate DS RR found






RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 15.07.2021, 20:00:00 +, Signature-Inception: 02.07.2021, 19:00:00 +, KeyTag 26838, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 43126, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 49620, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.09.2021, 22:16:33 +, Signature-Inception: 02.07.2021, 21:31:36 +, KeyTag 43126, Signer-Name: au






RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.09.2021, 22:16:33 +, Signature-Inception: 02.07.2021, 21:31:36 +, KeyTag 49620, Signer-Name: au






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 43126 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 49620 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 43126, DigestType 2 and Digest "Np2hs6do/f0QcogwxRtZSTwfdPnNIlTaY3INUkm1nUw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: com.au

com.au
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 14185, DigestType 2 and Digest k5S+oJ9evZE4SqXNA5ems5X9KymceRKXkkPNaJujh9s=






1 RRSIG RR to validate DS RR found






RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.09.2021, 04:53:56 +, Signature-Inception: 02.07.2021, 04:45:24 +, KeyTag 49620, Signer-Name: au






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 49620 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 14185, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 14968, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 22.07.2021, 15:16:54 +, Signature-Inception: 01.07.2021, 14:16:54 +, KeyTag 14185, Signer-Name: com.au






RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 22.07.2021, 15:16:54 +, Signature-Inception: 01.07.2021, 14:16:54 +, KeyTag 14968, Signer-Name: com.au






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14185 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14968 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14185, DigestType 2 and Digest "k5S+oJ9evZE4SqXNA5ems5X9KymceRKXkkPNaJujh9s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: independentcare.com.au

independentcare.com.au
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9k0kqfback3ivutqggos13j7qvelh7r1" between the hashed NSEC3-owner "9jum50ie1ahg41tjvkvmfeomom2qo351" and the hashed NextOwner "9k0vsjrev9ofnctksfg002katgf39nkh". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 9jum50ie1ahg41tjvkvmfeomom2qo351.com.au., Algorithm: 8, 3 Labels, original TTL: 900 sec, Signature-expiration: 22.07.2021, 15:16:54 +, Signature-Inception: 01.07.2021, 14:16:54 +, KeyTag 14968, Signer-Name: com.au






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "md9i9voubqb55nj87e5v632qbmvr5iou" as Owner. That's the Hash of "com.au" with the NextHashedOwnerName "mdbrseuq58lqu9vt9lh83konui9v4g80". So that domain name is the Closest Encloser of "independentcare.com.au". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner md9i9voubqb55nj87e5v632qbmvr5iou.com.au., Algorithm: 8, 3 Labels, original TTL: 900 sec, Signature-expiration: 24.07.2021, 04:18:32 +, Signature-Inception: 03.07.2021, 03:18:32 +, KeyTag 14968, Signer-Name: com.au






0 DNSKEY RR found









Zone: www.independentcare.com.au

www.independentcare.com.au
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.independentcare.com.au
  ns1.bdm.microsoftonline.com

independentcare.com.au
  ns1.bdm.microsoftonline.com
40.90.4.208
Ashburn/Virginia/United States (US) - Microsoft Corporation


 
2603:1061::d0
Toronto/Ontario/Canada (CA) - Microsoft Corporation


  ns2.bdm.microsoftonline.com
64.4.48.208
Ashburn/Virginia/United States (US) - Microsoft Corporation


 
2620:1ec:8ec::d0
Toronto/Ontario/Canada (CA) - Microsoft Corporation


  ns3.bdm.microsoftonline.com
13.107.24.208
Ashburn/Virginia/United States (US) - Microsoft Corporation


 
2a01:111:4000::d0
Dublin/Leinster/Ireland (IE) - Microsoft Corporation


  ns4.bdm.microsoftonline.com
13.107.160.208
Newark/New Jersey/United States (US) - Microsoft Corporation


 
2620:1ec:bda::d0
Redmond/Washington/United States (US) - Microsoft Corporation

com.au
  q.au / app19.iad1.hosts.meta.redstone.afilias-nst.info-2020121101
65.22.196.1
Sydney/New South Wales/Australia (AU) - Afilias, Inc.


 
2a01:8840:be::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 A0


  r.au / syd3.micro.hosts.meta.redstone.afilias-nst.info-2021042300
65.22.197.1
Los Angeles/California/United States (US) - Afilias, Inc.


 
2a01:8840:bf::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 B0


  s.au / app29.iad1.hosts.meta.redstone.afilias-nst.info-2020121101
65.22.198.1
Canberra/Australian Capital Territory/Australia (AU) - Afilias, Inc.


 
2a01:8840:c0::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 C0


  t.au / LHR4
65.22.199.1
Ambler/Pennsylvania/United States (US) - Afilias Ltd


 
2a01:8840:c1::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 (t.au)

au
  a.au / lax.02.au


  c.au / 67m39


  d.au / 67m24


  m.au / dns3.frpar1


  n.au / dns2.defra1


  q.au / app1.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  r.au / syd3.micro.hosts.meta.redstone.afilias-nst.info-2021042300


  s.au / app9.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  t.au / LHR4

 

4. SOA-Entries


Domain:au
Zone-Name:au
Primary:a.au
Mail:dns.audns.net.au
Serial:2021013485
Refresh:86400
Retry:900
Expire:1209600
TTL:43200
num Entries:2


Domain:au
Zone-Name:au
Primary:a.au
Mail:dns.audns.net.au
Serial:2021013487
Refresh:86400
Retry:900
Expire:1209600
TTL:43200
num Entries:7


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093370
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:1


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093370
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:1


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093371
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:2


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093371
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:2


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093372
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:5


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1533093372
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:5


Domain:independentcare.com.au
Zone-Name:independentcare.com.au
Primary:ns1.bdm.microsoftonline.com
Mail:azuredns-hostmaster.microsoft.com
Serial:1
Refresh:3600
Retry:300
Expire:2419200
TTL:300
num Entries:8


Domain:www.independentcare.com.au
Zone-Name:independentcare.com.au
Primary:ns1.bdm.microsoftonline.com
Mail:azuredns-hostmaster.microsoft.com
Serial:1
Refresh:3600
Retry:300
Expire:2419200
TTL:300
num Entries:1


5. Screenshots

Startaddress: https://independentcare.com.au, address used: https://independentcare.com.au/, Screenshot created 2021-07-03 06:24:26 +00:0

 

Mobil (412px x 732px)

 

1509 milliseconds

 

Screenshot mobile - https://independentcare.com.au/
Mobil + Landscape (732px x 412px)

 

977 milliseconds

 

Screenshot mobile landscape - https://independentcare.com.au/
Screen (1280px x 1680px)

 

4071 milliseconds

 

Screenshot Desktop - https://independentcare.com.au/

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport396732
content Size3965862

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_128_GCM.

 

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://independentcare.com.au/
221.121.138.120
301
https://independentcare.com.au/

1.516
A
Connection: close
x-powered-by: PHP/5.6.40
content-type: text/html; charset=UTF-8
x-pingback: http://independentcare.com.au/xmlrpc.php
x-redirect-by: WordPress
location: https://independentcare.com.au/
content-length: 0
date: Sat, 03 Jul 2021 04:20:52 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent

• http://www.independentcare.com.au/
221.121.138.120
301
https://www.independentcare.com.au/

0.954
A
Connection: close
x-powered-by: PHP/5.6.40
content-type: text/html; charset=UTF-8
x-pingback: http://independentcare.com.au/xmlrpc.php
x-redirect-by: WordPress
location: https://www.independentcare.com.au/
content-length: 0
date: Sat, 03 Jul 2021 04:20:53 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent

• https://www.independentcare.com.au/
221.121.138.120
301
https://independentcare.com.au/

7.014
A
Connection: close
x-powered-by: PHP/5.6.40
content-type: text/html; charset=UTF-8
x-pingback: https://independentcare.com.au/xmlrpc.php
x-redirect-by: WordPress
location: https://independentcare.com.au/
content-length: 0
date: Sat, 03 Jul 2021 04:21:03 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://independentcare.com.au/
221.121.138.120
Inline-JavaScript (∑/total): 11/4012 Inline-CSS (∑/total): 6/6078
200

Html is minified: 166.62 %
Other inline scripts (∑/total): 6/5611
7.110
A
Connection: close
x-powered-by: PHP/5.6.40
content-type: text/html; charset=UTF-8
x-pingback: https://independentcare.com.au/xmlrpc.php
link: <https://independentcare.com.au/wp-json/>; rel="https://api.w.org/",<https://independentcare.com.au/wp-json/wp/v2/pages/2>; rel="alternate"; type="application/json",<https://independentcare.com.au/>; rel=shortlink
transfer-encoding: chunked
content-encoding: gzip
vary: Accept-Encoding,User-Agent
date: Sat, 03 Jul 2021 04:20:55 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• http://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
221.121.138.120
301
https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

1.000
A
Visible Content:
Connection: close
x-powered-by: PHP/5.6.40
expires: Wed, 11 Jan 1984 05:00:00 GMT
cache-control: no-cache, must-revalidate, max-age=0
content-type: text/html; charset=UTF-8
x-redirect-by: WordPress
location: https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
content-length: 0
date: Sat, 03 Jul 2021 04:21:10 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent

• http://www.independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
221.121.138.120
301
https://www.independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

1.000
A
Visible Content:
Connection: close
x-powered-by: PHP/5.6.40
expires: Wed, 11 Jan 1984 05:00:00 GMT
cache-control: no-cache, must-revalidate, max-age=0
content-type: text/html; charset=UTF-8
x-redirect-by: WordPress
location: https://www.independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
content-length: 0
date: Sat, 03 Jul 2021 04:21:11 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent

• https://www.independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

301
https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

6.404
A
Visible Content:
Connection: close
x-powered-by: PHP/5.6.40
expires: Wed, 11 Jan 1984 05:00:00 GMT
cache-control: no-cache, must-revalidate, max-age=0
content-type: text/html; charset=UTF-8
x-redirect-by: WordPress
location: https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
content-length: 0
date: Sat, 03 Jul 2021 04:21:26 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
vary: User-Agent
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 10/3220 Inline-CSS (∑/total): 2/3583
404

Html is minified: 255.97 %
Other inline scripts (∑/total): 5/4156
6.623
A
Not Found
Visible Content: Sorry, that page does not exist Go Back or Home Page
Info: Html-Content with meta and/or script, may be a problem creating a Letsencrypt certificate using http-01 validation
Connection: close
x-powered-by: PHP/5.6.40
expires: Wed, 11 Jan 1984 05:00:00 GMT
cache-control: no-cache, must-revalidate, max-age=0
content-type: text/html; charset=UTF-8
link: <https://independentcare.com.au/wp-json/>; rel="https://api.w.org/"
transfer-encoding: chunked
content-encoding: gzip
vary: Accept-Encoding,User-Agent
date: Sat, 03 Jul 2021 04:21:19 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://221.121.138.120/
221.121.138.120
302
https://221.121.138.120/cgi-sys/suspendedpage.cgi
Html is minified: 102.40 %
5.516
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Connection: close
content-type: text/html
content-length: 683
date: Sat, 03 Jul 2021 04:21:12 GMT
server: LiteSpeed
cache-control: no-cache, no-store, must-revalidate, max-age=0
location: https://221.121.138.120/cgi-sys/suspendedpage.cgi
strict-transport-security: max-age=31536000
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

• https://221.121.138.120/cgi-sys/suspendedpage.cgi

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 1/6270
200

Html is minified: 688.64 %
Other inline scripts (∑/total): 0/0
5.070
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 102)
Account Suspended This Account has been suspended. Contact your hosting provider for more information.
Connection: close
content-type: text/html
transfer-encoding: chunked
content-encoding: gzip
vary: Accept-Encoding
date: Sat, 03 Jul 2021 04:21:33 GMT
server: LiteSpeed
strict-transport-security: max-age=31536000
alt-svc: h3-34=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-27=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"

 

7. Comments


1. General Results, most used to calculate the result

Aname "independentcare.com.au" is domain, public suffix is ".com.au", top-level-domain is ".au", top-level-domain-type is "country-code", Country is Australia, tld-manager is ".au Domain Administration (auDA)", num .au-domains preloaded: 1378 (complete: 151507)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: independentcare.com.au has only one ip address.
Warning: Only one ip address found: www.independentcare.com.au has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: independentcare.com.au has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.independentcare.com.au has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
Ahttps://221.121.138.120/ 221.121.138.120
302
https://221.121.138.120/cgi-sys/suspendedpage.cgi
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):2 complete Content-Type - header (3 urls)
https://221.121.138.120/cgi-sys/suspendedpage.cgi


Url with incomplete Content-Type - header - missing charset
Ahttp://independentcare.com.au/ 221.121.138.120
301
https://independentcare.com.au/
Correct redirect http - https with the same domain name
Ahttp://www.independentcare.com.au/ 221.121.138.120
301
https://www.independentcare.com.au/
Correct redirect http - https with the same domain name
Nhttps://221.121.138.120/ 221.121.138.120
302
https://221.121.138.120/cgi-sys/suspendedpage.cgi
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://221.121.138.120/cgi-sys/suspendedpage.cgi
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N221.121.138.120:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N221.121.138.120:2083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N221.121.138.120:2087


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N221.121.138.120:2096


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain independentcare.com.au, 1 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain www.independentcare.com.au, 1 ip addresses.

2. Header-Checks


3. DNS- and NameServer - Checks

AInfo:: 25 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 25 Queries complete, 21 with IPv6, 4 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
Ok (4 - 8):: An average of 6.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns1.bdm.microsoftonline.com, ns2.bdm.microsoftonline.com, ns3.bdm.microsoftonline.com, ns4.bdm.microsoftonline.com, 4 Name Servers included in Delegation: ns1.bdm.microsoftonline.com, ns2.bdm.microsoftonline.com, ns3.bdm.microsoftonline.com, ns4.bdm.microsoftonline.com, 4 Name Servers included in 1 Zone definitions: ns1.bdm.microsoftonline.com, ns2.bdm.microsoftonline.com, ns3.bdm.microsoftonline.com, ns4.bdm.microsoftonline.com, 1 Name Servers listed in SOA.Primary: ns1.bdm.microsoftonline.com.
AGood: Only one SOA.Primary Name Server found.: ns1.bdm.microsoftonline.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.bdm.microsoftonline.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.bdm.microsoftonline.com, ns2.bdm.microsoftonline.com, ns3.bdm.microsoftonline.com, ns4.bdm.microsoftonline.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 4 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 4 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 4 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: microsoftonline.com
AGood: Name servers with different Country locations found: 4 Name Servers, 3 Countries: CA, IE, US
AInfo: Ipv4-Subnet-list: 4 Name Servers, 3 different subnets (first Byte): 13., 40., 64., 3 different subnets (first two Bytes): 13.107., 40.90., 64.4., 4 different subnets (first three Bytes): 13.107.160., 13.107.24., 40.90.4., 64.4.48.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 4 Name Servers with IPv6, 3 different subnets (first block): 2603:, 2620:, 2a01:, 3 different subnets (first two blocks): 2603:1061:, 2620:01ec:, 2a01:0111:, 4 different subnets (first three blocks): 2603:1061:0000:, 2620:01ec:08ec:, 2620:01ec:0bda:, 2a01:0111:4000:, 4 different subnets (first four blocks): 2603:1061:0000:0000:, 2620:01ec:08ec:0000:, 2620:01ec:0bda:0000:, 2a01:0111:4000:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 8 good Nameserver
AGood: Nameserver supports Echo Capitalization: 8 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 8 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 8 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 and greater 1024 Bytes is compressed (gzip, deflate, br checked).
https://independentcare.com.au/ 221.121.138.120
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://221.121.138.120/cgi-sys/suspendedpage.cgi
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://independentcare.com.au/ 221.121.138.120
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://221.121.138.120/cgi-sys/suspendedpage.cgi
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
https://independentcare.com.au/ 221.121.138.120
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 6 script elements without defer/async.
https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 6 script elements without defer/async.
AGood: All CSS / JavaScript files are sent compressed (gzip, deflate, br checked). That reduces the content of the files. 22 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 19 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 4 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 23 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 6 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 6 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AGood: Some img-elements have a valid alt-attribute.: 6 img-elements found, 5 img-elements with correct alt-attributes (defined, not an empty value).
Wrong: img-elements without alt-attribute or empty alt-attribute found. The alt-attribute ("alternative") is required and should describe the img. So Screenreader and search engines are able to use these informations.: 1 img-elements without alt-attribute, 0 img-elements with empty alt-attribute found.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://independentcare.com.au/ 221.121.138.120
301

Warning: HSTS header sent via http has no effect
http://www.independentcare.com.au/ 221.121.138.120
301

Warning: HSTS header sent via http has no effect
https://independentcare.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
6.623 seconds
Warning: 404 needs more then one second
ADuration: 394533 milliseconds, 394.533 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
independentcare.com.au
221.121.138.120
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
independentcare.com.au
221.121.138.120
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
221.121.138.120
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok

www.independentcare.com.au
221.121.138.120
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


independentcare.com.au
independentcare.com.au
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok

independentcare.com.au
independentcare.com.au
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
www.independentcare.com.au
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
supported
ok

www.independentcare.com.au
www.independentcare.com.au
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


221.121.138.120
221.121.138.120
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=abchomes.melbourne


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


221.121.138.120
221.121.138.120
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=abchomes.melbourne


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


221.121.138.120
221.121.138.120
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
465
name does not match
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Chain - incomplete

1CN=*.diskmanservers.com.au


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


221.121.138.120
221.121.138.120
2083
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
2083
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.diskmanservers.com.au


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


221.121.138.120
221.121.138.120
2087
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
2087
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.diskmanservers.com.au


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


221.121.138.120
221.121.138.120
2096
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

221.121.138.120
221.121.138.120
2096
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=*.diskmanservers.com.au


2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US


independentcare.com.au
independentcare.com.au
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

independentcare.com.au
independentcare.com.au
465
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


independentcare.com.au
independentcare.com.au
2083
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

independentcare.com.au
independentcare.com.au
2083
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


independentcare.com.au
independentcare.com.au
2087
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

independentcare.com.au
independentcare.com.au
2087
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


independentcare.com.au
independentcare.com.au
2096
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

independentcare.com.au
independentcare.com.au
2096
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
www.independentcare.com.au
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.independentcare.com.au
www.independentcare.com.au
465
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
www.independentcare.com.au
2083
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.independentcare.com.au
www.independentcare.com.au
2083
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
www.independentcare.com.au
2087
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.independentcare.com.au
www.independentcare.com.au
2087
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


www.independentcare.com.au
www.independentcare.com.au
2096
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.independentcare.com.au
www.independentcare.com.au
2096
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates

1CN=independentcare.com.au


2CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, C=US, ST=TX


3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

 

9. Certificates

1.
1.
CN=independentcare.com.au
03.06.2021
02.09.2021
1292 days expired
independentcare.com.au, mail.independentcare.com.au, www.independentcare.com.au - 3 entries
1.
1.
CN=independentcare.com.au
03.06.2021

02.09.2021
1292 days expired


independentcare.com.au, mail.independentcare.com.au, www.independentcare.com.au - 3 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:6B301B9518028BE138020C80F833D213
Thumbprint:B6D609BA01F1E213CC66E5CC711FADD3DF58E153
SHA256 / Certificate:I4/N+oDeFMdW7eLhM+gTUO0KCZRSjeLuPD/d/1NoqME=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bc61a6e622c2077c28db55d9f4b20bb6d20c63b971a16a874f892f4186850289
SHA256 hex / Subject Public Key Information (SPKI):bc61a6e622c2077c28db55d9f4b20bb6d20c63b971a16a874f892f4186850289
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, S=TX, C=US
18.05.2015
18.05.2025
expires in 62 days


2.
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, S=TX, C=US
18.05.2015

18.05.2025
expires in 62 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:00F01D4BEE7B7CA37B3C0566AC05972458
Thumbprint:764D2FA59ED123F9C95570C403C92FEF338EA745
SHA256 / Certificate:ghzFXOfsXHT+u0L2JOtqNsR4IVox7Wfjz3I6Z+jHXro=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):84e175ba988efb17af9c3110d77837698dccdd4a9ae3844de6b565c2f536582f
SHA256 hex / Subject Public Key Information (SPKI):84e175ba988efb17af9c3110d77837698dccdd4a9ae3844de6b565c2f536582f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010
19.01.2038
expires in 4691 days


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010

19.01.2038
expires in 4691 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:4CAAF9CADB636FE01FF74ED85B03869D
Thumbprint:AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
SHA256 / Certificate:UvDhxOWOxikpG2AxfwdGcbhdfqgNWwcnNGNTSzK0AjQ=
SHA256 hex / Cert (DANE * 0 1):52f0e1c4e58ec629291b60317f074671b85d7ea80d5b07273463534b32b40234
SHA256 hex / PublicKey (DANE * 1 1):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SHA256 hex / Subject Public Key Information (SPKI):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=abchomes.melbourne
24.01.2020
24.04.2020
1788 days expired
abchomes.melbourne, mail.abchomes.melbourne, www.abchomes.melbourne - 3 entries
2.
1.
CN=abchomes.melbourne
24.01.2020

24.04.2020
1788 days expired


abchomes.melbourne, mail.abchomes.melbourne, www.abchomes.melbourne - 3 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D24E023A75E081E6F8630417F9C1180D
Thumbprint:2FEC0B94B90F24638F755B5F2EAF8A70EB5611C4
SHA256 / Certificate:yN6uHRXJcIkGb0R8nYOQr8cNW8HyRHPT8iWQsmgh6o0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):a09a0350a0320fb24c956451611a069d437618ce2a64cb2b717a89ead8125b3c
SHA256 hex / Subject Public Key Information (SPKI):a09a0350a0320fb24c956451611a069d437618ce2a64cb2b717a89ead8125b3c
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.


2.
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, S=TX, C=US
18.05.2015
18.05.2025
expires in 62 days


2.
CN="cPanel, Inc. Certification Authority", O="cPanel, Inc.", L=Houston, S=TX, C=US
18.05.2015

18.05.2025
expires in 62 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:00F01D4BEE7B7CA37B3C0566AC05972458
Thumbprint:764D2FA59ED123F9C95570C403C92FEF338EA745
SHA256 / Certificate:ghzFXOfsXHT+u0L2JOtqNsR4IVox7Wfjz3I6Z+jHXro=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):84e175ba988efb17af9c3110d77837698dccdd4a9ae3844de6b565c2f536582f
SHA256 hex / Subject Public Key Information (SPKI):84e175ba988efb17af9c3110d77837698dccdd4a9ae3844de6b565c2f536582f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010
19.01.2038
expires in 4691 days


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
19.01.2010

19.01.2038
expires in 4691 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:4CAAF9CADB636FE01FF74ED85B03869D
Thumbprint:AFE5D244A8D1194230FF479FE2F897BBCD7A8CB4
SHA256 / Certificate:UvDhxOWOxikpG2AxfwdGcbhdfqgNWwcnNGNTSzK0AjQ=
SHA256 hex / Cert (DANE * 0 1):52f0e1c4e58ec629291b60317f074671b85d7ea80d5b07273463534b32b40234
SHA256 hex / PublicKey (DANE * 1 1):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SHA256 hex / Subject Public Key Information (SPKI):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




3.
1.
CN=*.diskmanservers.com.au
17.09.2019
15.11.2021
1218 days expired
*.diskmanservers.com.au, diskmanservers.com.au - 2 entries
3.
1.
CN=*.diskmanservers.com.au
17.09.2019

15.11.2021
1218 days expired


*.diskmanservers.com.au, diskmanservers.com.au - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03B354FEE8FEC21BECD66FB3CD6F44F1
Thumbprint:DD13D93DC3E805351B42735122B79DE10D8452AD
SHA256 / Certificate:b0MFFuaE855q0cMYM2g3QCRLr/UyAoi3nThrqlZ5gvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5e2197815873fca3d3bef0eaeb891ad01f25c154493d635ef24fbdde9cc802ef
SHA256 hex / Subject Public Key Information (SPKI):5e2197815873fca3d3bef0eaeb891ad01f25c154493d635ef24fbdde9cc802ef
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://status.rapidssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.diskmanservers.com.au
17.09.2019
15.11.2021
1218 days expired
*.diskmanservers.com.au, diskmanservers.com.au - 2 entries

2.
CN=*.diskmanservers.com.au
17.09.2019

15.11.2021
1218 days expired


*.diskmanservers.com.au, diskmanservers.com.au - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03B354FEE8FEC21BECD66FB3CD6F44F1
Thumbprint:DD13D93DC3E805351B42735122B79DE10D8452AD
SHA256 / Certificate:b0MFFuaE855q0cMYM2g3QCRLr/UyAoi3nThrqlZ5gvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5e2197815873fca3d3bef0eaeb891ad01f25c154493d635ef24fbdde9cc802ef
SHA256 hex / Subject Public Key Information (SPKI):5e2197815873fca3d3bef0eaeb891ad01f25c154493d635ef24fbdde9cc802ef
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://status.rapidssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017
06.11.2027
expires in 964 days


3.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017

06.11.2027
expires in 964 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:08A5A246CD4B5C8C83D702B4BBAB5349
Thumbprint:98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
SHA256 / Certificate:x5C0cShEfsC2DyK/y3ldccMm3ZEO4Sy7TMWoYZHrkbw=
SHA256 hex / Cert (DANE * 0 1):c790b47128447ec0b60f22bfcb795d71c326dd910ee12cbb4cc5a86191eb91bc
SHA256 hex / PublicKey (DANE * 1 1):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SHA256 hex / Subject Public Key Information (SPKI):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)




4.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017
06.11.2027
expires in 964 days


4.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017

06.11.2027
expires in 964 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:08A5A246CD4B5C8C83D702B4BBAB5349
Thumbprint:98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
SHA256 / Certificate:x5C0cShEfsC2DyK/y3ldccMm3ZEO4Sy7TMWoYZHrkbw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SHA256 hex / Subject Public Key Information (SPKI):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




5.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006
10.11.2031
expires in 2429 days


5.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006

10.11.2031
expires in 2429 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:083BE056904246B1A1756AC95991C74A
Thumbprint:A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436
SHA256 / Certificate:Q0ig6URMeMsmXgWNXolEtNhPlmK9Jtslf4k0pEPHAWE=
SHA256 hex / Cert (DANE * 0 1):4348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161
SHA256 hex / PublicKey (DANE * 1 1):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SHA256 hex / Subject Public Key Information (SPKI):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





6.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016
10.05.2025
expires in 54 days


6.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016

10.05.2025
expires in 54 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0F5BC3A176CB789E2020C7893C8167B4
Thumbprint:FB20FA8A6A93B375F054814F9E00273EA51A6138
SHA256 / Certificate:bay7iUUTex2tQhGwQ2774G8SrONpBJc7Ra4ldAgj02k=
SHA256 hex / Cert (DANE * 0 1):6dacbb8945137b1dad4211b0436efbe06f12ace36904973b45ae25740823d369
SHA256 hex / PublicKey (DANE * 1 1):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SHA256 hex / Subject Public Key Information (SPKI):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000
13.05.2025
expires in 57 days


7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000

13.05.2025
expires in 57 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:020000B9
Thumbprint:D4DE20D05E66FC53FE1A50882C78DB2852CAE474
SHA256 / Certificate:Fq9XqfZ2sKsSYJWqXrre8iqzERnWRKyVzUuT2/Pyaus=
SHA256 hex / Cert (DANE * 0 1):16af57a9f676b0ab126095aa5ebadef22ab31119d644ac95cd4b93dbf3f26aeb
SHA256 hex / PublicKey (DANE * 1 1):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SHA256 hex / Subject Public Key Information (SPKI):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details (currently limited to 500 rows - some problems with spam users)

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.bdm.microsoftonline.com, ns2.bdm.microsoftonline.com, ns3.bdm.microsoftonline.com, ns4.bdm.microsoftonline.com

 

QNr.DomainTypeNS used
1
com
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.bdm.microsoftonline.com
NS
b.gtld-servers.net (192.33.14.30)

Answer: ns1-34.azure-dns.com, ns2-34.azure-dns.net, ns3-34.azure-dns.org, ns4-34.azure-dns.info, nse12.o365filtering.com, nse13.o365filtering.com, nse21.o365filtering.com, nse24.o365filtering.com

Answer: nse24.o365filtering.com
104.47.121.8

Answer: nse21.o365filtering.com
104.47.40.8

Answer: nse13.o365filtering.com
104.47.2.8

Answer: nse12.o365filtering.com
104.47.38.8

Answer: ns1-34.azure-dns.com
150.171.10.34, 2603:1061:0:10::22
3
ns2.bdm.microsoftonline.com
NS
b.gtld-servers.net (192.33.14.30)

Answer: ns1-34.azure-dns.com, ns2-34.azure-dns.net, ns3-34.azure-dns.org, ns4-34.azure-dns.info, nse12.o365filtering.com, nse13.o365filtering.com, nse21.o365filtering.com, nse24.o365filtering.com

Answer: nse24.o365filtering.com
104.47.121.8

Answer: nse21.o365filtering.com
104.47.40.8

Answer: nse13.o365filtering.com
104.47.2.8

Answer: nse12.o365filtering.com
104.47.38.8

Answer: ns1-34.azure-dns.com
150.171.10.34, 2603:1061:0:10::22
4
ns3.bdm.microsoftonline.com
NS
b.gtld-servers.net (192.33.14.30)

Answer: ns1-34.azure-dns.com, ns2-34.azure-dns.net, ns3-34.azure-dns.org, ns4-34.azure-dns.info, nse12.o365filtering.com, nse13.o365filtering.com, nse21.o365filtering.com, nse24.o365filtering.com

Answer: nse24.o365filtering.com
104.47.121.8

Answer: nse21.o365filtering.com
104.47.40.8

Answer: nse13.o365filtering.com
104.47.2.8

Answer: nse12.o365filtering.com
104.47.38.8

Answer: ns1-34.azure-dns.com
150.171.10.34, 2603:1061:0:10::22
5
ns4.bdm.microsoftonline.com
NS
b.gtld-servers.net (192.33.14.30)

Answer: ns1-34.azure-dns.com, ns2-34.azure-dns.net, ns3-34.azure-dns.org, ns4-34.azure-dns.info, nse12.o365filtering.com, nse13.o365filtering.com, nse21.o365filtering.com, nse24.o365filtering.com

Answer: nse24.o365filtering.com
104.47.121.8

Answer: nse21.o365filtering.com
104.47.40.8

Answer: nse13.o365filtering.com
104.47.2.8

Answer: nse12.o365filtering.com
104.47.38.8

Answer: ns1-34.azure-dns.com
150.171.10.34, 2603:1061:0:10::22
6
net
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
7
ns2-34.azure-dns.net
NS
e.gtld-servers.net (2001:502:1ca1::30)

Answer: ns2-01.azure-dns.net, ns2-02.azure-dns.net, ns2-03.azure-dns.net, ns2-04.azure-dns.net

Answer: ns2-01.azure-dns.net
2620:1ec:8ec::1, 64.4.48.1

Answer: ns2-02.azure-dns.net
2620:1ec:8ec::2, 64.4.48.2

Answer: ns2-03.azure-dns.net
2620:1ec:8ec::3, 64.4.48.3

Answer: ns2-04.azure-dns.net
2620:1ec:8ec::4, 64.4.48.4
8
org
NS
k.root-servers.net (2001:7fd::1)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
9
ns3-34.azure-dns.org
NS
a0.org.afilias-nst.info (2001:500:e::1)

Answer: ns3-01.azure-dns.org, ns3-02.azure-dns.org, ns3-03.azure-dns.org, ns3-04.azure-dns.org

Answer: ns3-01.azure-dns.org
13.107.24.1, 2a01:111:4000::1

Answer: ns3-02.azure-dns.org
13.107.24.2, 2a01:111:4000::2

Answer: ns3-03.azure-dns.org
13.107.24.3, 2a01:111:4000::3

Answer: ns3-04.azure-dns.org
13.107.24.4, 2a01:111:4000::4
10
info
NS
d.root-servers.net (2001:500:2d::d)

Answer: a0.info.afilias-nst.info, a2.info.afilias-nst.info, b0.info.afilias-nst.org, b2.info.afilias-nst.org, c0.info.afilias-nst.info, d0.info.afilias-nst.org
11
ns4-34.azure-dns.info
NS
a0.info.afilias-nst.info (2001:500:19::1)

Answer: ns4-01.azure-dns.info, ns4-02.azure-dns.info, ns4-03.azure-dns.info, ns4-04.azure-dns.info

Answer: ns4-01.azure-dns.info
13.107.160.1, 2620:1ec:bda::1

Answer: ns4-02.azure-dns.info
13.107.160.2, 2620:1ec:bda::2

Answer: ns4-03.azure-dns.info
13.107.160.3, 2620:1ec:bda::3

Answer: ns4-04.azure-dns.info
13.107.160.4, 2620:1ec:bda::4
12
ns2-34.azure-dns.net: 150.171.16.34
A
ns2-01.azure-dns.net (2620:1ec:8ec::1)
13
ns2-34.azure-dns.net: 2620:1ec:8ec:10::22
AAAA
ns2-01.azure-dns.net (2620:1ec:8ec::1)
14
ns3-34.azure-dns.org: 13.107.222.34
A
ns3-01.azure-dns.org (2a01:111:4000::1)
15
ns3-34.azure-dns.org: 2a01:111:4000:10::22
AAAA
ns3-01.azure-dns.org (2a01:111:4000::1)
16
ns4-34.azure-dns.info: 13.107.206.34
A
ns4-01.azure-dns.info (2620:1ec:bda::1)
17
ns4-34.azure-dns.info: 2620:1ec:bda:10::22
AAAA
ns4-01.azure-dns.info (2620:1ec:bda::1)
18
ns1.bdm.microsoftonline.com: 40.90.4.208
A
ns1-34.azure-dns.com (2603:1061:0:10::22)
19
ns1.bdm.microsoftonline.com: 2603:1061::d0
AAAA
ns1-34.azure-dns.com (2603:1061:0:10::22)
20
ns2.bdm.microsoftonline.com: 64.4.48.208
A
ns1-34.azure-dns.com (2603:1061:0:10::22)
21
ns2.bdm.microsoftonline.com: 2620:1ec:8ec::d0
AAAA
ns1-34.azure-dns.com (2603:1061:0:10::22)
22
ns3.bdm.microsoftonline.com: 13.107.24.208
A
ns1-34.azure-dns.com (2603:1061:0:10::22)
23
ns3.bdm.microsoftonline.com: 2a01:111:4000::d0
AAAA
ns1-34.azure-dns.com (2603:1061:0:10::22)
24
ns4.bdm.microsoftonline.com: 13.107.160.208
A
ns1-34.azure-dns.com (2603:1061:0:10::22)
25
ns4.bdm.microsoftonline.com: 2620:1ec:bda::d0
AAAA
ns1-34.azure-dns.com (2603:1061:0:10::22)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.independentcare.com.au
0

no CAA entry found
1
0
independentcare.com.au
0

no CAA entry found
1
0
com.au
0

no CAA entry found
1
0
au
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
independentcare.com.au
mscid=J2FVaKz7PodM/O7mcJPb2PSIdVxHNonISuziMS/cvwRM/czMNUmkB4RBUl4spsBayZuDrDkL3OA6pavg55E2RQ==
ok
1
0
independentcare.com.au
v=spf1 include:spf.protection.outlook.com -all
ok
1
0
www.independentcare.com.au

ok
1
0
_acme-challenge.independentcare.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.www.independentcare.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.independentcare.com.au.independentcare.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.www.independentcare.com.au.independentcare.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.www.independentcare.com.au.www.independentcare.com.au

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
independentcare.com.au
221.121.138.120
21
FTP



independentcare.com.au
221.121.138.120
21
FTP



independentcare.com.au
221.121.138.120
22
SSH



independentcare.com.au
221.121.138.120
22
SSH



independentcare.com.au
221.121.138.120
25
SMTP



independentcare.com.au
221.121.138.120
25
SMTP



independentcare.com.au
221.121.138.120
53
DNS



independentcare.com.au
221.121.138.120
53
DNS



independentcare.com.au
221.121.138.120
110
POP3



independentcare.com.au
221.121.138.120
110
POP3



independentcare.com.au
221.121.138.120
143
IMAP



independentcare.com.au
221.121.138.120
143
IMAP



independentcare.com.au
221.121.138.120
465
SMTP (encrypted)



independentcare.com.au
221.121.138.120
465
SMTP (encrypted)



independentcare.com.au
221.121.138.120
587
SMTP (encrypted, submission)



independentcare.com.au
221.121.138.120
587
SMTP (encrypted, submission)



independentcare.com.au
221.121.138.120
993
IMAP (encrypted)



independentcare.com.au
221.121.138.120
993
IMAP (encrypted)



independentcare.com.au
221.121.138.120
995
POP3 (encrypted)



independentcare.com.au
221.121.138.120
995
POP3 (encrypted)



independentcare.com.au
221.121.138.120
1433
MS SQL



independentcare.com.au
221.121.138.120
1433
MS SQL



independentcare.com.au
221.121.138.120
2082
cPanel (http)



independentcare.com.au
221.121.138.120
2082
cPanel (http)



independentcare.com.au
221.121.138.120
2083
cPanel (https)



independentcare.com.au
221.121.138.120
2083
cPanel (https)



independentcare.com.au
221.121.138.120
2086
WHM (http)



independentcare.com.au
221.121.138.120
2086
WHM (http)



independentcare.com.au
221.121.138.120
2087
WHM (https)



independentcare.com.au
221.121.138.120
2087
WHM (https)



independentcare.com.au
221.121.138.120
2089
cPanel Licensing



independentcare.com.au
221.121.138.120
2089
cPanel Licensing



independentcare.com.au
221.121.138.120
2095
cPanel Webmail (http)



independentcare.com.au
221.121.138.120
2095
cPanel Webmail (http)



independentcare.com.au
221.121.138.120
2096
cPanel Webmail (https)



independentcare.com.au
221.121.138.120
2096
cPanel Webmail (https)



independentcare.com.au
221.121.138.120
2222
DirectAdmin (http)



independentcare.com.au
221.121.138.120
2222
DirectAdmin (http)



independentcare.com.au
221.121.138.120
2222
DirectAdmin (https)



independentcare.com.au
221.121.138.120
2222
DirectAdmin (https)



independentcare.com.au
221.121.138.120
3306
mySql



independentcare.com.au
221.121.138.120
3306
mySql



independentcare.com.au
221.121.138.120
5224
Plesk Licensing



independentcare.com.au
221.121.138.120
5224
Plesk Licensing



independentcare.com.au
221.121.138.120
5432
PostgreSQL



independentcare.com.au
221.121.138.120
5432
PostgreSQL



independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (http)



independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (http)



independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (https)



independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (https)



independentcare.com.au
221.121.138.120
8083
VestaCP http



independentcare.com.au
221.121.138.120
8083
VestaCP http



independentcare.com.au
221.121.138.120
8083
VestaCP https



independentcare.com.au
221.121.138.120
8083
VestaCP https



independentcare.com.au
221.121.138.120
8443
Plesk Administration (https)



independentcare.com.au
221.121.138.120
8443
Plesk Administration (https)



independentcare.com.au
221.121.138.120
8447
Plesk Installer + Updates



independentcare.com.au
221.121.138.120
8447
Plesk Installer + Updates



independentcare.com.au
221.121.138.120
8880
Plesk Administration (http)



independentcare.com.au
221.121.138.120
8880
Plesk Administration (http)



independentcare.com.au
221.121.138.120
10000
Webmin (http)



independentcare.com.au
221.121.138.120
10000
Webmin (http)



independentcare.com.au
221.121.138.120
10000
Webmin (https)



independentcare.com.au
221.121.138.120
10000
Webmin (https)



www.independentcare.com.au
221.121.138.120
21
FTP



www.independentcare.com.au
221.121.138.120
21
FTP



www.independentcare.com.au
221.121.138.120
22
SSH



www.independentcare.com.au
221.121.138.120
22
SSH



www.independentcare.com.au
221.121.138.120
25
SMTP



www.independentcare.com.au
221.121.138.120
25
SMTP



www.independentcare.com.au
221.121.138.120
53
DNS



www.independentcare.com.au
221.121.138.120
53
DNS



www.independentcare.com.au
221.121.138.120
110
POP3



www.independentcare.com.au
221.121.138.120
110
POP3



www.independentcare.com.au
221.121.138.120
143
IMAP



www.independentcare.com.au
221.121.138.120
143
IMAP



www.independentcare.com.au
221.121.138.120
465
SMTP (encrypted)



www.independentcare.com.au
221.121.138.120
465
SMTP (encrypted)



www.independentcare.com.au
221.121.138.120
587
SMTP (encrypted, submission)



www.independentcare.com.au
221.121.138.120
587
SMTP (encrypted, submission)



www.independentcare.com.au
221.121.138.120
993
IMAP (encrypted)



www.independentcare.com.au
221.121.138.120
993
IMAP (encrypted)



www.independentcare.com.au
221.121.138.120
995
POP3 (encrypted)



www.independentcare.com.au
221.121.138.120
995
POP3 (encrypted)



www.independentcare.com.au
221.121.138.120
1433
MS SQL



www.independentcare.com.au
221.121.138.120
1433
MS SQL



www.independentcare.com.au
221.121.138.120
2082
cPanel (http)



www.independentcare.com.au
221.121.138.120
2082
cPanel (http)



www.independentcare.com.au
221.121.138.120
2083
cPanel (https)



www.independentcare.com.au
221.121.138.120
2083
cPanel (https)



www.independentcare.com.au
221.121.138.120
2086
WHM (http)



www.independentcare.com.au
221.121.138.120
2086
WHM (http)



www.independentcare.com.au
221.121.138.120
2087
WHM (https)



www.independentcare.com.au
221.121.138.120
2087
WHM (https)



www.independentcare.com.au
221.121.138.120
2089
cPanel Licensing



www.independentcare.com.au
221.121.138.120
2089
cPanel Licensing



www.independentcare.com.au
221.121.138.120
2095
cPanel Webmail (http)



www.independentcare.com.au
221.121.138.120
2095
cPanel Webmail (http)



www.independentcare.com.au
221.121.138.120
2096
cPanel Webmail (https)



www.independentcare.com.au
221.121.138.120
2096
cPanel Webmail (https)



www.independentcare.com.au
221.121.138.120
2222
DirectAdmin (http)



www.independentcare.com.au
221.121.138.120
2222
DirectAdmin (http)



www.independentcare.com.au
221.121.138.120
2222
DirectAdmin (https)



www.independentcare.com.au
221.121.138.120
2222
DirectAdmin (https)



www.independentcare.com.au
221.121.138.120
3306
mySql



www.independentcare.com.au
221.121.138.120
3306
mySql



www.independentcare.com.au
221.121.138.120
5224
Plesk Licensing



www.independentcare.com.au
221.121.138.120
5224
Plesk Licensing



www.independentcare.com.au
221.121.138.120
5432
PostgreSQL



www.independentcare.com.au
221.121.138.120
5432
PostgreSQL



www.independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (http)



www.independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (http)



www.independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (https)



www.independentcare.com.au
221.121.138.120
8080
Ookla Speedtest (https)



www.independentcare.com.au
221.121.138.120
8083
VestaCP http



www.independentcare.com.au
221.121.138.120
8083
VestaCP http



www.independentcare.com.au
221.121.138.120
8083
VestaCP https



www.independentcare.com.au
221.121.138.120
8083
VestaCP https



www.independentcare.com.au
221.121.138.120
8443
Plesk Administration (https)



www.independentcare.com.au
221.121.138.120
8443
Plesk Administration (https)



www.independentcare.com.au
221.121.138.120
8447
Plesk Installer + Updates



www.independentcare.com.au
221.121.138.120
8447
Plesk Installer + Updates



www.independentcare.com.au
221.121.138.120
8880
Plesk Administration (http)



www.independentcare.com.au
221.121.138.120
8880
Plesk Administration (http)



www.independentcare.com.au
221.121.138.120
10000
Webmin (http)



www.independentcare.com.au
221.121.138.120
10000
Webmin (http)



www.independentcare.com.au
221.121.138.120
10000
Webmin (https)



www.independentcare.com.au
221.121.138.120
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=4abe433b-3a38-44f8-9f1c-baca41e63a0f

 

Last Result: https://check-your-website.server-daten.de/?q=independentcare.com.au - 2021-07-03 06:17:59

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=independentcare.com.au" target="_blank">Check this Site: independentcare.com.au</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=independentcare.com.au