Check DNS, Urls + Redirects, Certificates and Content of your Website



X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
23.02.2021 11:39:11


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
iot.rvcict.com.au
A
144.130.98.120
Brisbane/Queensland/Australia (AU) - Telstra Corporation
Hostname: cpe-144-130-98-120.static.qld.asp.telstra.net
yes
1
0

AAAA

yes


www.iot.rvcict.com.au

Name Error
yes
1
0
*.rvcict.com.au
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.iot.rvcict.com.au
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: au
au
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 43126, DigestType 2 and Digest Np2hs6do/f0QcogwxRtZSTwfdPnNIlTaY3INUkm1nUw=



1 RRSIG RR to validate DS RR found



RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2021, 05:00:00 +, Signature-Inception: 23.02.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 35590, Flags 256



Public Key with Algorithm 8, KeyTag 43126, Flags 257 (SEP = Secure Entry Point)



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.05.2021, 08:13:36 +, Signature-Inception: 23.02.2021, 07:43:03 +, KeyTag 35590, Signer-Name: au



RRSIG-Owner au., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.05.2021, 08:13:36 +, Signature-Inception: 23.02.2021, 07:43:03 +, KeyTag 43126, Signer-Name: au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35590 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 43126 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 43126, DigestType 2 and Digest "Np2hs6do/f0QcogwxRtZSTwfdPnNIlTaY3INUkm1nUw=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com.au
com.au
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 14185, DigestType 2 and Digest k5S+oJ9evZE4SqXNA5ems5X9KymceRKXkkPNaJujh9s=



1 RRSIG RR to validate DS RR found



RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 24.05.2021, 08:23:25 +, Signature-Inception: 23.02.2021, 08:22:51 +, KeyTag 35590, Signer-Name: au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35590 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14185, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 14968, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2021, 15:16:59 +, Signature-Inception: 17.02.2021, 14:16:59 +, KeyTag 14185, Signer-Name: com.au



RRSIG-Owner com.au., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2021, 15:16:59 +, Signature-Inception: 17.02.2021, 14:16:59 +, KeyTag 14968, Signer-Name: com.au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14185 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14968 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14185, DigestType 2 and Digest "k5S+oJ9evZE4SqXNA5ems5X9KymceRKXkkPNaJujh9s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: rvcict.com.au
rvcict.com.au
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "8n6lpctpq1gl53ljjdg43tc4pt8qs6b9" between the hashed NSEC3-owner "8n3unaepn99dh1ts197knlpp7rtoec43" and the hashed NextOwner "8nb1e3j4fs1hhc8sv4acudfr7aldi1fv". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 8n3unaepn99dh1ts197knlpp7rtoec43.com.au., Algorithm: 8, 3 Labels, original TTL: 900 sec, Signature-expiration: 10.03.2021, 15:16:59 +, Signature-Inception: 17.02.2021, 14:16:59 +, KeyTag 14968, Signer-Name: com.au



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "md9i9voubqb55nj87e5v632qbmvr5iou" as Owner. That's the Hash of "com.au" with the NextHashedOwnerName "mdemg7k4db4navkjt50vjnfeo8spjg0b". So that domain name is the Closest Encloser of "rvcict.com.au". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner md9i9voubqb55nj87e5v632qbmvr5iou.com.au., Algorithm: 8, 3 Labels, original TTL: 900 sec, Signature-expiration: 16.03.2021, 10:39:31 +, Signature-Inception: 23.02.2021, 09:39:31 +, KeyTag 14968, Signer-Name: com.au



0 DNSKEY RR found




Zone: iot.rvcict.com.au
iot.rvcict.com.au
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.iot.rvcict.com.au
www.iot.rvcict.com.au
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.iot.rvcict.com.au
  ns1.syrahost.com

iot.rvcict.com.au
  ns1.syrahost.com

rvcict.com.au
  ns1.syrahost.com / dnsauth2.lon01.ds.network
27.124.125.1
North Perth/Western Australia/Australia (AU) - Dreamscape Networks PTY LTD


 
2a00:fd80:aaaa:ffff::bbbb:1
Sydney/New South Wales/Australia (AU) - Dreamscape Inc


  ns2.syrahost.com / dnsauth2.lon01.ds.network
27.124.125.2
North Perth/Western Australia/Australia (AU) - Dreamscape Networks PTY LTD


 
2a00:fd80:aaaa:ffff::bbbb:2
Sydney/New South Wales/Australia (AU) - Dreamscape Inc


  ns4.syra.net.au / dnsauth2.lon01.ds.network
27.124.125.1
North Perth/Western Australia/Australia (AU) - Dreamscape Networks PTY LTD


 
2a00:fd80:aaaa:ffff::bbbb:1
Sydney/New South Wales/Australia (AU) - Dreamscape Inc


  ns5.syra.net.au / dnsauth2.lon01.ds.network
27.124.125.2
North Perth/Western Australia/Australia (AU) - Dreamscape Networks PTY LTD


 
2a00:fd80:aaaa:ffff::bbbb:2
Sydney/New South Wales/Australia (AU) - Dreamscape Inc

com.au
  q.au / app27.iad1.hosts.meta.redstone.afilias-nst.info-2020121101
65.22.196.1
Sydney/New South Wales/Australia (AU) - Afilias, Inc.


 
2a01:8840:be::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 A0


  r.au / syd3.micro.hosts.meta.redstone.afilias-nst.info-2020121119
65.22.197.1
Los Angeles/California/United States (US) - Afilias, Inc.


 
2a01:8840:bf::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 B0


  s.au / app5.iad1.hosts.meta.redstone.afilias-nst.info-2020121101
65.22.198.1
Canberra/Australian Capital Territory/Australia (AU) - Afilias, Inc.


 
2a01:8840:c0::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 C0


  t.au / FRA3
65.22.199.1
Ambler/Pennsylvania/United States (US) - Afilias Ltd


 
2a01:8840:c1::1
Dublin/Leinster/Ireland (IE) - Afilias NS096 (t.au)

au
  a.au / lax.01.au


  c.au / 67m39


  d.au / 67m24


  m.au / dns2.frpar1


  n.au / dns1.defra1


  q.au / app29.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  r.au / syd3.micro.hosts.meta.redstone.afilias-nst.info-2020121119


  s.au / app7.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  t.au / FRA4


4. SOA-Entries


Domain:au
Zone-Name:au
Primary:a.au
Mail:dns.audns.net.au
Serial:2021011889
Refresh:86400
Retry:900
Expire:1209600
TTL:43200
num Entries:9


Domain:com.au
Zone-Name:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1532815341
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:8


Domain:rvcict.com.au
Zone-Name:rvcict.com.au
Primary:ns1.syrahost.com
Mail:cpanel_serverlogs.crazydomains.com
Serial:2021022204
Refresh:86400
Retry:7200
Expire:3600000
TTL:86400
num Entries:8


Domain:iot.rvcict.com.au
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:www.iot.rvcict.com.au
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks

DomainnameHttp-StatusredirectSec.G
• http://iot.rvcict.com.au/
144.130.98.120
-2

1.960
V
ConnectFailure - Unable to connect to the remote server

• https://iot.rvcict.com.au/
144.130.98.120
-2

1.980
V
ConnectFailure - Unable to connect to the remote server

• http://iot.rvcict.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
144.130.98.120
-2

1.960
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• https://144.130.98.120/
144.130.98.120
-2

1.953
V
ConnectFailure - Unable to connect to the remote server

7. Comments


1. General Results, most used to calculate the result

Aname "iot.rvcict.com.au" is subdomain, public suffix is ".com.au", top-level-domain is ".au", top-level-domain-type is "country-code", Country is Australia, tld-manager is ".au Domain Administration (auDA)", num .au-domains preloaded: 1284 (complete: 142558)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: iot.rvcict.com.au has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: iot.rvcict.com.au has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Niot.rvcict.com.au:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N144.130.98.120:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Vhttp://iot.rvcict.com.au/ 144.130.98.120
-2

connect failure - perhaps firewall
Vhttps://iot.rvcict.com.au/ 144.130.98.120
-2

connect failure - perhaps firewall
Vhttp://iot.rvcict.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 144.130.98.120
-2

connect failure - perhaps firewall
Vhttps://144.130.98.120/ 144.130.98.120
-2

connect failure - perhaps firewall
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain iot.rvcict.com.au, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 14 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 14 Queries complete, 14 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 7.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns1.syrahost.com, ns2.syrahost.com, ns4.syra.net.au, ns5.syra.net.au, 2 Name Servers included in Delegation: ns4.syra.net.au, ns5.syra.net.au, 2 Name Servers included in 1 Zone definitions: ns1.syrahost.com, ns2.syrahost.com, 1 Name Servers listed in SOA.Primary: ns1.syrahost.com.
AGood: Only one SOA.Primary Name Server found.: ns1.syrahost.com.
Error: SOA.Primary Name Server not included in the delegation set.: ns1.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns1.syrahost.com (27.124.125.1): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns1.syrahost.com (2a00:fd80:aaaa:ffff::bbbb:1): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns2.syrahost.com (27.124.125.2): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns2.syrahost.com (2a00:fd80:aaaa:ffff::bbbb:2): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns4.syra.net.au (27.124.125.1): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns4.syra.net.au (2a00:fd80:aaaa:ffff::bbbb:1): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns5.syra.net.au (27.124.125.2): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns5.syra.net.au (2a00:fd80:aaaa:ffff::bbbb:2): Delegation: ns4.syra.net.au, ns5.syra.net.au, Zone: ns1.syrahost.com, ns2.syrahost.com. Name Servers defined in Delegation, missing in Zone: ns4.syra.net.au, ns5.syra.net.au.Name Servers defined in Zone, missing in Delegation: ns1.syrahost.com, ns2.syrahost.com.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 4 Name Servers, 1 different subnets (first Byte): 27., 1 different subnets (first two Bytes): 27.124., 1 different subnets (first three Bytes): 27.124.125.
XFatal: All Name Server IPv4 addresses from the same subnet. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.:
AInfo: IPv6-Subnet-list: 4 Name Servers with IPv6, 1 different subnets (first block): 2a00:, 1 different subnets (first two blocks): 2a00:fd80:, 1 different subnets (first three blocks): 2a00:fd80:aaaa:, 1 different subnets (first four blocks): 2a00:fd80:aaaa:ffff:
Fatal: All Name Server IPv6 addresses from the same subnet.
AGood: Nameserver supports TCP connections: 8 good Nameserver
AGood: Nameserver supports Echo Capitalization: 8 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns1.syrahost.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns5.syra.net.au
Nameserver doesn't pass all EDNS-Checks: ns1.syrahost.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.syrahost.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://iot.rvcict.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 144.130.98.120
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 125497 milliseconds, 125.497 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
iot.rvcict.com.au
iot.rvcict.com.au
8443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
iot.rvcict.com.au
iot.rvcict.com.au
8443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
no Tls.1.0
Self signed certificate
1CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, C=US, ST=CA


144.130.98.120
144.130.98.120
8443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

144.130.98.120
144.130.98.120
8443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
no Tls.1.0
Self signed certificate
1CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, C=US, ST=CA


9. Certificates

1.
1.
CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, S=CA, C=US
26.02.2019
23.02.2029
expires in 2920 days

1.
1.
CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, S=CA, C=US
26.02.2019

23.02.2029
expires in 2920 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:5C749FB1
Thumbprint:09ED8231DF340BE4FDDDF9BBD57EB3ABC9889944
SHA256 / Certificate:2m/xuMk9LaPlWgVdp+DkoP1bj0mtha5piwVEpao8/C4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3c98688cfc5dc0d71753c6079217b346d105e0226ce998ed76387d73999e5a7f
SHA256 hex / Subject Public Key Information (SPKI):374767eb0a5aba5cbe778bab50fb376541d74f95fa0749bc2bb7be3acc8084c2
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.syrahost.com, ns2.syrahost.com, ns4.syra.net.au, ns5.syra.net.au

QNr.DomainTypeNS used
1
com
NS
b.root-servers.net (2001:500:200::b)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.syrahost.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: names1.syrahost.com, names2.syrahost.com

Answer: names1.syrahost.com
27.124.125.3, 2a00:fd80:aaaa:ffff::aaaa:1

Answer: names2.syrahost.com
27.124.125.4, 2a00:fd80:aaaa:ffff::aaaa:2
3
ns2.syrahost.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: names1.syrahost.com, names2.syrahost.com

Answer: names1.syrahost.com
27.124.125.3, 2a00:fd80:aaaa:ffff::aaaa:1

Answer: names2.syrahost.com
27.124.125.4, 2a00:fd80:aaaa:ffff::aaaa:2
4
au
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.au, c.au, d.au, m.au, n.au, q.au, r.au, s.au, t.au
5
ns4.syra.net.au
NS
a.au (2407:6e00:254:306::73)

Answer: q.au, r.au, s.au, t.au

Answer: q.au
2a01:8840:be::1, 65.22.196.1

Answer: r.au
2a01:8840:bf::1, 65.22.197.1

Answer: s.au
2a01:8840:c0::1, 65.22.198.1

Answer: t.au
2a01:8840:c1::1, 65.22.199.1
6
ns5.syra.net.au
NS
a.au (2407:6e00:254:306::73)

Answer: q.au, r.au, s.au, t.au

Answer: q.au
2a01:8840:be::1, 65.22.196.1

Answer: r.au
2a01:8840:bf::1, 65.22.197.1

Answer: s.au
2a01:8840:c0::1, 65.22.198.1

Answer: t.au
2a01:8840:c1::1, 65.22.199.1
7
ns1.syrahost.com: 27.124.125.1
A
names1.syrahost.com (2a00:fd80:aaaa:ffff::aaaa:1)
8
ns1.syrahost.com: 2a00:fd80:aaaa:ffff::bbbb:1
AAAA
names1.syrahost.com (2a00:fd80:aaaa:ffff::aaaa:1)
9
ns2.syrahost.com: 27.124.125.2
A
names1.syrahost.com (2a00:fd80:aaaa:ffff::aaaa:1)
10
ns2.syrahost.com: 2a00:fd80:aaaa:ffff::bbbb:2
AAAA
names1.syrahost.com (2a00:fd80:aaaa:ffff::aaaa:1)
11
ns4.syra.net.au: No A record found
A
q.au (2a01:8840:be::1)
12
ns4.syra.net.au: No AAAA record found
AAAA
q.au (2a01:8840:be::1)
13
ns5.syra.net.au: No A record found
A
q.au (2a01:8840:be::1)
14
ns5.syra.net.au: No AAAA record found
AAAA
q.au (2a01:8840:be::1)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
iot.rvcict.com.au
0

no CAA entry found
1
0
rvcict.com.au
0

no CAA entry found
1
0
com.au
0

no CAA entry found
1
0
au
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rvcict.com.au
v=spf1 ip4:103.67.235.8 ip4:203.170.85.123 ip4:27.54.80.211 +a +mx +ip4:203.170.87.57 include:_spf.syrahost.com ?all
ok
1
0
rvcict.com.au
Zone hosted on cp-wc22.per01.ds.network
ok
1
0
iot.rvcict.com.au

ok
1
0
_acme-challenge.iot.rvcict.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.iot.rvcict.com.au.rvcict.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.iot.rvcict.com.au.iot.rvcict.com.au

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
iot.rvcict.com.au
21
FTP



iot.rvcict.com.au
21
FTP



iot.rvcict.com.au
22
SSH



iot.rvcict.com.au
22
SSH



iot.rvcict.com.au
25
SMTP



iot.rvcict.com.au
25
SMTP



iot.rvcict.com.au
53
DNS
open


iot.rvcict.com.au
53
DNS
open


iot.rvcict.com.au
110
POP3



iot.rvcict.com.au
110
POP3



iot.rvcict.com.au
143
IMAP



iot.rvcict.com.au
143
IMAP



iot.rvcict.com.au
465
SMTP (encrypted)



iot.rvcict.com.au
465
SMTP (encrypted)



iot.rvcict.com.au
587
SMTP (encrypted, submission)



iot.rvcict.com.au
587
SMTP (encrypted, submission)



iot.rvcict.com.au
993
IMAP (encrypted)



iot.rvcict.com.au
993
IMAP (encrypted)



iot.rvcict.com.au
995
POP3 (encrypted)



iot.rvcict.com.au
995
POP3 (encrypted)



iot.rvcict.com.au
1433
MS SQL



iot.rvcict.com.au
1433
MS SQL



iot.rvcict.com.au
2082
cPanel (http)



iot.rvcict.com.au
2082
cPanel (http)



iot.rvcict.com.au
2083
cPanel (https)



iot.rvcict.com.au
2083
cPanel (https)



iot.rvcict.com.au
2086
WHM (http)



iot.rvcict.com.au
2086
WHM (http)



iot.rvcict.com.au
2087
WHM (https)



iot.rvcict.com.au
2087
WHM (https)



iot.rvcict.com.au
2089
cPanel Licensing



iot.rvcict.com.au
2089
cPanel Licensing



iot.rvcict.com.au
2095
cPanel Webmail (http)



iot.rvcict.com.au
2095
cPanel Webmail (http)



iot.rvcict.com.au
2096
cPanel Webmail (https)



iot.rvcict.com.au
2096
cPanel Webmail (https)



iot.rvcict.com.au
2222
DirectAdmin (http)



iot.rvcict.com.au
2222
DirectAdmin (http)



iot.rvcict.com.au
2222
DirectAdmin (https)



iot.rvcict.com.au
2222
DirectAdmin (https)



iot.rvcict.com.au
3306
mySql



iot.rvcict.com.au
3306
mySql



iot.rvcict.com.au
5224
Plesk Licensing



iot.rvcict.com.au
5224
Plesk Licensing



iot.rvcict.com.au
5432
PostgreSQL



iot.rvcict.com.au
5432
PostgreSQL



iot.rvcict.com.au
8080
Ookla Speedtest (http)
open
http://iot.rvcict.com.au:8080/
Http-Status: 302
Redirect: /manage
iot.rvcict.com.au
8080
Ookla Speedtest (http)
open
http://iot.rvcict.com.au:8080/
Http-Status: 302
Redirect: /manage
iot.rvcict.com.au
8080
Ookla Speedtest (https)
open
https://iot.rvcict.com.au:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

iot.rvcict.com.au
8080
Ookla Speedtest (https)
open
https://iot.rvcict.com.au:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

iot.rvcict.com.au
8083
VestaCP http



iot.rvcict.com.au
8083
VestaCP http



iot.rvcict.com.au
8083
VestaCP https



iot.rvcict.com.au
8083
VestaCP https



iot.rvcict.com.au
8443
Plesk Administration (https)
open
https://iot.rvcict.com.au:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
iot.rvcict.com.au
8443
Plesk Administration (https)
open
https://iot.rvcict.com.au:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
iot.rvcict.com.au
8447
Plesk Installer + Updates



iot.rvcict.com.au
8447
Plesk Installer + Updates



iot.rvcict.com.au
8880
Plesk Administration (http)
open
http://iot.rvcict.com.au:8880/
Http-Status: 400

iot.rvcict.com.au
8880
Plesk Administration (http)
open
http://iot.rvcict.com.au:8880/
Http-Status: 400

iot.rvcict.com.au
10000
Webmin (http)



iot.rvcict.com.au
10000
Webmin (http)



iot.rvcict.com.au
10000
Webmin (https)



iot.rvcict.com.au
10000
Webmin (https)



144.130.98.120
21
FTP



144.130.98.120
21
FTP



144.130.98.120
22
SSH



144.130.98.120
22
SSH



144.130.98.120
25
SMTP



144.130.98.120
25
SMTP



144.130.98.120
53
DNS
open


144.130.98.120
53
DNS
open


144.130.98.120
110
POP3



144.130.98.120
110
POP3



144.130.98.120
143
IMAP



144.130.98.120
143
IMAP



144.130.98.120
465
SMTP (encrypted)



144.130.98.120
465
SMTP (encrypted)



144.130.98.120
587
SMTP (encrypted, submission)



144.130.98.120
587
SMTP (encrypted, submission)



144.130.98.120
993
IMAP (encrypted)



144.130.98.120
993
IMAP (encrypted)



144.130.98.120
995
POP3 (encrypted)



144.130.98.120
995
POP3 (encrypted)



144.130.98.120
1433
MS SQL



144.130.98.120
1433
MS SQL



144.130.98.120
2082
cPanel (http)



144.130.98.120
2082
cPanel (http)



144.130.98.120
2083
cPanel (https)



144.130.98.120
2083
cPanel (https)



144.130.98.120
2086
WHM (http)



144.130.98.120
2086
WHM (http)



144.130.98.120
2087
WHM (https)



144.130.98.120
2087
WHM (https)



144.130.98.120
2089
cPanel Licensing



144.130.98.120
2089
cPanel Licensing



144.130.98.120
2095
cPanel Webmail (http)



144.130.98.120
2095
cPanel Webmail (http)



144.130.98.120
2096
cPanel Webmail (https)



144.130.98.120
2096
cPanel Webmail (https)



144.130.98.120
2222
DirectAdmin (http)



144.130.98.120
2222
DirectAdmin (http)



144.130.98.120
2222
DirectAdmin (https)



144.130.98.120
2222
DirectAdmin (https)



144.130.98.120
3306
mySql



144.130.98.120
3306
mySql



144.130.98.120
5224
Plesk Licensing



144.130.98.120
5224
Plesk Licensing



144.130.98.120
5432
PostgreSQL



144.130.98.120
5432
PostgreSQL



144.130.98.120
8080
Ookla Speedtest (http)
open
http://144.130.98.120:8080/
Http-Status: 302
Redirect: /manage
144.130.98.120
8080
Ookla Speedtest (http)
open
http://144.130.98.120:8080/
Http-Status: 302
Redirect: /manage
144.130.98.120
8080
Ookla Speedtest (https)
open
https://144.130.98.120:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

144.130.98.120
8080
Ookla Speedtest (https)
open
https://144.130.98.120:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

144.130.98.120
8083
VestaCP http



144.130.98.120
8083
VestaCP http



144.130.98.120
8083
VestaCP https



144.130.98.120
8083
VestaCP https



144.130.98.120
8443
Plesk Administration (https)
open
https://144.130.98.120:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
144.130.98.120
8443
Plesk Administration (https)
open
https://144.130.98.120:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
144.130.98.120
8447
Plesk Installer + Updates



144.130.98.120
8447
Plesk Installer + Updates



144.130.98.120
8880
Plesk Administration (http)
open
http://144.130.98.120:8880/
Http-Status: 400

144.130.98.120
8880
Plesk Administration (http)
open
http://144.130.98.120:8880/
Http-Status: 400

144.130.98.120
10000
Webmin (http)



144.130.98.120
10000
Webmin (http)



144.130.98.120
10000
Webmin (https)



144.130.98.120
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=084f506a-fbdc-4671-9b21-2fbf994bf8a3


Last Result: https://check-your-website.server-daten.de/?q=iot.rvcict.com.au - 2021-02-23 11:39:11


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=iot.rvcict.com.au" target="_blank">Check this Site: iot.rvcict.com.au</a>