Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
16.07.2024 21:53:45

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
loki.tel
A
89.58.18.247
Vienna/Austria (AT) - netcup GmbH
Hostname: mcp.loki.tel
yes
1
0

AAAA
2a0a:4cc0:0:dc7::1984
Vienna/Austria (AT) - netcup GmbH

yes


www.loki.tel
A

yes
1
0

AAAA

yes


*.loki.tel
A

yes



AAAA

yes



CNAME

yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20038, Flags 256






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.08.2024, 00:00:00 +, Signature-Inception: 11.07.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: tel

tel
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 31166, DigestType 2 and Digest HXtqraGgNRAHf3iadRhMphpv4xdqJj0b5SvOiTVcqo0=






1 RRSIG RR to validate DS RR found






RRSIG-Owner tel., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 29.07.2024, 18:00:00 +, Signature-Inception: 16.07.2024, 17:00:00 +, KeyTag 20038, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20038 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 29848, Flags 256






Public Key with Algorithm 8, KeyTag 31166, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner tel., Algorithm: 8, 1 Labels, original TTL: 43200 sec, Signature-expiration: 26.07.2024, 21:32:04 +, Signature-Inception: 12.07.2024, 21:32:04 +, KeyTag 31166, Signer-Name: tel






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 31166 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 31166, DigestType 2 and Digest "HXtqraGgNRAHf3iadRhMphpv4xdqJj0b5SvOiTVcqo0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: loki.tel

loki.tel
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "jusvr79u8vk4kij705ocptko0d7por7m" between the hashed NSEC3-owner "jusvr79u8vk4kij705ocptko0d7por7m" and the hashed NextOwner "jutp4eik4o73ca28h6q8cc50hcv1n2ti". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner jusvr79u8vk4kij705ocptko0d7por7m.tel., Algorithm: 8, 2 Labels, original TTL: 43200 sec, Signature-expiration: 25.07.2024, 21:29:21 +, Signature-Inception: 11.07.2024, 21:29:21 +, KeyTag 29848, Signer-Name: tel






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 48868, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 62900, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 48868, Signer-Name: loki.tel






RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 48868 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 62900 used to validate the DNSKEY RRSet






Error: DNSKEY 48868 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.






Error: DNSKEY 62900 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.






RRSIG Type 1 validates the A - Result: 89.58.18.247
Validated: RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






RRSIG Type 16 validates the TXT - Result: v=spf1 mx -all
Validated: RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






RRSIG Type 28 validates the AAAA - Result: 2A0A:4CC0:0000:0DC7:0000:0000:0000:1984
Validated: RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






RRSIG Type 257 validates the CAA - Result: 5|issueletsencrypt.org
Validated: RRSIG-Owner loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "4men3qfijhc2j1u6tau501etohe0n79j" equal the hashed NSEC3-owner "4men3qfijhc2j1u6tau501etohe0n79j" and the hashed NextOwner "4mvpvg92i8b9fuuo3c8lvcrj726kau9f". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query (_443._tcp.loki.tel) sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "1joifhs6fl597i3hmt5jnrjtkmjhf27i" (unhashed: _tcp.loki.tel) with the owner "1esvirv9nososs3nvnfs3skufakdv5qq" and the NextOwner "248bl7cs2muta1fac199bpktmt716sna". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, SSHFP, RRSIG Validated: RRSIG-Owner 1esvirv9nososs3nvnfs3skufakdv5qq.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "dqusqof98vvfp9jqua1knl7tcidvcfpk". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.



Zone: www.loki.tel

www.loki.tel
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "4men3qfijhc2j1u6tau501etohe0n79j" as Owner. That's the Hash of "loki.tel" with the NextHashedOwnerName "4mvpvg92i8b9fuuo3c8lvcrj726kau9f". So that domain name is the Closest Encloser of "www.loki.tel". Opt-Out: False.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






The ClosestEncloser says, that "*.loki.tel" with the Hash "vsj3m2b8et6v8eij121f7e9lk0snhg6s" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "vsj3m2b8et6v8eij121f7e9lk0snhg6s" and the Next Owner "02bt2hj8rvpp78m1dmg6vpbvaou0r9o3", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






RRSIG Type 257 validates the CAA - Result: 9|issuewildletsencrypt.org. RRSIG Owner has 3 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner www.loki.tel., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






A-Query sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






A-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "bs16t4o19nmt1k9s56alg3vcdl6put7s". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






CNAME-Query sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






CNAME-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "bs16t4o19nmt1k9s56alg3vcdl6put7s". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TXT-Query sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TXT-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "bs16t4o19nmt1k9s56alg3vcdl6put7s". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






AAAA-Query sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






AAAA-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "bs16t4o19nmt1k9s56alg3vcdl6put7s". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query (_443._tcp.www.loki.tel) sends a valid NSEC3 RR as result with the hashed owner name "4men3qfijhc2j1u6tau501etohe0n79j" (unhashed: loki.tel). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, MX, TXT, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CAA Validated: RRSIG-Owner 4men3qfijhc2j1u6tau501etohe0n79j.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "bs16t4o19nmt1k9s56alg3vcdl6put7s" (unhashed: www.loki.tel) with the owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result with the hashed owner name "vsj3m2b8et6v8eij121f7e9lk0snhg6s" (unhashed: *.loki.tel) as the Wildcard-Expansion of the Closest Encloser of the query name "5nhbuk4gfsvseeqsue7lu2aqtfelllme". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: RRSIG, CAA Validated: RRSIG-Owner vsj3m2b8et6v8eij121f7e9lk0snhg6s.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Good. NoData-Proof required and found.






A-Query sends a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the zone confirmes the not-existence of that A RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC3 covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC3-Records, so DNSSEC works.






CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the zone confirmes the not-existence of that CNAME RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC3 covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC3-Records, so DNSSEC works.






TXT-Query sends a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the zone confirmes the not-existence of that TXT RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC3 covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC3-Records, so DNSSEC works.






AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the zone confirmes the not-existence of that AAAA RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC3 covers the Query Name, but there are not enough informations about wildcards: NoError - there must be a confirmed wildcard expansion to create the query name. Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC3-Records, so DNSSEC works.






CAA-Query sends a valid NSEC3 RR as result with the hashed query name "bs16t4o19nmt1k9s56alg3vcdl6put7s" between the hashed NSEC3-owner "9vqht005gc0pagq26n9f54gjm0jdc0sv" and the hashed NextOwner "c8ct2i710q0172c6ufvgp5i7ufhfo8c9". So the zone confirmes the not-existence of that CAA RR.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 9vqht005gc0pagq26n9f54gjm0jdc0sv.loki.tel., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 14.08.2024, 20:01:17 +, Signature-Inception: 15.07.2024, 20:01:17 +, KeyTag 62900, Signer-Name: loki.tel






Status: Fatal / bogus. NoError+NoDataResult sent, the answer says, the query name exists, the NSEC3 covers the Query Name, but there are not enough informations about wildcards: Validated Data sent, but the NSEC3Recalculate the zone or update the name server software. Or there is a Man in the middle, who has removed one of the required NSEC3-Records, so DNSSEC works.

 

3. Name Servers

DomainNameserverNS-IP
www.loki.tel
  anexia.secondns.at / anx-uceuwest-cdns-node1002

loki.tel
  anexia.fifthns.com / anx-uceuwest-cdns-node8201
213.227.168.116
Frankfurt am Main/Hesse/Germany (DE) - ANEXIA Internetdienstleistungs GmbH


 
2a00:11c0:82:359::1004
Frankfurt am Main/Hesse/Germany (DE) - ANEXIA Internetdienstleistungs GmbH


  anexia.firstns.cc / anx-uceuwest-cdns-node0402
45.84.253.112
Vienna/Austria (AT) - ANEXIA Internetdienstleistungs GmbH


 
2a00:11c0:66::210
Vienna/Austria (AT) - ANEXIA Internetdienstleistungs GmbH


  anexia.fourthns.systems / anx-uceuwest-cdns-node6301
188.172.219.104
Amsterdam/North Holland/The Netherlands (NL) - ANEXIA Internetdienstleistungs GmbH


 
2a00:11c0:63:350::1004
Amsterdam/North Holland/The Netherlands (NL) - ANEXIA Internetdienstleistungs GmbH


  anexia.secondns.at / anx-uceuwest-cdns-node1002
37.252.225.36
Paris/Île-de-France/France (FR) - ANEXIA Internetdienstleistungs GmbH


 
2a00:11c0:2:998::30
Paris/Île-de-France/France (FR) - ANEXIA Internetdienstleistungs GmbH


  anexia.thirdns.de / anx-uceuwest-cdns-node2502
217.146.22.148
Frankfurt am Main/Hesse/Germany (DE) - ANEXIA Internetdienstleistungs GmbH


 
2a00:11c0:e:ffff:1::4
Frankfurt am Main/Hesse/Germany (DE) - ANEXIA Internetdienstleistungs GmbH

tel
  anycast10.irondns.net


  anycast23.irondns.net


  anycast24.irondns.net


  anycast9.irondns.net

 

4. SOA-Entries


Domain:tel
Zone-Name:tel
Primary:anycast9.irondns.net
Mail:dnsmaster.irondns.net
Serial:2407161853
Refresh:7200
Retry:7200
Expire:604800
TTL:7200
num Entries:4


Domain:loki.tel
Zone-Name:loki.tel
Primary:anexia.secondns.at
Mail:support.anexia.at
Serial:144
Refresh:14400
Retry:3600
Expire:604800
TTL:3600
num Entries:10


Domain:www.loki.tel
Zone-Name:loki.tel
Primary:anexia.secondns.at
Mail:support.anexia.at
Serial:144
Refresh:14400
Retry:3600
Expire:604800
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://loki.tel/, address used: https://loki.tel/, Screenshot created 2024-07-16 22:00:59 +00:0

 

Mobil (412px x 732px)

 

1047 milliseconds

 

Screenshot mobile - https://loki.tel/
Mobil + Landscape (732px x 412px)

 

1043 milliseconds

 

Screenshot mobile landscape - https://loki.tel/
Screen (1280px x 1680px)

 

1160 milliseconds

 

Screenshot Desktop - https://loki.tel/

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport396732
content Size3961214

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://loki.tel/
89.58.18.247
301
https://loki.tel/
Html is minified: 109.46 %
0.077
A
Server: nginx
Date: Tue, 16 Jul 2024 19:54:55 GMT
Connection: close
Location: https://loki.tel/
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Content-Length: 162

• http://loki.tel/
2a0a:4cc0:0:dc7::1984
301
https://loki.tel/
Html is minified: 109.46 %
0.084
A
Server: nginx
Date: Tue, 16 Jul 2024 19:54:55 GMT
Connection: close
Location: https://loki.tel/
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Content-Length: 162

• https://loki.tel/
89.58.18.247
Inline-JavaScript (∑/total): 1/338 Inline-CSS (∑/total): 1/811
200

Html is minified: 125.82 %
Other inline scripts (∑/total): 1/338
2.460
A
Server: nginx
Date: Tue, 16 Jul 2024 19:54:56 GMT
Transfer-Encoding: chunked
Connection: close
ETag: W/"66008039-22e4"
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Last-Modified: Sun, 24 Mar 2024 19:34:17 GMT
Content-Encoding: gzip

• https://loki.tel/
2a0a:4cc0:0:dc7::1984
Inline-JavaScript (∑/total): 1/338 Inline-CSS (∑/total): 1/811
200

Html is minified: 125.82 %
Other inline scripts (∑/total): 1/338
2.510
A
Server: nginx
Date: Tue, 16 Jul 2024 19:55:00 GMT
Transfer-Encoding: chunked
Connection: close
ETag: W/"66008039-22e4"
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Last-Modified: Sun, 24 Mar 2024 19:34:17 GMT
Content-Encoding: gzip

• http://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
89.58.18.247
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
Other inline scripts (∑/total): 0/0
0.076
A
Visible Content:
Server: nginx
Date: Tue, 16 Jul 2024 19:55:04 GMT
Connection: close
Location: https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Content-Length: 162

• http://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a0a:4cc0:0:dc7::1984
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 109.46 %
Other inline scripts (∑/total): 0/0
0.083
A
Visible Content:
Server: nginx
Date: Tue, 16 Jul 2024 19:55:04 GMT
Connection: close
Location: https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Content-Length: 162

• https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 110.61 %
Other inline scripts (∑/total): 0/0
2.533
A
Not Found
Visible Content:
Server: nginx
Date: Tue, 16 Jul 2024 19:55:13 GMT
Transfer-Encoding: chunked
Connection: close
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Content-Encoding: gzip

• https://89.58.18.247/
89.58.18.247
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 107.91 %
Other inline scripts (∑/total): 0/0
2.757
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Server: nginx
Date: Tue, 16 Jul 2024 19:55:05 GMT
Transfer-Encoding: chunked
Connection: close
ETag: W/"623a62e5-214"
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Last-Modified: Tue, 22 Mar 2022 23:59:33 GMT
Content-Encoding: gzip

• https://[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]/
2a0a:4cc0:0:dc7::1984
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 107.91 %
Other inline scripts (∑/total): 0/0
2.647
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Server: nginx
Date: Tue, 16 Jul 2024 19:55:09 GMT
Transfer-Encoding: chunked
Connection: close
ETag: W/"623a62e5-214"
X-Frame-Options: SAMEORIGIN
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
Content-Type: text/html
Last-Modified: Tue, 22 Mar 2022 23:59:33 GMT
Content-Encoding: gzip

 

7. Comments


1. General Results, most used to calculate the result

Aname "loki.tel" is domain, public suffix is ".tel", top-level-domain is ".tel", top-level-domain-type is "sponsored", tld-manager is "Telnames Ltd.", num .tel-domains preloaded: 21 (complete: 245733)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: loki.tel has 2 different ip addresses (authoritative).
AGood: Ipv4 and Ipv6 addresses per domain name found: loki.tel has 1 ipv4, 1 ipv6 addresses
AGood: No asked Authoritative Name Server had a timeout
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
AGood: HSTS has includeSubdomains - directive
AGood: HSTS has preload directive
Warning: HSTS preload sent, but not in Preload-List. Never send a preload directive if you don't know what preload means. Check https://hstspreload.org/ to learn the basics about the Google-Preload list. If you send a preload directive, you should **immediately** add your domain to the HSTS preload list via https://hstspreload.org/ . If Google accepts the domain, so the status is "pending": Note that new entries are hardcoded into the Chrome source code and can take several months before they reach the stable version. So you will see this message some months. If you don't want that or if you don't understand "preload", but if you send a preload directive and if you have correct A-redirects, everybody can add your domain to that list. Then you may have problems, it's not easy to undo that. So if you don't want your domain preloaded, remove the preload directive.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (5 urls)
https://loki.tel/ 89.58.18.247


Url with incomplete Content-Type - header - missing charset
https://loki.tel/ 2a0a:4cc0:0:dc7::1984


Url with incomplete Content-Type - header - missing charset
https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
https://89.58.18.247/ 89.58.18.247


Url with incomplete Content-Type - header - missing charset
https://[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]/ 2a0a:4cc0:0:dc7::1984


Url with incomplete Content-Type - header - missing charset
Ahttp://loki.tel/ 89.58.18.247
301
https://loki.tel/
Correct redirect http - https with the same domain name
Ahttp://loki.tel/ 2a0a:4cc0:0:dc7::1984
301
https://loki.tel/
Correct redirect http - https with the same domain name
Nhttps://89.58.18.247/ 89.58.18.247
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]/ 2a0a:4cc0:0:dc7::1984
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nloki.tel:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nloki.tel:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain loki.tel, 2 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain loki.tel, 2 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.loki.tel

2. Header-Checks

Aloki.tel 89.58.18.247
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
X-Frame-Options
Ok: Header without syntax errors found: SAMEORIGIN
B

Info: Header is deprecated. May not longer work in modern browsers. SAMEORIGIN. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1; mode=block
B

Info: Header is deprecated. May not longer work in modern browsers. 1; mode=block
Aloki.tel 2a0a:4cc0:0:dc7::1984
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
X-Frame-Options
Ok: Header without syntax errors found: SAMEORIGIN
B

Info: Header is deprecated. May not longer work in modern browsers. SAMEORIGIN. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1; mode=block
B

Info: Header is deprecated. May not longer work in modern browsers. 1; mode=block
Floki.tel 89.58.18.247
Content-Security-Policy
Critical: Missing Header:
Floki.tel 89.58.18.247
Referrer-Policy
Critical: Missing Header:
Floki.tel 89.58.18.247
Permissions-Policy
Critical: Missing Header:
Bloki.tel 89.58.18.247
Cross-Origin-Embedder-Policy
Info: Missing Header
Bloki.tel 89.58.18.247
Cross-Origin-Opener-Policy
Info: Missing Header
Bloki.tel 89.58.18.247
Cross-Origin-Resource-Policy
Info: Missing Header
Floki.tel 2a0a:4cc0:0:dc7::1984
Content-Security-Policy
Critical: Missing Header:
Floki.tel 2a0a:4cc0:0:dc7::1984
Referrer-Policy
Critical: Missing Header:
Floki.tel 2a0a:4cc0:0:dc7::1984
Permissions-Policy
Critical: Missing Header:
Bloki.tel 2a0a:4cc0:0:dc7::1984
Cross-Origin-Embedder-Policy
Info: Missing Header
Bloki.tel 2a0a:4cc0:0:dc7::1984
Cross-Origin-Opener-Policy
Info: Missing Header
Bloki.tel 2a0a:4cc0:0:dc7::1984
Cross-Origin-Resource-Policy
Info: Missing Header

3. DNS- and NameServer - Checks

AInfo:: 23 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 5 Name Servers.
AInfo:: 23 Queries complete, 22 with IPv6, 0 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
Ok (4 - 8):: An average of 4.6 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 5 different Name Servers found: anexia.fifthns.com, anexia.firstns.cc, anexia.fourthns.systems, anexia.secondns.at, anexia.thirdns.de, 5 Name Servers included in Delegation: anexia.fifthns.com, anexia.firstns.cc, anexia.fourthns.systems, anexia.secondns.at, anexia.thirdns.de, 5 Name Servers included in 1 Zone definitions: anexia.fifthns.com, anexia.firstns.cc, anexia.fourthns.systems, anexia.secondns.at, anexia.thirdns.de, 1 Name Servers listed in SOA.Primary: anexia.secondns.at.
AGood: Only one SOA.Primary Name Server found.: anexia.secondns.at.
AGood: SOA.Primary Name Server included in the delegation set.: anexia.secondns.at.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: anexia.fifthns.com, anexia.firstns.cc, anexia.fourthns.systems, anexia.secondns.at, anexia.thirdns.de
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 5 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 5 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 5 Name Servers, 5 Top Level Domains: cc, at, de, com, systems
AGood: Name Servers with different domain names found.: 5 different Domains found
AGood: Name servers with different Country locations found: 5 Name Servers, 4 Countries: AT, DE, FR, NL
AInfo: Ipv4-Subnet-list: 5 Name Servers, 5 different subnets (first Byte): 188., 213., 217., 37., 45., 5 different subnets (first two Bytes): 188.172., 213.227., 217.146., 37.252., 45.84., 5 different subnets (first three Bytes): 188.172.219., 213.227.168., 217.146.22., 37.252.225., 45.84.253.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 5 Name Servers with IPv6, 1 different subnets (first block): 2a00:, 1 different subnets (first two blocks): 2a00:11c0:, 5 different subnets (first three blocks): 2a00:11c0:0002:, 2a00:11c0:000e:, 2a00:11c0:0063:, 2a00:11c0:0066:, 2a00:11c0:0082:, 5 different subnets (first four blocks): 2a00:11c0:0002:0998:, 2a00:11c0:000e:ffff:, 2a00:11c0:0063:0350:, 2a00:11c0:0066:0000:, 2a00:11c0:0082:0359:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 10 good Nameserver
AInfo: Nameserver mit different domain names found. May be a problem with DNS-Updates
AGood: Nameserver supports Echo Capitalization: 10 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: anexia.fifthns.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: anexia.firstns.cc
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: anexia.fourthns.systems
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: anexia.secondns.at
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: anexia.thirdns.de
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 10 good Nameserver
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create wildcard-certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 and greater 1024 Bytes is compressed (gzip, deflate, br checked).
https://loki.tel/ 89.58.18.247
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://loki.tel/ 2a0a:4cc0:0:dc7::1984
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://loki.tel/ 89.58.18.247
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://loki.tel/ 2a0a:4cc0:0:dc7::1984
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://loki.tel/ 89.58.18.247
301

Warning: HSTS header sent via http has no effect
http://loki.tel/ 2a0a:4cc0:0:dc7::1984
301

Warning: HSTS header sent via http has no effect
https://loki.tel/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
2.533 seconds
Warning: 404 needs more then one second
ADuration: 448970 milliseconds, 448.970 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
loki.tel
89.58.18.247
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
loki.tel
89.58.18.247
443
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=loki.tel


2CN=E5, O=Let's Encrypt, C=US


loki.tel
2a0a:4cc0:0:dc7::1984
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok

loki.tel
2a0a:4cc0:0:dc7::1984
443
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=loki.tel


2CN=E5, O=Let's Encrypt, C=US


loki.tel
loki.tel
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok

loki.tel
loki.tel
443
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=loki.tel


2CN=E5, O=Let's Encrypt, C=US


89.58.18.247
89.58.18.247
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
not supported
ok

89.58.18.247
89.58.18.247
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=mcp.loki.tel


2CN=R3, O=Let's Encrypt, C=US


3CN=ISRG Root X1, O=Internet Security Research Group, C=US


[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]
2a0a:4cc0:0:dc7::1984
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
not supported
ok

[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]
2a0a:4cc0:0:dc7::1984
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=mcp.loki.tel


2CN=R3, O=Let's Encrypt, C=US


3CN=ISRG Root X1, O=Internet Security Research Group, C=US


loki.tel
89.58.18.247
993
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

loki.tel
89.58.18.247
993
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate

1CN=mcp.loki.tel


loki.tel
2a0a:4cc0:0:dc7::1984
993
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

loki.tel
2a0a:4cc0:0:dc7::1984
993
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2

Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate

1CN=mcp.loki.tel

 

9. Certificates

1.
1.
CN=loki.tel
12.07.2024
10.10.2024
219 days expired
*.loki.tel, loki.tel - 2 entries
1.
1.
CN=loki.tel
12.07.2024

10.10.2024
219 days expired


*.loki.tel, loki.tel - 2 entries

KeyalgorithmEC Public Key (384 bit, secp384r1)
Signatur:ECDSA SHA384
Serial Number:04D7A9A9523E370C3B2ED4549977C2025405
Thumbprint:794091E1B62D149DFB1ABD49DB3456A4A9C2156B
SHA256 / Certificate:gqPj/qaSzdhZ7Kl06UGKMlaRcXY6ks8H16AUKo2Qq9s=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):530870fc40d283c95531757b0102d11124539cd5b445ef633ec3c6b622ef3d54
SHA256 hex / Subject Public Key Information (SPKI):530870fc40d283c95531757b0102d11124539cd5b445ef633ec3c6b622ef3d54 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://e5.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=E5, O=Let's Encrypt, C=US
13.03.2024
13.03.2027
expires in 665 days


2.
CN=E5, O=Let's Encrypt, C=US
13.03.2024

13.03.2027
expires in 665 days




KeyalgorithmEC Public Key (384 bit, secp384r1)
Signatur:SHA256 With RSA-Encryption
Serial Number:00838F6C63CEB1398C6206628315C9FDDE
Thumbprint:5F28D9C589EE4BF31A11B78C72B8D13F079DDC45
SHA256 / Certificate:Xf2zzzGybyPYfAnzoM72QvZAaan7fP4pJwu13A8eFrs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3586d4ecf070578cbd27aedce20b964e48bc149faeb9dad72f46b857869172b8
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3670 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3670 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=mcp.loki.tel
16.09.2023
15.12.2023
519 days expired
mcp.loki.tel - 1 entry
2.
1.
CN=mcp.loki.tel
16.09.2023

15.12.2023
519 days expired


mcp.loki.tel - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04D0F7AB00F51E2EAEEB7254182EF8ADBCBD
Thumbprint:9676C510E9F1D9D614C125900A8A0885A5F97278
SHA256 / Certificate:yJhIKtuG8OG/hIqPvTUwfzCoeitEUe6nNMdgdo+/yNA=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e6e506b9dd93d735cc7a639b104129e6c83f4d38eaba293b3eac78a815a78268
SHA256 hex / Subject Public Key Information (SPKI):e6e506b9dd93d735cc7a639b104129e6c83f4d38eaba293b3eac78a815a78268 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 121 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 121 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3670 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3670 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




3.
1.
CN=mcp.loki.tel
13.02.2022
11.02.2032
expires in 2461 days
mcp.loki.tel - 1 entry
3.
1.
CN=mcp.loki.tel
13.02.2022

11.02.2032
expires in 2461 days


mcp.loki.tel - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:78E1AD6A32D040226AA3A2F9547A91FDEA753294
Thumbprint:725397F242EE55AECC33C3FC28DE166599D423F6
SHA256 / Certificate:ozeD8ZMub1iw53Pccv+ftrCuNYEGQDKbv/DMk2fy+F4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):17c5ef71dcc67744e597f03161b97468297357aa6bf72276f32eb7587e89167a
SHA256 hex / Subject Public Key Information (SPKI):17c5ef71dcc67744e597f03161b97468297357aa6bf72276f32eb7587e89167a (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=E5, O=Let's Encrypt, C=US
0
0
2
CN=E6, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7717824591
leaf cert
CN=E5, O=Let's Encrypt, C=US
2024-07-15 20:21:51
2024-10-13 20:21:50
*.loki.tel, loki.tel - 2 entries


7695332010
leaf cert
CN=E5, O=Let's Encrypt, C=US
2024-07-12 14:17:22
2024-10-10 14:17:21
*.loki.tel, loki.tel - 2 entries


7695062462
leaf cert
CN=E6, O=Let's Encrypt, C=US
2024-07-12 13:22:46
2024-10-10 13:22:45
*.loki.tel, loki.tel - 2 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=E5, O=Let's Encrypt, C=US
0
0
2
CN=E6, O=Let's Encrypt, C=US
0
0
1
CN=R3, O=Let's Encrypt, C=US
0 /0 new
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
13753312261
precert
CN=E5, O=Let's Encrypt, C=US
2024-07-15 18:21:51
2024-10-13 18:21:50
*.loki.tel, loki.tel
2 entries


13737355966
leaf cert
CN=E5, O=Let's Encrypt, C=US
2024-07-12 12:17:22
2024-10-10 12:17:21
*.loki.tel, loki.tel
2 entries


13737054034
leaf cert
CN=E6, O=Let's Encrypt, C=US
2024-07-12 11:22:46
2024-10-10 11:22:45
*.loki.tel, loki.tel
2 entries


12708605253
leaf cert
CN=R3, O=Let's Encrypt, C=US
2024-04-13 07:54:30
2024-07-12 07:54:29
*.loki.tel, loki.tel
2 entries


 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://loki.tel/
89.58.18.247
a

24

0


0
0
0


link
other
1

0


0
0
0


meta
other
2

0


0
0
0

https://loki.tel/
2a0a:4cc0:0:dc7::1984
a

24

0


0
0
0


link
other
1

0


0
0
0


meta
other
2

0


0
0
0

https://89.58.18.247/
89.58.18.247
a

2

0


0
0
0

https://[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]/
2a0a:4cc0:0:dc7::1984
a

2

0


0
0
0

 

Details (currently limited to 500 rows - some problems with spam users)

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://loki.tel/
89.58.18.247
a

#


2
ok















a

http://wetten.overheid.nl/BWBR0005289/Boek6/Titel3/Afdeling4A/Artikel196c/


3
ok















a

http://www.ris.bka.gv.at/Dokument.wxe?Abfrage=Bundesnormen&Dokumentnummer=NOR40025809


3
ok















a

https://chaos.social/@coacx


1
ok















a

https://de.wikipedia.org/wiki/Tor_(Netzwerk)


1
ok















a

https://en.wikipedia.org/wiki/Tor_(network)


1
ok















a

https://metrics.torproject.org/rs.html#search/family:824862C40A81327DE807F44A7DB9827A62B86B57


1
ok















a

https://munin.loki.tel/tor.loki.tel/index.html


1
ok















a

https://nl.wikipedia.org/wiki/Tor_(netwerk)


1
ok















a

https://prism-break.org/


1
ok















a

https://status.loki.tel


1
ok















a

https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/Telekommunikation/Unternehmen_Institutionen/Anbieterpflichten/Meldepflicht/TKDiensteanbieterXLS_3_12.html


3
ok















a

https://www.eff.org/


1
ok















a

https://www.gesetze-im-internet.de/tmg/__8.html


3
ok















a

https://www.torproject.org/


1
ok















link
icon
data:image/vnd.microsoft.icon;base64,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
Image:


1
ok















meta
charset
utf-8


1
ok















meta
viewport
width=device-width, initial-scale=1.0


1
ok














2a0a:4cc0:0:dc7::1984
a

#


2
ok















a

http://wetten.overheid.nl/BWBR0005289/Boek6/Titel3/Afdeling4A/Artikel196c/


3
ok















a

http://www.ris.bka.gv.at/Dokument.wxe?Abfrage=Bundesnormen&Dokumentnummer=NOR40025809


3
ok















a

https://chaos.social/@coacx


1
ok















a

https://de.wikipedia.org/wiki/Tor_(Netzwerk)


1
ok















a

https://en.wikipedia.org/wiki/Tor_(network)


1
ok















a

https://metrics.torproject.org/rs.html#search/family:824862C40A81327DE807F44A7DB9827A62B86B57


1
ok















a

https://munin.loki.tel/tor.loki.tel/index.html


1
ok















a

https://nl.wikipedia.org/wiki/Tor_(netwerk)


1
ok















a

https://prism-break.org/


1
ok















a

https://status.loki.tel


1
ok















a

https://www.bundesnetzagentur.de/SharedDocs/Downloads/DE/Sachgebiete/Telekommunikation/Unternehmen_Institutionen/Anbieterpflichten/Meldepflicht/TKDiensteanbieterXLS_3_12.html


3
ok















a

https://www.eff.org/


1
ok















a

https://www.gesetze-im-internet.de/tmg/__8.html


3
ok















a

https://www.torproject.org/


1
ok















link
icon
data:image/vnd.microsoft.icon;base64,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
Image:


1
ok















meta
charset
utf-8


1
ok















meta
viewport
width=device-width, initial-scale=1.0


1
ok














https://89.58.18.247/
89.58.18.247
a

http://nginx.com/


1
ok















a

http://nginx.org/


1
ok














https://[2a0a:4cc0:0000:0dc7:0000:0000:0000:1984]/
2a0a:4cc0:0:dc7::1984
a

http://nginx.com/


1
ok















a

http://nginx.org/


1
ok














 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: anexia.fifthns.com, anexia.firstns.cc, anexia.fourthns.systems, anexia.secondns.at, anexia.thirdns.de

 

QNr.DomainTypeNS used
1
com
NS
g.root-servers.net (2001:500:12::d0d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
anexia.fifthns.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: acglob.fifthns.com, acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de

Answer: acglob.fifthns.com
185.81.208.1, 2a00:11c0:1010::1
3
cc
NS
b.root-servers.net (2001:500:200::b)

Answer: ac1.nstld.com, ac2.nstld.com, ac3.nstld.com, ac4.nstld.com
4
anexia.firstns.cc
NS
ac1.nstld.com (2001:500:120::30)

Answer: acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de, acglobacglob.fifthns.com

Answer: acglob.firstns.cc
217.146.18.1, 2a00:11c0:aa1::1
5
systems
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: v0n0.nic.systems, v0n1.nic.systems, v0n2.nic.systems, v0n3.nic.systems, v2n0.nic.systems, v2n1.nic.systems
6
anexia.fourthns.systems
NS
v0n0.nic.systems (2a01:8840:16::38)

Answer: acglob.fifthns.com, acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de

Answer: acglob.fourthns.systems
213.227.191.1, 2803:ad80:aa1::1
7
at
NS
l.root-servers.net (2001:500:9f::42)

Answer: d.ns.at, j.ns.at, n.ns.at, ns1.univie.ac.at, ns2.univie.ac.at, ns9.univie.ac.at, r.ns.at, u.ns.at
8
anexia.secondns.at
NS
d.ns.at (2a02:568:20:1::d)

Answer: acglob.fifthns.com, acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de

Answer: acglob.secondns.at
188.172.248.1, 2a05:8900:aa1::1
9
de
NS
b.root-servers.net (2001:500:200::b)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
10
anexia.thirdns.de
NS
a.nic.de (2001:678:2::53)

Answer: acglob.fifthns.com, acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de

Answer: acglob.thirdns.de
213.227.160.1, 2605:380:aa1::1
11
acglobacglob.fifthns.com
NS
l.gtld-servers.net (2001:500:d937::30)

Answer: acglob.fifthns.com, acglob.firstns.cc, acglob.fourthns.systems, acglob.secondns.at, acglob.thirdns.de

Answer: acglob.fifthns.com
185.81.208.1, 2a00:11c0:1010::1
13
acglobacglob.fifthns.com: No AAAA record found
AAAA
acglob.fifthns.com (2a00:11c0:1010::1)
14
anexia.fifthns.com: 213.227.168.116
A
acglob.fifthns.com (2a00:11c0:1010::1)
15
anexia.fifthns.com: 2a00:11c0:82:359::1004
AAAA
acglob.fifthns.com (2a00:11c0:1010::1)
16
anexia.firstns.cc: 45.84.253.112
A
acglob.firstns.cc (2a00:11c0:aa1::1)
17
anexia.firstns.cc: 2a00:11c0:66::210
AAAA
acglob.firstns.cc (2a00:11c0:aa1::1)
18
anexia.fourthns.systems: 188.172.219.104
A
acglob.fifthns.com (2a00:11c0:1010::1)
19
anexia.fourthns.systems: 2a00:11c0:63:350::1004
AAAA
acglob.fifthns.com (2a00:11c0:1010::1)
20
anexia.secondns.at: 37.252.225.36
A
acglob.fifthns.com (2a00:11c0:1010::1)
21
anexia.secondns.at: 2a00:11c0:2:998::30
AAAA
acglob.fifthns.com (2a00:11c0:1010::1)
22
anexia.thirdns.de: 217.146.22.148
A
acglob.fifthns.com (2a00:11c0:1010::1)
23
anexia.thirdns.de: 2a00:11c0:e:ffff:1::4
AAAA
acglob.fifthns.com (2a00:11c0:1010::1)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.loki.tel
9
issuewild
letsencrypt.org
1
0
loki.tel
5
issue
letsencrypt.org
1
0
tel
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
loki.tel
v=spf1 mx -all
ok
1
0
www.loki.tel

ok
1
0
_acme-challenge.loki.tel

missing entry or wrong length
1
0
_acme-challenge.www.loki.tel

missing entry or wrong length
1
0
_acme-challenge.loki.tel.loki.tel

perhaps wrong
1
0
_acme-challenge.www.loki.tel.loki.tel

perhaps wrong
1
0
_acme-challenge.www.loki.tel.www.loki.tel

perhaps wrong
1
0

 

16. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

loki.tel
3600
mx.loki.tel
01ok

A


195.128.100.25
01ok

CNAME


00ok
SPF
TXT
loki.tel

v=spf1 mx -all
ok

MX
loki.tel

mx.loki.tel
ok

MX-A
mx.loki.tel

195.128.100.25
ok

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
loki.tel
89.58.18.247
443
2 Ciphers34.98 sec
0 without, 2 FS
100.00 %
loki.tel
89.58.18.247
993
28 Ciphers111.35 secIMAP (encrypted)
0 without, 28 FS
100.00 %
loki.tel
2a0a:4cc0:0:dc7::1984
443
2 Ciphers32.31 sec
0 without, 2 FS
100.00 %
loki.tel
2a0a:4cc0:0:dc7::1984
993
28 Ciphers108.89 secIMAP (encrypted)
0 without, 28 FS
100.00 %
Complete

4
60 Ciphers
15.00 Ciphers/Check
287.53 sec71.88 sec/Check
0 without, 60 FS
100.00 %

Details
DomainIPPortCipher (OpenSsl / IANA)
loki.tel
89.58.18.247
443
ECDHE-ECDSA-CHACHA20-POLY1305
(Recommended)
TLSv1.2
0xCC,0xA9
FS
2 Ciphers, 34.98 sec
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
ECDSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-ECDSA-AES256-GCM-SHA384
(Recommended)
TLSv1.2
0xC0,0x2C
FS

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

ECDH
ECDSA
AESGCM(256)
AEAD



993
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
28 Ciphers, 111.35 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x53
FS

TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384

DH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xAA
FS

TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256

DH
RSA
CHACHA20/POLY1305(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x61
FS

TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384

ECDH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-AES256-CCM8
(Secure)
TLSv1.2
0xC0,0xA3
FS

TLS_DHE_RSA_WITH_AES_256_CCM_8

DH
RSA
AESCCM8(256)
AEAD




DHE-RSA-AES256-CCM
(Secure)
TLSv1.2
0xC0,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_CCM

DH
RSA
AESCCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x52
FS

TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256

DH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x60
FS

TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256

ECDH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-CCM8
(Secure)
TLSv1.2
0xC0,0xA2
FS

TLS_DHE_RSA_WITH_AES_128_CCM_8

DH
RSA
AESCCM8(128)
AEAD




DHE-RSA-AES128-CCM
(Secure)
TLSv1.2
0xC0,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_CCM

DH
RSA
AESCCM(128)
AEAD




ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384

ECDH
RSA
Camellia(256)
SHA384




DHE-RSA-CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC4
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256

DH
RSA
Camellia(256)
SHA256




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

DH
RSA
AES(256)
SHA256




ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

ECDH
RSA
Camellia(128)
SHA256




DHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBE
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

DH
RSA
Camellia(128)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

DH
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA

DH
RSA
Camellia(256)
SHA1




DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

DH
RSA
AES(256)
SHA1




DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA

DH
RSA
Camellia(128)
SHA1




DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

DH
RSA
AES(128)
SHA1


2a0a:4cc0:0:dc7::1984
443
ECDHE-ECDSA-CHACHA20-POLY1305
(Recommended)
TLSv1.2
0xCC,0xA9
FS
2 Ciphers, 32.31 sec
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
ECDSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-ECDSA-AES256-GCM-SHA384
(Recommended)
TLSv1.2
0xC0,0x2C
FS

TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

ECDH
ECDSA
AESGCM(256)
AEAD



993
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
28 Ciphers, 108.89 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




DHE-RSA-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x53
FS

TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384

DH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xAA
FS

TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256

DH
RSA
CHACHA20/POLY1305(256)
AEAD




DHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0x00,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_GCM_SHA384

DH
RSA
AESGCM(256)
AEAD




ECDHE-ARIA256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x61
FS

TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384

ECDH
RSA
ARIAGCM(256)
AEAD




DHE-RSA-AES256-CCM8
(Secure)
TLSv1.2
0xC0,0xA3
FS

TLS_DHE_RSA_WITH_AES_256_CCM_8

DH
RSA
AESCCM8(256)
AEAD




DHE-RSA-AES256-CCM
(Secure)
TLSv1.2
0xC0,0x9F
FS

TLS_DHE_RSA_WITH_AES_256_CCM

DH
RSA
AESCCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




DHE-RSA-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x52
FS

TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256

DH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0x00,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

DH
RSA
AESGCM(128)
AEAD




ECDHE-ARIA128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x60
FS

TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256

ECDH
RSA
ARIAGCM(128)
AEAD




DHE-RSA-AES128-CCM8
(Secure)
TLSv1.2
0xC0,0xA2
FS

TLS_DHE_RSA_WITH_AES_128_CCM_8

DH
RSA
AESCCM8(128)
AEAD




DHE-RSA-AES128-CCM
(Secure)
TLSv1.2
0xC0,0x9E
FS

TLS_DHE_RSA_WITH_AES_128_CCM

DH
RSA
AESCCM(128)
AEAD




ECDHE-RSA-CAMELLIA256-SHA384
(Weak)
TLSv1.2
0xC0,0x77
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384

ECDH
RSA
Camellia(256)
SHA384




DHE-RSA-CAMELLIA256-SHA256
(Weak)
TLSv1.2
0x00,0xC4
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256

DH
RSA
Camellia(256)
SHA256




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




DHE-RSA-AES256-SHA256
(Weak)
TLSv1.2
0x00,0x6B
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

DH
RSA
AES(256)
SHA256




ECDHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0xC0,0x76
FS

TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

ECDH
RSA
Camellia(128)
SHA256




DHE-RSA-CAMELLIA128-SHA256
(Weak)
TLSv1.2
0x00,0xBE
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256

DH
RSA
Camellia(128)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




DHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0x00,0x67
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

DH
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




DHE-RSA-CAMELLIA256-SHA
(Weak)
SSLv3
0x00,0x88
FS

TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA

DH
RSA
Camellia(256)
SHA1




DHE-RSA-AES256-SHA
(Weak)
SSLv3
0x00,0x39
FS

TLS_DHE_RSA_WITH_AES_256_CBC_SHA

DH
RSA
AES(256)
SHA1




DHE-RSA-CAMELLIA128-SHA
(Weak)
SSLv3
0x00,0x45
FS

TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA

DH
RSA
Camellia(128)
SHA1




DHE-RSA-AES128-SHA
(Weak)
SSLv3
0x00,0x33
FS

TLS_DHE_RSA_WITH_AES_128_CBC_SHA

DH
RSA
AES(128)
SHA1

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
loki.tel
89.58.18.247
21
FTP



loki.tel
89.58.18.247
21
FTP



loki.tel
89.58.18.247
22
SSH



loki.tel
89.58.18.247
22
SSH



loki.tel
89.58.18.247
25
SMTP



loki.tel
89.58.18.247
25
SMTP



loki.tel
89.58.18.247
53
DNS



loki.tel
89.58.18.247
53
DNS



loki.tel
89.58.18.247
110
POP3



loki.tel
89.58.18.247
110
POP3



loki.tel
89.58.18.247
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

loki.tel
89.58.18.247
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.
This port ist unencrypted and deprecated. Don't use it.
loki.tel
89.58.18.247
465
SMTP (encrypted)



loki.tel
89.58.18.247
465
SMTP (encrypted)



loki.tel
89.58.18.247
587
SMTP (encrypted, submission)



loki.tel
89.58.18.247
587
SMTP (encrypted, submission)



loki.tel
89.58.18.247
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
loki.tel
89.58.18.247
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
loki.tel
89.58.18.247
995
POP3 (encrypted)



loki.tel
89.58.18.247
995
POP3 (encrypted)



loki.tel
89.58.18.247
1433
MS SQL



loki.tel
89.58.18.247
1433
MS SQL



loki.tel
89.58.18.247
2082
cPanel (http)



loki.tel
89.58.18.247
2082
cPanel (http)



loki.tel
89.58.18.247
2083
cPanel (https)



loki.tel
89.58.18.247
2083
cPanel (https)



loki.tel
89.58.18.247
2086
WHM (http)



loki.tel
89.58.18.247
2086
WHM (http)



loki.tel
89.58.18.247
2087
WHM (https)



loki.tel
89.58.18.247
2087
WHM (https)



loki.tel
89.58.18.247
2089
cPanel Licensing



loki.tel
89.58.18.247
2089
cPanel Licensing



loki.tel
89.58.18.247
2095
cPanel Webmail (http)



loki.tel
89.58.18.247
2095
cPanel Webmail (http)



loki.tel
89.58.18.247
2096
cPanel Webmail (https)



loki.tel
89.58.18.247
2096
cPanel Webmail (https)



loki.tel
89.58.18.247
2222
DirectAdmin (http)



loki.tel
89.58.18.247
2222
DirectAdmin (http)



loki.tel
89.58.18.247
2222
DirectAdmin (https)



loki.tel
89.58.18.247
2222
DirectAdmin (https)



loki.tel
89.58.18.247
3306
mySql



loki.tel
89.58.18.247
3306
mySql



loki.tel
89.58.18.247
5224
Plesk Licensing



loki.tel
89.58.18.247
5224
Plesk Licensing



loki.tel
89.58.18.247
5432
PostgreSQL



loki.tel
89.58.18.247
5432
PostgreSQL



loki.tel
89.58.18.247
8080
Ookla Speedtest (http)



loki.tel
89.58.18.247
8080
Ookla Speedtest (http)



loki.tel
89.58.18.247
8080
Ookla Speedtest (https)



loki.tel
89.58.18.247
8080
Ookla Speedtest (https)



loki.tel
89.58.18.247
8083
VestaCP http



loki.tel
89.58.18.247
8083
VestaCP http



loki.tel
89.58.18.247
8083
VestaCP https



loki.tel
89.58.18.247
8083
VestaCP https



loki.tel
89.58.18.247
8443
Plesk Administration (https)



loki.tel
89.58.18.247
8443
Plesk Administration (https)



loki.tel
89.58.18.247
8447
Plesk Installer + Updates



loki.tel
89.58.18.247
8447
Plesk Installer + Updates



loki.tel
89.58.18.247
8880
Plesk Administration (http)



loki.tel
89.58.18.247
8880
Plesk Administration (http)



loki.tel
89.58.18.247
10000
Webmin (http)



loki.tel
89.58.18.247
10000
Webmin (http)



loki.tel
89.58.18.247
10000
Webmin (https)



loki.tel
89.58.18.247
10000
Webmin (https)



loki.tel
2a0a:4cc0:0:dc7::1984
21
FTP



loki.tel
2a0a:4cc0:0:dc7::1984
21
FTP



loki.tel
2a0a:4cc0:0:dc7::1984
22
SSH



loki.tel
2a0a:4cc0:0:dc7::1984
22
SSH



loki.tel
2a0a:4cc0:0:dc7::1984
25
SMTP



loki.tel
2a0a:4cc0:0:dc7::1984
25
SMTP



loki.tel
2a0a:4cc0:0:dc7::1984
53
DNS



loki.tel
2a0a:4cc0:0:dc7::1984
53
DNS



loki.tel
2a0a:4cc0:0:dc7::1984
110
POP3



loki.tel
2a0a:4cc0:0:dc7::1984
110
POP3



loki.tel
2a0a:4cc0:0:dc7::1984
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

loki.tel
2a0a:4cc0:0:dc7::1984
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.
This port ist unencrypted and deprecated. Don't use it.
loki.tel
2a0a:4cc0:0:dc7::1984
465
SMTP (encrypted)



loki.tel
2a0a:4cc0:0:dc7::1984
465
SMTP (encrypted)



loki.tel
2a0a:4cc0:0:dc7::1984
587
SMTP (encrypted, submission)



loki.tel
2a0a:4cc0:0:dc7::1984
587
SMTP (encrypted, submission)



loki.tel
2a0a:4cc0:0:dc7::1984
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
loki.tel
2a0a:4cc0:0:dc7::1984
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
loki.tel
2a0a:4cc0:0:dc7::1984
995
POP3 (encrypted)



loki.tel
2a0a:4cc0:0:dc7::1984
995
POP3 (encrypted)



loki.tel
2a0a:4cc0:0:dc7::1984
1433
MS SQL



loki.tel
2a0a:4cc0:0:dc7::1984
1433
MS SQL



loki.tel
2a0a:4cc0:0:dc7::1984
2082
cPanel (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2082
cPanel (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2083
cPanel (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2083
cPanel (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2086
WHM (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2086
WHM (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2087
WHM (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2087
WHM (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2089
cPanel Licensing



loki.tel
2a0a:4cc0:0:dc7::1984
2089
cPanel Licensing



loki.tel
2a0a:4cc0:0:dc7::1984
2095
cPanel Webmail (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2095
cPanel Webmail (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2096
cPanel Webmail (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2096
cPanel Webmail (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2222
DirectAdmin (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2222
DirectAdmin (http)



loki.tel
2a0a:4cc0:0:dc7::1984
2222
DirectAdmin (https)



loki.tel
2a0a:4cc0:0:dc7::1984
2222
DirectAdmin (https)



loki.tel
2a0a:4cc0:0:dc7::1984
3306
mySql



loki.tel
2a0a:4cc0:0:dc7::1984
3306
mySql



loki.tel
2a0a:4cc0:0:dc7::1984
5224
Plesk Licensing



loki.tel
2a0a:4cc0:0:dc7::1984
5224
Plesk Licensing



loki.tel
2a0a:4cc0:0:dc7::1984
5432
PostgreSQL



loki.tel
2a0a:4cc0:0:dc7::1984
5432
PostgreSQL



loki.tel
2a0a:4cc0:0:dc7::1984
8080
Ookla Speedtest (http)



loki.tel
2a0a:4cc0:0:dc7::1984
8080
Ookla Speedtest (http)



loki.tel
2a0a:4cc0:0:dc7::1984
8080
Ookla Speedtest (https)



loki.tel
2a0a:4cc0:0:dc7::1984
8080
Ookla Speedtest (https)



loki.tel
2a0a:4cc0:0:dc7::1984
8083
VestaCP http



loki.tel
2a0a:4cc0:0:dc7::1984
8083
VestaCP http



loki.tel
2a0a:4cc0:0:dc7::1984
8083
VestaCP https



loki.tel
2a0a:4cc0:0:dc7::1984
8083
VestaCP https



loki.tel
2a0a:4cc0:0:dc7::1984
8443
Plesk Administration (https)



loki.tel
2a0a:4cc0:0:dc7::1984
8443
Plesk Administration (https)



loki.tel
2a0a:4cc0:0:dc7::1984
8447
Plesk Installer + Updates



loki.tel
2a0a:4cc0:0:dc7::1984
8447
Plesk Installer + Updates



loki.tel
2a0a:4cc0:0:dc7::1984
8880
Plesk Administration (http)



loki.tel
2a0a:4cc0:0:dc7::1984
8880
Plesk Administration (http)



loki.tel
2a0a:4cc0:0:dc7::1984
10000
Webmin (http)



loki.tel
2a0a:4cc0:0:dc7::1984
10000
Webmin (http)



loki.tel
2a0a:4cc0:0:dc7::1984
10000
Webmin (https)



loki.tel
2a0a:4cc0:0:dc7::1984
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=8f3a1756-4210-4470-a7aa-21bd8097c668

 

Last Result: https://check-your-website.server-daten.de/?q=loki.tel - 2024-07-16 21:53:45

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=loki.tel" target="_blank">Check this Site: loki.tel</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=loki.tel