Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

X

 

DNS-problem - authoritative Nameserver refused, not defined or timeout

 

Checked:
13.05.2023 22:35:20

 

Older results

 

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
maddino.dedyn.io
A
153.100.176.208
Turkheim/Bavaria/Germany (DE) - LEW TelNet GmbH
No Hostname found
yes
1
0

AAAA
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
Munich/Bavaria/Germany (DE) - LEW TelNet GmbH

yes


www.maddino.dedyn.io

Name Error
yes
1
0
*.maddino.dedyn.io
A
Name Error
yes



A
Name Error
yes



AAAA
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 60955, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.06.2023, 00:00:00 +, Signature-Inception: 11.05.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: io

io
1 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=






1 RRSIG RR to validate DS RR found






RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.05.2023, 17:00:00 +, Signature-Inception: 13.05.2023, 16:00:00 +, KeyTag 60955, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 60955 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 9810, Flags 256






Public Key with Algorithm 8, KeyTag 57355, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 65163, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner io., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 30.05.2023, 15:28:26 +, Signature-Inception: 09.05.2023, 14:28:26 +, KeyTag 57355, Signer-Name: io






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 57355 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 57355, DigestType 2 and Digest "laV8O6t4SdvN33xyracaiBRrFBEQMYylvmcgV+hlw+I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: dedyn.io

dedyn.io
2 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 35233, DigestType 2 and Digest nGcq4ySIT5oBdDMMp2RPaWAXLB2UAj+Ub3B2Ob5tOrA=






DS with Algorithm 13, KeyTag 35233, DigestType 4 and Digest zoB+diKdZKrohrJzI1W91o4snRA5YJCF3+FZM/4DHHGYGn+nf0WyIZL3ZySpsp+5






1 RRSIG RR to validate DS RR found






RRSIG-Owner dedyn.io., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 30.05.2023, 15:28:26 +, Signature-Inception: 09.05.2023, 14:28:26 +, KeyTag 65163, Signer-Name: io






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 65163 used to validate the DS RRSet in the parent zone






1 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 35233, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner dedyn.io., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 35233, Signer-Name: dedyn.io






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35233 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 35233, DigestType 2 and Digest "nGcq4ySIT5oBdDMMp2RPaWAXLB2UAj+Ub3B2Ob5tOrA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 35233, DigestType 4 and Digest "zoB+diKdZKrohrJzI1W91o4snRA5YJCF3+FZM/4DHHGYGn+nf0WyIZL3ZySpsp+5" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: maddino.dedyn.io

maddino.dedyn.io
2 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 1975, DigestType 2 and Digest DUg8eH0NMvvrqz0jyHP7Zxb8yKW0Qg4X5WFflwHy5ss=






DS with Algorithm 13, KeyTag 1975, DigestType 4 and Digest scAqIzfeFaVRAmWAokQ4cuiozZxmC9lq4xqEuixfJk4OoWnlbUIJ5jtb7+zdzzhH






1 RRSIG RR to validate DS RR found






RRSIG-Owner maddino.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 35233, Signer-Name: dedyn.io






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35233 used to validate the DS RRSet in the parent zone






1 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 1975, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner maddino.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 1975 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 1975, DigestType 2 and Digest "DUg8eH0NMvvrqz0jyHP7Zxb8yKW0Qg4X5WFflwHy5ss=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 1975, DigestType 4 and Digest "scAqIzfeFaVRAmWAokQ4cuiozZxmC9lq4xqEuixfJk4OoWnlbUIJ5jtb7+zdzzhH" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






RRSIG Type 1 validates the A - Result: 153.100.176.208
Validated: RRSIG-Owner maddino.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 60 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






RRSIG Type 28 validates the AAAA - Result: 2A02:0F90:E005:06F8:4A5D:35FF:FE99:2F23
Validated: RRSIG-Owner maddino.dedyn.io., Algorithm: 13, 3 Labels, original TTL: 60 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "6tv5ktvtcprrla18sk6p427sjqop6f9j" equal the hashed NSEC3-owner "6tv5ktvtcprrla18sk6p427sjqop6f9j" and the hashed NextOwner "768tdit2lrjem0t8cepeci6rgggu86mi". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 6tv5ktvtcprrla18sk6p427sjqop6f9j.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NoData-Proof required and found.






TXT-Query sends a valid NSEC3 RR as result with the hashed query name "6tv5ktvtcprrla18sk6p427sjqop6f9j" equal the hashed NSEC3-owner "6tv5ktvtcprrla18sk6p427sjqop6f9j" and the hashed NextOwner "768tdit2lrjem0t8cepeci6rgggu86mi". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 6tv5ktvtcprrla18sk6p427sjqop6f9j.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NoData-Proof required and found.






TLSA-Query (_443._tcp.maddino.dedyn.io) sends a valid NSEC3 RR as result with the hashed owner name "6tv5ktvtcprrla18sk6p427sjqop6f9j" (unhashed: maddino.dedyn.io). So that's the Closest Encloser of the query name.
Bitmap: A, NS, SOA, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 6tv5ktvtcprrla18sk6p427sjqop6f9j.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "0qm6n62gi2ahjmblk8cqsu6d87j44unn" (unhashed: _tcp.maddino.dedyn.io) with the owner "ugsj9mrl0v0m2qfjcuauqrlfe93pnnfs" and the NextOwner "6tv5ktvtcprrla18sk6p427sjqop6f9j". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner ugsj9mrl0v0m2qfjcuauqrlfe93pnnfs.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "e49gnh6bc76t20m612c0b8148kqej698" (unhashed: *.maddino.dedyn.io) with the owner "9o32ggr1h4o8dqdviu2p3q8pskdf68n8" and the NextOwner "ebga0um2i0hiee3k2uo14l0svs32h8oc". So that NSEC3 confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.maddino.dedyn.io) sends a valid NSEC3 RR as result with the hashed query name "atnma8a0i18mfhao0jipthhvmrui5629" between the hashed NSEC3-owner "9o32ggr1h4o8dqdviu2p3q8pskdf68n8" and the hashed NextOwner "ebga0um2i0hiee3k2uo14l0svs32h8oc". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: TXT, RRSIG Validated: RRSIG-Owner 9o32ggr1h4o8dqdviu2p3q8pskdf68n8.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NXDomain-Proof required and found.






CAA-Query sends a valid NSEC3 RR as result with the hashed query name "6tv5ktvtcprrla18sk6p427sjqop6f9j" equal the hashed NSEC3-owner "6tv5ktvtcprrla18sk6p427sjqop6f9j" and the hashed NextOwner "768tdit2lrjem0t8cepeci6rgggu86mi". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 6tv5ktvtcprrla18sk6p427sjqop6f9j.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






Status: Good. NoData-Proof required and found.



Zone: www.maddino.dedyn.io

www.maddino.dedyn.io
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "o1fqoroebql5oih15u38js5noafr8hm6" between the hashed NSEC3-owner "lsu45d60vd68b4h1dsb3vpnbulkfs8nv" and the hashed NextOwner "q642j9990vulgk8s1lmjl0tifpiod10q". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner lsu45d60vd68b4h1dsb3vpnbulkfs8nv.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "6tv5ktvtcprrla18sk6p427sjqop6f9j" as Owner. That's the Hash of "maddino.dedyn.io" with the NextHashedOwnerName "768tdit2lrjem0t8cepeci6rgggu86mi". So that domain name is the Closest Encloser of "www.maddino.dedyn.io". Opt-Out: False.
Bitmap: A, NS, SOA, AAAA, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY Validated: RRSIG-Owner 6tv5ktvtcprrla18sk6p427sjqop6f9j.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io






The ClosestEncloser says, that "*.maddino.dedyn.io" with the Hash "e49gnh6bc76t20m612c0b8148kqej698" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "9o32ggr1h4o8dqdviu2p3q8pskdf68n8" and the Next Owner "ebga0um2i0hiee3k2uo14l0svs32h8oc", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: TXT, RRSIG Validated: RRSIG-Owner 9o32ggr1h4o8dqdviu2p3q8pskdf68n8.maddino.dedyn.io., Algorithm: 13, 4 Labels, original TTL: 300 sec, Signature-expiration: 25.05.2023, 00:00:00 +, Signature-Inception: 04.05.2023, 00:00:00 +, KeyTag 1975, Signer-Name: maddino.dedyn.io

 

3. Name Servers

DomainNameserverNS-IP
www.maddino.dedyn.io
  get.desec.io

maddino.dedyn.io
U  get.desec.io
88.99.64.5
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH


U 
2a01:4f8:10a:1044:deec:642:ac10:80
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH


  ns1.desec.io / 3803d7ce6f1f
45.54.76.1
Dallas/Texas/United States (US) - NetActuate, Inc


 
2607:f740:e633:deec::2
New York/United States (US) - NetActuate, Inc


  ns2.desec.org / 0eee616d37e9
157.53.224.1
Raleigh/North Carolina/United States (US) - NetActuate, Inc


 
2607:f740:e00a:deec::2
New York/United States (US) - NetActuate, Inc

dedyn.io
  get.desec.io


  ns1.desec.io / 3803d7ce6f1f
45.54.76.1
Dallas/Texas/United States (US) - NetActuate, Inc


 
2607:f740:e633:deec::2
New York/United States (US) - NetActuate, Inc


  ns2.desec.org / 0eee616d37e9
157.53.224.1
Raleigh/North Carolina/United States (US) - NetActuate, Inc


 
2607:f740:e00a:deec::2
New York/United States (US) - NetActuate, Inc

io
  a0.nic.io / app25.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861


  a2.nic.io / FRA6


  b0.nic.io / app10.ams2.hosts.meta.redstone.afilias-nst.info-1615580861


  c0.nic.io / app16.nrt1.hosts.meta.redstone.afilias-nst.info-1615580861

 

4. SOA-Entries


Domain:io
Zone-Name:io
Primary:a0.nic.io
Mail:hostmaster.donuts.email
Serial:1684009773
Refresh:7200
Retry:900
Expire:1209600
TTL:3600
num Entries:4


Domain:dedyn.io
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:dedyn.io
Zone-Name:dedyn.io
Primary:get.desec.io
Mail:get.desec.io
Serial:2023054099
Refresh:86400
Retry:3600
Expire:2419200
TTL:3600
num Entries:4


Domain:maddino.dedyn.io
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:2


Domain:maddino.dedyn.io
Zone-Name:maddino.dedyn.io
Primary:get.desec.io
Mail:get.desec.io
Serial:2023054086
Refresh:86400
Retry:3600
Expire:2419200
TTL:3600
num Entries:4


Domain:www.maddino.dedyn.io
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://maddino.dedyn.io/
153.100.176.208
404

Html is minified: 100.00 %
0.064
M
Not Found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
Date: Sat, 13 May 2023 20:36:26 GMT
Content-Length: 19
Connection: close

• http://maddino.dedyn.io/
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
-14


10.030
T
Timeout - The operation has timed out

• https://maddino.dedyn.io/
153.100.176.208
302
https://maddino.dedyn.io/login.html
Html is minified: 106.25 %
2.373
B
Access-Control-Allow-Origin: http://maddino.dedyn.io
Content-Type: text/html; charset=utf-8
Location: /login.html
Vary: Origin
Date: Sat, 13 May 2023 20:36:36 GMT
Content-Length: 34
Connection: close

• https://maddino.dedyn.io/
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
-14


10.044
T
Timeout - The operation has timed out

• https://maddino.dedyn.io/login.html

-14


10.023
T
Timeout - The operation has timed out

• http://maddino.dedyn.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
153.100.176.208
-14


10.044
T
Timeout - The operation has timed out
Visible Content:

• http://maddino.dedyn.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
-14


10.044
T
Timeout - The operation has timed out
Visible Content:

• https://153.100.176.208/
153.100.176.208
302
https://maddino.dedyn.io/login.html
Html is minified: 106.25 %
2.076
N
Certificate error: RemoteCertificateNameMismatch
Access-Control-Allow-Origin: http://153.100.176.208
Content-Type: text/html; charset=utf-8
Location: /login.html
Vary: Origin
Date: Sat, 13 May 2023 20:37:10 GMT
Content-Length: 34
Connection: close

• https://[2a02:0f90:e005:06f8:4a5d:35ff:fe99:2f23]/
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
-14


10.030
T
Timeout - The operation has timed out

 

7. Comments


1. General Results, most used to calculate the result

Aname "maddino.dedyn.io" is domain, public suffix is ".dedyn.io", top-level-domain is ".io", top-level-domain-type is "country-code", Country is British Indian Ocean Territory (the), tld-manager is "IO Top Level Domain Registry", num .io-domains preloaded: 2217 (complete: 221801)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: maddino.dedyn.io has 2 different ip addresses (authoritative).
AGood: Ipv4 and Ipv6 addresses per domain name found: maddino.dedyn.io has 1 ipv4, 1 ipv6 addresses
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://maddino.dedyn.io/ 153.100.176.208
302

Missing HSTS-Header
CError - no version with Http-Status 200
HFatal error: No https - result with http-status 200, no encryption
Khttp://maddino.dedyn.io/ 153.100.176.208, Status 404

http://maddino.dedyn.io/ 2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23, Status -14
Configuration problem - different ip addresses with different status
Khttps://maddino.dedyn.io/ 153.100.176.208, Status 302

https://maddino.dedyn.io/ 2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23, Status -14
Configuration problem - different ip addresses with different status
Mhttp://maddino.dedyn.io/ 153.100.176.208
404

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://153.100.176.208/ 153.100.176.208
302
https://maddino.dedyn.io/login.html
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Omaddino.dedyn.io / 153.100.176.208 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 2 Cipher Suites without Forward Secrecy found
XFatal error: Nameserver doesn't support TCP connection: get.desec.io / 2a01:4f8:10a:1044:deec:642:ac10:80: Timeout
XFatal error: Nameserver isn't defined or has timeout
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain maddino.dedyn.io, 2 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.maddino.dedyn.io

2. Header-Checks

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 6 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 6 Queries complete, 6 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns2.desec.org (157.53.224.1, 2607:f740:e00a:deec::2), ns1.desec.io (2607:f740:e633:deec::2, 45.54.76.1)
AGood (1 - 3.0):: An average of 2.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: get.desec.io, ns1.desec.io, ns2.desec.org, 2 Name Servers included in Delegation: ns1.desec.io, ns2.desec.org, 2 Name Servers included in 2 Zone definitions: ns1.desec.io, ns2.desec.org, 1 Name Servers listed in SOA.Primary: get.desec.io.
AGood: Only one SOA.Primary Name Server found.: get.desec.io.
Error: SOA.Primary Name Server not included in the delegation set.: get.desec.io.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 3 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 3 Name Servers, 2 Top Level Domains: io, org
AGood: Name Servers with different domain names found.: 2 different Domains found
AGood: Name servers with different Country locations found: 3 Name Servers, 2 Countries: DE, US
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 157., 45., 88., 3 different subnets (first two Bytes): 157.53., 45.54., 88.99., 3 different subnets (first three Bytes): 157.53.224., 45.54.76., 88.99.64.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 2 different subnets (first block): 2607:, 2a01:, 2 different subnets (first two blocks): 2607:f740:, 2a01:04f8:, 3 different subnets (first three blocks): 2607:f740:e00a:, 2607:f740:e633:, 2a01:04f8:010a:, 3 different subnets (first four blocks): 2607:f740:e00a:deec:, 2607:f740:e633:deec:, 2a01:04f8:010a:1044:
AGood: Name Server IPv6 addresses from different subnets found.
Nameserver doesn't pass all EDNS-Checks: get.desec.io: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: get.desec.io: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: get.desec.io / 88.99.64.5: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: get.desec.io / 2a01:4f8:10a:1044:deec:642:ac10:80: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns1.desec.io / 45.54.76.1: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (3803d7ce6f1f). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.desec.io / 45.54.76.1: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (3803d7ce6f1f). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.desec.io / 2607:f740:e633:deec::2: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (3803d7ce6f1f). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.desec.io / 2607:f740:e633:deec::2: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (3803d7ce6f1f). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.desec.org / 157.53.224.1: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (0eee616d37e9). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.desec.org / 157.53.224.1: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (0eee616d37e9). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.desec.org / 2607:f740:e00a:deec::2: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (0eee616d37e9). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.desec.org / 2607:f740:e00a:deec::2: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (0eee616d37e9). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://maddino.dedyn.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 153.100.176.208
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://maddino.dedyn.io/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 219467 milliseconds, 219.467 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
maddino.dedyn.io
153.100.176.208
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
maddino.dedyn.io
153.100.176.208
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
No SNI required - domain included in main certificate
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
No SNI required - domain included in main certificate
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=maddino.dedyn.io


2CN=R3, O=Let's Encrypt, C=US


3CN=ISRG Root X1, O=Internet Security Research Group, C=US


153.100.176.208
153.100.176.208
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

153.100.176.208
153.100.176.208
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=maddino.dedyn.io


2CN=R3, O=Let's Encrypt, C=US


3CN=ISRG Root X1, O=Internet Security Research Group, C=US

 

9. Certificates

1.
1.
CN=maddino.dedyn.io
02.04.2023
01.07.2023
685 days expired
maddino.dedyn.io - 1 entry
1.
1.
CN=maddino.dedyn.io
02.04.2023

01.07.2023
685 days expired


maddino.dedyn.io - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0375D9BDA67EFE7FAC903E02FF5B56480E72
Thumbprint:605EE4613F0DA587B727EBD5B6FF77A08115E1A4
SHA256 / Certificate:KQUJq4me0afQ5CHGpCdYzX7ntEqXgLCQZ3a7ppwgM6A=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):ebb8378b3a79369a7a0f50c064d2d08d221534104376806bb1ed92442eb84559
SHA256 hex / Subject Public Key Information (SPKI):ebb8378b3a79369a7a0f50c064d2d08d221534104376806bb1ed92442eb84559 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 122 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 122 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3671 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3671 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
5030804972
leaf cert
CN=R3, O=Let's Encrypt, C=US
2023-04-02 09:28:19
2023-07-01 09:28:18
maddino.dedyn.io - 1 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Small Code Update - wait one minute

 

11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404

 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: get.desec.io, ns1.desec.io, ns2.desec.org

 

QNr.DomainTypeNS used
1
io
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a0.nic.io, a2.nic.io, b0.nic.io, c0.nic.io
2
get.desec.io
NS
a0.nic.io (2a01:8840:9e::17)

Answer: ns1.desec.io, ns2.desec.org

Answer: ns1.desec.io
2607:f740:e633:deec::2, 45.54.76.1
3
org
NS
h.root-servers.net (2001:500:1::53)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
4
ns2.desec.org: 157.53.224.1, 2607:f740:e00a:deec::2
NS
a0.org.afilias-nst.info (2001:500:e::1)
5
get.desec.io: 88.99.64.5
A
ns1.desec.io (2607:f740:e633:deec::2)
6
get.desec.io: 2a01:4f8:10a:1044:deec:642:ac10:80
AAAA
ns1.desec.io (2607:f740:e633:deec::2)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
maddino.dedyn.io
0

no CAA entry found
1
0
dedyn.io
0

no CAA entry found
1
0
io
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
maddino.dedyn.io

ok
1
0
_acme-challenge.maddino.dedyn.io

missing entry or wrong length
1
0
_acme-challenge.maddino.dedyn.io.maddino.dedyn.io
Ir2Cd5jmPRvBXqgGcSVUh1BVJBzqiAS7jTD7Xd9gen0
perhaps wrong
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
maddino.dedyn.io
153.100.176.208
443
5 Ciphers40.36 sec
2 without, 3 FS
60.00 %
Complete

1
5 Ciphers
5.00 Ciphers/Check
40.36 sec40.36 sec/Check
2 without, 3 FS
60.00 %

Details
DomainIPPortCipher (OpenSsl / IANA)
maddino.dedyn.io
153.100.176.208
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
5 Ciphers, 40.36 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
maddino.dedyn.io
153.100.176.208
21
FTP



maddino.dedyn.io
153.100.176.208
21
FTP



maddino.dedyn.io
153.100.176.208
22
SSH



maddino.dedyn.io
153.100.176.208
22
SSH



maddino.dedyn.io
153.100.176.208
25
SMTP



maddino.dedyn.io
153.100.176.208
25
SMTP



maddino.dedyn.io
153.100.176.208
53
DNS



maddino.dedyn.io
153.100.176.208
53
DNS



maddino.dedyn.io
153.100.176.208
110
POP3



maddino.dedyn.io
153.100.176.208
110
POP3



maddino.dedyn.io
153.100.176.208
143
IMAP



maddino.dedyn.io
153.100.176.208
143
IMAP



maddino.dedyn.io
153.100.176.208
465
SMTP (encrypted)



maddino.dedyn.io
153.100.176.208
465
SMTP (encrypted)



maddino.dedyn.io
153.100.176.208
587
SMTP (encrypted, submission)



maddino.dedyn.io
153.100.176.208
587
SMTP (encrypted, submission)



maddino.dedyn.io
153.100.176.208
993
IMAP (encrypted)



maddino.dedyn.io
153.100.176.208
993
IMAP (encrypted)



maddino.dedyn.io
153.100.176.208
995
POP3 (encrypted)



maddino.dedyn.io
153.100.176.208
995
POP3 (encrypted)



maddino.dedyn.io
153.100.176.208
1433
MS SQL



maddino.dedyn.io
153.100.176.208
1433
MS SQL



maddino.dedyn.io
153.100.176.208
2082
cPanel (http)



maddino.dedyn.io
153.100.176.208
2082
cPanel (http)



maddino.dedyn.io
153.100.176.208
2083
cPanel (https)



maddino.dedyn.io
153.100.176.208
2083
cPanel (https)



maddino.dedyn.io
153.100.176.208
2086
WHM (http)



maddino.dedyn.io
153.100.176.208
2086
WHM (http)



maddino.dedyn.io
153.100.176.208
2087
WHM (https)



maddino.dedyn.io
153.100.176.208
2087
WHM (https)



maddino.dedyn.io
153.100.176.208
2089
cPanel Licensing



maddino.dedyn.io
153.100.176.208
2089
cPanel Licensing



maddino.dedyn.io
153.100.176.208
2095
cPanel Webmail (http)



maddino.dedyn.io
153.100.176.208
2095
cPanel Webmail (http)



maddino.dedyn.io
153.100.176.208
2096
cPanel Webmail (https)



maddino.dedyn.io
153.100.176.208
2096
cPanel Webmail (https)



maddino.dedyn.io
153.100.176.208
2222
DirectAdmin (http)



maddino.dedyn.io
153.100.176.208
2222
DirectAdmin (http)



maddino.dedyn.io
153.100.176.208
2222
DirectAdmin (https)



maddino.dedyn.io
153.100.176.208
2222
DirectAdmin (https)



maddino.dedyn.io
153.100.176.208
3306
mySql



maddino.dedyn.io
153.100.176.208
3306
mySql



maddino.dedyn.io
153.100.176.208
5224
Plesk Licensing



maddino.dedyn.io
153.100.176.208
5224
Plesk Licensing



maddino.dedyn.io
153.100.176.208
5432
PostgreSQL



maddino.dedyn.io
153.100.176.208
5432
PostgreSQL



maddino.dedyn.io
153.100.176.208
8080
Ookla Speedtest (http)
open
http://153.100.176.208:8080/
Http-Status: 307
Redirect: https://maddino.dedyn.io/
maddino.dedyn.io
153.100.176.208
8080
Ookla Speedtest (http)
open
http://153.100.176.208:8080/
Http-Status: 307
Redirect: https://maddino.dedyn.io/
maddino.dedyn.io
153.100.176.208
8080
Ookla Speedtest (https)
open
https://153.100.176.208:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

maddino.dedyn.io
153.100.176.208
8080
Ookla Speedtest (https)
open
https://153.100.176.208:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

maddino.dedyn.io
153.100.176.208
8083
VestaCP http



maddino.dedyn.io
153.100.176.208
8083
VestaCP http



maddino.dedyn.io
153.100.176.208
8083
VestaCP https



maddino.dedyn.io
153.100.176.208
8083
VestaCP https



maddino.dedyn.io
153.100.176.208
8443
Plesk Administration (https)



maddino.dedyn.io
153.100.176.208
8443
Plesk Administration (https)



maddino.dedyn.io
153.100.176.208
8447
Plesk Installer + Updates



maddino.dedyn.io
153.100.176.208
8447
Plesk Installer + Updates



maddino.dedyn.io
153.100.176.208
8880
Plesk Administration (http)



maddino.dedyn.io
153.100.176.208
8880
Plesk Administration (http)



maddino.dedyn.io
153.100.176.208
10000
Webmin (http)



maddino.dedyn.io
153.100.176.208
10000
Webmin (http)



maddino.dedyn.io
153.100.176.208
10000
Webmin (https)



maddino.dedyn.io
153.100.176.208
10000
Webmin (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
21
FTP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
21
FTP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
22
SSH



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
22
SSH



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
25
SMTP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
25
SMTP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
53
DNS



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
53
DNS



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
110
POP3



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
110
POP3



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
143
IMAP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
143
IMAP



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
465
SMTP (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
465
SMTP (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
587
SMTP (encrypted, submission)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
587
SMTP (encrypted, submission)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
993
IMAP (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
993
IMAP (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
995
POP3 (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
995
POP3 (encrypted)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
1433
MS SQL



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
1433
MS SQL



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2082
cPanel (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2082
cPanel (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2083
cPanel (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2083
cPanel (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2086
WHM (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2086
WHM (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2087
WHM (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2087
WHM (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2089
cPanel Licensing



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2089
cPanel Licensing



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2095
cPanel Webmail (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2095
cPanel Webmail (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2096
cPanel Webmail (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2096
cPanel Webmail (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2222
DirectAdmin (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2222
DirectAdmin (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2222
DirectAdmin (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
2222
DirectAdmin (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
3306
mySql



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
3306
mySql



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
5224
Plesk Licensing



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
5224
Plesk Licensing



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
5432
PostgreSQL



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
5432
PostgreSQL



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8080
Ookla Speedtest (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8080
Ookla Speedtest (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8080
Ookla Speedtest (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8080
Ookla Speedtest (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8083
VestaCP http



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8083
VestaCP http



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8083
VestaCP https



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8083
VestaCP https



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8443
Plesk Administration (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8443
Plesk Administration (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8447
Plesk Installer + Updates



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8447
Plesk Installer + Updates



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8880
Plesk Administration (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
8880
Plesk Administration (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
10000
Webmin (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
10000
Webmin (http)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
10000
Webmin (https)



maddino.dedyn.io
2a02:f90:e005:6f8:4a5d:35ff:fe99:2f23
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=518b9ebf-f957-49a7-87dd-4ff4df404b0a

 

Last Result: https://check-your-website.server-daten.de/?q=maddino.dedyn.io - 2023-05-13 22:35:20

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=maddino.dedyn.io" target="_blank">Check this Site: maddino.dedyn.io</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=maddino.dedyn.io