Check DNS, Urls + Redirects, Certificates and Content of your Website




X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
24.01.2023 21:30:26


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
magictool.dev.br
A
200.148.80.252
São José dos Campos/Sao Paulo/Brazil (BR) - Vivo
Hostname: magictool.dev.br
yes
2
0

AAAA

yes


www.magictool.dev.br
CNAME
magictool.dev.br
yes
1
0

A
200.148.80.252
São José dos Campos/Sao Paulo/Brazil (BR) - Vivo
Hostname: magictool.dev.br
yes


*.magictool.dev.br
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 951, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.02.2023, 00:00:00 +, Signature-Inception: 21.01.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: br
br
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=



1 RRSIG RR to validate DS RR found



RRSIG-Owner br., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.02.2023, 17:00:00 +, Signature-Inception: 24.01.2023, 16:00:00 +, KeyTag 951, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 2471, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 13, KeyTag 32863, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner br., Algorithm: 13, 1 Labels, original TTL: 21600 sec, Signature-expiration: 05.02.2023, 12:00:00 +, Signature-Inception: 15.01.2023, 12:00:00 +, KeyTag 2471, Signer-Name: br



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2471 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2471, DigestType 2 and Digest "Xk81mYuPkJVX+hGcTL/cotZgom8GnvAGtAN1igfRouQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: dev.br
dev.br
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 15653, DigestType 2 and Digest ByqDHOHOhJuOYzp7I/7O4AnbQ3r64oG9SsNfqy63yYk=



1 RRSIG RR to validate DS RR found



RRSIG-Owner dev.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 05.02.2023, 12:00:10 +, Signature-Inception: 22.01.2023, 11:00:10 +, KeyTag 32863, Signer-Name: br



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 32863 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 15653, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner dev.br., Algorithm: 13, 2 Labels, original TTL: 21600 sec, Signature-expiration: 07.02.2023, 20:30:10 +, Signature-Inception: 24.01.2023, 19:30:10 +, KeyTag 15653, Signer-Name: dev.br



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 15653 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 15653, DigestType 2 and Digest "ByqDHOHOhJuOYzp7I/7O4AnbQ3r64oG9SsNfqy63yYk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: magictool.dev.br
magictool.dev.br
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 33150, DigestType 2 and Digest c7PnwKGvXmqyfRAftcal1nPjG03qaLouZP0Q24cqFrU=



1 RRSIG RR to validate DS RR found



RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 30.01.2023, 18:55:10 +, Signature-Inception: 16.01.2023, 17:55:10 +, KeyTag 15653, Signer-Name: dev.br



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 15653 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 33150, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 33150 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 33150, DigestType 2 and Digest "c7PnwKGvXmqyfRAftcal1nPjG03qaLouZP0Q24cqFrU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



RRSIG Type 1 validates the A - Result: 200.148.80.252
Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



RRSIG Type 16 validates the TXT - Result: v=spf1 -all
Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



CNAME-Query sends a valid NSEC RR as result with the query name "magictool.dev.br" equal the NSEC-owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the query name "magictool.dev.br" equal the NSEC-owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.magictool.dev.br) sends a valid NSEC RR as result with the owner name magictool.dev.br. So that's the Closest Encloser of the query name. TLSA-Query sends a valid NSEC RR as result and covers the Wildcard expansion of the ClosestEncloser with the owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So that NSEC confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.magictool.dev.br) sends a valid NSEC RR as result with the query name "_443._tcp.magictool.dev.br" between the NSEC-owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.magictool.dev.br) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.magictool.dev.br" between the NSEC-owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



Status: Good. NXDomain-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the query name "magictool.dev.br" equal the NSEC-owner "magictool.dev.br" and the NextOwner "www.magictool.dev.br". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, MX, TXT, RRSIG, NSEC, DNSKEY Validated: RRSIG-Owner magictool.dev.br., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br



Status: Good. NoData-Proof required and found.

Zone: www.magictool.dev.br
www.magictool.dev.br
0 DS RR in the parent zone found



RRSIG Type 5 validates the CNAME - Result: magictool.dev.br
Validated: RRSIG-Owner www.magictool.dev.br., Algorithm: 13, 4 Labels, original TTL: 3600 sec, Signature-expiration: 24.01.2023, 22:05:00 +, Signature-Inception: 24.01.2023, 19:55:00 +, KeyTag 33150, Signer-Name: magictool.dev.br


3. Name Servers

DomainNameserverNS-IP
magictool.dev.br
  a.auto.dns.br / a.auto.dns.br.
200.160.2.88
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12ff:0:2::88
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  b.auto.dns.br / b.auto.dns.br.
200.160.2.89
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12ff:0:2::89
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR

dev.br
  a.dns.br / a2.a.dns.br
200.219.148.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:6::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  b.dns.br / b8.b.dns.br
200.189.41.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:8::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  c.dns.br / c7.c.dns.br
200.192.233.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:a::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  d.dns.br / d7.d.dns.br
200.219.154.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:4::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  e.dns.br / e5.e.dns.br
200.229.248.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:2::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


  f.dns.br / f7.a.f.dns.br
200.219.159.10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR


 
2001:12f8:c::10
São Paulo/Brazil (BR) - Núcleo de Inf. e Coord. do Ponto BR - NIC.BR

br
  a.dns.br / a6.a.dns.br


  b.dns.br / b5.b.dns.br


  c.dns.br / c8.c.dns.br


  d.dns.br / d8.d.dns.br


  e.dns.br / e2.e.dns.br


T  f.dns.br / f7.a.f.dns.br


4. SOA-Entries


Domain:br
Zone-Name:br
Primary:a.dns.br
Mail:hostmaster.registro.br
Serial:2023024492
Refresh:1800
Retry:900
Expire:604800
TTL:900
num Entries:6


Domain:dev.br
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:dev.br
Zone-Name:dev.br
Primary:a.dns.br
Mail:hostmaster.registro.br
Serial:2023024492
Refresh:1800
Retry:900
Expire:604800
TTL:900
num Entries:11


Domain:magictool.dev.br
Zone-Name:magictool.dev.br
Primary:a.auto.dns.br
Mail:hostmaster.registro.br
Serial:2023024820
Refresh:1800
Retry:900
Expire:604800
TTL:900
num Entries:4


5. Screenshots

Startaddress: https://magictool.dev.br/, address used: https://magictool.dev.br/ui/, Screenshot created 2023-01-24 21:38:43 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

1953 milliseconds

Screenshot mobile - https://magictool.dev.br/ui/
Mobil + Landscape (732px x 412px)

3211 milliseconds

Screenshot mobile landscape - https://magictool.dev.br/ui/
Screen (1280px x 1680px)

4019 milliseconds

Screenshot Desktop - https://magictool.dev.br/ui/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412716
content Size768716

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://magictool.dev.br/
200.148.80.252
-2

1.714
V
ConnectFailure - Unable to connect to the remote server

• http://www.magictool.dev.br/
200.148.80.252
-2

1.710
V
ConnectFailure - Unable to connect to the remote server

• https://magictool.dev.br/
200.148.80.252
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 104.88 %
6.687
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 90)
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
Date: Tue, 24 Jan 2023 20:29:55 GMT
Connection: Keep-Alive
Content-Security-Policy: block-all-mixed-content
Content-Type: text/html
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 1
Content-Length: 258

• https://www.magictool.dev.br/
200.148.80.252
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 104.88 %
6.734
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 90)
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
Date: Tue, 24 Jan 2023 20:30:03 GMT
Connection: Keep-Alive
Content-Security-Policy: block-all-mixed-content
Content-Type: text/html
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 1
Content-Length: 258

• http://magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200.148.80.252
-2

1.720
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• http://www.magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200.148.80.252
-2

1.767
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• https://200.148.80.252/
200.148.80.252
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 104.88 %
6.623
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 90)
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd">
Date: Tue, 24 Jan 2023 20:30:14 GMT
Connection: Keep-Alive
Content-Security-Policy: block-all-mixed-content
Content-Type: text/html
Strict-Transport-Security: max-age=31536000
X-Content-Type-Options: nosniff
X-Frame-Options: DENY
X-XSS-Protection: 1
Content-Length: 258

7. Comments


1. General Results, most used to calculate the result

Aname "magictool.dev.br" is domain, public suffix is ".dev.br", top-level-domain is ".br", top-level-domain-type is "country-code", Country is Brazil, tld-manager is "Comite Gestor da Internet no Brasil", num .br-domains preloaded: 2693 (complete: 216710)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: magictool.dev.br has only one ip address.
Warning: Only one ip address found: www.magictool.dev.br has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: magictool.dev.br has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.magictool.dev.br has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
AGood: destination is https
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (3 urls)
https://magictool.dev.br/ 200.148.80.252


Url with incomplete Content-Type - header - missing charset
https://www.magictool.dev.br/ 200.148.80.252


Url with incomplete Content-Type - header - missing charset
https://200.148.80.252/ 200.148.80.252


Url with incomplete Content-Type - header - missing charset
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Nhttps://magictool.dev.br/ 200.148.80.252
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://www.magictool.dev.br/ 200.148.80.252
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://200.148.80.252/ 200.148.80.252
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Omagictool.dev.br / 200.148.80.252 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Owww.magictool.dev.br / 200.148.80.252 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Vhttp://magictool.dev.br/ 200.148.80.252
-2

Connect failure - perhaps firewall
Vhttp://www.magictool.dev.br/ 200.148.80.252
-2

Connect failure - perhaps firewall
Vhttp://magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 200.148.80.252
-2

Connect failure - perhaps firewall
Vhttp://www.magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 200.148.80.252
-2

Connect failure - perhaps firewall
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain magictool.dev.br, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.magictool.dev.br, 1 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.magictool.dev.br

2. Header-Checks (alpha, started 2022-10-23, may be buggy / incomplete)

Amagictool.dev.br 200.148.80.252
Content-Security-Policy
Ok: Header without syntax errors found: block-all-mixed-content
B

Info: Header-Element is deprecated. block-all-mixed-content
F

Bad: Missing default-src directive. A default-src directive is used if one of the specialized fetch directives (child-src, connect-src, font-src, frame-src, img-src, manifest-src, media-src, object-src, prefetch-src, script-src, style-src, worker-src) isn't defined. Missing default-src, all sources are allowed, that's bad. A default-src with 'none' or 'self' blocks that.
E

Bad: No form-action directive found. Use one to limit the form - action - destinations. form-action is a navigation-directive, so default-src isn't used.
E

Bad: No frame-ancestors directive found. Use one to limit the pages allowed to use this page in frame / iframe / object / embed / applet. frame-ancestors is a navigation-directive, so default-src isn't used.
E

Bad: No base-uri directive found. Use one to limit the URLs which can be used in a document's <base> element. Because it's a document directive, default-src isn't used, so an own directive is required.
F

Critical: No object-src and no default-src as fallback defined. So object / embed / applet can load every resource. That's fatal.
F

Critical: No script-src and no default-src as fallback defined. So scripts are unlimited. That's fatal.
A
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
X-Frame-Options
Ok: Header without syntax errors found: DENY
B

Info: Header is deprecated. May not longer work in modern browsers. DENY. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1
B

Info: Header is deprecated. May not longer work in modern browsers. 1
Awww.magictool.dev.br 200.148.80.252
Content-Security-Policy
Ok: Header without syntax errors found: block-all-mixed-content
B

Info: Header-Element is deprecated. block-all-mixed-content
F

Bad: Missing default-src directive. A default-src directive is used if one of the specialized fetch directives (child-src, connect-src, font-src, frame-src, img-src, manifest-src, media-src, object-src, prefetch-src, script-src, style-src, worker-src) isn't defined. Missing default-src, all sources are allowed, that's bad. A default-src with 'none' or 'self' blocks that.
E

Bad: No form-action directive found. Use one to limit the form - action - destinations. form-action is a navigation-directive, so default-src isn't used.
E

Bad: No frame-ancestors directive found. Use one to limit the pages allowed to use this page in frame / iframe / object / embed / applet. frame-ancestors is a navigation-directive, so default-src isn't used.
E

Bad: No base-uri directive found. Use one to limit the URLs which can be used in a document's <base> element. Because it's a document directive, default-src isn't used, so an own directive is required.
F

Critical: No object-src and no default-src as fallback defined. So object / embed / applet can load every resource. That's fatal.
F

Critical: No script-src and no default-src as fallback defined. So scripts are unlimited. That's fatal.
A
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
X-Frame-Options
Ok: Header without syntax errors found: DENY
B

Info: Header is deprecated. May not longer work in modern browsers. DENY. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1
B

Info: Header is deprecated. May not longer work in modern browsers. 1
Fmagictool.dev.br 200.148.80.252
Referrer-Policy
Critical: Missing Header:
Fmagictool.dev.br 200.148.80.252
Permissions-Policy
Critical: Missing Header:
Fwww.magictool.dev.br 200.148.80.252
Referrer-Policy
Critical: Missing Header:
Fwww.magictool.dev.br 200.148.80.252
Permissions-Policy
Critical: Missing Header:

3. DNS- and NameServer - Checks

AInfo:: 7 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 7 Queries complete, 7 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: a.auto.dns.br, b.auto.dns.br, 2 Name Servers included in Delegation: a.auto.dns.br, b.auto.dns.br, 2 Name Servers included in 1 Zone definitions: a.auto.dns.br, b.auto.dns.br, 1 Name Servers listed in SOA.Primary: a.auto.dns.br.
AGood: Only one SOA.Primary Name Server found.: a.auto.dns.br.
AGood: SOA.Primary Name Server included in the delegation set.: a.auto.dns.br.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: a.auto.dns.br, b.auto.dns.br
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: br
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: dns.br
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: BR
AInfo: Ipv4-Subnet-list: 2 Name Servers, 1 different subnets (first Byte): 200., 1 different subnets (first two Bytes): 200.160., 1 different subnets (first three Bytes): 200.160.2.
XFatal: All Name Server IPv4 addresses from the same subnet. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.:
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 1 different subnets (first block): 2001:, 1 different subnets (first two blocks): 2001:12ff:, 1 different subnets (first three blocks): 2001:12ff:0000:, 1 different subnets (first four blocks): 2001:12ff:0000:0002:
Fatal: All Name Server IPv6 addresses from the same subnet.
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
XNameserver Timeout checking Echo Capitalization: f.dns.br
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 4 good Nameserver
Nameserver doesn't pass all EDNS-Checks: a.dns.br / 2001:12f8:6::10: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: fatal timeout. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: f.dns.br / 2001:12f8:c::10: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (f7.a.f.dns.br). COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 200.148.80.252
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.magictool.dev.br/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 200.148.80.252
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
https://magictool.dev.br/ 200.148.80.252
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://www.magictool.dev.br/ 200.148.80.252
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://200.148.80.252/ 200.148.80.252
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 510957 milliseconds, 510.957 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
magictool.dev.br
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
magictool.dev.br
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate
1CN=localhost.localdomain, OU=VMware ESX Server Default Certificate, O="VMware, Inc", L=Palo Alto, C=US, unstructuredName="1647895382,564d7761726520496e632e"


www.magictool.dev.br
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

www.magictool.dev.br
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate
1CN=localhost.localdomain, OU=VMware ESX Server Default Certificate, O="VMware, Inc", L=Palo Alto, C=US, unstructuredName="1647895382,564d7761726520496e632e"


200.148.80.252
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok

200.148.80.252
200.148.80.252
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate
1CN=localhost.localdomain, OU=VMware ESX Server Default Certificate, O="VMware, Inc", L=Palo Alto, C=US, unstructuredName="1647895382,564d7761726520496e632e"


9. Certificates

1.
1.
OID.1.2.840.113549.1.9.2="1647895382,564d7761726520496e632e", CN=localhost.localdomain, E=ssl-certificates@vmware.com, OU=VMware ESX Server Default Certificate, O="VMware, Inc", L=Palo Alto, S=California, C=US
21.03.2022
19.09.2033
expires in 3884 days
localhost.localdomain - 1 entry
1.
1.
OID.1.2.840.113549.1.9.2="1647895382,564d7761726520496e632e", CN=localhost.localdomain, E=ssl-certificates@vmware.com, OU=VMware ESX Server Default Certificate, O="VMware, Inc", L=Palo Alto, S=California, C=US
21.03.2022

19.09.2033
expires in 3884 days
localhost.localdomain - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:477EBD1A1EAA
Thumbprint:29D056F35030A044E6CCC93E155F537F3FB8B965
SHA256 / Certificate:t8QsCEn9muCGGL6QPhJg4rK55vbzx5mUarQ570uEc0g=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):fbe0939de15c57f815a460b596e4c2e693b73b7f1c59557dac47fee2a16646f8
SHA256 hex / Subject Public Key Information (SPKI):fbe0939de15c57f815a460b596e4c2e693b73b7f1c59557dac47fee2a16646f8 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)

RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://magictool.dev.br/
200.148.80.252
meta
other
2

0


0
0
0

https://www.magictool.dev.br/
200.148.80.252
meta
other
2

0


0
0
0

https://200.148.80.252/
200.148.80.252
meta
other
2

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://magictool.dev.br/
200.148.80.252
meta
content-type
text/html; charset=utf8


1
ok








meta
refresh
0;URL='/ui'


1
ok







https://www.magictool.dev.br/
200.148.80.252
meta
content-type
text/html; charset=utf8


1
ok








meta
refresh
0;URL='/ui'


1
ok







https://200.148.80.252/
200.148.80.252
meta
content-type
text/html; charset=utf8


1
ok








meta
refresh
0;URL='/ui'


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: a.auto.dns.br, b.auto.dns.br

QNr.DomainTypeNS used
1
br
NS
f.root-servers.net (2001:500:2f::f)

Answer: a.dns.br, b.dns.br, c.dns.br, d.dns.br, e.dns.br, f.dns.br
2
a.auto.dns.br
NS
a.dns.br (2001:12f8:6::10)

Answer: a.dns.br
3
b.auto.dns.br
NS
a.dns.br (2001:12f8:6::10)

Answer: a.dns.br
4
a.auto.dns.br: 200.160.2.88
A
a.dns.br (2001:12f8:6::10)
5
a.auto.dns.br: 2001:12ff:0:2::88
AAAA
a.dns.br (2001:12f8:6::10)
6
b.auto.dns.br: 200.160.2.89
A
a.dns.br (2001:12f8:6::10)
7
b.auto.dns.br: 2001:12ff:0:2::89
AAAA
a.dns.br (2001:12f8:6::10)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.magictool.dev.br



1
0
magictool.dev.br
0

no CAA entry found
1
0
dev.br
0

no CAA entry found
1
0
br
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
magictool.dev.br
v=spf1 -all
ok
1
0
www.magictool.dev.br


1
0
_acme-challenge.magictool.dev.br

Name Error - The domain name does not exist
1
0
_acme-challenge.www.magictool.dev.br

Name Error - The domain name does not exist
1
0
_acme-challenge.magictool.dev.br.magictool.dev.br

Name Error - The domain name does not exist
1
0
_acme-challenge.www.magictool.dev.br.magictool.dev.br

Name Error - The domain name does not exist
1
0
_acme-challenge.www.magictool.dev.br.www.magictool.dev.br

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
MX

magictool.dev.br
0

0
1
ok



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
magictool.dev.br
200.148.80.252
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
12 Ciphers, 140.15 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1
www.magictool.dev.br
200.148.80.252
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
12 Ciphers, 140.12 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=c29afc5f-e0bb-4b89-ad8a-89a3c88829da


Last Result: https://check-your-website.server-daten.de/?q=magictool.dev.br - 2023-01-24 21:30:26


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=magictool.dev.br" target="_blank">Check this Site: magictool.dev.br</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro