J

Control Panel Problem

Checked:
12.08.2019 09:38:23


Older results

No older results found


1. IP-Addresses

HostTIP-Addressis auth.∑ Queries∑ Timeout
marvelfanfiles.page
A
185.27.134.133
Regent Centre/England/United Kingdom (GB) - UK-IFASTNET
Hostname: 13313427185.ifastnet.org
yes
1
0

AAAA

yes


www.marvelfanfiles.page
A
185.27.134.133
Regent Centre/England/United Kingdom (GB) - UK-IFASTNET
Hostname: 13313427185.ifastnet.org
yes
1
0

AAAA

yes



2. DNSSEC

Zone (*)DNSSEC - Informations (beta)
(root)
1 DS RR published

Status: Valid because published

2 DNSKEY RR found

Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)

Public Key with Algorithm 8, KeyTag 59944, Flags 256

1 RRSIG RR to validate DNSKEY RR found

Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 31.08.2019, 00:00:00, Signature-Inception: 10.08.2019, 00:00:00, KeyTag 20326, Signer-Name: (root)

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
page
1 DS RR in the parent zone found

1 RRSIG RR to validate DS RR found

Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 25.08.2019, 05:00:00, Signature-Inception: 12.08.2019, 04:00:00, KeyTag 59944, Signer-Name: (root)

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone

2 DNSKEY RR found

Public Key with Algorithm 8, KeyTag 8643, Flags 256

Public Key with Algorithm 8, KeyTag 64712, Flags 257 (SEP = Secure Entry Point)

1 RRSIG RR to validate DNSKEY RR found

Algorithm: 8, 1 Labels, original TTL: 300 sec, Signature-expiration: 31.08.2019, 01:30:05, Signature-Inception: 09.08.2019, 01:30:05, KeyTag 64712, Signer-Name: page

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 64712 used to validate the DNSKEY RRSet

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 64712, DigestType 2 and Digest "m+EwO4YYfff46+HFG8cMK/obwSq5g4OsKn0OGJFCkvU=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
marvelfanfiles.page
0 DS RR in the parent zone found

DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed domain name between the hashed NSEC3-owner and the hashed NextOwner. So the parent zone confirmes the non-existence of a DS RR.

0 DNSKEY RR found


www.marvelfanfiles.page
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.marvelfanfiles.page
  ns2.epizy.com / ns1.byet.org

marvelfanfiles.page
  ns1.epizy.com / ns1.byet.org
198.251.86.152
Ashburn/Virginia/United States (US) - FranTech Solutions


  ns2.epizy.com / ns1.byet.org
198.251.86.153
Ashburn/Virginia/United States (US) - FranTech Solutions

page
  ns-tld1.charlestonroadregistry.com


  ns-tld2.charlestonroadregistry.com


  ns-tld3.charlestonroadregistry.com


  ns-tld4.charlestonroadregistry.com


  ns-tld5.charlestonroadregistry.com


4. SOA-Entries


Domain:page
Primary:ns-tld1.charlestonroadregistry.com
Mail:cloud-dns-hostmaster.google.com
Serial:1
Refresh:21600
Retry:3600
Expire:259200
TTL:900
num Entries:5


Domain:marvelfanfiles.page
Primary:ns2.epizy.com
Mail:support.marvelfanfiles.page
Serial:2006112402
Refresh:28800
Retry:7200
Expire:604800
TTL:86400
num Entries:2


Domain:www.marvelfanfiles.page
Primary:ns2.epizy.com
Mail:support.marvelfanfiles.page
Serial:2006112402
Refresh:28800
Retry:7200
Expire:604800
TTL:86400
num Entries:1


5. Url-Checks


show header:
Domainname Http-StatusredirectSec.G
• http://marvelfanfiles.page/
185.27.134.133
200

0.073
H
small content:
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://marvelfanfiles.page/?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:38:57 GMT
Content-Type: text/html
Content-Length: 830
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

• http://www.marvelfanfiles.page/
185.27.134.133
200

0.073
H
small content:
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.marvelfanfiles.page/?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:38:57 GMT
Content-Type: text/html
Content-Length: 834
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

• https://marvelfanfiles.page/
185.27.134.133
200

2.286
J
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small content:
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="https://marvelfanfiles.page/?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:38:57 GMT
Content-Type: text/html
Content-Length: 831
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

• https://www.marvelfanfiles.page/
185.27.134.133
200

2.290
J
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small content:
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="https://www.marvelfanfiles.page/?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:39:00 GMT
Content-Type: text/html
Content-Length: 835
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

• http://marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
185.27.134.133
200

0.070
J
Visible Content: This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support
Info: Html-Content with meta and/or script, may be a problem creating a Letsencrypt certificate using http-01 validation
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:39:03 GMT
Content-Type: text/html
Content-Length: 899
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

• http://www.marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
185.27.134.133
200

0.073
J
Visible Content: This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support
Info: Html-Content with meta and/or script, may be a problem creating a Letsencrypt certificate using http-01 validation
<html><body><script type="text/javascript" src="/aes.js" ></script><script>function toNumbers(d){var e=[];d.replace(/(..)/g,function(d){e.push(parseInt(d,16))});return e}function toHex(){for(var d=[],d=1==arguments.length&&arguments[0].constructor==Array?arguments[0]:arguments,e="",f=0;f<d.length;f++)e+=(16>d[f]?"0":"")+d[f].toString(16);return e.toLowerCase()}var a=toNumbers("f655ba9d09a112d4968c63579db590b4"),b=toNumbers("98344c2eee86c3994890592585b49f80"),c=toNumbers("1c167956de3e1144501be14a7c38a53a");document.cookie="__test="+toHex(slowAES.decrypt(c,2,a,b))+"; expires=Thu, 31-Dec-37 23:55:55 GMT; path=/"; location.href="http://www.marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de?i=1";</script><noscript>This site requires Javascript to work, please enable Javascript in your browser or use a browser with Javascript support</noscript></body></html>
Server: nginx
Date: Mon, 12 Aug 2019 07:39:03 GMT
Content-Type: text/html
Content-Length: 903
Connection: close
Vary: Accept-Encoding
Expires: Thu, 01 Jan 1970 00:00:01 GMT
Cache-Control: no-cache

6. Comments

Aname "marvelfanfiles.page" is domain, public suffix is "page", top-level-domain-type is "generic", tld-manager is "Charleston Road Registry Inc."
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
AExcellent: Domain is in the Google-Preload-List
AExcellent: Domain is in the Mozilla/Firefox-Preload-List
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (6 urls)
http://marvelfanfiles.page/ 185.27.134.133


Url with incomplete Content-Type - header - missing charset
http://www.marvelfanfiles.page/ 185.27.134.133


Url with incomplete Content-Type - header - missing charset
https://marvelfanfiles.page/ 185.27.134.133


Url with incomplete Content-Type - header - missing charset
https://www.marvelfanfiles.page/ 185.27.134.133


Url with incomplete Content-Type - header - missing charset
http://marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.133


Url with incomplete Content-Type - header - missing charset
http://www.marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.133


Url with incomplete Content-Type - header - missing charset
Bhttps://marvelfanfiles.page/ 185.27.134.133
200

Missing HSTS-Header
Bhttps://www.marvelfanfiles.page/ 185.27.134.133
200

Missing HSTS-Header
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Jhttps://marvelfanfiles.page/ 185.27.134.133
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttps://www.marvelfanfiles.page/ 185.27.134.133
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttp://marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.133
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Jhttp://www.marvelfanfiles.page/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 185.27.134.133
200

Fatal: Script /aes.js found. Looks like your hoster has a Bot-Check-Detection, so Letsencrypt can't check your http-validation file.
Nhttps://marvelfanfiles.page/ 185.27.134.133
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://www.marvelfanfiles.page/ 185.27.134.133
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 5 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.epizy.com / 198.251.86.152: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (ns1.byet.org). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.epizy.com: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (ns1.byet.org). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.epizy.com / 198.251.86.153: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok (ns1.byet.org). COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 30880 milliseconds, 30.880 seconds


7. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
marvelfanfiles.page
185.27.134.133
443
Certificate/chain invalid and wrong name
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
marvelfanfiles.page
185.27.134.133
443
Certificate/chain invalid and wrong name
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
Self signed certificate
1CN=*, O=IfastNet LTD, L=Everywhere, C=US
www.marvelfanfiles.page
185.27.134.133
443
Certificate/chain invalid and wrong name
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
www.marvelfanfiles.page
185.27.134.133
443
Certificate/chain invalid and wrong name
Tls12
DiffieHellman
2048
Aes128
128
Sha256
error checking OCSP stapling
ok
Self signed certificate
1CN=*, O=IfastNet LTD, L=Everywhere, C=US


8. Certificates

1.
1.
CN=*, O=IfastNet LTD, L=Everywhere, C=US
06.04.2019
19.03.2031
expires in 4229 days

1.
1.
CN=*, O=IfastNet LTD, L=Everywhere, C=US
06.04.2019

19.03.2031
expires in 4229 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008715FCDCA7DAEC19
Thumbprint:4C17D029309CB96FB9ACDE32DAED3A2E1453C6BE
SHA256 / Certificate:mDogchfkLbBtrX3RZNRQ8TJeQa8SPOporL0tnLkfzS8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):cb7ba44f1214c16a36d1e2f427abee57d6b054665a6baaae08082bcc4a5e9d71
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


9. Last Certificates - Certificate Transparency Log Check (BETA)

1. Source CertSpotter - active certificates

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow.

No CRT - CT-Log entries found


10. Html-Content - Entries (BETA - mixed content and other checks)

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://marvelfanfiles.page/
185.27.134.133
script

1
31,206 Bytes
0
1
0




https://www.marvelfanfiles.page/
185.27.134.133
script

1
31,206 Bytes
0
1
0




Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://marvelfanfiles.page/
185.27.134.133
script
src
/aes.js
200
31206 Bytes

1
ok

local SRI possible, possible hash-values:

sha256-0nAchqKjGmQVIOchIXSdu6vu1LGlmuziC78U+cnegrw=
sha384-3LsCjA/Ki/zMFyaMiYiwF+QStymvnTOkYV9kfooje/gdYyDSddvlzi5ykoh3sedM
sha512-aZQcLnOgiUcxvaFxNp0dOtCfbTCgoCyqI0D6xLUMIIKzU5iLRZEfAdDZXRLnjTPH/OBQA/QQL4EnyLffL1chrg==

<script src="/aes.js" crossorigin="anonymous" integrity="sha256-0nAchqKjGmQVIOchIXSdu6vu1LGlmuziC78U+cnegrw=" />



https://www.marvelfanfiles.page/
185.27.134.133
script
src
/aes.js
200
31206 Bytes

1
ok

local SRI possible, possible hash-values:

sha256-0nAchqKjGmQVIOchIXSdu6vu1LGlmuziC78U+cnegrw=
sha384-3LsCjA/Ki/zMFyaMiYiwF+QStymvnTOkYV9kfooje/gdYyDSddvlzi5ykoh3sedM
sha512-aZQcLnOgiUcxvaFxNp0dOtCfbTCgoCyqI0D6xLUMIIKzU5iLRZEfAdDZXRLnjTPH/OBQA/QQL4EnyLffL1chrg==

<script src="/aes.js" crossorigin="anonymous" integrity="sha256-0nAchqKjGmQVIOchIXSdu6vu1LGlmuziC78U+cnegrw=" />




11. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.marvelfanfiles.page
0

no CAA entry found
1
0
marvelfanfiles.page
0

no CAA entry found
1
0
page
0

no CAA entry found
1
0


12. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
marvelfanfiles.page

ok
1
0
www.marvelfanfiles.page

ok
1
0
_acme-challenge.marvelfanfiles.page

Name Error - The domain name does not exist
1
0
_acme-challenge.www.marvelfanfiles.page

Name Error - The domain name does not exist
1
0
_acme-challenge.marvelfanfiles.page.marvelfanfiles.page

Name Error - The domain name does not exist
1
0
_acme-challenge.www.marvelfanfiles.page.marvelfanfiles.page

Name Error - The domain name does not exist
1
0
_acme-challenge.www.marvelfanfiles.page.www.marvelfanfiles.page

Name Error - The domain name does not exist
1
0


13. Portchecks (BETA)

Domain or IPPortDescriptionResultAnswer
marvelfanfiles.page
21
FTP



marvelfanfiles.page
21
FTP



marvelfanfiles.page
22
SSH



marvelfanfiles.page
22
SSH



marvelfanfiles.page
25
SMTP



marvelfanfiles.page
25
SMTP



marvelfanfiles.page
53
DNS



marvelfanfiles.page
53
DNS



marvelfanfiles.page
110
POP3



marvelfanfiles.page
110
POP3



marvelfanfiles.page
143
IMAP



marvelfanfiles.page
143
IMAP



marvelfanfiles.page
465
SMTP (encrypted)



marvelfanfiles.page
465
SMTP (encrypted)



marvelfanfiles.page
587
SMTP (encrypted, submission)



marvelfanfiles.page
587
SMTP (encrypted, submission)



marvelfanfiles.page
993
IMAP (encrypted)



marvelfanfiles.page
993
IMAP (encrypted)



marvelfanfiles.page
995
POP3 (encrypted)



marvelfanfiles.page
995
POP3 (encrypted)



marvelfanfiles.page
1433
MS SQL



marvelfanfiles.page
1433
MS SQL



marvelfanfiles.page
2082
cPanel (http)



marvelfanfiles.page
2082
cPanel (http)



marvelfanfiles.page
2083
cPanel (https)



marvelfanfiles.page
2083
cPanel (https)



marvelfanfiles.page
2086
WHM (http)



marvelfanfiles.page
2086
WHM (http)



marvelfanfiles.page
2087
WHM SSL



marvelfanfiles.page
2087
WHM SSL



marvelfanfiles.page
2089
cPanel Licensing



marvelfanfiles.page
2089
cPanel Licensing



marvelfanfiles.page
2095
cPanel Webmail (http)



marvelfanfiles.page
2095
cPanel Webmail (http)



marvelfanfiles.page
2096
cPanel Webmail (https)



marvelfanfiles.page
2096
cPanel Webmail (https)



marvelfanfiles.page
3306
mySql



marvelfanfiles.page
3306
mySql



marvelfanfiles.page
5224
Plesk Licensing



marvelfanfiles.page
5224
Plesk Licensing



marvelfanfiles.page
5432
PostgreSQL



marvelfanfiles.page
5432
PostgreSQL



marvelfanfiles.page
8080
Ookla Speedtest (http)



marvelfanfiles.page
8080
Ookla Speedtest (http)



marvelfanfiles.page
8080
Ookla Speedtest (https)



marvelfanfiles.page
8080
Ookla Speedtest (https)



marvelfanfiles.page
8083
VestaCP http



marvelfanfiles.page
8083
VestaCP http



marvelfanfiles.page
8083
VestaCP https



marvelfanfiles.page
8083
VestaCP https



marvelfanfiles.page
8443
Plesk Administration (https)



marvelfanfiles.page
8443
Plesk Administration (https)



marvelfanfiles.page
8447
Plesk Installer + Updates



marvelfanfiles.page
8447
Plesk Installer + Updates



marvelfanfiles.page
8880
Plesk Administration (http)



marvelfanfiles.page
8880
Plesk Administration (http)



marvelfanfiles.page
10000
Webmin (http)



marvelfanfiles.page
10000
Webmin (http)



marvelfanfiles.page
10000
Webmin (https)



marvelfanfiles.page
10000
Webmin (https)



www.marvelfanfiles.page
21
FTP



www.marvelfanfiles.page
21
FTP



www.marvelfanfiles.page
22
SSH



www.marvelfanfiles.page
22
SSH



www.marvelfanfiles.page
25
SMTP



www.marvelfanfiles.page
25
SMTP



www.marvelfanfiles.page
53
DNS



www.marvelfanfiles.page
53
DNS



www.marvelfanfiles.page
110
POP3



www.marvelfanfiles.page
110
POP3



www.marvelfanfiles.page
143
IMAP



www.marvelfanfiles.page
143
IMAP



www.marvelfanfiles.page
465
SMTP (encrypted)



www.marvelfanfiles.page
465
SMTP (encrypted)



www.marvelfanfiles.page
587
SMTP (encrypted, submission)



www.marvelfanfiles.page
587
SMTP (encrypted, submission)



www.marvelfanfiles.page
993
IMAP (encrypted)



www.marvelfanfiles.page
993
IMAP (encrypted)



www.marvelfanfiles.page
995
POP3 (encrypted)



www.marvelfanfiles.page
995
POP3 (encrypted)



www.marvelfanfiles.page
1433
MS SQL



www.marvelfanfiles.page
1433
MS SQL



www.marvelfanfiles.page
2082
cPanel (http)



www.marvelfanfiles.page
2082
cPanel (http)



www.marvelfanfiles.page
2083
cPanel (https)



www.marvelfanfiles.page
2083
cPanel (https)



www.marvelfanfiles.page
2086
WHM (http)



www.marvelfanfiles.page
2086
WHM (http)



www.marvelfanfiles.page
2087
WHM SSL



www.marvelfanfiles.page
2087
WHM SSL



www.marvelfanfiles.page
2089
cPanel Licensing



www.marvelfanfiles.page
2089
cPanel Licensing



www.marvelfanfiles.page
2095
cPanel Webmail (http)



www.marvelfanfiles.page
2095
cPanel Webmail (http)



www.marvelfanfiles.page
2096
cPanel Webmail (https)



www.marvelfanfiles.page
2096
cPanel Webmail (https)



www.marvelfanfiles.page
3306
mySql



www.marvelfanfiles.page
3306
mySql



www.marvelfanfiles.page
5224
Plesk Licensing



www.marvelfanfiles.page
5224
Plesk Licensing



www.marvelfanfiles.page
5432
PostgreSQL



www.marvelfanfiles.page
5432
PostgreSQL



www.marvelfanfiles.page
8080
Ookla Speedtest (http)



www.marvelfanfiles.page
8080
Ookla Speedtest (http)



www.marvelfanfiles.page
8080
Ookla Speedtest (https)



www.marvelfanfiles.page
8080
Ookla Speedtest (https)



www.marvelfanfiles.page
8083
VestaCP http



www.marvelfanfiles.page
8083
VestaCP http



www.marvelfanfiles.page
8083
VestaCP https



www.marvelfanfiles.page
8083
VestaCP https



www.marvelfanfiles.page
8443
Plesk Administration (https)



www.marvelfanfiles.page
8443
Plesk Administration (https)



www.marvelfanfiles.page
8447
Plesk Installer + Updates



www.marvelfanfiles.page
8447
Plesk Installer + Updates



www.marvelfanfiles.page
8880
Plesk Administration (http)



www.marvelfanfiles.page
8880
Plesk Administration (http)



www.marvelfanfiles.page
10000
Webmin (http)



www.marvelfanfiles.page
10000
Webmin (http)



www.marvelfanfiles.page
10000
Webmin (https)



www.marvelfanfiles.page
10000
Webmin (https)



185.27.134.133
21
FTP



185.27.134.133
21
FTP



185.27.134.133
22
SSH



185.27.134.133
22
SSH



185.27.134.133
25
SMTP



185.27.134.133
25
SMTP



185.27.134.133
53
DNS



185.27.134.133
53
DNS



185.27.134.133
110
POP3



185.27.134.133
110
POP3



185.27.134.133
143
IMAP



185.27.134.133
143
IMAP



185.27.134.133
465
SMTP (encrypted)



185.27.134.133
465
SMTP (encrypted)



185.27.134.133
587
SMTP (encrypted, submission)



185.27.134.133
587
SMTP (encrypted, submission)



185.27.134.133
993
IMAP (encrypted)



185.27.134.133
993
IMAP (encrypted)



185.27.134.133
995
POP3 (encrypted)



185.27.134.133
995
POP3 (encrypted)



185.27.134.133
1433
MS SQL



185.27.134.133
1433
MS SQL



185.27.134.133
2082
cPanel (http)



185.27.134.133
2082
cPanel (http)



185.27.134.133
2083
cPanel (https)



185.27.134.133
2083
cPanel (https)



185.27.134.133
2086
WHM (http)



185.27.134.133
2086
WHM (http)



185.27.134.133
2087
WHM SSL



185.27.134.133
2087
WHM SSL



185.27.134.133
2089
cPanel Licensing



185.27.134.133
2089
cPanel Licensing



185.27.134.133
2095
cPanel Webmail (http)



185.27.134.133
2095
cPanel Webmail (http)



185.27.134.133
2096
cPanel Webmail (https)



185.27.134.133
2096
cPanel Webmail (https)



185.27.134.133
3306
mySql



185.27.134.133
3306
mySql



185.27.134.133
5224
Plesk Licensing



185.27.134.133
5224
Plesk Licensing



185.27.134.133
5432
PostgreSQL



185.27.134.133
5432
PostgreSQL



185.27.134.133
8080
Ookla Speedtest (http)



185.27.134.133
8080
Ookla Speedtest (http)



185.27.134.133
8080
Ookla Speedtest (https)



185.27.134.133
8080
Ookla Speedtest (https)



185.27.134.133
8083
VestaCP http



185.27.134.133
8083
VestaCP http



185.27.134.133
8083
VestaCP https



185.27.134.133
8083
VestaCP https



185.27.134.133
8443
Plesk Administration (https)



185.27.134.133
8443
Plesk Administration (https)



185.27.134.133
8447
Plesk Installer + Updates



185.27.134.133
8447
Plesk Installer + Updates



185.27.134.133
8880
Plesk Administration (http)



185.27.134.133
8880
Plesk Administration (http)



185.27.134.133
10000
Webmin (http)



185.27.134.133
10000
Webmin (http)



185.27.134.133
10000
Webmin (https)



185.27.134.133
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=eec0b867-a145-4147-87d5-f98a0d206e96


Last Result: https://check-your-website.server-daten.de/?q=marvelfanfiles.page - 2019-08-12 09:38:23


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=marvelfanfiles.page" target="_blank">Check this Site: marvelfanfiles.page</a>