Check DNS, Urls + Redirects, Certificates and Content of your Website



M

Misconfiguration - http-status 400 - 499

Checked:
23.02.2021 11:07:45


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
medusa.breizh-chocolatine.gq
A
192.99.11.141
Montreal/Quebec/Canada (CA) - OVH SAS
Hostname: ns531331.ip-192-99-11.net
yes
1
0

AAAA

yes


www.medusa.breizh-chocolatine.gq

Name Error
yes
1
0
*.breizh-chocolatine.gq
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.medusa.breizh-chocolatine.gq
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: gq
gq
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "gq" and the NextOwner "gr". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC



0 DNSKEY RR found




Zone: breizh-chocolatine.gq
breizh-chocolatine.gq
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: medusa.breizh-chocolatine.gq
medusa.breizh-chocolatine.gq
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.medusa.breizh-chocolatine.gq
www.medusa.breizh-chocolatine.gq
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.medusa.breizh-chocolatine.gq
  ns01.freenom.com

medusa.breizh-chocolatine.gq
  ns01.freenom.com
54.171.131.39
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.

breizh-chocolatine.gq
  ns01.freenom.com
54.171.131.39
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.


  ns02.freenom.com
52.19.156.76
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.


  ns03.freenom.com
104.155.27.112
Brussels/Brussels Capital/Belgium (BE) - Google LLC


  ns04.freenom.com
104.155.29.241
Brussels/Brussels Capital/Belgium (BE) - Google LLC

gq
  a.ns.gq / led


  b.ns.gq / led


  c.ns.gq / led


  d.ns.gq / led


4. SOA-Entries


Domain:gq
Zone-Name:gq
Primary:a.ns.gq
Mail:info.equatorialguineadomains.com
Serial:1614074764
Refresh:10800
Retry:3600
Expire:604800
TTL:5
num Entries:4


Domain:breizh-chocolatine.gq
Zone-Name:breizh-chocolatine.gq
Primary:ns01.freenom.com
Mail:soa.freenom.com
Serial:1602873173
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:4


Domain:medusa.breizh-chocolatine.gq
Zone-Name:breizh-chocolatine.gq
Primary:ns01.freenom.com
Mail:soa.freenom.com
Serial:1602873173
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:1


Domain:www.medusa.breizh-chocolatine.gq
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://medusa.breizh-chocolatine.gq, address used: https://medusa.breizh-chocolatine.gq/, Screenshot created 2021-02-23 11:08:52 +00:0

Mobil (412px x 732px)

349 milliseconds

Screenshot mobile - https://medusa.breizh-chocolatine.gq/
Mobil + Landscape (732px x 412px)

341 milliseconds

Screenshot mobile landscape - https://medusa.breizh-chocolatine.gq/
Screen (1280px x 1680px)

705 milliseconds

Screenshot Desktop - https://medusa.breizh-chocolatine.gq/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with X25519, and CHACHA20_POLY1305.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://medusa.breizh-chocolatine.gq/
192.99.11.141
302
https://medusa.breizh-chocolatine.gq:443/
Html is minified: 100.00 %
0.217
A
Location: https://medusa.breizh-chocolatine.gq:443/
Date: Tue, 23 Feb 2021 10:08:15 GMT
Content-Length: 5
Content-Type: text/plain; charset=utf-8
Connection: close

• https://medusa.breizh-chocolatine.gq/
192.99.11.141
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
401

Html is minified: 100.00 %
4.797
M
Unauthorized
small visible content (num chars: 16)
401 Unauthorized
Content-Type: text/plain
Www-Authenticate: Basic realm="traefik"
Date: Tue, 23 Feb 2021 10:08:16 GMT
Content-Length: 17
Connection: close

• https://medusa.breizh-chocolatine.gq:443/

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
401

Html is minified: 100.00 %
4.593
M
Unauthorized
small visible content (num chars: 16)
401 Unauthorized
Content-Type: text/plain
Www-Authenticate: Basic realm="traefik"
Date: Tue, 23 Feb 2021 10:08:36 GMT
Content-Length: 17
Connection: close

• http://medusa.breizh-chocolatine.gq/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
192.99.11.141
-14

10.030
T
Timeout - The operation has timed out
Visible Content:

• https://192.99.11.141/
192.99.11.141
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
3.510
N
Not Found
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 18)
404 page not found
Content-Type: text/plain; charset=utf-8
X-Content-Type-Options: nosniff
Date: Tue, 23 Feb 2021 10:08:31 GMT
Content-Length: 19
Connection: close

7. Comments


1. General Results, most used to calculate the result

Aname "medusa.breizh-chocolatine.gq" is subdomain, public suffix is ".gq", top-level-domain is ".gq", top-level-domain-type is "country-code", Country is Equatorial Guinea, tld-manager is "GETESA", num .gq-domains preloaded: 805 (complete: 142558)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: medusa.breizh-chocolatine.gq has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: medusa.breizh-chocolatine.gq has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (3 urls)
https://medusa.breizh-chocolatine.gq:443/


Url with incomplete Content-Type - header - missing charset
https://medusa.breizh-chocolatine.gq/ 192.99.11.141


Url with incomplete Content-Type - header - missing charset
Bhttps://medusa.breizh-chocolatine.gq:443/
401

Missing HSTS-Header
Bhttps://medusa.breizh-chocolatine.gq/ 192.99.11.141
401

Missing HSTS-Header
CError - no version with Http-Status 200
Hfatal error: No https - result with http-status 200, no encryption
Mhttps://medusa.breizh-chocolatine.gq:443/
401

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://medusa.breizh-chocolatine.gq/ 192.99.11.141
401

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://192.99.11.141/ 192.99.11.141
404

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://192.99.11.141/ 192.99.11.141
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain medusa.breizh-chocolatine.gq, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns01.freenom.com (54.171.131.39), ns02.freenom.com (52.19.156.76), ns03.freenom.com (104.155.27.112), ns04.freenom.com (104.155.29.241)
AGood (1 - 3.0):: An average of 0.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 4 Name Servers included in Delegation: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 4 Name Servers included in 1 Zone definitions: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 1 Name Servers listed in SOA.Primary: ns01.freenom.com.
AGood: Only one SOA.Primary Name Server found.: ns01.freenom.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns01.freenom.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 4 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 4 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 4 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: freenom.com
AGood: Name servers with different Country locations found: 4 Name Servers, 2 Countries: BE, IE
AInfo: Ipv4-Subnet-list: 4 Name Servers, 3 different subnets (first Byte): 104., 52., 54., 3 different subnets (first two Bytes): 104.155., 52.19., 54.171., 4 different subnets (first three Bytes): 104.155.27., 104.155.29., 52.19.156., 54.171.131.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 1 good Nameserver
AGood: Nameserver supports Echo Capitalization: 1 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns01.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns02.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns03.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns04.freenom.com
Nameserver doesn't pass all EDNS-Checks: ns01.freenom.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns01.freenom.com / 54.171.131.39: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns01.freenom.com / 54.171.131.39: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns02.freenom.com / 52.19.156.76: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns03.freenom.com / 104.155.27.112: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns04.freenom.com / 104.155.29.241: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://medusa.breizh-chocolatine.gq/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 192.99.11.141
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://192.99.11.141/ 192.99.11.141
404
3.510 seconds
Warning: 404 needs more then one second
ADuration: 74257 milliseconds, 74.257 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
medusa.breizh-chocolatine.gq
medusa.breizh-chocolatine.gq
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
medusa.breizh-chocolatine.gq
medusa.breizh-chocolatine.gq
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=medusa.breizh-chocolatine.gq

2CN=R3, O=Let's Encrypt, C=US


medusa.breizh-chocolatine.gq
192.99.11.141
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

medusa.breizh-chocolatine.gq
192.99.11.141
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=medusa.breizh-chocolatine.gq

2CN=R3, O=Let's Encrypt, C=US


192.99.11.141
192.99.11.141
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

192.99.11.141
192.99.11.141
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=TRAEFIK DEFAULT CERT


9. Certificates

1.
1.
CN=medusa.breizh-chocolatine.gq
05.02.2021
06.05.2021
expires in 70 days
medusa.breizh-chocolatine.gq - 1 entry
1.
1.
CN=medusa.breizh-chocolatine.gq
05.02.2021

06.05.2021
expires in 70 days
medusa.breizh-chocolatine.gq - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04BE5DEA59F5B7D058C174B7F791129E3FAD
Thumbprint:FD1B760FF226F88B32457E1FD7D0ABFB1242D685
SHA256 / Certificate:9iye7+mchulFwIRiLmTRYhL9XfgbWu3Yg5UCc1wC7/Y=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):a37da7cd99fe255b396425bd48169549827cdc974ee8c02a5b916ef67236b3f4
SHA256 hex / Subject Public Key Information (SPKI):c266206c6360d1a984fe334130c243cb885bdf5a3c7a343165e273d950ab6999
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
07.10.2020
29.09.2021
expires in 216 days


2.
CN=R3, O=Let's Encrypt, C=US
07.10.2020

29.09.2021
expires in 216 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:400175048314A4C8218C84A90C16CDDF
Thumbprint:48504E974C0DAC5B5CD476C8202274B24C8C7172
SHA256 / Certificate:cwwb3NhfV85dwLunM+XxulqSWyp3HWQKJvekVCJNrTs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 217 days


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 217 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SHA256 hex / Subject Public Key Information (SPKI):29cc40db5e2de462a311cbbafaa1dc466960002335ecdf3317f2cd05c1d0bedf
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=TRAEFIK DEFAULT CERT
14.02.2021
14.02.2022
expires in 354 days
650818fc9a5093d8009ae5f6f48fabb8.51e3608f5da80b9adb81b112d939dfe2.traefik.default - 1 entry
2.
1.
CN=TRAEFIK DEFAULT CERT
14.02.2021

14.02.2022
expires in 354 days
650818fc9a5093d8009ae5f6f48fabb8.51e3608f5da80b9adb81b112d939dfe2.traefik.default - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:5389E256857B3DBCCE8CF273AC3787F9
Thumbprint:B64BBB8C6E189C81E4E241ACECE74FA112FFAC21
SHA256 / Certificate:S56wSEasAwenVNs0uEeJErDRi45G2k6um3wNW1tHeCY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):94d3c31b3f4da6d825d768a328083160b7b1af8d78def765497efa8b4b3e90d4
SHA256 hex / Subject Public Key Information (SPKI):09fb131569edb71cb1f357bf7ed637e0bc3ed4eb990752ab431f82a12bf454ad
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1)

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
2
2

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2274453120
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-02-05 17:05:45
2021-05-06 17:05:45
medusa.breizh-chocolatine.gq - 1 entries


2119748258
leaf cert
CN=R3, O=Let's Encrypt, C=US
2020-12-06 18:39:38
2021-03-06 18:39:38
medusa.breizh-chocolatine.gq - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
5
CN=R3, O=Let's Encrypt, C=US
0 /0 new
2
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4036158028
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-02-05 16:05:45
2021-05-06 15:05:45
medusa.breizh-chocolatine.gq
1 entries


3745752130
leaf cert
CN=R3, O=Let's Encrypt, C=US
2020-12-06 17:39:38
2021-03-06 17:39:38
medusa.breizh-chocolatine.gq
1 entries


3475494813
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-10-06 18:35:03
2021-01-04 19:35:03
medusa.breizh-chocolatine.gq
1 entries


3210132898
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-08-07 18:35:13
2020-11-05 19:35:13
medusa.breizh-chocolatine.gq
1 entries


2949012332
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-06-08 09:18:07
2020-09-06 09:18:07
medusa.breizh-chocolatine.gq
1 entries


2685317076
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-04-09 09:18:01
2020-07-08 09:18:01
medusa.breizh-chocolatine.gq
1 entries


2442761879
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-02-08 16:57:29
2020-05-08 15:57:29
medusa.breizh-chocolatine.gq
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com

QNr.DomainTypeNS used
1
com
NS
l.root-servers.net (2001:500:9f::42)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns01.freenom.com: 54.171.131.39
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns02.freenom.com
52.19.156.76

Answer: ns03.freenom.com
104.155.27.112

Answer: ns04.freenom.com
104.155.29.241


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
medusa.breizh-chocolatine.gq
0

no CAA entry found
1
0
breizh-chocolatine.gq
0

no CAA entry found
1
0
gq
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
breizh-chocolatine.gq

ok
1
0
medusa.breizh-chocolatine.gq

ok
1
0
_acme-challenge.medusa.breizh-chocolatine.gq

Name Error - The domain name does not exist
1
0
_acme-challenge.medusa.breizh-chocolatine.gq.breizh-chocolatine.gq

Name Error - The domain name does not exist
1
0
_acme-challenge.medusa.breizh-chocolatine.gq.medusa.breizh-chocolatine.gq

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
medusa.breizh-chocolatine.gq
21
FTP



medusa.breizh-chocolatine.gq
21
FTP



medusa.breizh-chocolatine.gq
22
SSH
open
SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4

medusa.breizh-chocolatine.gq
22
SSH
open
SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4

medusa.breizh-chocolatine.gq
25
SMTP



medusa.breizh-chocolatine.gq
25
SMTP



medusa.breizh-chocolatine.gq
53
DNS



medusa.breizh-chocolatine.gq
53
DNS



medusa.breizh-chocolatine.gq
110
POP3



medusa.breizh-chocolatine.gq
110
POP3



medusa.breizh-chocolatine.gq
143
IMAP



medusa.breizh-chocolatine.gq
143
IMAP



medusa.breizh-chocolatine.gq
465
SMTP (encrypted)



medusa.breizh-chocolatine.gq
465
SMTP (encrypted)



medusa.breizh-chocolatine.gq
587
SMTP (encrypted, submission)



medusa.breizh-chocolatine.gq
587
SMTP (encrypted, submission)



medusa.breizh-chocolatine.gq
993
IMAP (encrypted)



medusa.breizh-chocolatine.gq
993
IMAP (encrypted)



medusa.breizh-chocolatine.gq
995
POP3 (encrypted)



medusa.breizh-chocolatine.gq
995
POP3 (encrypted)



medusa.breizh-chocolatine.gq
1433
MS SQL



medusa.breizh-chocolatine.gq
1433
MS SQL



medusa.breizh-chocolatine.gq
2082
cPanel (http)



medusa.breizh-chocolatine.gq
2082
cPanel (http)



medusa.breizh-chocolatine.gq
2083
cPanel (https)



medusa.breizh-chocolatine.gq
2083
cPanel (https)



medusa.breizh-chocolatine.gq
2086
WHM (http)



medusa.breizh-chocolatine.gq
2086
WHM (http)



medusa.breizh-chocolatine.gq
2087
WHM (https)



medusa.breizh-chocolatine.gq
2087
WHM (https)



medusa.breizh-chocolatine.gq
2089
cPanel Licensing



medusa.breizh-chocolatine.gq
2089
cPanel Licensing



medusa.breizh-chocolatine.gq
2095
cPanel Webmail (http)



medusa.breizh-chocolatine.gq
2095
cPanel Webmail (http)



medusa.breizh-chocolatine.gq
2096
cPanel Webmail (https)



medusa.breizh-chocolatine.gq
2096
cPanel Webmail (https)



medusa.breizh-chocolatine.gq
2222
DirectAdmin (http)



medusa.breizh-chocolatine.gq
2222
DirectAdmin (http)



medusa.breizh-chocolatine.gq
2222
DirectAdmin (https)



medusa.breizh-chocolatine.gq
2222
DirectAdmin (https)



medusa.breizh-chocolatine.gq
3306
mySql



medusa.breizh-chocolatine.gq
3306
mySql



medusa.breizh-chocolatine.gq
5224
Plesk Licensing



medusa.breizh-chocolatine.gq
5224
Plesk Licensing



medusa.breizh-chocolatine.gq
5432
PostgreSQL



medusa.breizh-chocolatine.gq
5432
PostgreSQL



medusa.breizh-chocolatine.gq
8080
Ookla Speedtest (http)



medusa.breizh-chocolatine.gq
8080
Ookla Speedtest (http)



medusa.breizh-chocolatine.gq
8080
Ookla Speedtest (https)



medusa.breizh-chocolatine.gq
8080
Ookla Speedtest (https)



medusa.breizh-chocolatine.gq
8083
VestaCP http



medusa.breizh-chocolatine.gq
8083
VestaCP http



medusa.breizh-chocolatine.gq
8083
VestaCP https



medusa.breizh-chocolatine.gq
8083
VestaCP https



medusa.breizh-chocolatine.gq
8443
Plesk Administration (https)



medusa.breizh-chocolatine.gq
8443
Plesk Administration (https)



medusa.breizh-chocolatine.gq
8447
Plesk Installer + Updates



medusa.breizh-chocolatine.gq
8447
Plesk Installer + Updates



medusa.breizh-chocolatine.gq
8880
Plesk Administration (http)



medusa.breizh-chocolatine.gq
8880
Plesk Administration (http)



medusa.breizh-chocolatine.gq
10000
Webmin (http)



medusa.breizh-chocolatine.gq
10000
Webmin (http)



medusa.breizh-chocolatine.gq
10000
Webmin (https)



medusa.breizh-chocolatine.gq
10000
Webmin (https)



192.99.11.141
21
FTP



192.99.11.141
21
FTP



192.99.11.141
22
SSH
open
SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4

192.99.11.141
22
SSH
open
SSH-2.0-OpenSSH_7.4p1 Debian-10+deb9u4

192.99.11.141
25
SMTP



192.99.11.141
25
SMTP



192.99.11.141
53
DNS



192.99.11.141
53
DNS



192.99.11.141
110
POP3



192.99.11.141
110
POP3



192.99.11.141
143
IMAP



192.99.11.141
143
IMAP



192.99.11.141
465
SMTP (encrypted)



192.99.11.141
465
SMTP (encrypted)



192.99.11.141
587
SMTP (encrypted, submission)



192.99.11.141
587
SMTP (encrypted, submission)



192.99.11.141
993
IMAP (encrypted)



192.99.11.141
993
IMAP (encrypted)



192.99.11.141
995
POP3 (encrypted)



192.99.11.141
995
POP3 (encrypted)



192.99.11.141
1433
MS SQL



192.99.11.141
1433
MS SQL



192.99.11.141
2082
cPanel (http)



192.99.11.141
2082
cPanel (http)



192.99.11.141
2083
cPanel (https)



192.99.11.141
2083
cPanel (https)



192.99.11.141
2086
WHM (http)



192.99.11.141
2086
WHM (http)



192.99.11.141
2087
WHM (https)



192.99.11.141
2087
WHM (https)



192.99.11.141
2089
cPanel Licensing



192.99.11.141
2089
cPanel Licensing



192.99.11.141
2095
cPanel Webmail (http)



192.99.11.141
2095
cPanel Webmail (http)



192.99.11.141
2096
cPanel Webmail (https)



192.99.11.141
2096
cPanel Webmail (https)



192.99.11.141
2222
DirectAdmin (http)



192.99.11.141
2222
DirectAdmin (http)



192.99.11.141
2222
DirectAdmin (https)



192.99.11.141
2222
DirectAdmin (https)



192.99.11.141
3306
mySql



192.99.11.141
3306
mySql



192.99.11.141
5224
Plesk Licensing



192.99.11.141
5224
Plesk Licensing



192.99.11.141
5432
PostgreSQL



192.99.11.141
5432
PostgreSQL



192.99.11.141
8080
Ookla Speedtest (http)



192.99.11.141
8080
Ookla Speedtest (http)



192.99.11.141
8080
Ookla Speedtest (https)



192.99.11.141
8080
Ookla Speedtest (https)



192.99.11.141
8083
VestaCP http



192.99.11.141
8083
VestaCP http



192.99.11.141
8083
VestaCP https



192.99.11.141
8083
VestaCP https



192.99.11.141
8443
Plesk Administration (https)



192.99.11.141
8443
Plesk Administration (https)



192.99.11.141
8447
Plesk Installer + Updates



192.99.11.141
8447
Plesk Installer + Updates



192.99.11.141
8880
Plesk Administration (http)



192.99.11.141
8880
Plesk Administration (http)



192.99.11.141
10000
Webmin (http)



192.99.11.141
10000
Webmin (http)



192.99.11.141
10000
Webmin (https)



192.99.11.141
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=7417ac9a-fdfa-4651-97a0-78debe27a66c


Last Result: https://check-your-website.server-daten.de/?q=medusa.breizh-chocolatine.gq - 2021-02-23 11:07:45


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=medusa.breizh-chocolatine.gq" target="_blank">Check this Site: medusa.breizh-chocolatine.gq</a>