Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

A

 

Top config

 

Checked:
31.03.2020 13:39:34

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
migrosbank.ch
A
159.179.169.15
Wallisellen/Zurich/Switzerland (CH) - Migros-Genossenschafts-Bund
No Hostname found
yes
1
0

AAAA

yes


www.migrosbank.ch
A
159.179.169.15
Wallisellen/Zurich/Switzerland (CH) - Migros-Genossenschafts-Bund
No Hostname found
yes
1
0

AAAA

yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 33853, Flags 256






Public Key with Algorithm 8, KeyTag 48903, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.04.2020, 00:00:00 +, Signature-Inception: 21.03.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: ch

ch
1 DS RR in the parent zone found






1 RRSIG RR to validate DS RR found






RRSIG-Owner ch., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.04.2020, 05:00:00 +, Signature-Inception: 31.03.2020, 04:00:00 +, KeyTag 33853, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 33853 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 18757, Flags 256






Public Key with Algorithm 13, KeyTag 51409, Flags 256






Public Key with Algorithm 13, KeyTag 55966, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner ch., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.04.2020, 10:09:09 +, Signature-Inception: 15.03.2020, 09:09:09 +, KeyTag 55966, Signer-Name: ch






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 55966 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 55966, DigestType 2 and Digest "zrR5QW5O/XcIAENL4SReGxDUzwGCVcEdhUTESPoDKzI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: migrosbank.ch

migrosbank.ch
1 DS RR in the parent zone found






1 RRSIG RR to validate DS RR found






RRSIG-Owner migrosbank.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 18.04.2020, 15:30:58 +, Signature-Inception: 19.03.2020, 15:01:16 +, KeyTag 18757, Signer-Name: ch






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 18757 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 32944, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 50197, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner migrosbank.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 13:22:22 +, Signature-Inception: 25.03.2020, 11:52:22 +, KeyTag 32944, Signer-Name: migrosbank.ch






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 32944 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 32944, DigestType 2 and Digest "Z9J/Il1bBLqBV7RtvDqg+4VfKVHdm9ZVGkIhzuuli6I=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






RRSIG Type 1 validates the A - Result: 159.179.169.15
Validated: RRSIG-Owner migrosbank.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 13:22:22 +, Signature-Inception: 25.03.2020, 11:52:22 +, KeyTag 50197, Signer-Name: migrosbank.ch






RRSIG Type 16 validates the TXT - Result: MS=ms66830616 MS=B32C090CD5A81AB3CDDC0E2E99CE07E40F9E16AC docusign=99972819-783a-4814-8516-a6b68f4201f4 docusign=d12dcc5f-b031-455b-b799-a883ae9e4dd4 facebook-domain-verification=lq62pc8vk8cavacgab1rhozj3i6eem adobe-idp-site-verification=ab961429-d28c-4279-b0cd-5be6f3cfdb5d v=spf1 ip4:159.179.169.132 ip4:159.179.169.133 ip4:146.67.146.0/24 ip4:54.229.54.45 ip4:185.238.12.20 ip4:185.238.12.21 ip4:93.190.78.23 -all
Validated: RRSIG-Owner migrosbank.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 16:01:23 +, Signature-Inception: 25.03.2020, 14:31:23 +, KeyTag 50197, Signer-Name: migrosbank.ch






RRSIG Type 257 validates the CAA - Result: 5|issuedigicert.com 5|issueswisssign.com 9|issuewild;
Validated: RRSIG-Owner migrosbank.ch., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 13:22:22 +, Signature-Inception: 25.03.2020, 11:52:22 +, KeyTag 50197, Signer-Name: migrosbank.ch






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY, CAA






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, NS, SOA, MX, TXT, RRSIG, DNSKEY, NSEC3PARAM, CDS, CDNSKEY, CAA






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: No Bitmap?



Zone: www.migrosbank.ch

www.migrosbank.ch
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "0v8j2b2ajp7l6jh02vkdus3iqreqt7i7" between the hashed NSEC3-owner "0v8j2b2ajp7l6jh02vkdus3iqreqt7i7" and the hashed NextOwner "1csdbfh4i9n0ii0k1odo7d4o4cgmjav4". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner 0v8j2b2ajp7l6jh02vkdus3iqreqt7i7.migrosbank.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 13:22:22 +, Signature-Inception: 25.03.2020, 11:52:22 +, KeyTag 50197, Signer-Name: migrosbank.ch






RRSIG Type 1 validates the A - Result: 159.179.169.15
Validated: RRSIG-Owner www.migrosbank.ch., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 08.04.2020, 13:22:22 +, Signature-Inception: 25.03.2020, 11:52:22 +, KeyTag 50197, Signer-Name: migrosbank.ch






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the CNAME RR.
Bitmap: A, RRSIG






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the TXT RR.
Bitmap: A, RRSIG






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the AAAA RR.
Bitmap: A, RRSIG






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the TLSA RR.
Bitmap: A, RRSIG






RRSIG Type 50, expiration 2020-04-08 13:22:22 + validates the NSEC3 RR that proves the not-existence of the CAA RR.
Bitmap: A, RRSIG

 

3. Name Servers

DomainNameserverNS-IP
www.migrosbank.ch
T  davros.glipac.ch

migrosbank.ch
  ns1.glipac.ch
212.243.165.90
Zurich/Switzerland (CH) - Swisscom AG


 
2001:918:ff6e:1::90
Lucerne/Switzerland (CH) - Swisscom IP-Plus TLA


  ns1.ip-plus.net
164.128.36.34
Corsier-sur-Vevey/Vaud/Switzerland (CH) - Swisscom IP-Plus Backbone


  ns2.glipac.ch
217.192.237.170
Eysins/Vaud/Switzerland (CH) - Swisscom IP-Plus


 
2001:918:ff6e:2::170
Lucerne/Switzerland (CH) - Swisscom IP-Plus TLA


  ns3.glipac.ch
188.40.91.196
Ellerbek/Schleswig-Holstein/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:221:1601::2
Falkenstein/Saxony/Germany (DE) - Hetzner Online GmbH

ch
  a.nic.ch / lako.switch.ch


  b.nic.ch / wako.switch.ch


  e.nic.ch / 2.ber.pch


  f.nic.ch / s2.amx


  g.nic.ch


  h.nic.ch

 

4. SOA-Entries


Domain:ch
Zone-Name:
Primary:a.nic.ch
Mail:dns-operation.switch.ch
Serial:2020033113
Refresh:900
Retry:600
Expire:1123200
TTL:900
num Entries:6


Domain:migrosbank.ch
Zone-Name:
Primary:davros.glipac.ch
Mail:dns.domaintechnology.ch
Serial:2020032601
Refresh:14400
Retry:3600
Expire:1814400
TTL:3600
num Entries:7


Domain:www.migrosbank.ch
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://www.migrosbank.ch/de/privatpersonen.html, address used: https://www.migrosbank.ch/de/privatpersonen.html, Screenshot created 2020-03-31 13:42:18 +00:0

 

Mobil (412px x 732px)

 

1422 milliseconds

 

Screenshot mobile - https://www.migrosbank.ch/de/privatpersonen.html
Mobil + Landscape (732px x 412px)

 

1734 milliseconds

 

Screenshot mobile landscape - https://www.migrosbank.ch/de/privatpersonen.html
Screen (1280px x 1680px)

 

2234 milliseconds

 

Screenshot Desktop - https://www.migrosbank.ch/de/privatpersonen.html

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport396716
content Size10502342

 

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

 

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with P-256, and AES_256_GCM.

 

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://migrosbank.ch/
159.179.169.15
301
https://migrosbank.ch/
Html is minified: 100.00 %
0.070
A
Date: Tue, 31 Mar 2020 11:41:14 GMT
Server: Apache
Location: https://migrosbank.ch/
Content-Length: 230
Connection: close
Content-Type: text/html; charset=iso-8859-1

• http://www.migrosbank.ch/
159.179.169.15
301
https://www.migrosbank.ch/
Html is minified: 100.00 %
0.056
A
Date: Tue, 31 Mar 2020 11:41:14 GMT
Server: Apache
Location: https://www.migrosbank.ch/
Content-Length: 234
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://migrosbank.ch/
159.179.169.15
301
https://www.migrosbank.ch/
Html is minified: 100.00 %
3.350
A
Date: Tue, 31 Mar 2020 11:41:14 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Location: https://www.migrosbank.ch/
Content-Length: 234
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://www.migrosbank.ch/
159.179.169.15
302
https://www.migrosbank.ch/de/privatpersonen.html

3.323
A
Date: Tue, 31 Mar 2020 11:41:18 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Vary: Referer,User-Agent
Set-Cookie: language=en; Path=/; Domain=www.migrosbank.ch; Expires=2021-03-31 13:41:18; Secure,ZX_2020AFX-S=AVfPICRaSsHeZISs1QaZQLe5Wjet!NBM0EEzthN38yAF!N8Z6XllMibdnat7XAdkt0Ns; Path=/; Domain=www.migrosbank.ch; HttpOnly; Secure
Content-Length: 0
Pragma: no-cache
Cache-Control: no-cache, no-store, must-revalidate, max-age=0
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Location: /de/privatpersonen.html
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: frame-src 'self' blob: https://*.migrosbank.ch/ https://www.youtube.com/ https://optimize.google.com/ https://cdn.migros.ch/ https://services.logismata.ch/ https://www.googleadservices.com/ https://googleads.g.doubleclick.net/ https://stats.g.doubleclick.net/ https://tpc.googlesyndication.com/ https://8050383.fls.doubleclick.net/ https://payment.datatrans.biz/ https://edge.capturemedia.network/; object-src 'none'; frame-ancestors 'self' https://*.ti8m.ch;
Access-Control-Allow-Origin: https://blog.migrosbank.ch
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Referrer-Policy: strict-origin-when-cross-origin
Connection: close

• https://www.migrosbank.ch/de/privatpersonen.html
No Compression used - 20992 / 104748 - 20.04 % possible
Inline-JavaScript (∑/total): 6/4758 Inline-CSS (∑/total): 0/0
200

Html is minified: 137.84 %
Other inline scripts (∑/total): 9/5696
3.477
A
Date: Tue, 31 Mar 2020 11:41:21 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Vary: Referer,User-Agent,Accept-Encoding
Set-Cookie: language=de; Path=/; Domain=www.migrosbank.ch; Expires=2021-03-31 13:41:21; Secure,ZX_2020AFX-S=AQqKSoSM_HQoe1tVW1wTHEs7hwN0v3y9WxVzlkLVpc90S!AyjVAHR_!u5a5nElsUog_U; Path=/; Domain=www.migrosbank.ch; HttpOnly; Secure
Content-Length: 104748
Pragma: no-cache
Cache-Control: no-cache, no-store, must-revalidate, max-age=0
Expires: Thu, 01 Jan 1970 00:00:00 GMT
Last-Modified: Tue, 31 Mar 2020 11:38:23 GMT
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: frame-src 'self' blob: https://*.migrosbank.ch/ https://www.youtube.com/ https://optimize.google.com/ https://cdn.migros.ch/ https://services.logismata.ch/ https://www.googleadservices.com/ https://googleads.g.doubleclick.net/ https://stats.g.doubleclick.net/ https://tpc.googlesyndication.com/ https://8050383.fls.doubleclick.net/ https://payment.datatrans.biz/ https://edge.capturemedia.network/; object-src 'none'; frame-ancestors 'self' https://*.ti8m.ch;
Access-Control-Allow-Origin: https://blog.migrosbank.ch
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Referrer-Policy: strict-origin-when-cross-origin
Connection: close
Content-Type: text/html;charset=UTF-8

• http://migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
159.179.169.15
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
0.073
A
Visible Content: Moved Permanently The document has moved here .
Date: Tue, 31 Mar 2020 11:41:21 GMT
Server: Apache
Location: https://migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 299
Connection: close
Content-Type: text/html; charset=iso-8859-1

• http://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
159.179.169.15
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
0.060
A
Visible Content: Moved Permanently The document has moved here .
Date: Tue, 31 Mar 2020 11:41:21 GMT
Server: Apache
Location: https://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 303
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
3.334
A
Visible Content: Moved Permanently The document has moved here .
Date: Tue, 31 Mar 2020 11:41:26 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Location: https://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 303
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
303
https://www.migrosbank.ch/error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
3.360
A
Visible Content: Please follow this link
Date: Tue, 31 Mar 2020 11:41:29 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Vary: Referer,User-Agent
Set-Cookie: ZX_2020AFX-S=Af!ZdwcoXgchfkpyX03sKANjCyyBxdCJU35Gsf1LiwEadYnL_1zZKtVUkZ3enRgLWdlt; Path=/; Domain=www.migrosbank.ch; HttpOnly; Secure
Content-Length: 123
Location: /error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE
Connection: close
Content-Type: text/html

• https://www.migrosbank.ch/error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 157.31 %
Other inline scripts (∑/total): 0/0
3.327
A
Not Found
Visible Content: Fehlermeldung – Message d'erreur – Messaggio errore Ungültige Eingabe. Saisie incorrecte. Inserimento non valido. Error 404: Page not found The document at the specified URL does not exist. Your request ID was: XoMsaVQzssDGzJedcvREiwAAEtE © Migros Bank AG
Info: Html-Content with meta and/or script, may be a problem creating a Letsencrypt certificate using http-01 validation
Date: Tue, 31 Mar 2020 11:41:33 GMT
Server: Apache
Strict-Transport-Security: max-age=31536000
Vary: Referer,User-Agent
Connection: close
Transfer-Encoding: chunked
Content-Type: text/html

 

7. Comments


1. General Results, most used to calculate the result

Aname "migrosbank.ch" is domain, public suffix is "ch", top-level-domain-type is "country-code", Country is Switzerland, tld-manager is "SWITCH The Swiss Education & Research Network"
AGood: All ip addresses are public addresses
AGood: No asked Authoritative Name Server had a timeout
Ahttps://www.migrosbank.ch/ 159.179.169.15
302
https://www.migrosbank.ch/de/privatpersonen.html
Correct redirect https to https
Ahttps://www.migrosbank.ch/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
303
https://www.migrosbank.ch/error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: www is preferred
AGood: every cookie sent via https is marked as secure
AGood: every https has a Strict Transport Security Header
AGood: HSTS max-age is long enough, 31536000 seconds = 365 days
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (2 urls)
https://www.migrosbank.ch/error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE


Url with incomplete Content-Type - header - missing charset
Ahttp://migrosbank.ch/ 159.179.169.15
301
https://migrosbank.ch/
Correct redirect http - https with the same domain name
Ahttp://www.migrosbank.ch/ 159.179.169.15
301
https://www.migrosbank.ch/
Correct redirect http - https with the same domain name
XFatal error: Nameserver doesn't support TCP connection: davros.glipac.ch: Timeout

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)


3. DNS- and NameServer - Checks

AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.glipac.ch,ns1.ip-plus.net,ns2.glipac.ch,ns3.glipac.ch
AInfo: Nameserver mit different domain names found. May be a problem with DNS-Updates
AGood: Nameserver supports TCP connections: 7 good Nameserver
AGood: Nameserver supports Echo Capitalization: 7 good Nameserver
XNameserver Timeout checking Echo Capitalization: davros.glipac.ch
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 7 good Nameserver
XNameserver Timeout checking EDNS512: davros.glipac.ch
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 3 good Nameserver
Nameserver doesn't pass all EDNS-Checks: davros.glipac.ch: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: ns1.glipac.ch / 212.243.165.90: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: fatal timeout. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.glipac.ch / 2001:918:ff6e:1::90: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.glipac.ch / 217.192.237.170: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: fatal timeout. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.glipac.ch / 2001:918:ff6e:2::170: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
AGood: CAA entries found, creating certificate is limited: digicert.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: swisssign.com is allowed to create certificates
AGood: CAA entries found, creating certificate is limited: no CAA is allowed to create wildcard certificates

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://www.migrosbank.ch/de/privatpersonen.html
200

Warning: https result with status 200 and size greater then 1024 Bytes without Compression found. Add Compression support (gzip, deflate, br - these are checked) so the html content is compressed.
https://www.migrosbank.ch/de/privatpersonen.html
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.migrosbank.ch/de/privatpersonen.html
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.migrosbank.ch/de/privatpersonen.html
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
Warning: CSS / JavaScript found without Compression. Compress these ressources, gzip, deflate, br are checked. 5 external CSS / JavaScript files without GZip found - 2 with GZip, 7 complete
AGood: All images with internal compression not compressed. Some Images (.png, .jpg, .jpeg, .webp, .gif) are already compressed, so an additional compression isn't helpful. 1 images (type image/png, image/jpg) found without additional GZip. Not required because these images are already compressed
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 2 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 5 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 7 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 19 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 19 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AGood: Some img-elements have a valid alt-attribute.: 19 img-elements found, 16 img-elements with correct alt-attributes (defined, not an empty value).
Wrong: img-elements without alt-attribute or empty alt-attribute found. The alt-attribute ("alternative") is required and should describe the img. So Screenreader and search engines are able to use these informations.: 3 img-elements without alt-attribute, 0 img-elements with empty alt-attribute found.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://www.migrosbank.ch/error_path/404.html?al_req_id=XoMsaVQzssDGzJedcvREiwAAEtE
404
3.327 seconds
Warning: 404 needs more then one second
ADuration: 168904 milliseconds, 168.904 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
migrosbank.ch
159.179.169.15
443
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
migrosbank.ch
159.179.169.15
443
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, serialNumber=CHE 105 841 533


2CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US


www.migrosbank.ch
www.migrosbank.ch
443
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.migrosbank.ch
www.migrosbank.ch
443
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, serialNumber=CHE 105 841 533


2CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US


www.migrosbank.ch
159.179.169.15
443
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

www.migrosbank.ch
159.179.169.15
443
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, serialNumber=CHE 105 841 533


2CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US


migrosbank.ch
migrosbank.ch
443
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok

migrosbank.ch
migrosbank.ch
443
ok
Tls12

ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - incomplete

1CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, serialNumber=CHE 105 841 533


2CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US

 

9. Certificates

1.
1.
CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, SERIALNUMBER=CHE 105 841 533, OID.1.3.6.1.4.1.311.60.2.1.3=CH, OID.2.5.4.15=Private Organization
26.07.2018
25.08.2020
1562 days expired
www.bancamigros.ch, www.banquemigros.ch, migrosbank.ch, bancamigros.ch, banquemigros.ch, www.migrosbank.ch - 6 entries
1.
1.
CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, SERIALNUMBER=CHE 105 841 533, OID.1.3.6.1.4.1.311.60.2.1.3=CH, OID.2.5.4.15=Private Organization
26.07.2018

25.08.2020
1562 days expired


www.bancamigros.ch, www.banquemigros.ch, migrosbank.ch, bancamigros.ch, banquemigros.ch, www.migrosbank.ch - 6 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0F6EA6A2CDB9F9609292AD46DB850238
Thumbprint:C7AE23E5687F67D905B995225811ADDCEA21B393
SHA256 / Certificate:WtlURpg52q1fVsxYTkrutn/3YazXKmqL0g1r09v6ZqQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5862d917c8907dafdbad5bbc740f4d9c3790b77453eff5c5b5f46db5f8062b94
SHA256 hex / Subject Public Key Information (SPKI):5862d917c8907dafdbad5bbc740f4d9c3790b77453eff5c5b5f46db5f8062b94
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, SERIALNUMBER=CHE 105 841 533, OID.1.3.6.1.4.1.311.60.2.1.3=CH, OID.2.5.4.15=Private Organization
26.07.2018
25.08.2020
1562 days expired
www.bancamigros.ch, www.banquemigros.ch, migrosbank.ch, bancamigros.ch, banquemigros.ch, www.migrosbank.ch - 6 entries

2.
CN=www.migrosbank.ch, OU=MIGROSBANK, O=Migros Bank AG, L=Zuerich, C=CH, SERIALNUMBER=CHE 105 841 533, OID.1.3.6.1.4.1.311.60.2.1.3=CH, OID.2.5.4.15=Private Organization
26.07.2018

25.08.2020
1562 days expired


www.bancamigros.ch, www.banquemigros.ch, migrosbank.ch, bancamigros.ch, banquemigros.ch, www.migrosbank.ch - 6 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0F6EA6A2CDB9F9609292AD46DB850238
Thumbprint:C7AE23E5687F67D905B995225811ADDCEA21B393
SHA256 / Certificate:WtlURpg52q1fVsxYTkrutn/3YazXKmqL0g1r09v6ZqQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5862d917c8907dafdbad5bbc740f4d9c3790b77453eff5c5b5f46db5f8062b94
SHA256 hex / Subject Public Key Information (SPKI):5862d917c8907dafdbad5bbc740f4d9c3790b77453eff5c5b5f46db5f8062b94
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013
22.10.2028
expires in 1418 days


3.
CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013

22.10.2028
expires in 1418 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0C79A944B08C11952092615FE26B1D83
Thumbprint:7E2F3A4F8FE8FA8A5730AECA029696637E986F3F
SHA256 / Certificate:QD4GKiZTBZETKFuvgKDUrkIshIyfePrQH8lLxbh/7xo=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):451335746aa70c5b022570531e4cb5eaf8b5a1b3a50a01459ffc8e848ff2fa1a
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013
22.10.2028
expires in 1418 days


4.
CN=DigiCert SHA2 Extended Validation Server CA, OU=www.digicert.com, O=DigiCert Inc, C=US
22.10.2013

22.10.2028
expires in 1418 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0C79A944B08C11952092615FE26B1D83
Thumbprint:7E2F3A4F8FE8FA8A5730AECA029696637E986F3F
SHA256 / Certificate:QD4GKiZTBZETKFuvgKDUrkIshIyfePrQH8lLxbh/7xo=
SHA256 hex / Cert (DANE * 0 1):403e062a2653059113285baf80a0d4ae422c848c9f78fad01fc94bc5b87fef1a
SHA256 hex / PublicKey (DANE * 1 1):451335746aa70c5b022570531e4cb5eaf8b5a1b3a50a01459ffc8e848ff2fa1a
SHA256 hex / Subject Public Key Information (SPKI):451335746aa70c5b022570531e4cb5eaf8b5a1b3a50a01459ffc8e848ff2fa1a
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)




5.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016
10.05.2025
expires in 157 days


5.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
07.12.2016

10.05.2025
expires in 157 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03BAD1D3F56CF1218E8DEF57DC4195BB
Thumbprint:2B723184E84F8F7A675ADF5AFF8B38FA65878083
SHA256 / Certificate:y/j7d2YBZ+a6rNDfd82jl9ARfuK+6iO5NTF/i7W147A=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):5a889647220e54d6bd8a16817224520bb5c78e58984bd570506388b9de0f075f
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




6.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006
10.11.2031
expires in 2532 days


6.
CN=DigiCert High Assurance EV Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006

10.11.2031
expires in 2532 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:02AC5C266A0B409B8F0B79F2AE462577
Thumbprint:5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25
SHA256 / Certificate:dDHl9MPBzkaQd08LYeBUQIg7qaAe0Aumq9eAbtOxGM8=
SHA256 hex / Cert (DANE * 0 1):7431e5f4c3c1ce4690774f0b61e05440883ba9a01ed00ba6abd7806ed3b118cf
SHA256 hex / PublicKey (DANE * 1 1):5a889647220e54d6bd8a16817224520bb5c78e58984bd570506388b9de0f075f
SHA256 hex / Subject Public Key Information (SPKI):5a889647220e54d6bd8a16817224520bb5c78e58984bd570506388b9de0f075f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000
13.05.2025
expires in 160 days


7.
CN=Baltimore CyberTrust Root, OU=CyberTrust, O=Baltimore, C=IE
12.05.2000

13.05.2025
expires in 160 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:020000B9
Thumbprint:D4DE20D05E66FC53FE1A50882C78DB2852CAE474
SHA256 / Certificate:Fq9XqfZ2sKsSYJWqXrre8iqzERnWRKyVzUuT2/Pyaus=
SHA256 hex / Cert (DANE * 0 1):16af57a9f676b0ab126095aa5ebadef22ab31119d644ac95cd4b93dbf3f26aeb
SHA256 hex / PublicKey (DANE * 1 1):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SHA256 hex / Subject Public Key Information (SPKI):63d9af9b47b1064d49a10e7b7fd566dbc8caa399459bfc2829c571ad8c6ef34a
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.nu/ / https://validator.w3.org/nu/ (started 2024-09-28, 09:00, alpha)

  Unfortunately, there are differences between the first used validator.nu and validator.w3.org/nu/ - switched to validator.w3.org/nu/. Looks like some error messages (link - fetchpriority attribute) of validator.nu are obsolete, not seen in the w3.org-version and not found in the current specification: link may have a fetchpriority attribute.

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

 

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.migrosbank.ch
0

no CAA entry found
1
0
migrosbank.ch
9
issuewild
;
1
0

5
issue
digicert.com
1
0

5
issue
swisssign.com
1
0
ch
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
migrosbank.ch
adobe-idp-site-verification=ab961429-d28c-4279-b0cd-5be6f3cfdb5d
ok
1
0
migrosbank.ch
docusign=99972819-783a-4814-8516-a6b68f4201f4
ok
1
0
migrosbank.ch
facebook-domain-verification=lq62pc8vk8cavacgab1rhozj3i6eem
ok
1
0
migrosbank.ch
MS=B32C090CD5A81AB3CDDC0E2E99CE07E40F9E16AC
ok
1
0
migrosbank.ch
MS=ms66830616
ok
1
0
migrosbank.ch
v=spf1 ip4:159.179.169.132 ip4:159.179.169.133 ip4:146.67.146.0/24 ip4:54.229.54.45 ip4:185.238.12.20 ip4:185.238.12.21 ip4:93.190.78.23 -all
ok
1
0
www.migrosbank.ch

ok
1
0
_acme-challenge.migrosbank.ch

Name Error - The domain name does not exist
1
0
_acme-challenge.www.migrosbank.ch

Name Error - The domain name does not exist
1
0
_acme-challenge.migrosbank.ch.migrosbank.ch

Name Error - The domain name does not exist
1
0
_acme-challenge.www.migrosbank.ch.migrosbank.ch

Name Error - The domain name does not exist
1
0
_acme-challenge.www.migrosbank.ch.www.migrosbank.ch

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=1117f78e-36d6-487f-aedf-dcb08f0dbfcc

 

Last Result: https://check-your-website.server-daten.de/?q=migrosbank.ch - 2020-03-31 13:39:34

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=migrosbank.ch" target="_blank">Check this Site: migrosbank.ch</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=migrosbank.ch