Check DNS, Urls + Redirects, Certificates and Content of your Website





1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
my.freenom.com
CNAME
lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
yes
1
0

A
52.18.152.219
Dublin/Leinster/Ireland (IE) - Amazon Technologies Inc.
Hostname: ec2-52-18-152-219.eu-west-1.compute.amazonaws.com
yes



A
54.194.129.212
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.
Hostname: ec2-54-194-129-212.eu-west-1.compute.amazonaws.com
yes



A
99.81.236.120
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.
Hostname: ec2-99-81-236-120.eu-west-1.compute.amazonaws.com
yes


www.my.freenom.com

Name Error
yes
1
0
*.freenom.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.my.freenom.com
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 951, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.02.2023, 00:00:00 +, Signature-Inception: 21.01.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=



2 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.02.2023, 05:00:00 +, Signature-Inception: 24.01.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 36739, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.02.2023, 18:24:21 +, Signature-Inception: 20.01.2023, 18:19:21 +, KeyTag 30909, Signer-Name: com



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: freenom.com
freenom.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "sl410for5bikeri96fb4vikss2cp9409" between the hashed NSEC3-owner "sl40ntd6dqs2cnm8rqge813qlbpj2i9h" and the hashed NextOwner "sl410vp1dbu1jru2f3kkf2i0hdd3c6cl". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner sl40ntd6dqs2cnm8rqge813qlbpj2i9h.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.01.2023, 06:48:12 +, Signature-Inception: 23.01.2023, 05:38:12 +, KeyTag 36739, Signer-Name: com



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "ck0pojmg874ljref7efn8430qvit8bsm" as Owner. That's the Hash of "com" with the NextHashedOwnerName "ck0q2d6ni4i7eqh8na30ns61o48ul8g5". So that domain name is the Closest Encloser of "freenom.com". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner ck0pojmg874ljref7efn8430qvit8bsm.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.01.2023, 05:23:04 +, Signature-Inception: 23.01.2023, 04:13:04 +, KeyTag 36739, Signer-Name: com



0 DNSKEY RR found




Zone: my.freenom.com
my.freenom.com
0 DS RR in the parent zone found

Zone: www.my.freenom.com
www.my.freenom.com
0 DS RR in the parent zone found

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 951, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.02.2023, 00:00:00 +, Signature-Inception: 21.01.2023, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=



2 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.02.2023, 05:00:00 +, Signature-Inception: 24.01.2023, 04:00:00 +, KeyTag 951, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 36739, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 04.02.2023, 18:24:21 +, Signature-Inception: 20.01.2023, 18:19:21 +, KeyTag 30909, Signer-Name: com



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: amazonaws.com
amazonaws.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "f1rgvh3kf6di3tf72pim4t6uom70c5h4" between the hashed NSEC3-owner "f1rguclkmtbffl151iq24fpp76mu5qo7" and the hashed NextOwner "f1rhc3no0ksgmn6j90sgarj7fq7ch0qr". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner f1rguclkmtbffl151iq24fpp76mu5qo7.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 31.01.2023, 06:34:53 +, Signature-Inception: 24.01.2023, 05:24:53 +, KeyTag 36739, Signer-Name: com



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "ck0pojmg874ljref7efn8430qvit8bsm" as Owner. That's the Hash of "com" with the NextHashedOwnerName "ck0q2d6ni4i7eqh8na30ns61o48ul8g5". So that domain name is the Closest Encloser of "amazonaws.com". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner ck0pojmg874ljref7efn8430qvit8bsm.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.01.2023, 05:23:04 +, Signature-Inception: 23.01.2023, 04:13:04 +, KeyTag 36739, Signer-Name: com



0 DNSKEY RR found




Zone: elb.amazonaws.com
elb.amazonaws.com
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: eu-west-1.elb.amazonaws.com
eu-west-1.elb.amazonaws.com
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
0 DS RR in the parent zone found



0 DNSKEY RR found




3. Name Servers

DomainNameserverNS-IP
www.my.freenom.com
  ns01.freenom.com

freenom.com
  ns01.freenom.com
54.171.131.39
Dublin/Leinster/Ireland (IE) - Amazon.com, Inc.


  ns02.freenom.com
52.19.156.76
Dublin/Leinster/Ireland (IE) - Amazon Technologies Inc.


  ns03.freenom.com
104.155.27.112
Brussels/Brussels Capital/Belgium (BE) - Google LLC


  ns04.freenom.com
104.155.29.241
Brussels/Brussels Capital/Belgium (BE) - Google LLC

com
  a.gtld-servers.net / nnn1-fra6


  b.gtld-servers.net / nnn1-eltxl1


  c.gtld-servers.net / nnn1-fra6


  d.gtld-servers.net / nnn1-fra6


  e.gtld-servers.net / nnn1-fra6


  f.gtld-servers.net / nnn1-fra5


  g.gtld-servers.net / nnn1-fra5


  h.gtld-servers.net / nnn1-fra5


  i.gtld-servers.net / nnn1-fra5


  j.gtld-servers.net / nnn1-nlams-1a


  k.gtld-servers.net / nnn1-nlams-1c


  l.gtld-servers.net / nnn1-nlams-1d


  m.gtld-servers.net / nnn1-nlams-1a


lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
  ns-1053.awsdns-03.org / c437c83c553e75cdcdde5edf42a06b43 -
205.251.196.29
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5304:1d00::1
London/England/United Kingdom (GB) - Amazon.com

eu-west-1.elb.amazonaws.com
  ns-1053.awsdns-03.org / 40bd453279d22c134f4815b90ed782f4 -
205.251.196.29
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5304:1d00::1
London/England/United Kingdom (GB) - Amazon.com


  ns-2023.awsdns-60.co.uk / e3fc9b2808eabb1791c00963e5c52f3d -
205.251.199.231
Herndon/Virginia/United States (US) - Amazon.com


 
2600:9000:5307:e700::1
Seattle/Washington/United States (US) - Amazon.com


  ns-341.awsdns-42.com / 2d48f79e9daad54027f3eabd6f139bb0 -
205.251.193.85
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5301:5500::1
Seattle/Washington/United States (US) - Amazon.com


  ns-739.awsdns-28.net / 29888b3021f73dadbc0a1ae68db8a77d -
205.251.194.227
Sterling/Virginia/United States (US) - Amazon.com


 
2600:9000:5302:e300::1
Seattle/Washington/United States (US) - Amazon.com

elb.amazonaws.com
  dns-external-master.amazon.com / Auth_Host1.Frankfurt_Node1
204.74.108.1
New York/United States (US) - NeuStar, Inc.


  pdns1.ultradns.net / Auth_Host3.Frankfurt_Node1
204.74.108.1
New York/United States (US) - NeuStar, Inc.


 
2001:502:f3ff::1
Sterling/Virginia/United States (US) - NeuStar, Inc.

amazonaws.com
  dns-external-master.amazon.com


  ns-1321.awsdns-37.org / 1cb1cfb50c5bc8a37c402beb8161ec22 -
205.251.197.41
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5305:2900::1
London/England/United Kingdom (GB) - Amazon.com


  ns-1670.awsdns-16.co.uk / a4305d9c4640d6d8307b2d63155a9e58 -
205.251.198.134
Herndon/Virginia/United States (US) - Amazon.com


 
2600:9000:5306:8600::1
Seattle/Washington/United States (US) - Amazon.com


  ns-27.awsdns-03.com / b085e4b5e9f11bafe4c40a599f175633 -
205.251.192.27
Dublin/Leinster/Ireland (IE) - Amazon.com


 
2600:9000:5300:1b00::1
Seattle/Washington/United States (US) - Amazon.com


  ns-967.awsdns-56.net / 29888b3021f73dadbc0a1ae68db8a77d -
205.251.195.199
Herndon/Virginia/United States (US) - Amazon.com


 
2600:9000:5303:c700::1
Seattle/Washington/United States (US) - Amazon.com

com
  a.gtld-servers.net / nnn1-fra6


  b.gtld-servers.net / nnn1-eltxl1


  c.gtld-servers.net / nnn1-fra6


  d.gtld-servers.net / nnn1-fra6


  e.gtld-servers.net / nnn1-fra6


  f.gtld-servers.net / nnn1-fra5


  g.gtld-servers.net / nnn1-fra5


  h.gtld-servers.net / nnn1-fra5


  i.gtld-servers.net / nnn1-fra5


  j.gtld-servers.net / nnn1-nlams-1e


  k.gtld-servers.net / nnn1-nlams-1e


  l.gtld-servers.net / nnn1-nlams-1c


  m.gtld-servers.net / nnn1-nlams-1c


4. SOA-Entries


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1674566635
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:1


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1674566645
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:12


Domain:freenom.com
Zone-Name:freenom.com
Primary:ns01.freenom.com
Mail:soa.freenom.com
Serial:1669284767
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:4


Domain:www.my.freenom.com
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1



Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1674566665
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:6


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1674566675
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:7


Domain:amazonaws.com
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:amazonaws.com
Zone-Name:amazonaws.com
Primary:dns-external-master.amazon.com
Mail:hostmaster.amazon.com
Serial:2016969706
Refresh:180
Retry:60
Expire:2592000
TTL:3600
num Entries:8


Domain:elb.amazonaws.com
Zone-Name:amazonaws.com
Primary:pdns1.ultradns.net
Mail:hostmaster.amazon.com
Serial:2016969874
Refresh:180
Retry:60
Expire:2592000
TTL:3600
num Entries:3


Domain:eu-west-1.elb.amazonaws.com
Zone-Name:eu-west-1.elb.amazonaws.com
Primary:ns-1053.awsdns-03.org
Mail:awsdns-hostmaster.amazon.com
Serial:1
Refresh:7200
Retry:900
Expire:1209600
TTL:60
num Entries:8


Domain:lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
Zone-Name:eu-west-1.elb.amazonaws.com
Primary:ns-1053.awsdns-03.org
Mail:awsdns-hostmaster.amazon.com
Serial:1
Refresh:7200
Retry:900
Expire:1209600
TTL:60
num Entries:2


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://my.freenom.com/
52.18.152.219
302
http://my.freenom.com/clientarea.php
0.086
D
Date: Tue, 24 Jan 2023 13:26:35 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• http://my.freenom.com/
54.194.129.212
302
http://my.freenom.com/clientarea.php
0.070
D
Date: Tue, 24 Jan 2023 13:26:35 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• http://my.freenom.com/
99.81.236.120
302
http://my.freenom.com/clientarea.php
0.070
D
Date: Tue, 24 Jan 2023 13:26:36 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• http://my.freenom.com/clientarea.php

302
http://my.freenom.com/clientarea.php
0.260
L
Date: Tue, 24 Jan 2023 13:27:00 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Set-Cookie: WHMCSZH5eHTGhfvzP=09o7df79n9kdtdimt3gdu9e1c5; path=/; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: clientarea.php

• https://my.freenom.com/
52.18.152.219
302
https://my.freenom.com/clientarea.php
3.656
B
Date: Tue, 24 Jan 2023 13:26:36 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• https://my.freenom.com/
54.194.129.212
302
https://my.freenom.com/clientarea.php
3.056
B
Date: Tue, 24 Jan 2023 13:26:40 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• https://my.freenom.com/
99.81.236.120
302
https://my.freenom.com/clientarea.php
3.040
B
Date: Tue, 24 Jan 2023 13:26:44 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• https://my.freenom.com/clientarea.php

302
https://my.freenom.com/clientarea.php
3.240
L
Date: Tue, 24 Jan 2023 13:27:01 GMT
Content-Type: text/html; charset=utf-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Set-Cookie: WHMCSZH5eHTGhfvzP=4e3aj7tdgcvj94en4kid8fa5u1; path=/; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Location: clientarea.php

• http://my.freenom.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
52.18.152.219
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.070
A
Not Found
Visible Content: Not Found The requested URL /.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de was not found on this server. Apache/2.4.10 (Debian) Server at my.freenom.com Port 80
Date: Tue, 24 Jan 2023 13:26:48 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 347
Connection: close
Server: Apache/2.4.10 (Debian)

• http://my.freenom.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
54.194.129.212
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.067
A
Not Found
Visible Content: Not Found The requested URL /.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de was not found on this server. Apache/2.4.10 (Debian) Server at my.freenom.com Port 80
Date: Tue, 24 Jan 2023 13:26:48 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 347
Connection: close
Server: Apache/2.4.10 (Debian)

• http://my.freenom.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
99.81.236.120
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
0.070
A
Not Found
Visible Content: Not Found The requested URL /.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de was not found on this server. Apache/2.4.10 (Debian) Server at my.freenom.com Port 80
Date: Tue, 24 Jan 2023 13:26:48 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 347
Connection: close
Server: Apache/2.4.10 (Debian)

• https://52.18.152.219/
52.18.152.219
302
https://my.freenom.com/clientarea.php
3.087
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 24 Jan 2023 13:26:49 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• https://99.81.236.120/
99.81.236.120
302
https://my.freenom.com/clientarea.php
3.046
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 24 Jan 2023 13:26:56 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

• https://54.194.129.212/
54.194.129.212
302
https://my.freenom.com/clientarea.php
3.057
N
Certificate error: RemoteCertificateNameMismatch
Date: Tue, 24 Jan 2023 13:26:53 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 0
Connection: close
Server: Apache/2.4.10 (Debian)
Location: /clientarea.php

7. Comments


1. General Results, most used to calculate the result

Aname "my.freenom.com" is subdomain, public suffix is ".com", top-level-domain is ".com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .com-domains preloaded: 83852 (complete: 216710)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: my.freenom.com has 3 different ip addresses (authoritative).
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: my.freenom.com has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://my.freenom.com/ 52.18.152.219
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
Ahttps://my.freenom.com/ 54.194.129.212
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
Ahttps://my.freenom.com/ 99.81.236.120
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
Ahttps://52.18.152.219/ 52.18.152.219
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
Ahttps://54.194.129.212/ 54.194.129.212
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
Ahttps://99.81.236.120/ 99.81.236.120
302
https://my.freenom.com/clientarea.php
Correct redirect https to https
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://my.freenom.com/clientarea.php
302

Missing HSTS-Header
Bhttps://my.freenom.com/ 52.18.152.219
302

Missing HSTS-Header
Bhttps://my.freenom.com/ 54.194.129.212
302

Missing HSTS-Header
Bhttps://my.freenom.com/ 99.81.236.120
302

Missing HSTS-Header
http://my.freenom.com/clientarea.php
302
WHMCSZH5eHTGhfvzP=09o7df79n9kdtdimt3gdu9e1c5; path=/; HttpOnly
Fatal: Cookie sent via http. Never send Cookies / Session-Cookies via http. If a user uses an insecure WLan and if the same cookie is used to managed the authenticated session, it's possible to hack that user. Same with HttpOnly - without https that's only decorative.
Bhttps://my.freenom.com/clientarea.php
302
WHMCSZH5eHTGhfvzP=4e3aj7tdgcvj94en4kid8fa5u1; path=/; HttpOnly
Cookie sent via https, but not marked as secure
Bhttp://my.freenom.com/clientarea.php
302
WHMCSZH5eHTGhfvzP=09o7df79n9kdtdimt3gdu9e1c5; path=/; HttpOnly
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
Bhttps://my.freenom.com/clientarea.php
302
WHMCSZH5eHTGhfvzP=4e3aj7tdgcvj94en4kid8fa5u1; path=/; HttpOnly
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
CError - no version with Http-Status 200
Dhttp://my.freenom.com/ 52.18.152.219
302
http://my.freenom.com/clientarea.php
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://my.freenom.com/ 54.194.129.212
302
http://my.freenom.com/clientarea.php
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://my.freenom.com/ 99.81.236.120
302
http://my.freenom.com/clientarea.php
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
HFatal error: No https - result with http-status 200, no encryption
Lhttp://my.freenom.com/clientarea.php
302
http://my.freenom.com/clientarea.php
Error direct loop
Lhttps://my.freenom.com/clientarea.php
302
https://my.freenom.com/clientarea.php
Error direct loop
Nhttps://52.18.152.219/ 52.18.152.219
302
https://my.freenom.com/clientarea.php
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://54.194.129.212/ 54.194.129.212
302
https://my.freenom.com/clientarea.php
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://99.81.236.120/ 99.81.236.120
302
https://my.freenom.com/clientarea.php
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Omy.freenom.com / 52.18.152.219 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Omy.freenom.com / 54.194.129.212 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
Omy.freenom.com / 99.81.236.120 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain my.freenom.com, 3 ip addresses.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain my.freenom.com, 3 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.my.freenom.com

2. Header-Checks (alpha, started 2022-10-23, may be buggy / incomplete)

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns01.freenom.com (54.171.131.39), ns02.freenom.com (52.19.156.76), ns03.freenom.com (104.155.27.112), ns04.freenom.com (104.155.29.241)
AGood (1 - 3.0):: An average of 0.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 4 Name Servers included in Delegation: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 4 Name Servers included in 1 Zone definitions: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com, 1 Name Servers listed in SOA.Primary: ns01.freenom.com.
AGood: Only one SOA.Primary Name Server found.: ns01.freenom.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns01.freenom.com.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 4 Name Servers, 3 different subnets (first Byte): 104., 52., 54., 3 different subnets (first two Bytes): 104.155., 52.19., 54.171., 4 different subnets (first three Bytes): 104.155.27., 104.155.29., 52.19.156., 54.171.131.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns01.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns02.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns03.freenom.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns04.freenom.com
Nameserver doesn't pass all EDNS-Checks: dns-external-master.amazon.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns01.freenom.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns01.freenom.com / 54.171.131.39: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns02.freenom.com / 52.19.156.76: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns03.freenom.com / 104.155.27.112: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns04.freenom.com / 104.155.29.241: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 381397 milliseconds, 381.397 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
my.freenom.com
my.freenom.com
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
my.freenom.com
my.freenom.com
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


my.freenom.com
52.18.152.219
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

my.freenom.com
52.18.152.219
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


my.freenom.com
54.194.129.212
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

my.freenom.com
54.194.129.212
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


my.freenom.com
99.81.236.120
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

my.freenom.com
99.81.236.120
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


52.18.152.219
52.18.152.219
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

52.18.152.219
52.18.152.219
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


99.81.236.120
99.81.236.120
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

99.81.236.120
99.81.236.120
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


54.194.129.212
54.194.129.212
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok

54.194.129.212
54.194.129.212
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates
1CN=my.freenom.com

2CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, C=US, ST=New Jersey

4CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, C=GB, ST=Greater Manchester


9. Certificates

1.
1.
CN=my.freenom.com
19.04.2022
30.04.2023
expires in 89 days
my.freenom.com, www.my.freenom.com - 2 entries
1.
1.
CN=my.freenom.com
19.04.2022

30.04.2023
expires in 89 days
my.freenom.com, www.my.freenom.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0093EEBF2F268F852FF74A3FAADA733D43
Thumbprint:D8435000B93C3E71D0B9BD3CE87D9B36D76EFE7C
SHA256 / Certificate:NvTnV2epYhvtKpLCHu/kli18R0MgLiLWnf8v0DBltKg=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):83cd448b517400b532d83e4a6a42ff04863dab7138a464fcc992f62108141540
SHA256 hex / Subject Public Key Information (SPKI):83cd448b517400b532d83e4a6a42ff04863dab7138a464fcc992f62108141540 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=my.freenom.com
19.04.2022
30.04.2023
expires in 89 days
my.freenom.com, www.my.freenom.com - 2 entries

2.
CN=my.freenom.com
19.04.2022

30.04.2023
expires in 89 days
my.freenom.com, www.my.freenom.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0093EEBF2F268F852FF74A3FAADA733D43
Thumbprint:D8435000B93C3E71D0B9BD3CE87D9B36D76EFE7C
SHA256 / Certificate:NvTnV2epYhvtKpLCHu/kli18R0MgLiLWnf8v0DBltKg=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):83cd448b517400b532d83e4a6a42ff04863dab7138a464fcc992f62108141540
SHA256 hex / Subject Public Key Information (SPKI):83cd448b517400b532d83e4a6a42ff04863dab7138a464fcc992f62108141540 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.sectigo.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2892 days


3.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2892 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018
01.01.2031
expires in 2892 days


4.
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, S=Greater Manchester, C=GB
02.11.2018

01.01.2031
expires in 2892 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:7D5B5126B476BA11DB74160BBC530DA7
Thumbprint:33E4E80807204C2B6182A3A14B591ACD25B5F0DB
SHA256 / Certificate:f6T/aOwEqZ11KNUIX5SQf00d0cU4G6zcgy7VyWAhRnY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SHA256 hex / Subject Public Key Information (SPKI):e1ae9c3de848ece1ba72e0d991ae4d0d9ec547c6bad1dddab9d6beb0a7e0e0d8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 5467 days


5.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 5467 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019
01.01.2029
expires in 2162 days


6.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
12.03.2019

01.01.2029
expires in 2162 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:3972443AF922B751D7D36C10DD313595
Thumbprint:D89E3BD43D5D909B47A18977AA9D5CE36CEE184C
SHA256 / Certificate:aLnHYSGaWx8BMXhEdGZdthu9sQngDwXKn3QkTuX19Ss=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004
01.01.2029
expires in 2162 days


7.
CN=AAA Certificate Services, O=Comodo CA Limited, L=Salford, S=Greater Manchester, C=GB
01.01.2004

01.01.2029
expires in 2162 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:D1EB23A46D17D68FD92564C2F1F1601764D8E349
SHA256 / Certificate:16eg+11+JzHXcelITrze9x1fDD4KKUh4K8g+4OppnvQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SHA256 hex / Subject Public Key Information (SPKI):bd153ed7b0434f6886b17bce8bbe84ed340c7132d702a8f4fa318f756ecbd6f3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
2

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3642980955
leaf cert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2022-04-19 00:00:00
2023-04-29 23:59:59
my.freenom.com, www.my.freenom.com - 2 entries


2494122580
leaf cert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2021-04-29 00:00:00
2022-04-29 23:59:59
my.freenom.com, www.my.freenom.com - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
6573954474
precert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2022-04-18 22:00:00
2023-04-29 21:59:59
my.freenom.com, www.my.freenom.com
2 entries


4449263435
leaf cert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2021-04-28 22:00:00
2022-04-29 21:59:59
my.freenom.com, www.my.freenom.com
2 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns01.freenom.com, ns02.freenom.com, ns03.freenom.com, ns04.freenom.com

QNr.DomainTypeNS used
1
com
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns01.freenom.com: 54.171.131.39
NS
b.gtld-servers.net (2001:503:231d::2:30)

Answer: ns02.freenom.com
52.19.156.76

Answer: ns03.freenom.com
104.155.27.112

Answer: ns04.freenom.com
104.155.29.241


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com
0

no CAA entry found
1
0
eu-west-1.elb.amazonaws.com
0

no CAA entry found
1
0
elb.amazonaws.com
0

no CAA entry found
1
0
my.freenom.com



1
0
amazonaws.com
0

no CAA entry found
1
0
freenom.com
0

no CAA entry found
1
0
com
0

no CAA entry found
1
0

0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
freenom.com
v=spf1 ip4:93.190.234.74/31 ip4:93.190.234.75/31 ip4:209.126.180.53 ip4:209.126.180.52 ip4:93.190.234.74 a include:spf.mail.isp api.net a include:mail.ispapi.net a mx ip4:64.50.144.0/20 ~all
ok
1
0
my.freenom.com


1
0
_acme-challenge.my.freenom.com

Name Error - The domain name does not exist
1
0
_acme-challenge.my.freenom.com.freenom.com

Name Error - The domain name does not exist
1
0
_acme-challenge.my.freenom.com.my.freenom.com

Name Error - The domain name does not exist
1
0
_acme-challenge.lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com

Name Error - The domain name does not exist
1
0
_acme-challenge.lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com.lb-my-freenom-com-vpc-2022-1373795610.eu-west-1.elb.amazonaws.com

Name Error - The domain name does not exist
1
0


15. DomainService - Entries (SSHFP Check is new - 2022-09-24, may be incomplete, alpha, some results are required)

No DomainServiceEntries entries found



16. Cipher Suites

DomainIPPortCipher (OpenSsl / IANA)
my.freenom.com
52.18.152.219
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
12 Ciphers, 62.88 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1

54.194.129.212
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
12 Ciphers, 63.36 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1

99.81.236.120
443
ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS
12 Ciphers, 61.52 sec
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
ECDH
RSA
AESGCM(256)
AEAD



ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
ECDH
RSA
AESGCM(128)
AEAD



ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
ECDH
RSA
AES(256)
SHA384



AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384
RSA
RSA
AESGCM(256)
AEAD



AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256
RSA
RSA
AES(256)
SHA256



ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
ECDH
RSA
AES(128)
SHA256



AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256
RSA
RSA
AESGCM(128)
AEAD



AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256
RSA
RSA
AES(128)
SHA256



ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
ECDH
RSA
AES(256)
SHA1



ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
ECDH
RSA
AES(128)
SHA1



AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA
RSA
RSA
AES(256)
SHA1



AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA
RSA
RSA
AES(128)
SHA1


17. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.



Permalink: https://check-your-website.server-daten.de/?i=3183c3a2-32bc-4c40-9995-a222d200c83d


Last Result: https://check-your-website.server-daten.de/?q=my.freenom.com - 2023-01-24 14:24:24


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=my.freenom.com" target="_blank">Check this Site: my.freenom.com</a>

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro