Check DNS, Urls + Redirects, Certificates and Content of your Website



L

Loop - it's impossible to use this site

Checked:
25.11.2021 12:20:32


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
mylms.smktelkom-pwt.sch.id
A
103.55.38.180
Cicurug/West Java/Indonesia (ID) - PT Cloud Hosting Indonesia
No Hostname found
yes
1
0

AAAA

yes


www.mylms.smktelkom-pwt.sch.id

Name Error
yes
1
0
*.smktelkom-pwt.sch.id
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.mylms.smktelkom-pwt.sch.id
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14748, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2021, 00:00:00 +, Signature-Inception: 20.11.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: id
id
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 26887, DigestType 2 and Digest KL4iADoa+x7Zp7uCSCJ04ttfCabFBwLHMeBA0iVzR+o=



1 RRSIG RR to validate DS RR found



RRSIG-Owner id., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.12.2021, 05:00:00 +, Signature-Inception: 25.11.2021, 04:00:00 +, KeyTag 14748, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14748 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 22449, Flags 256



Public Key with Algorithm 8, KeyTag 26887, Flags 257 (SEP = Secure Entry Point)



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner id., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.12.2021, 12:45:53 +, Signature-Inception: 13.11.2021, 12:33:39 +, KeyTag 22449, Signer-Name: id



RRSIG-Owner id., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.12.2021, 12:45:53 +, Signature-Inception: 13.11.2021, 12:33:39 +, KeyTag 26887, Signer-Name: id



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22449 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26887 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26887, DigestType 2 and Digest "KL4iADoa+x7Zp7uCSCJ04ttfCabFBwLHMeBA0iVzR+o=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: sch.id
sch.id
1 DS RR in the parent zone found



DS with Algorithm 10, KeyTag 22371, DigestType 2 and Digest Pd+gMVJikmY18W/R2a5hra2jLCpuP8vtV6X8a5NLGXA=



1 RRSIG RR to validate DS RR found



RRSIG-Owner sch.id., Algorithm: 8, 2 Labels, original TTL: 13300 sec, Signature-expiration: 04.12.2021, 19:06:05 +, Signature-Inception: 04.11.2021, 18:38:12 +, KeyTag 22449, Signer-Name: id



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22449 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 10, KeyTag 22371, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 10, KeyTag 58757, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner sch.id., Algorithm: 10, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.12.2021, 15:41:53 +, Signature-Inception: 13.11.2021, 14:48:21 +, KeyTag 22371, Signer-Name: sch.id



RRSIG-Owner sch.id., Algorithm: 10, 2 Labels, original TTL: 86400 sec, Signature-expiration: 13.12.2021, 15:41:53 +, Signature-Inception: 13.11.2021, 14:48:21 +, KeyTag 58757, Signer-Name: sch.id



Status: Good - Algorithmus 10 and DNSKEY with KeyTag 22371 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 10 and DNSKEY with KeyTag 58757 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 10, KeyTag 22371, DigestType 2 and Digest "Pd+gMVJikmY18W/R2a5hra2jLCpuP8vtV6X8a5NLGXA=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: smktelkom-pwt.sch.id
smktelkom-pwt.sch.id
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "smktelkom-pwt.sch.id" and the NextOwner "smktelkom-sda.sch.id". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC



0 DNSKEY RR found




Zone: mylms.smktelkom-pwt.sch.id
mylms.smktelkom-pwt.sch.id
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.mylms.smktelkom-pwt.sch.id
www.mylms.smktelkom-pwt.sch.id
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.mylms.smktelkom-pwt.sch.id
  andy.ns.cloudflare.com

mylms.smktelkom-pwt.sch.id
  andy.ns.cloudflare.com / 20m627
108.162.193.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
172.64.33.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
173.245.59.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
2606:4700:58::adf5:3b65
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c165
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:2165
London/England/United Kingdom (GB) - CloudFLARENET-EU

smktelkom-pwt.sch.id
  andy.ns.cloudflare.com / 20m685
108.162.193.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
172.64.33.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
173.245.59.101
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
2606:4700:58::adf5:3b65
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c165
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:2165
London/England/United Kingdom (GB) - CloudFLARENET-EU


  vita.ns.cloudflare.com / 20m438
108.162.192.238
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
172.64.32.238
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
173.245.58.238
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
2606:4700:50::adf5:3aee
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c0ee
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:20ee
London/England/United Kingdom (GB) - CloudFLARENET-EU

sch.id
  b.dns.id
103.19.179.179
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


 
2402:ee80:b::b
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


  c.dns.id
103.19.178.178
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


 
2402:ee80:c::c
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


  d.dns.id
45.126.57.57
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


 
2402:ee80:d::d
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


  e.dns.id
103.19.177.177
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia


 
2001:df5:4000:4::4
Pagedangan/West Java/Indonesia (ID) - Pengelola Nama Domain Internet Indonesia

id
  b.dns.id


  c.dns.id


  d.dns.id


  e.dns.id


  ns4.apnic.net


4. SOA-Entries


Domain:id
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:5


Domain:sch.id
Zone-Name:sch.id
Primary:b.dns.id
Mail:hostmaster.pandi.id
Serial:2019979551
Refresh:28800
Retry:7200
Expire:604800
TTL:172800
num Entries:2


Domain:sch.id
Zone-Name:sch.id
Primary:b.dns.id
Mail:hostmaster.pandi.id
Serial:2019979552
Refresh:28800
Retry:7200
Expire:604800
TTL:172800
num Entries:6


Domain:smktelkom-pwt.sch.id
Zone-Name:smktelkom-pwt.sch.id
Primary:andy.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2263054807
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:12


Domain:mylms.smktelkom-pwt.sch.id
Zone-Name:smktelkom-pwt.sch.id
Primary:andy.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2263054807
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:6


Domain:www.mylms.smktelkom-pwt.sch.id
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://mylms.smktelkom-pwt.sch.id/
103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id/
Html is minified: 100.00 %
0.417
A
Date: Thu, 25 Nov 2021 11:24:02 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id/
Content-Length: 335
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://mylms.smktelkom-pwt.sch.id/
103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id
Html is minified: 100.00 %
5.207
B
Date: Thu, 25 Nov 2021 11:24:03 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id
Content-Length: 335
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://mylms.smktelkom-pwt.sch.id

301
https://mylms.smktelkom-pwt.sch.id
Html is minified: 100.00 %
4.180
L
Date: Thu, 25 Nov 2021 11:24:15 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id
Content-Length: 335
Connection: close
Content-Type: text/html; charset=iso-8859-1

• http://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
103.55.38.180
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
0.403
A
Visible Content: Moved Permanently The document has moved here . Apache/2.4.38 (Debian) Server at mylms.smktelkom-pwt.sch.id Port 80
Date: Thu, 25 Nov 2021 11:24:08 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 404
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://mylms.smktelkom-pwt.sch.id.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
4.186
A
Visible Content: Moved Permanently The document has moved here . Apache/2.4.38 (Debian) Server at mylms.smktelkom-pwt.sch.id Port 443
Date: Thu, 25 Nov 2021 11:24:20 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Content-Length: 404
Connection: close
Content-Type: text/html; charset=iso-8859-1

• https://mylms.smktelkom-pwt.sch.id.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

-1

0.034
R
NameResolutionFailure - The remote name could not be resolved: 'mylms.smktelkom-pwt.sch.id.well-known'
Visible Content:

• https://103.55.38.180/
103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id
Html is minified: 100.00 %
4.940
N
Certificate error: RemoteCertificateNameMismatch
Date: Thu, 25 Nov 2021 11:24:09 GMT
Server: Apache/2.4.38 (Debian)
Location: https://mylms.smktelkom-pwt.sch.id
Content-Length: 322
Connection: close
Content-Type: text/html; charset=iso-8859-1

7. Comments


1. General Results, most used to calculate the result

Aname "mylms.smktelkom-pwt.sch.id" is subdomain, public suffix is ".sch.id", top-level-domain is ".id", top-level-domain-type is "country-code", Country is Indonesia, tld-manager is "Perkumpulan Pengelola Nama Domain Internet Indonesia (PANDI)", num .id-domains preloaded: 324 (complete: 168171)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: mylms.smktelkom-pwt.sch.id has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: mylms.smktelkom-pwt.sch.id has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://mylms.smktelkom-pwt.sch.id/ 103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id
correct redirect https to https
Ahttps://103.55.38.180/ 103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id
correct redirect https to https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Ahttp://mylms.smktelkom-pwt.sch.id/ 103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id/
correct redirect http - https with the same domain name
Bhttps://mylms.smktelkom-pwt.sch.id
301

Missing HSTS-Header
Bhttps://mylms.smktelkom-pwt.sch.id/ 103.55.38.180
301

Missing HSTS-Header
Bhttps://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
301

Missing HSTS-Header
CError - no version with Http-Status 200
Hfatal error: No https - result with http-status 200, no encryption
Lhttps://mylms.smktelkom-pwt.sch.id
301
https://mylms.smktelkom-pwt.sch.id
Error direct loop
Nhttps://103.55.38.180/ 103.55.38.180
301
https://mylms.smktelkom-pwt.sch.id
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nmylms.smktelkom-pwt.sch.id:10000


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N103.55.38.180:10000


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Rhttps://mylms.smktelkom-pwt.sch.id/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
301
https://mylms.smktelkom-pwt.sch.id.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
redirect to not existing domain
XFatal error: Nameserver doesn't support TCP connection: b.dns.id / 103.19.179.179: Timeout
XFatal error: Nameserver doesn't support TCP connection: b.dns.id / 2402:ee80:b::b: Timeout
XFatal error: Nameserver doesn't support TCP connection: c.dns.id / 103.19.178.178: Timeout
XFatal error: Nameserver doesn't support TCP connection: c.dns.id / 2402:ee80:c::c: Timeout
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain mylms.smktelkom-pwt.sch.id, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 7 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 7 Queries complete, 7 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: andy.ns.cloudflare.com, vita.ns.cloudflare.com, 2 Name Servers included in Delegation: andy.ns.cloudflare.com, vita.ns.cloudflare.com, 2 Name Servers included in 1 Zone definitions: andy.ns.cloudflare.com, vita.ns.cloudflare.com, 1 Name Servers listed in SOA.Primary: andy.ns.cloudflare.com.
AGood: Only one SOA.Primary Name Server found.: andy.ns.cloudflare.com.
AGood: SOA.Primary Name Server included in the delegation set.: andy.ns.cloudflare.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: andy.ns.cloudflare.com, vita.ns.cloudflare.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: cloudflare.com
AGood: Name servers with different Country locations found: 2 Name Servers, 4 Countries: CA, CR, GB, US
AInfo: Ipv4-Subnet-list: 6 Name Servers, 3 different subnets (first Byte): 108., 172., 173., 3 different subnets (first two Bytes): 108.162., 172.64., 173.245., 6 different subnets (first three Bytes): 108.162.192., 108.162.193., 172.64.32., 172.64.33., 173.245.58., 173.245.59.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 6 Name Servers with IPv6, 3 different subnets (first block): 2606:, 2803:, 2a06:, 3 different subnets (first two blocks): 2606:4700:, 2803:f800:, 2a06:98c1:, 4 different subnets (first three blocks): 2606:4700:0050:, 2606:4700:0058:, 2803:f800:0050:, 2a06:98c1:0050:, 4 different subnets (first four blocks): 2606:4700:0050:0000:, 2606:4700:0058:0000:, 2803:f800:0050:0000:, 2a06:98c1:0050:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 6 good Nameserver
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 6 good Nameserver
Nameserver doesn't pass all EDNS-Checks: andy.ns.cloudflare.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: b.dns.id: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: c.dns.id: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: d.dns.id: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: e.dns.id: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns4.apnic.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

https://mylms.smktelkom-pwt.sch.id.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
-1

Fatal: Check of /.well-known/acme-challenge/random-filename redirects to not-existing domain. Creating a Letsencrypt certificate via http-01 challenge can't work. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 262190 milliseconds, 262.190 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
mylms.smktelkom-pwt.sch.id
mylms.smktelkom-pwt.sch.id
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
mylms.smktelkom-pwt.sch.id
mylms.smktelkom-pwt.sch.id
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0


mylms.smktelkom-pwt.sch.id
103.55.38.180
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

mylms.smktelkom-pwt.sch.id
103.55.38.180
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0


103.55.38.180
103.55.38.180
443
name does not match
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

103.55.38.180
103.55.38.180
443
name does not match
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0


mylms.smktelkom-pwt.sch.id
mylms.smktelkom-pwt.sch.id
10000
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

mylms.smktelkom-pwt.sch.id
mylms.smktelkom-pwt.sch.id
10000
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=*, O=Webmin Webserver on ServerLMS, emailAddress=root@ServerLMS


103.55.38.180
103.55.38.180
10000
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

103.55.38.180
103.55.38.180
10000
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Self signed certificate
1CN=*, O=Webmin Webserver on ServerLMS, emailAddress=root@ServerLMS


9. Certificates

1.
1.
CN=mylms.smktelkom-pwt.sch.id
24.11.2021
22.02.2022
expires in 78 days
mylms.smktelkom-pwt.sch.id - 1 entry
1.
1.
CN=mylms.smktelkom-pwt.sch.id
24.11.2021

22.02.2022
expires in 78 days
mylms.smktelkom-pwt.sch.id - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:037DCC959CDE51DAEB1EA6C79A54CA702C98
Thumbprint:BC681286293618BCFE403CDD8672452E37468C12
SHA256 / Certificate:NObDsMVgbYgjOwCkdybafjbGVJAmMLmO4wBo5eqyXD8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):fc56c2943d7218a5a42dc25b90c367dc944d65483355a62a06b1a45e96a72a05
SHA256 hex / Subject Public Key Information (SPKI):fc56c2943d7218a5a42dc25b90c367dc944d65483355a62a06b1a45e96a72a05 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1379 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1379 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4928 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4928 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
E=root@ServerLMS, CN=*, O=Webmin Webserver on ServerLMS
29.08.2021
28.08.2026
expires in 1726 days

2.
1.
E=root@ServerLMS, CN=*, O=Webmin Webserver on ServerLMS
29.08.2021

28.08.2026
expires in 1726 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:7FE4D93F854FD1F98B44909C47E1A402142ED6E6
Thumbprint:E48AEF3A91162B86A5BCD3FDCAEB8C405BEF1416
SHA256 / Certificate:LMnW8S10EfNNZGZ0fTme2mLpBNK+c7UOJKBaWgLsanQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):be14b4f32593fa9c99a2e4a89c5df7e997e2e5fa4f26eac19f641b575f4479c8
SHA256 hex / Subject Public Key Information (SPKI):be14b4f32593fa9c99a2e4a89c5df7e997e2e5fa4f26eac19f641b575f4479c8 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3153938383
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-11-24 22:51:46
2022-02-22 22:51:45
mylms.smktelkom-pwt.sch.id - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
4
CN=R3, O=Let's Encrypt, C=US
0 /0 new
1
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
5673271178
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-11-24 21:51:46
2022-02-22 21:51:45
mylms.smktelkom-pwt.sch.id
1 entries


3947237313
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-01-18 17:46:21
2021-04-18 16:46:21
mylms.smktelkom-pwt.sch.id
1 entries


3668082661
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-11-19 09:00:38
2021-02-17 09:00:38
mylms.smktelkom-pwt.sch.id
1 entries


3401682126
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-09-19 16:05:41
2020-12-18 17:05:41
mylms.smktelkom-pwt.sch.id
1 entries


3248776773
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-08-16 09:11:42
2020-11-14 10:11:42
mylms.smktelkom-pwt.sch.id
1 entries


3118221702
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-07-21 07:46:18
2020-10-19 07:46:18
mylms.smktelkom-pwt.sch.id
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: andy.ns.cloudflare.com, vita.ns.cloudflare.com

QNr.DomainTypeNS used
1
com
NS
b.root-servers.net (2001:500:200::b)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
andy.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
3
vita.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
4
andy.ns.cloudflare.com: 108.162.193.101, 172.64.33.101, 173.245.59.101
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
5
andy.ns.cloudflare.com: 2606:4700:58::adf5:3b65, 2803:f800:50::6ca2:c165, 2a06:98c1:50::ac40:2165
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
6
vita.ns.cloudflare.com: 108.162.192.238, 172.64.32.238, 173.245.58.238
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
7
vita.ns.cloudflare.com: 2606:4700:50::adf5:3aee, 2803:f800:50::6ca2:c0ee, 2a06:98c1:50::ac40:20ee
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
mylms.smktelkom-pwt.sch.id
0

no CAA entry found
1
0
smktelkom-pwt.sch.id
0

no CAA entry found
1
0
sch.id
0

no CAA entry found
1
0
id
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
smktelkom-pwt.sch.id

ok
1
0
mylms.smktelkom-pwt.sch.id

ok
1
0
_acme-challenge.mylms.smktelkom-pwt.sch.id

Name Error - The domain name does not exist
1
0
_acme-challenge.mylms.smktelkom-pwt.sch.id.smktelkom-pwt.sch.id

Name Error - The domain name does not exist
1
0
_acme-challenge.mylms.smktelkom-pwt.sch.id.mylms.smktelkom-pwt.sch.id

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
mylms.smktelkom-pwt.sch.id
21
FTP



mylms.smktelkom-pwt.sch.id
21
FTP



mylms.smktelkom-pwt.sch.id
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2

mylms.smktelkom-pwt.sch.id
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2

mylms.smktelkom-pwt.sch.id
25
SMTP



mylms.smktelkom-pwt.sch.id
25
SMTP



mylms.smktelkom-pwt.sch.id
53
DNS



mylms.smktelkom-pwt.sch.id
53
DNS



mylms.smktelkom-pwt.sch.id
110
POP3



mylms.smktelkom-pwt.sch.id
110
POP3



mylms.smktelkom-pwt.sch.id
143
IMAP



mylms.smktelkom-pwt.sch.id
143
IMAP



mylms.smktelkom-pwt.sch.id
465
SMTP (encrypted)



mylms.smktelkom-pwt.sch.id
465
SMTP (encrypted)



mylms.smktelkom-pwt.sch.id
587
SMTP (encrypted, submission)



mylms.smktelkom-pwt.sch.id
587
SMTP (encrypted, submission)



mylms.smktelkom-pwt.sch.id
993
IMAP (encrypted)



mylms.smktelkom-pwt.sch.id
993
IMAP (encrypted)



mylms.smktelkom-pwt.sch.id
995
POP3 (encrypted)



mylms.smktelkom-pwt.sch.id
995
POP3 (encrypted)



mylms.smktelkom-pwt.sch.id
1433
MS SQL



mylms.smktelkom-pwt.sch.id
1433
MS SQL



mylms.smktelkom-pwt.sch.id
2082
cPanel (http)



mylms.smktelkom-pwt.sch.id
2082
cPanel (http)



mylms.smktelkom-pwt.sch.id
2083
cPanel (https)



mylms.smktelkom-pwt.sch.id
2083
cPanel (https)



mylms.smktelkom-pwt.sch.id
2086
WHM (http)



mylms.smktelkom-pwt.sch.id
2086
WHM (http)



mylms.smktelkom-pwt.sch.id
2087
WHM (https)



mylms.smktelkom-pwt.sch.id
2087
WHM (https)



mylms.smktelkom-pwt.sch.id
2089
cPanel Licensing



mylms.smktelkom-pwt.sch.id
2089
cPanel Licensing



mylms.smktelkom-pwt.sch.id
2095
cPanel Webmail (http)



mylms.smktelkom-pwt.sch.id
2095
cPanel Webmail (http)



mylms.smktelkom-pwt.sch.id
2096
cPanel Webmail (https)



mylms.smktelkom-pwt.sch.id
2096
cPanel Webmail (https)



mylms.smktelkom-pwt.sch.id
2222
DirectAdmin (http)



mylms.smktelkom-pwt.sch.id
2222
DirectAdmin (http)



mylms.smktelkom-pwt.sch.id
2222
DirectAdmin (https)



mylms.smktelkom-pwt.sch.id
2222
DirectAdmin (https)



mylms.smktelkom-pwt.sch.id
3306
mySql



mylms.smktelkom-pwt.sch.id
3306
mySql



mylms.smktelkom-pwt.sch.id
5224
Plesk Licensing



mylms.smktelkom-pwt.sch.id
5224
Plesk Licensing



mylms.smktelkom-pwt.sch.id
5432
PostgreSQL



mylms.smktelkom-pwt.sch.id
5432
PostgreSQL



mylms.smktelkom-pwt.sch.id
8080
Ookla Speedtest (http)



mylms.smktelkom-pwt.sch.id
8080
Ookla Speedtest (http)



mylms.smktelkom-pwt.sch.id
8080
Ookla Speedtest (https)



mylms.smktelkom-pwt.sch.id
8080
Ookla Speedtest (https)



mylms.smktelkom-pwt.sch.id
8083
VestaCP http



mylms.smktelkom-pwt.sch.id
8083
VestaCP http



mylms.smktelkom-pwt.sch.id
8083
VestaCP https



mylms.smktelkom-pwt.sch.id
8083
VestaCP https



mylms.smktelkom-pwt.sch.id
8443
Plesk Administration (https)



mylms.smktelkom-pwt.sch.id
8443
Plesk Administration (https)



mylms.smktelkom-pwt.sch.id
8447
Plesk Installer + Updates



mylms.smktelkom-pwt.sch.id
8447
Plesk Installer + Updates



mylms.smktelkom-pwt.sch.id
8880
Plesk Administration (http)



mylms.smktelkom-pwt.sch.id
8880
Plesk Administration (http)



mylms.smktelkom-pwt.sch.id
10000
Webmin (http)
open
http://mylms.smktelkom-pwt.sch.id:10000/
Http-Status: 200

mylms.smktelkom-pwt.sch.id
10000
Webmin (http)
open
http://mylms.smktelkom-pwt.sch.id:10000/
Http-Status: 200

mylms.smktelkom-pwt.sch.id
10000
Webmin (https)
open
https://mylms.smktelkom-pwt.sch.id:10000/
Http-Status: 200
Certificate is invalid
mylms.smktelkom-pwt.sch.id
10000
Webmin (https)
open
https://mylms.smktelkom-pwt.sch.id:10000/
Http-Status: 200
Certificate is invalid
103.55.38.180
21
FTP



103.55.38.180
21
FTP



103.55.38.180
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2

103.55.38.180
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2

103.55.38.180
25
SMTP



103.55.38.180
25
SMTP



103.55.38.180
53
DNS



103.55.38.180
53
DNS



103.55.38.180
110
POP3



103.55.38.180
110
POP3



103.55.38.180
143
IMAP



103.55.38.180
143
IMAP



103.55.38.180
465
SMTP (encrypted)



103.55.38.180
465
SMTP (encrypted)



103.55.38.180
587
SMTP (encrypted, submission)



103.55.38.180
587
SMTP (encrypted, submission)



103.55.38.180
993
IMAP (encrypted)



103.55.38.180
993
IMAP (encrypted)



103.55.38.180
995
POP3 (encrypted)



103.55.38.180
995
POP3 (encrypted)



103.55.38.180
1433
MS SQL



103.55.38.180
1433
MS SQL



103.55.38.180
2082
cPanel (http)



103.55.38.180
2082
cPanel (http)



103.55.38.180
2083
cPanel (https)



103.55.38.180
2083
cPanel (https)



103.55.38.180
2086
WHM (http)



103.55.38.180
2086
WHM (http)



103.55.38.180
2087
WHM (https)



103.55.38.180
2087
WHM (https)



103.55.38.180
2089
cPanel Licensing



103.55.38.180
2089
cPanel Licensing



103.55.38.180
2095
cPanel Webmail (http)



103.55.38.180
2095
cPanel Webmail (http)



103.55.38.180
2096
cPanel Webmail (https)



103.55.38.180
2096
cPanel Webmail (https)



103.55.38.180
2222
DirectAdmin (http)



103.55.38.180
2222
DirectAdmin (http)



103.55.38.180
2222
DirectAdmin (https)



103.55.38.180
2222
DirectAdmin (https)



103.55.38.180
3306
mySql



103.55.38.180
3306
mySql



103.55.38.180
5224
Plesk Licensing



103.55.38.180
5224
Plesk Licensing



103.55.38.180
5432
PostgreSQL



103.55.38.180
5432
PostgreSQL



103.55.38.180
8080
Ookla Speedtest (http)



103.55.38.180
8080
Ookla Speedtest (http)



103.55.38.180
8080
Ookla Speedtest (https)



103.55.38.180
8080
Ookla Speedtest (https)



103.55.38.180
8083
VestaCP http



103.55.38.180
8083
VestaCP http



103.55.38.180
8083
VestaCP https



103.55.38.180
8083
VestaCP https



103.55.38.180
8443
Plesk Administration (https)



103.55.38.180
8443
Plesk Administration (https)



103.55.38.180
8447
Plesk Installer + Updates



103.55.38.180
8447
Plesk Installer + Updates



103.55.38.180
8880
Plesk Administration (http)



103.55.38.180
8880
Plesk Administration (http)



103.55.38.180
10000
Webmin (http)
open
http://103.55.38.180:10000/
Http-Status: 200

103.55.38.180
10000
Webmin (http)
open
http://103.55.38.180:10000/
Http-Status: 200

103.55.38.180
10000
Webmin (https)
open
https://103.55.38.180:10000/
Http-Status: 200
Certificate is invalid
103.55.38.180
10000
Webmin (https)
open
https://103.55.38.180:10000/
Http-Status: 200
Certificate is invalid



Permalink: https://check-your-website.server-daten.de/?i=43eb0871-63d7-4026-89dd-ffa1da10ecc4


Last Result: https://check-your-website.server-daten.de/?q=mylms.smktelkom-pwt.sch.id - 2021-11-25 12:20:32


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=mylms.smktelkom-pwt.sch.id" target="_blank">Check this Site: mylms.smktelkom-pwt.sch.id</a>