Check DNS, Urls + Redirects, Certificates and Content of your Website



E

Wrong redirect http ⇒ https with new domain name

Checked:
01.10.2021 12:29:09


Older results


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
npi.pe
A
52.72.49.79
Ashburn/Virginia/United States (US) - Amazon.com, Inc.
Hostname: visit.rebrand.ly
yes
1
0

AAAA

yes


www.npi.pe

Name Error
yes
1
0
*.npi.pe
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14748, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 26838, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 10.10.2021, 00:00:00 +, Signature-Inception: 19.09.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: pe
pe
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 7981, DigestType 2 and Digest fEsSwNkWaUcYExx7dgdWE5P7huKjFZznp06p4pr7JvM=



1 RRSIG RR to validate DS RR found



RRSIG-Owner pe., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 13.10.2021, 20:00:00 +, Signature-Inception: 30.09.2021, 19:00:00 +, KeyTag 26838, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 7981, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 37239, Flags 256



2 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner pe., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 31.10.2021, 08:50:11 +, Signature-Inception: 01.10.2021, 08:50:11 +, KeyTag 7981, Signer-Name: pe



RRSIG-Owner pe., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 31.10.2021, 08:50:11 +, Signature-Inception: 01.10.2021, 08:50:11 +, KeyTag 37239, Signer-Name: pe



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 7981 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 37239 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 7981, DigestType 2 and Digest "fEsSwNkWaUcYExx7dgdWE5P7huKjFZznp06p4pr7JvM=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: npi.pe
npi.pe
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "2081gg2gje16280anbp7ah423ipjmi97" between the hashed NSEC3-owner "0v9dcstvb3fuehsomn03d70pef46uc3f" and the hashed NextOwner "22cjf625ctoc1afgfmvs3v4a5n1h07d7". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 0v9dcstvb3fuehsomn03d70pef46uc3f.pe., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.10.2021, 08:50:11 +, Signature-Inception: 01.10.2021, 08:50:11 +, KeyTag 37239, Signer-Name: pe



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "rev6afuevi842hdqs29o2dpab9egp9ca" as Owner. That's the Hash of "pe" with the NextHashedOwnerName "rlu3chmb9i8603c82fuptp1rolssjudm". So that domain name is the Closest Encloser of "npi.pe". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner rev6afuevi842hdqs29o2dpab9egp9ca.pe., Algorithm: 8, 2 Labels, original TTL: 1800 sec, Signature-expiration: 31.10.2021, 08:50:11 +, Signature-Inception: 01.10.2021, 08:50:11 +, KeyTag 37239, Signer-Name: pe



0 DNSKEY RR found




Zone: www.npi.pe
www.npi.pe
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.npi.pe
  clint.ns.cloudflare.com

npi.pe
  clint.ns.cloudflare.com / 67m49
108.162.193.90
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
172.64.33.90
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
173.245.59.90
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
2606:4700:58::adf5:3b5a
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c15a
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:215a
London/England/United Kingdom (GB) - CloudFLARENET-EU


  kate.ns.cloudflare.com / 67m43
108.162.192.124
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
172.64.32.124
Newark/New Jersey/United States (US) - Cloudflare, Inc.


 
173.245.58.124
Chicago/Illinois/United States (US) - Cloudflare, Inc.


 
2606:4700:50::adf5:3a7c
Montreal/Quebec/Canada (CA) - Cloudflare, Inc.


 
2803:f800:50::6ca2:c07c
San José/Provincia de San Jose/Costa Rica (CR) - Cloudflare, Inc.


 
2a06:98c1:50::ac40:207c
London/England/United Kingdom (GB) - CloudFLARENET-EU

pe
  a.lactld.org / a3-scl


  pch.rcp.pe / 2.ber.pch


  pe1.dnsnode.net / s2.amx


X  quipu.rcp.net.pe


4. SOA-Entries


Domain:pe
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:pe
Zone-Name:pe
Primary:quipu.rcp.net.pe
Mail:operador.rcp.pe
Serial:2021100104
Refresh:1800
Retry:300
Expire:604800
TTL:1800
num Entries:3


Domain:npi.pe
Zone-Name:npi.pe
Primary:clint.ns.cloudflare.com
Mail:dns.cloudflare.com
Serial:2036590692
Refresh:10000
Retry:2400
Expire:604800
TTL:3600
num Entries:12


Domain:www.npi.pe
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://custom.rebrandly.com/?domain=npi.pe, address used: https://custom.rebrandly.com/, Screenshot created 2021-10-01 12:32:43 +00:0

Mobil (412px x 732px)

203 milliseconds

Screenshot mobile - https://custom.rebrandly.com/
Mobil + Landscape (732px x 412px)

204 milliseconds

Screenshot mobile landscape - https://custom.rebrandly.com/
Screen (1280px x 1680px)

358 milliseconds

Screenshot Desktop - https://custom.rebrandly.com/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_128_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://npi.pe/
52.72.49.79
302
http://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
0.233
D
Connection: close
Date: Fri, 01 Oct 2021 10:31:24 GMT
Content-Length: 0
Location: http://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
Engine: Rebrandly.redirect, version 2.1

• http://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826

302
https://custom.rebrandly.com/?domain=npi.pe
0.250
E
Connection: close
Date: Fri, 01 Oct 2021 10:31:33 GMT
Content-Length: 0
Location: https://custom.rebrandly.com/?domain=npi.pe
Engine: Rebrandly.redirect, version 2.1

• https://npi.pe/
52.72.49.79
302
https://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
3.810
B
Connection: close
Date: Fri, 01 Oct 2021 10:31:25 GMT
Content-Length: 0
Location: https://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
Engine: Rebrandly.redirect, version 2.1
Strict-Transport-Security: max-age=15552000

• https://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826

302
https://custom.rebrandly.com/?domain=npi.pe
3.687
B
Connection: close
Date: Fri, 01 Oct 2021 10:31:34 GMT
Content-Length: 0
Location: https://custom.rebrandly.com/?domain=npi.pe
Engine: Rebrandly.redirect, version 2.1
Strict-Transport-Security: max-age=15552000

• https://custom.rebrandly.com/?domain=npi.pe
GZip used - 1398 / 4094 - 65.85 %
Inline-JavaScript (∑/total): 4/990 Inline-CSS (∑/total): 1/176
200

Html is minified: 236.24 %
5.923
B
small visible content (num chars: 86)
  is a Branded Short Domain Learn more     or     Get started
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
Date: Fri, 01 Oct 2021 10:31:45 GMT
Last-Modified: Thu, 24 Oct 2019 16:01:34 GMT
ETag: W/"3495d019dc4de889a562e90d2a369d78"
Server: AmazonS3
X-Edge-Origin-Shield-Skipped: 0
Content-Encoding: gzip
Vary: Accept-Encoding
X-Cache: Miss from cloudfront
Via: 1.1 df86e917220bc08caa68b0eb8ddabe91.cloudfront.net (CloudFront)
X-Amz-Cf-Pop: FRA6-C1
X-Amz-Cf-Id: 56mAskAnocQBhmK4ae6Mz3izeoaA8JfJ99vVxHpPhMNoRhHzjAF4ww==

• http://npi.pe/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
52.72.49.79
302

0.250

Visible Content:
Connection: close
Date: Fri, 01 Oct 2021 10:31:29 GMT
Content-Length: 0
Engine: Rebrandly.redirect, version 2.1

• https://52.72.49.79/
52.72.49.79
302
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
3.547
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Connection: close
Date: Fri, 01 Oct 2021 10:31:30 GMT
Content-Length: 0
Location: https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
Engine: Rebrandly.redirect, version 2.1
Strict-Transport-Security: max-age=15552000

• https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
GZip used - 1430 / 4094 - 65.07 %
Inline-JavaScript (∑/total): 4/990 Inline-CSS (∑/total): 1/176
200

Html is minified: 236.24 %
3.640
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 86)
  is a Branded Short Domain Learn more     or     Get started
Connection: close
Date: Fri, 01 Oct 2021 10:31:40 GMT
Content-Type: text/html
Server: AmazonS3
Transfer-Encoding: chunked
Via: 1.1 ee2aae92a0963bbb2d1a2d667fe2ad2c.cloudfront.net (CloudFront)
Content-Encoding: gzip
Last-Modified: Thu, 24 Oct 2019 16:01:34 GMT
ETag: W/"3495d019dc4de889a562e90d2a369d78"
Vary: Accept-Encoding
Engine: Rebrandly.redirect, version 2.1
Strict-Transport-Security: max-age=15552000
X-Edge-Origin-Shield-Skipped: 0
X-Cache: RefreshHit from cloudfront
X-Amz-Cf-Pop: IAD66-C1
X-Amz-Cf-Id: wzv0CGJdc4zTqFgiH455k9eBfaLIQsj9pgJS7PQ8IkiVJ3rw5dvFnQ==

7. Comments


1. General Results, most used to calculate the result

Aname "npi.pe" is domain, public suffix is ".pe", top-level-domain is ".pe", top-level-domain-type is "country-code", Country is Peru, tld-manager is "Red Cientifica Peruana", num .pe-domains preloaded: 102 (complete: 168171)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: npi.pe has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: npi.pe has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
302
https://custom.rebrandly.com/?domain=npi.pe
correct redirect https to https
Ahttps://npi.pe/ 52.72.49.79
302
https://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
correct redirect https to https
Ahttps://52.72.49.79/ 52.72.49.79
302
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
correct redirect https to https
Agood: destination is https
Agood - only one version with Http-Status 200
Agood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (2 urls)
https://custom.rebrandly.com/?domain=npi.pe


Url with incomplete Content-Type - header - missing charset
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937


Url with incomplete Content-Type - header - missing charset
Bwarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 15552000 seconds = 180 days found
Bhttps://custom.rebrandly.com/?domain=npi.pe
200

Missing HSTS-Header
Dhttp://npi.pe/ 52.72.49.79
302
http://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Ehttp://npi.pe/?rb.routing.mode=proxy&rb.routing.signature=569826
302
https://custom.rebrandly.com/?domain=npi.pe
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Nhttps://52.72.49.79/ 52.72.49.79
302
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
XFatal error: Nameserver doesn't support TCP connection: quipu.rcp.net.pe: Fatal error (-14). Details: Unable to read data from the transport connection: Eine vorhandene Verbindung wurde vom Remotehost geschlossen. - Eine vorhandene Verbindung wurde vom Remotehost geschlossen
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain npi.pe, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 7 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 7 Queries complete, 7 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.5 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: clint.ns.cloudflare.com, kate.ns.cloudflare.com, 2 Name Servers included in Delegation: clint.ns.cloudflare.com, kate.ns.cloudflare.com, 2 Name Servers included in 1 Zone definitions: clint.ns.cloudflare.com, kate.ns.cloudflare.com, 1 Name Servers listed in SOA.Primary: clint.ns.cloudflare.com.
AGood: Only one SOA.Primary Name Server found.: clint.ns.cloudflare.com.
AGood: SOA.Primary Name Server included in the delegation set.: clint.ns.cloudflare.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: clint.ns.cloudflare.com, kate.ns.cloudflare.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: cloudflare.com
AGood: Name servers with different Country locations found: 2 Name Servers, 4 Countries: CA, CR, GB, US
AInfo: Ipv4-Subnet-list: 6 Name Servers, 3 different subnets (first Byte): 108., 172., 173., 3 different subnets (first two Bytes): 108.162., 172.64., 173.245., 6 different subnets (first three Bytes): 108.162.192., 108.162.193., 172.64.32., 172.64.33., 173.245.58., 173.245.59.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 6 Name Servers with IPv6, 3 different subnets (first block): 2606:, 2803:, 2a06:, 3 different subnets (first two blocks): 2606:4700:, 2803:f800:, 2a06:98c1:, 4 different subnets (first three blocks): 2606:4700:0050:, 2606:4700:0058:, 2803:f800:0050:, 2a06:98c1:0050:, 4 different subnets (first four blocks): 2606:4700:0050:0000:, 2606:4700:0058:0000:, 2803:f800:0050:0000:, 2a06:98c1:0050:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 12 good Nameserver
AGood: Nameserver supports Echo Capitalization: 12 good Nameserver
XNameserver Timeout checking Echo Capitalization: quipu.rcp.net.pe
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 12 good Nameserver
XNameserver Timeout checking EDNS512: quipu.rcp.net.pe
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 12 good Nameserver
Nameserver doesn't pass all EDNS-Checks: clint.ns.cloudflare.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: quipu.rcp.net.pe: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
AGood: All SOA have the same Serial Number
Agood: CAA entries found, creating certificate is limited: comodoca.com is allowed to create certificates
Agood: CAA entries found, creating certificate is limited: digicert.com is allowed to create certificates
Agood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
Agood: CAA entries found, creating certificate is limited: comodoca.com is allowed to create wildcard-certificates
Agood: CAA entries found, creating certificate is limited: digicert.com is allowed to create wildcard-certificates
Agood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create wildcard-certificates

3. Content- and Performance-critical Checks

http://npi.pe/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 52.72.49.79
302

Warning: Redirect found (http status between 301 and 309), but no Location Header with the redirect destination specified. Creating a Letsencrypt certificate via http-validation may not work.
AGood: Every https result with status 200 supports GZip.
https://custom.rebrandly.com/?domain=npi.pe
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://custom.rebrandly.com/?domain=npi.pe
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://custom.rebrandly.com/?domain=npi.pe
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
AGood: All CSS / JavaScript files are sent with GZip. That reduces the content of the files. 2 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 3 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 1 with Cache-Control long enough, 4 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 222487 milliseconds, 222.487 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
npi.pe
npi.pe
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
npi.pe
npi.pe
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


npi.pe
52.72.49.79
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

npi.pe
52.72.49.79
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0


custom.rebrandly.com
custom.rebrandly.com
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

custom.rebrandly.com
custom.rebrandly.com
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.rebrandly.com, OU=Domain Control Validated

2CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona

3CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona

4OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US


52.72.49.79
52.72.49.79
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

52.72.49.79
52.72.49.79
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0


52.72.49.79
52.72.49.79
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

52.72.49.79
52.72.49.79
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0


9. Certificates

1.
1.
CN=npi.pe
09.09.2021
08.12.2021
205 days expired
npi.pe - 1 entry
1.
1.
CN=npi.pe
09.09.2021

08.12.2021
205 days expired
npi.pe - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:036639BA71FFC2876F1B41AEEC19E5A0E4E5
Thumbprint:262E025ECF2E4FDB0C5D6103506C1DD94EE541FA
SHA256 / Certificate:MkBil8oTJGrzg9tAGAYBcN47Aql0N6f44/kR7TucyUw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):dc276401a056c4f4839d75d4ed241bba49346afbe009cb834270f6840a6ed1c9
SHA256 hex / Subject Public Key Information (SPKI):dc276401a056c4f4839d75d4ed241bba49346afbe009cb834270f6840a6ed1c9 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1172 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1172 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4721 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4721 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
OU="", C=IR, S=Dublin, L=Dublin, O=Rebrandly, CN=rebrandly.com
23.07.2018
23.07.2028
expires in 2214 days

2.
1.
OU="", C=IR, S=Dublin, L=Dublin, O=Rebrandly, CN=rebrandly.com
23.07.2018

23.07.2028
expires in 2214 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:
Serial Number:4EDE2D1A31E0F3D4
Thumbprint:76BE94ACC0482A00322A8C66BA463979A8EC4E8F
SHA256 / Certificate:dTC3qh/OkqgwIHTG7sObXBdTtpHCIpC8DcKkavpbh7k=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):36adfa1140a1069b33244291aa487aa76e0fd5667ee09d514e2b9f387d62da7e
SHA256 hex / Subject Public Key Information (SPKI):e1b6a85b3dffc64ec2708321b97fb45b735d511e8de8f1a1c06939c4af9894ee
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.

3.
1.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021
08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries
3.
1.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021

08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D6CDCB385EF85ECA
Thumbprint:DF4346DC18AA10F4AEBE753E55448BCEE5987E78
SHA256 / Certificate:u6bAULTHHQg3AG7lxx5tBmjbLc2DLcYQtSlVNojrP/M=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SHA256 hex / Subject Public Key Information (SPKI):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021
08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries

2.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021

08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D6CDCB385EF85ECA
Thumbprint:DF4346DC18AA10F4AEBE753E55448BCEE5987E78
SHA256 / Certificate:u6bAULTHHQg3AG7lxx5tBmjbLc2DLcYQtSlVNojrP/M=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SHA256 hex / Subject Public Key Information (SPKI):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021
08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries

3.
CN=*.rebrandly.com, OU=Domain Control Validated
07.05.2021

08.06.2022
23 days expired
*.rebrandly.com, rebrandly.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D6CDCB385EF85ECA
Thumbprint:DF4346DC18AA10F4AEBE753E55448BCEE5987E78
SHA256 / Certificate:u6bAULTHHQg3AG7lxx5tBmjbLc2DLcYQtSlVNojrP/M=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SHA256 hex / Subject Public Key Information (SPKI):de0ed6982ad16b2933fe60e5bcbc2d93322778127d9144f1fef692b01c4d19c8
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


4.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 3228 days


4.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 3228 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):973a41276ffd01e027a2aad49e34c37846d3e976ff6a620b6712e33832041aa6
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


5.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 3228 days


5.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 3228 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


6.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 3228 days


6.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 3228 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


7.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.01.2014
30.05.2031
expires in 3255 days


7.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.01.2014

30.05.2031
expires in 3255 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:1BE715
Thumbprint:340B2880F446FCC04E59ED33F52B3D08D6242964
SHA256 / Certificate:Oi++kokeV/4F1XCH9I5zDxflpfU+9APWGOW3TXp+bss=
SHA256 hex / Cert (DANE * 0 1):3a2fbe92891e57fe05d57087f48e730f17e5a5f53ef403d618e5b74d7a7e6ecb
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


8.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.09.2009
01.01.2038
expires in 5663 days


8.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.09.2009

01.01.2038
expires in 5663 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00
Thumbprint:47BEABC922EAE80E78783462A79F45C254FDE68B
SHA256 / Certificate:RRQLMkfrnMjFtPDXtTCR9zKSCJ5uWmPidJ3TrKkZjto=
SHA256 hex / Cert (DANE * 0 1):45140b3247eb9cc8c5b4f0d7b53091f73292089e6e5a63e2749dd3aca9198eda
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



9.
CN=Go Daddy Root Certificate Authority - G2, OU=https://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 3228 days


9.
CN=Go Daddy Root Certificate Authority - G2, OU=https://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 3228 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:2003
Thumbprint:841D4A9FC9D3B2F0CA5FAB95525AB2066ACF8322
SHA256 / Certificate:m/WJZ1RZlhlFEtthdxUa/plwauo9o2/u562fizwFB8s=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


10.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004
29.06.2034
expires in 4381 days


10.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004

29.06.2034
expires in 4381 days


KeyalgorithmRSA encryption ( bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:00
Thumbprint:2796BAE63F1801E277261BA0D77770028F20EEE4
SHA256 / Certificate:w4Rr8kuek8pkJ0wOxnwezF4CT/ys0tdAGTUOgf5UauQ=
SHA256 hex / Cert (DANE * 0 1):c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
SHA256 hex / PublicKey (DANE * 1 1):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SHA256 hex / Subject Public Key Information (SPKI):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



11.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004
29.06.2034
expires in 4381 days


11.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004

29.06.2034
expires in 4381 days


KeyalgorithmRSA encryption ( bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:00
Thumbprint:2796BAE63F1801E277261BA0D77770028F20EEE4
SHA256 / Certificate:w4Rr8kuek8pkJ0wOxnwezF4CT/ys0tdAGTUOgf5UauQ=
SHA256 hex / Cert (DANE * 0 1):c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
SHA256 hex / PublicKey (DANE * 1 1):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SHA256 hex / Subject Public Key Information (SPKI):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0
0
14
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
0
1
2
CN=R3, O=Let's Encrypt, C=US
0
0
2
CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, C=US, ST=CA
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2895376859
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-09-09 17:53:29
2021-12-08 17:53:28
npi.pe - 1 entries


2702367203
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-07-08 13:54:18
2021-10-06 13:54:17
npi.pe - 1 entries


2699475424
precert
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
2021-07-07 00:00:00
2022-07-06 23:59:59
*.npi.pe, npi.pe, sni.cloudflaressl.com - 3 entries


1839267389
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-08-10 15:55:22
2020-11-08 15:55:22
npi.pe - 1 entries


1832407803
precert
CN=Cloudflare Inc ECC CA-3, O="Cloudflare, Inc.", C=US
2020-08-07 00:00:00
2021-08-07 12:00:00
*.npi.pe, npi.pe, sni.cloudflaressl.com - 3 entries


1023909800
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-18 06:57:51
2019-10-16 06:57:51
npi.pe - 1 entries


1022772726
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-17 14:55:58
2019-10-15 14:55:58
npi.pe - 1 entries


1022111226
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-17 06:58:15
2019-10-15 06:58:15
npi.pe - 1 entries


1017706860
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-15 00:00:02
2019-10-13 00:00:02
npi.pe - 1 entries


1015485960
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-13 16:59:42
2019-10-11 16:59:42
npi.pe - 1 entries


1011225666
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-11 07:57:31
2019-10-09 07:57:31
npi.pe - 1 entries


1010092834
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-10 15:39:09
2019-10-08 15:39:09
npi.pe - 1 entries


1009505654
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-10 07:02:20
2019-10-08 07:02:20
npi.pe - 1 entries


1005545462
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-08 00:59:47
2019-10-06 00:59:47
npi.pe - 1 entries


1003497086
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-06 17:59:16
2019-10-04 17:59:16
npi.pe - 1 entries


996652140
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-02 06:53:58
2019-09-30 06:53:58
npi.pe - 1 entries


996249994
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-07-02 00:55:53
2019-09-30 00:55:53
npi.pe - 1 entries


993154234
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2019-06-30 02:54:19
2019-09-28 02:54:19
npi.pe - 1 entries


869666045
leaf cert
CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, C=US, ST=CA
2019-04-18 00:00:00
2020-04-18 12:00:00
*.npi.pe, npi.pe, sni.cloudflaressl.com - 3 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, C=US, ST=CA
0
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1497015394
leaf cert
CN=CloudFlare Inc ECC CA-2, O="CloudFlare, Inc.", L=San Francisco, C=US, ST=CA
2019-04-17 22:00:00
2020-04-18 10:00:00
*.npi.pe, npi.pe, sni.cloudflaressl.com
3 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://custom.rebrandly.com/?domain=npi.pe
a

3

0


0
0
0


form

1

0
0
1
0
0
0


link
dns-prefetch
4

0


0
0
0


link
stylesheet
1

0
1
0
0
0
0


meta
other
4

0


0
0
0


script

1
33,495 Bytes
0
0
1
1
0
0
-1

style

1
684 Bytes
0
1
0
0
0
0


style-attribute

1

0
1
0
0
0
0

https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937
a

3

0


0
0
0


form

1

0


0
0
0


link
dns-prefetch
4

0


0
0
0


link
stylesheet
1

0


0
0
0


meta
other
4

0


0
0
0


script

1

0


0
0
0


style

1

0


0
0
0


style-attribute

1

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://custom.rebrandly.com/?domain=npi.pe

a

https://www.rebrandly.com


2
ok








a

https://www.rebrandly.com/pricing


1
ok








form
post
https://www.rebrandly.com
200

1
ok
text/html, X-Content-Type-Options nosniff found

73569 Bytes




Server-Header Access-Control-Allow-Origin: not found
Cross-Origin Resource Sharing (CORS) not supported



link
dns-prefetch
//ajax.googleapis.com


1
ok








link
dns-prefetch
//custom.rebrandly.com


1
ok








link
dns-prefetch
//oss.maxcdn.com


1
ok








link
dns-prefetch
//use.typekit.net


1
ok








link
stylesheet
//custom.rebrandly.com/css/rebrandly.min.css
200

1
ok
text/css, missing X-Content-Type-Options nosniff

No Cache-Control - header
GZip: 29908/171653 Bytes




local SRI possible, possible hash-values:

sha256-YVIYmgwgUTQ1JEMu9ekKTvY1heHW7Y2yjtTaCGGZIbM=
sha384-/jOebsAIMk+fJXlLauNZx3TeQs3BiDeJd441UdOj0hxKm2RAS9TrSRF7IMwNNqKA
sha512-GgUXRlrzq0fHno8xJ2BNgTWGlIZ+i/xwfzUYv2u+vdPxA0YJCWndy9iwyy2NE8AkMMK9pfrqNeUjLmqRFcwfbw==

<link rel="stylesheet" href="//custom.rebrandly.com/css/rebrandly.min.css" crossorigin="anonymous" integrity="sha256-YVIYmgwgUTQ1JEMu9ekKTvY1heHW7Y2yjtTaCGGZIbM=" />



Content loaded via url("...")

../fonts/fontawesome-webfont.eot?#iefix&v=4.3.01
../fonts/fontawesome-webfont.eot?v=4.3.01
../fonts/fontawesome-webfont.svg?v=4.3.0#fontawesomeregular1
../fonts/fontawesome-webfont.ttf?v=4.3.01
../fonts/fontawesome-webfont.woff?v=4.3.01
../fonts/fontawesome-webfont.woff2?v=4.3.01
../fonts/glyphicons-halflings-regular.eot1
../fonts/glyphicons-halflings-regular.eot?#iefix1
../fonts/glyphicons-halflings-regular.svg#glyphicons_halflingsregular1
../fonts/glyphicons-halflings-regular.ttf1
../fonts/glyphicons-halflings-regular.woff1
../fonts/glyphicons-halflings-regular.woff21
../fonts/roboto-italic-webfont.eot1
../fonts/roboto-italic-webfont.eot?#iefix1
../fonts/roboto-italic-webfont.svg#robotoitalic1
../fonts/roboto-italic-webfont.ttf1
../fonts/roboto-italic-webfont.woff1
../fonts/roboto-italic-webfont.woff21
../fonts/roboto-light-webfont.eot1
../fonts/roboto-light-webfont.eot?#iefix1
../fonts/roboto-light-webfont.svg#robotolight1
../fonts/roboto-light-webfont.ttf1
../fonts/roboto-light-webfont.woff1
../fonts/roboto-light-webfont.woff21
../fonts/roboto-medium-webfont.eot1
../fonts/roboto-medium-webfont.eot?#iefix1
../fonts/roboto-medium-webfont.svg#robotomedium1
../fonts/roboto-medium-webfont.ttf1
../fonts/roboto-medium-webfont.woff1
../fonts/roboto-medium-webfont.woff21
../fonts/roboto-regular-webfont.eot1
../fonts/roboto-regular-webfont.eot?#iefix1
../fonts/roboto-regular-webfont.svg#robotoregular1
../fonts/roboto-regular-webfont.ttf1
../fonts/roboto-regular-webfont.woff1
../fonts/roboto-regular-webfont.woff21
../img/404.jpg1
../img/api-bg.png1
../img/check.svg1
../img/container-shadow.svg3
../img/favicon-default.svg1
../img/features/feature-gray.svg1
../img/features/feature-no.svg1
../img/features/feature-ok.svg1
../img/flags.png1
../img/flags@2x.png1
../img/form-cvv.png1
../img/howitwoks-arrow.svg1
../img/icon-cart.svg2
../img/icon-close.svg1
../img/icon-ok.svg1
../img/icon-search.svg1
../img/logo.svg3
../img/logo-footer.png1
../img/results-line.svg3
../img/social-facebook.svg1
../img/social-twitter.svg1
../img/spinner.gif1
bigvideo.png1
owl.video.play.png1

meta

utf-8


1
ok








meta
X-UA-Compatible
IE=edge


1
ok








meta
robots
index, follow


1
ok








meta
viewport
width=device-width, initial-scale=1


1
ok








script
src
https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js
200

1
ok
Missing defer / async attribute. text/javascript; charset=UTF-8, X-Content-Type-Options nosniff found

Cache-Control: public, max-age=31536000, stale-while-revalidate=2592000 - with long duration found.
GZip: 33495/95931 Bytes




Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

sha256-Ls0pXSlb7AYs7evhd+VLnWsZ/AqEHcXBeMZUycz/CcA=
sha384-Pn+PczAsODRZ2PiGg0IheRROpP7lXO1NTIjiPo6cca8TliBvaeil42fobhzvZd74
sha512-eBrO3JneTOjVPZtDoVjGReqxsj39/WtXs8RCsRrMSjRODVsAZ9S3i7Fzq73tdfuRxBDytaWPcdQ4qmJm0EjZig==

<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js" crossorigin="anonymous" integrity="sha256-Ls0pXSlb7AYs7evhd+VLnWsZ/AqEHcXBeMZUycz/CcA=" />




style

//custom.rebrandly.com/img/container-shadow.svg
200

1
ok
image/svg+xml, missing X-Content-Type-Options nosniff

No Cache-Control header
No GZip - 684 Bytes






style-attribute

//custom.rebrandly.com/img/logo-blue.svg
200

1
ok
image/svg+xml, missing X-Content-Type-Options nosniff

No Cache-Control header
GZip: 2445/5260 Bytes





https://52.72.49.79/?rb.routing.mode=proxy&rb.routing.signature=823937

a

https://www.rebrandly.com


2
ok








a

https://www.rebrandly.com/pricing


1
ok








form
post
https://www.rebrandly.com


1
ok








link
dns-prefetch
//ajax.googleapis.com


1
ok








link
dns-prefetch
//custom.rebrandly.com


1
ok








link
dns-prefetch
//oss.maxcdn.com


1
ok








link
dns-prefetch
//use.typekit.net


1
ok








link
stylesheet
//custom.rebrandly.com/css/rebrandly.min.css


1
ok








meta

utf-8


1
ok








meta
X-UA-Compatible
IE=edge


1
ok








meta
robots
index, follow


1
ok








meta
viewport
width=device-width, initial-scale=1


1
ok








script
src
https://ajax.googleapis.com/ajax/libs/jquery/1.11.2/jquery.min.js


1
ok
Missing defer / async attribute.








style

//custom.rebrandly.com/img/container-shadow.svg


1
ok








style-attribute

//custom.rebrandly.com/img/logo-blue.svg


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: clint.ns.cloudflare.com, kate.ns.cloudflare.com

QNr.DomainTypeNS used
1
com
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
clint.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
3
kate.ns.cloudflare.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns3.cloudflare.com, ns4.cloudflare.com, ns5.cloudflare.com, ns6.cloudflare.com, ns7.cloudflare.com

Answer: ns3.cloudflare.com
162.159.0.33, 162.159.7.226, 2400:cb00:2049:1::a29f:21, 2400:cb00:2049:1::a29f:7e2

Answer: ns4.cloudflare.com
162.159.1.33, 162.159.8.55, 2400:cb00:2049:1::a29f:121, 2400:cb00:2049:1::a29f:837

Answer: ns5.cloudflare.com
162.159.2.9, 162.159.9.55, 2400:cb00:2049:1::a29f:209, 2400:cb00:2049:1::a29f:937

Answer: ns6.cloudflare.com
162.159.3.11, 162.159.5.6, 2400:cb00:2049:1::a29f:30b, 2400:cb00:2049:1::a29f:506

Answer: ns7.cloudflare.com
162.159.4.8
4
clint.ns.cloudflare.com: 108.162.193.90, 172.64.33.90, 173.245.59.90
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
5
clint.ns.cloudflare.com: 2606:4700:58::adf5:3b5a, 2803:f800:50::6ca2:c15a, 2a06:98c1:50::ac40:215a
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
6
kate.ns.cloudflare.com: 108.162.192.124, 172.64.32.124, 173.245.58.124
A
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)
7
kate.ns.cloudflare.com: 2606:4700:50::adf5:3a7c, 2803:f800:50::6ca2:c07c, 2a06:98c1:50::ac40:207c
AAAA
ns3.cloudflare.com (2400:cb00:2049:1::a29f:21)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
npi.pe
5
issue
comodoca.com
1
0

9
issuewild
comodoca.com
1
0

5
issue
digicert.com
1
0

9
issuewild
digicert.com
1
0

5
issue
letsencrypt.org
1
0

9
issuewild
letsencrypt.org
1
0

5
iodef
mailto:caa@nullpipe.com
1
0
pe
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
npi.pe
v=spf1 -all
ok
1
0
npi.pe
zoho-verification=zb71524913.zmverify.zoho.com
ok
1
0
_acme-challenge.npi.pe

Name Error - The domain name does not exist
1
0
_acme-challenge.npi.pe.npi.pe

Name Error - The domain name does not exist
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=bb724f3f-fb86-4ccf-b098-456844eae32e


Last Result: https://check-your-website.server-daten.de/?q=npi.pe - 2021-10-01 12:29:09


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=npi.pe" target="_blank">Check this Site: npi.pe</a>