Check DNS, Urls + Redirects, Certificates and Content of your Website



X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
14.05.2022 15:58:25


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
parman.ir
A
80.210.30.120
Tehran/Iran (IR) - TIC
No Hostname found
yes
1
0

AAAA

yes


www.parman.ir
A
5.144.130.38
Tehran/Iran (IR) - Hostiran Network
No Hostname found
yes
1
0

AAAA

yes


*.parman.ir
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 47671, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.06.2022, 00:00:00 +, Signature-Inception: 11.05.2022, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: ir
ir
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "ir" and the NextOwner "irish". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: NS, RRSIG, NSEC



0 DNSKEY RR found




Zone: parman.ir
parman.ir
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.parman.ir
www.parman.ir
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.parman.ir
  ns.parman.ir

parman.ir
  ns.parman.ir
80.210.30.120
Tehran/Iran (IR) - TIC


  ns2.parman.ir
185.21.70.90
Tehran/Iran (IR) - Tose'h Fanavari Ertebabat Pasargad Arian Co. PJS

ir
  a.nic.ir


  b.nic.ir / localhost


  dns-ir.univie.ac.at / dns-ir.univie.ac.at


  ir.cctld.authdns.ripe.net / ns2.nl-ams.authdns.ripe.net


  ns1.nic.ir


  ns5.univie.ac.at


4. SOA-Entries


Domain:ir
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:ir
Zone-Name:ir
Primary:ns1.nic.ir
Mail:info.nic.ir
Serial:2022051418
Refresh:14400
Retry:1800
Expire:604800
TTL:1440
num Entries:5


Domain:parman.ir
Zone-Name:parman.ir
Primary:ns.parman.ir
Mail:admin.parman.ir
Serial:2000072835
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:www.parman.ir
Zone-Name:parman.ir
Primary:ns.parman.ir
Mail:admin.parman.ir
Serial:2000072835
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://parman.ir, address used: https://parman.ir/, Screenshot created 2022-05-14 16:04:12 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

407 milliseconds

Screenshot mobile - https://parman.ir/
Mobil + Landscape (732px x 412px)

388 milliseconds

Screenshot mobile landscape - https://parman.ir/
Screen (1280px x 1680px)

549 milliseconds

Screenshot Desktop - https://parman.ir/

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://parman.ir/
80.210.30.120
302
https://parman.ir/
0.227
A
Cache-Control: no-cache
Content-length: 0
Location: https://parman.ir/
Connection: close

• http://www.parman.ir/
5.144.130.38
301
https://parman.ir/
2.550
E
Connection: close
Content-Type: text/html; charset=UTF-8
X-Pingback: http://parman.ir/xmlrpc.php
X-Redirect-By: WordPress
Location: https://parman.ir/
X-Litespeed-Cache: miss
Content-Length: 0
Date: Sat, 14 May 2022 14:01:34 GMT

• https://www.parman.ir/
5.144.130.38
301
https://parman.ir/
4.883
N
Certificate error: RemoteCertificateChainErrors
Connection: close
Content-Type: text/html; charset=UTF-8
X-Pingback: https://parman.ir/xmlrpc.php
X-Redirect-By: WordPress
Location: https://parman.ir/
X-Litespeed-Cache: miss
Content-Length: 0
Date: Sat, 14 May 2022 14:01:41 GMT
Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000

• https://parman.ir/
80.210.30.120
503

Html is minified: 100.00 %
3.803
N
Service Unavailable
Certificate error: RemoteCertificateNameMismatch
Cache-Control: no-cache
Connection: close
Content-Type: text/html

• http://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
80.210.30.120
302
https://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.220
A
Visible Content:
Cache-Control: no-cache
Content-length: 0
Location: https://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Connection: close

• http://www.parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
5.144.130.38
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 102.31 %
0.224
A
Not Found
Visible Content: 404 Not Found The resource requested could not be found on this server!
Connection: close
Cache-Control: private, no-cache, no-store, must-revalidate, max-age=0
Pragma: no-cache
Content-Type: text/html
Content-Length: 708
Date: Sat, 14 May 2022 14:01:46 GMT

• https://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
503

Html is minified: 100.00 %
3.236
N
Service Unavailable
Certificate error: RemoteCertificateNameMismatch
Visible Content: 503 Service Unavailable No server is available to handle this request.
Cache-Control: no-cache
Connection: close
Content-Type: text/html

• https://5.144.130.38/
5.144.130.38
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
200

Html is minified: 100.00 %
3.324
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 1)
8
Connection: close
Content-Type: text/html
Last-Modified: Fri, 24 May 2019 16:24:24 GMT
Accept-Ranges: bytes
Content-Length: 2
Date: Sat, 14 May 2022 14:01:51 GMT
Alt-Svc: quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000

• https://80.210.30.120/
80.210.30.120
503

Html is minified: 100.00 %
3.740
N
Service Unavailable
Certificate error: RemoteCertificateNameMismatch
Cache-Control: no-cache
Connection: close
Content-Type: text/html

7. Comments


1. General Results, most used to calculate the result

Aname "parman.ir" is domain, public suffix is ".ir", top-level-domain is ".ir", top-level-domain-type is "country-code", Country is Iran (Islamic Republic of), tld-manager is "Institute for Research in Fundamental Sciences", num .ir-domains preloaded: 214 (complete: 175327)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: parman.ir has only one ip address.
Warning: Only one ip address found: www.parman.ir has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: parman.ir has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.parman.ir has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
Agood: destination is https
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (2 urls)
http://www.parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 5.144.130.38


Url with incomplete Content-Type - header - missing charset
https://5.144.130.38/ 5.144.130.38


Url with incomplete Content-Type - header - missing charset
Ahttp://parman.ir/ 80.210.30.120
302
https://parman.ir/
correct redirect http - https with the same domain name
Bhttps://parman.ir/ 80.210.30.120
503

Missing HSTS-Header
Bhttps://www.parman.ir/ 5.144.130.38
301

Missing HSTS-Header
Bhttps://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
503

Missing HSTS-Header
Ehttp://www.parman.ir/ 5.144.130.38
301
https://parman.ir/
Wrong redirect one domain http to other domain https. First redirect to https without new dns query, so the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Nhttps://parman.ir/ 80.210.30.120
503

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.parman.ir/ 5.144.130.38
301
https://parman.ir/
Error - Certificate isn't trusted, RemoteCertificateChainErrors
Nhttps://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
503

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://80.210.30.120/ 80.210.30.120
503

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://5.144.130.38/ 5.144.130.38
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nparman.ir:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nparman.ir:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.parman.ir:2083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.parman.ir:2087


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.parman.ir:2096


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N5.144.130.38:2083


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N5.144.130.38:2087


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N5.144.130.38:2096


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N80.210.30.120:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N80.210.30.120:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain parman.ir, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain www.parman.ir, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns.parman.ir (80.210.30.120), ns2.parman.ir (185.21.70.90)
AGood (1 - 3.0):: An average of 1.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: ns.parman.ir, ns2.parman.ir, 2 Name Servers included in Delegation: ns.parman.ir, ns2.parman.ir, 1 Name Servers included in 1 Zone definitions: ns.parman.ir, 1 Name Servers listed in SOA.Primary: ns.parman.ir.
AGood: Only one SOA.Primary Name Server found.: ns.parman.ir.
AGood: SOA.Primary Name Server included in the delegation set.: ns.parman.ir.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns.parman.ir (80.210.30.120): Delegation: ns.parman.ir, ns2.parman.ir, Zone: ns.parman.ir. Name Servers defined in Delegation, missing in Zone: ns2.parman.ir.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone.: ns2.parman.ir (185.21.70.90): Delegation: ns.parman.ir, ns2.parman.ir, Zone: ns.parman.ir. Name Servers defined in Delegation, missing in Zone: ns2.parman.ir.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: ir
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: parman.ir
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: IR
AInfo: Ipv4-Subnet-list: 2 Name Servers, 2 different subnets (first Byte): 185., 80., 2 different subnets (first two Bytes): 185.21., 80.210., 2 different subnets (first three Bytes): 185.21.70., 80.210.30.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.nic.ir: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Agood: CAA entries found, creating certificate is limited: no CAA is allowed to create certificates
Agood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create wildcard-certificates

3. Content- and Performance-critical Checks

https://parman.ir/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
503

Fatal: Check of /.well-known/acme-challenge/random-filename has a http status 500 - 599, Server Error. Creating a Letsencrypt certificate via http-01 challenge can't work. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: No https + http status 200 with inline CSS / JavaScript found
AGood: Every https result with status 200 has a minified Html-Content with a quota lower then 110 %.
https://5.144.130.38/ 5.144.130.38
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 355500 milliseconds, 355.500 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
parman.ir
80.210.30.120
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
parman.ir
80.210.30.120
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0


www.parman.ir
5.144.130.38
443
Certificate/chain invalid
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.parman.ir
5.144.130.38
443
Certificate/chain invalid
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


parman.ir
parman.ir
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

parman.ir
parman.ir
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0


5.144.130.38
5.144.130.38
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

5.144.130.38
5.144.130.38
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0


80.210.30.120
80.210.30.120
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

80.210.30.120
80.210.30.120
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0


parman.ir
parman.ir
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

parman.ir
parman.ir
993
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0


parman.ir
parman.ir
995
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

parman.ir
parman.ir
995
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0


www.parman.ir
www.parman.ir
2083
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.parman.ir
www.parman.ir
2083
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.parman.ir
www.parman.ir
2087
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.parman.ir
www.parman.ir
2087
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.parman.ir
www.parman.ir
2096
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.parman.ir
www.parman.ir
2096
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


5.144.130.38
5.144.130.38
2083
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

5.144.130.38
5.144.130.38
2083
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


5.144.130.38
5.144.130.38
2087
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

5.144.130.38
5.144.130.38
2087
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


5.144.130.38
5.144.130.38
2096
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

5.144.130.38
5.144.130.38
2096
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=linux8.centraldnserver.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


80.210.30.120
80.210.30.120
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

80.210.30.120
80.210.30.120
993
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0


80.210.30.120
80.210.30.120
995
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

80.210.30.120
80.210.30.120
995
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0


9. Certificates

1.
1.
CN=*.parman.ir
14.04.2022
13.07.2022
expires in 48 days
*.parman.ir - 1 entry
1.
1.
CN=*.parman.ir
14.04.2022

13.07.2022
expires in 48 days
*.parman.ir - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:03AE7B43AEC8ACE09C4D613AE26D0E30FBA2
Thumbprint:6B7DC09BE35091110DDA3655E154AC4295DE97EE
SHA256 / Certificate:O1cpthUnceceeP2nDOWs1uiasSlJ2N6zNn3A6ohmFyo=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):536265656dc288a6b9410a7b13c092764e1d93f392571b6a25b06e35f5dbc0d6
SHA256 hex / Subject Public Key Information (SPKI):536265656dc288a6b9410a7b13c092764e1d93f392571b6a25b06e35f5dbc0d6 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1208 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1208 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4757 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4757 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


2.
1.
CN=parman.ir
12.02.2022
13.05.2022
13 days expired
parman.ir, www.parman.ir - 2 entries
2.
1.
CN=parman.ir
12.02.2022

13.05.2022
13 days expired
parman.ir, www.parman.ir - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:045141248A080737CFDC1225D936F0532553
Thumbprint:335E8CBBB5E65B2251B16A32E915919D054AB12E
SHA256 / Certificate:Rk+QXpfPunicHsDAVBzLWVtYQe7KQhNDGIFEWlTJby4=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):d83ac4afcbcb06c43a9d99ef52251c56969a8ac7907a91491c8bcad7c10ec495
SHA256 hex / Subject Public Key Information (SPKI):d83ac4afcbcb06c43a9d99ef52251c56969a8ac7907a91491c8bcad7c10ec495 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)

NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.

2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1208 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1208 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4757 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4757 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
1.
L=tehran, S=tehran, C=IR, CN=accs.hostiran.net, O=iran
24.05.2019
23.05.2020
733 days expired

3.
1.
L=tehran, S=tehran, C=IR, CN=accs.hostiran.net, O=iran
24.05.2019

23.05.2020
733 days expired


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0B1C9E70
Thumbprint:EB723FCEFC7170BA43AD116F0362EA04D9044C04
SHA256 / Certificate:rsXIf/RZjf9QARq9tu8U5iq98yAp/F9owkSmVlwjs9o=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):dd559bd2872f7e0ebe529dc365a099c593d289a13e350bb4145677f384617174
SHA256 hex / Subject Public Key Information (SPKI):dd559bd2872f7e0ebe529dc365a099c593d289a13e350bb4145677f384617174 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.
NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.

4.
1.
CN=linux8.centraldnserver.com
31.03.2022
29.06.2022
expires in 34 days
linux8.centraldnserver.com - 1 entry
4.
1.
CN=linux8.centraldnserver.com
31.03.2022

29.06.2022
expires in 34 days
linux8.centraldnserver.com - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0436E89CF6927683587B3134D09E39B06828
Thumbprint:ED8583321E023A68D1F243E3427761E8733ACEB5
SHA256 / Certificate:9U46wIepKvLuyVM96WwGCcI6CL4ANVjsbhvsO1F2+6k=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6b168e573e6069dee4991d815e76c4fcdc3fb5df5d6d2da44719893178e565e5
SHA256 hex / Subject Public Key Information (SPKI):6b168e573e6069dee4991d815e76c4fcdc3fb5df5d6d2da44719893178e565e5 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1208 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1208 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4757 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4757 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
0
3
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4570982693
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-05-22 06:40:57
2021-08-20 06:40:57
parman.ir, www.parman.ir
2 entries


4254635738
precert
CN=R3, O=Let's Encrypt, C=US
2021-03-22 07:52:57
2021-06-20 06:52:57
parman.ir, www.parman.ir
2 entries


3946787390
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-01-18 15:21:08
2021-04-18 14:21:08
parman.ir, www.parman.ir
2 entries


3664870572
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-11-18 15:34:40
2021-02-16 15:34:40
parman.ir, www.parman.ir
2 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns.parman.ir, ns2.parman.ir

QNr.DomainTypeNS used
1
ir
NS
k.root-servers.net (2001:7fd::1)

Answer: a.nic.ir, b.nic.ir, ir.cctld.authdns.ripe.net, ns5.univie.ac.at
2
ns.parman.ir: 80.210.30.120
NS
ir.cctld.authdns.ripe.net (2001:67c:e0::85)

Answer: ns2.parman.ir
185.21.70.90


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.parman.ir
0

no CAA entry found
1
0
parman.ir
5
issue
;
1
0

9
issuewild
letsencrypt.org
1
0
ir
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
parman.ir
v=spf1 a mx -all
ok
1
0
www.parman.ir

ok
1
0
_acme-challenge.parman.ir
60cDR_CRqXAoPJTxT_kHKy4gFOljyGpcj9huOZl1lp4
looks good, correct length, correct characters
1
0
_acme-challenge.parman.ir
pFG01SnZ34cg0QoYuVgpRVXzai1sRgQH0ZVThm5e7RU
looks good, correct length, correct characters
1
0
_acme-challenge.www.parman.ir

Name Error - The domain name does not exist
1
0
_acme-challenge.parman.ir.parman.ir

Name Error - The domain name does not exist
1
0
_acme-challenge.www.parman.ir.parman.ir

Name Error - The domain name does not exist
1
0
_acme-challenge.www.parman.ir.www.parman.ir

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
parman.ir
21
FTP



parman.ir
21
FTP



parman.ir
22
SSH



parman.ir
22
SSH



parman.ir
25
SMTP
open
220-server.parman.ir ESMTP Postfix

parman.ir
25
SMTP
open
220-server.parman.ir ESMTP Postfix

parman.ir
53
DNS
open


parman.ir
53
DNS
open


parman.ir
110
POP3
open
+OK Dovecot (Ubuntu) ready.

parman.ir
110
POP3
open
+OK Dovecot (Ubuntu) ready.

parman.ir
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS LOGINDISABLED] Dovecot (Ubuntu) ready.

parman.ir
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS LOGINDISABLED] Dovecot (Ubuntu) ready.

parman.ir
465
SMTP (encrypted)



parman.ir
465
SMTP (encrypted)



parman.ir
587
SMTP (encrypted, submission)
open
220 server.parman.ir ESMTP Postfix

parman.ir
587
SMTP (encrypted, submission)
open
220 server.parman.ir ESMTP Postfix

parman.ir
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
parman.ir
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
parman.ir
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
parman.ir
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
parman.ir
1433
MS SQL



parman.ir
1433
MS SQL



parman.ir
2082
cPanel (http)



parman.ir
2082
cPanel (http)



parman.ir
2083
cPanel (https)



parman.ir
2083
cPanel (https)



parman.ir
2086
WHM (http)



parman.ir
2086
WHM (http)



parman.ir
2087
WHM (https)



parman.ir
2087
WHM (https)



parman.ir
2089
cPanel Licensing



parman.ir
2089
cPanel Licensing



parman.ir
2095
cPanel Webmail (http)



parman.ir
2095
cPanel Webmail (http)



parman.ir
2096
cPanel Webmail (https)



parman.ir
2096
cPanel Webmail (https)



parman.ir
2222
DirectAdmin (http)
open
http://parman.ir:2222/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

parman.ir
2222
DirectAdmin (http)
open
http://parman.ir:2222/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

parman.ir
2222
DirectAdmin (https)
open
https://parman.ir:2222/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

parman.ir
2222
DirectAdmin (https)
open
https://parman.ir:2222/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

parman.ir
3306
mySql



parman.ir
3306
mySql



parman.ir
5224
Plesk Licensing



parman.ir
5224
Plesk Licensing



parman.ir
5432
PostgreSQL



parman.ir
5432
PostgreSQL



parman.ir
8080
Ookla Speedtest (http)



parman.ir
8080
Ookla Speedtest (http)



parman.ir
8080
Ookla Speedtest (https)



parman.ir
8080
Ookla Speedtest (https)



parman.ir
8083
VestaCP http



parman.ir
8083
VestaCP http



parman.ir
8083
VestaCP https



parman.ir
8083
VestaCP https



parman.ir
8443
Plesk Administration (https)



parman.ir
8443
Plesk Administration (https)



parman.ir
8447
Plesk Installer + Updates



parman.ir
8447
Plesk Installer + Updates



parman.ir
8880
Plesk Administration (http)



parman.ir
8880
Plesk Administration (http)



parman.ir
10000
Webmin (http)



parman.ir
10000
Webmin (http)



parman.ir
10000
Webmin (https)



parman.ir
10000
Webmin (https)



www.parman.ir
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 500 allowed. 220-Local time is now 18:32. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

www.parman.ir
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 500 allowed. 220-Local time is now 18:32. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

www.parman.ir
22
SSH



www.parman.ir
22
SSH



www.parman.ir
25
SMTP
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

www.parman.ir
25
SMTP
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

www.parman.ir
53
DNS
open


www.parman.ir
53
DNS
open


www.parman.ir
110
POP3
open
+OK Dovecot ready.

www.parman.ir
110
POP3
open
+OK Dovecot ready.

www.parman.ir
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

www.parman.ir
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

www.parman.ir
465
SMTP (encrypted)
open


www.parman.ir
465
SMTP (encrypted)
open


www.parman.ir
587
SMTP (encrypted, submission)
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

www.parman.ir
587
SMTP (encrypted, submission)
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

www.parman.ir
993
IMAP (encrypted)
open


www.parman.ir
993
IMAP (encrypted)
open


www.parman.ir
995
POP3 (encrypted)
open


www.parman.ir
995
POP3 (encrypted)
open


www.parman.ir
1433
MS SQL



www.parman.ir
1433
MS SQL



www.parman.ir
2082
cPanel (http)
open
http://www.parman.ir:2082/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2083/
www.parman.ir
2082
cPanel (http)
open
http://www.parman.ir:2082/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2083/
www.parman.ir
2083
cPanel (https)
open
https://www.parman.ir:2083/
Http-Status: 200
Certificate is invalid
www.parman.ir
2083
cPanel (https)
open
https://www.parman.ir:2083/
Http-Status: 200
Certificate is invalid
www.parman.ir
2086
WHM (http)
open
http://www.parman.ir:2086/
Http-Status: 401
Access Denied

www.parman.ir
2086
WHM (http)
open
http://www.parman.ir:2086/
Http-Status: 401
Access Denied

www.parman.ir
2087
WHM (https)
open
https://www.parman.ir:2087/
Http-Status: 401
Access Denied
Certificate is invalid
www.parman.ir
2087
WHM (https)
open
https://www.parman.ir:2087/
Http-Status: 401
Access Denied
Certificate is invalid
www.parman.ir
2089
cPanel Licensing



www.parman.ir
2089
cPanel Licensing



www.parman.ir
2095
cPanel Webmail (http)
open
http://www.parman.ir:2095/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2096/
www.parman.ir
2095
cPanel Webmail (http)
open
http://www.parman.ir:2095/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2096/
www.parman.ir
2096
cPanel Webmail (https)
open
https://www.parman.ir:2096/
Http-Status: 200
Certificate is invalid
www.parman.ir
2096
cPanel Webmail (https)
open
https://www.parman.ir:2096/
Http-Status: 200
Certificate is invalid
www.parman.ir
2222
DirectAdmin (http)



www.parman.ir
2222
DirectAdmin (http)



www.parman.ir
2222
DirectAdmin (https)



www.parman.ir
2222
DirectAdmin (https)



www.parman.ir
3306
mySql



www.parman.ir
3306
mySql



www.parman.ir
5224
Plesk Licensing



www.parman.ir
5224
Plesk Licensing



www.parman.ir
5432
PostgreSQL



www.parman.ir
5432
PostgreSQL



www.parman.ir
8080
Ookla Speedtest (http)



www.parman.ir
8080
Ookla Speedtest (http)



www.parman.ir
8080
Ookla Speedtest (https)



www.parman.ir
8080
Ookla Speedtest (https)



www.parman.ir
8083
VestaCP http



www.parman.ir
8083
VestaCP http



www.parman.ir
8083
VestaCP https



www.parman.ir
8083
VestaCP https



www.parman.ir
8443
Plesk Administration (https)



www.parman.ir
8443
Plesk Administration (https)



www.parman.ir
8447
Plesk Installer + Updates



www.parman.ir
8447
Plesk Installer + Updates



www.parman.ir
8880
Plesk Administration (http)



www.parman.ir
8880
Plesk Administration (http)



www.parman.ir
10000
Webmin (http)



www.parman.ir
10000
Webmin (http)



www.parman.ir
10000
Webmin (https)



www.parman.ir
10000
Webmin (https)



5.144.130.38
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 500 allowed. 220-Local time is now 18:32. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

5.144.130.38
21
FTP
open
220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220-You are user number 1 of 500 allowed. 220-Local time is now 18:32. Server port: 21. 220-This is a private system - No anonymous login 220-IPv6 connections are also welcome on this server. 220 You will be disconnected after 15 minutes of inactivity.

5.144.130.38
22
SSH



5.144.130.38
22
SSH



5.144.130.38
25
SMTP
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

5.144.130.38
25
SMTP
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

5.144.130.38
53
DNS
open


5.144.130.38
53
DNS
open


5.144.130.38
110
POP3
open
+OK Dovecot ready.

5.144.130.38
110
POP3
open
+OK Dovecot ready.

5.144.130.38
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

5.144.130.38
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE NAMESPACE LITERAL+ STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot ready.

5.144.130.38
465
SMTP (encrypted)
open


5.144.130.38
465
SMTP (encrypted)
open


5.144.130.38
587
SMTP (encrypted, submission)
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

5.144.130.38
587
SMTP (encrypted, submission)
open
220-linux8.centraldnserver.com ESMTP Exim 4.95 #2 Sat, 14 May 2022 18:32:59 +0430 220-We do not authorize the use of this system to transport unsolicited, 220 and/or bulk e-mail.

5.144.130.38
993
IMAP (encrypted)
open


5.144.130.38
993
IMAP (encrypted)
open


5.144.130.38
995
POP3 (encrypted)
open


5.144.130.38
995
POP3 (encrypted)
open


5.144.130.38
1433
MS SQL



5.144.130.38
1433
MS SQL



5.144.130.38
2082
cPanel (http)
open
http://5.144.130.38:2082/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2083/
5.144.130.38
2082
cPanel (http)
open
http://5.144.130.38:2082/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2083/
5.144.130.38
2083
cPanel (https)
open
https://5.144.130.38:2083/
Http-Status: 200
Certificate is invalid
5.144.130.38
2083
cPanel (https)
open
https://5.144.130.38:2083/
Http-Status: 200
Certificate is invalid
5.144.130.38
2086
WHM (http)
open
http://5.144.130.38:2086/
Http-Status: 401
Access Denied

5.144.130.38
2086
WHM (http)
open
http://5.144.130.38:2086/
Http-Status: 401
Access Denied

5.144.130.38
2087
WHM (https)
open
https://5.144.130.38:2087/
Http-Status: 401
Access Denied
Certificate is invalid
5.144.130.38
2087
WHM (https)
open
https://5.144.130.38:2087/
Http-Status: 401
Access Denied
Certificate is invalid
5.144.130.38
2089
cPanel Licensing



5.144.130.38
2089
cPanel Licensing



5.144.130.38
2095
cPanel Webmail (http)
open
http://5.144.130.38:2095/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2096/
5.144.130.38
2095
cPanel Webmail (http)
open
http://5.144.130.38:2095/
Http-Status: 301
Redirect: https://linux8.centraldnserver.com:2096/
5.144.130.38
2096
cPanel Webmail (https)
open
https://5.144.130.38:2096/
Http-Status: 200
Certificate is invalid
5.144.130.38
2096
cPanel Webmail (https)
open
https://5.144.130.38:2096/
Http-Status: 200
Certificate is invalid
5.144.130.38
2222
DirectAdmin (http)



5.144.130.38
2222
DirectAdmin (http)



5.144.130.38
2222
DirectAdmin (https)



5.144.130.38
2222
DirectAdmin (https)



5.144.130.38
3306
mySql



5.144.130.38
3306
mySql



5.144.130.38
5224
Plesk Licensing



5.144.130.38
5224
Plesk Licensing



5.144.130.38
5432
PostgreSQL



5.144.130.38
5432
PostgreSQL



5.144.130.38
8080
Ookla Speedtest (http)



5.144.130.38
8080
Ookla Speedtest (http)



5.144.130.38
8080
Ookla Speedtest (https)



5.144.130.38
8080
Ookla Speedtest (https)



5.144.130.38
8083
VestaCP http



5.144.130.38
8083
VestaCP http



5.144.130.38
8083
VestaCP https



5.144.130.38
8083
VestaCP https



5.144.130.38
8443
Plesk Administration (https)



5.144.130.38
8443
Plesk Administration (https)



5.144.130.38
8447
Plesk Installer + Updates



5.144.130.38
8447
Plesk Installer + Updates



5.144.130.38
8880
Plesk Administration (http)



5.144.130.38
8880
Plesk Administration (http)



5.144.130.38
10000
Webmin (http)



5.144.130.38
10000
Webmin (http)



5.144.130.38
10000
Webmin (https)



5.144.130.38
10000
Webmin (https)



80.210.30.120
21
FTP



80.210.30.120
21
FTP



80.210.30.120
22
SSH



80.210.30.120
22
SSH



80.210.30.120
25
SMTP
open
220-server.parman.ir ESMTP Postfix 220 server.parman.ir ESMTP Postfix

80.210.30.120
25
SMTP
open
220-server.parman.ir ESMTP Postfix 220 server.parman.ir ESMTP Postfix

80.210.30.120
53
DNS
open


80.210.30.120
53
DNS
open


80.210.30.120
110
POP3
open
+OK Dovecot (Ubuntu) ready.

80.210.30.120
110
POP3
open
+OK Dovecot (Ubuntu) ready.

80.210.30.120
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS LOGINDISABLED] Dovecot (Ubuntu) ready.

80.210.30.120
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS LOGINDISABLED] Dovecot (Ubuntu) ready.

80.210.30.120
465
SMTP (encrypted)



80.210.30.120
465
SMTP (encrypted)



80.210.30.120
587
SMTP (encrypted, submission)
open
220 server.parman.ir ESMTP Postfix

80.210.30.120
587
SMTP (encrypted, submission)
open
220 server.parman.ir ESMTP Postfix

80.210.30.120
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
80.210.30.120
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
80.210.30.120
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
80.210.30.120
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
80.210.30.120
1433
MS SQL



80.210.30.120
1433
MS SQL



80.210.30.120
2082
cPanel (http)



80.210.30.120
2082
cPanel (http)



80.210.30.120
2083
cPanel (https)



80.210.30.120
2083
cPanel (https)



80.210.30.120
2086
WHM (http)



80.210.30.120
2086
WHM (http)



80.210.30.120
2087
WHM (https)



80.210.30.120
2087
WHM (https)



80.210.30.120
2089
cPanel Licensing



80.210.30.120
2089
cPanel Licensing



80.210.30.120
2095
cPanel Webmail (http)



80.210.30.120
2095
cPanel Webmail (http)



80.210.30.120
2096
cPanel Webmail (https)



80.210.30.120
2096
cPanel Webmail (https)



80.210.30.120
2222
DirectAdmin (http)
open
http://80.210.30.120:2222/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

80.210.30.120
2222
DirectAdmin (http)
open
http://80.210.30.120:2222/
Http-Status: -11
ServerProtocolViolation - The server committed a protocol violation. Section=ResponseStatusLine

80.210.30.120
2222
DirectAdmin (https)
open
https://80.210.30.120:2222/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

80.210.30.120
2222
DirectAdmin (https)
open
https://80.210.30.120:2222/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

80.210.30.120
3306
mySql



80.210.30.120
3306
mySql



80.210.30.120
5224
Plesk Licensing



80.210.30.120
5224
Plesk Licensing



80.210.30.120
5432
PostgreSQL



80.210.30.120
5432
PostgreSQL



80.210.30.120
8080
Ookla Speedtest (http)



80.210.30.120
8080
Ookla Speedtest (http)



80.210.30.120
8080
Ookla Speedtest (https)



80.210.30.120
8080
Ookla Speedtest (https)



80.210.30.120
8083
VestaCP http



80.210.30.120
8083
VestaCP http



80.210.30.120
8083
VestaCP https



80.210.30.120
8083
VestaCP https



80.210.30.120
8443
Plesk Administration (https)



80.210.30.120
8443
Plesk Administration (https)



80.210.30.120
8447
Plesk Installer + Updates



80.210.30.120
8447
Plesk Installer + Updates



80.210.30.120
8880
Plesk Administration (http)



80.210.30.120
8880
Plesk Administration (http)



80.210.30.120
10000
Webmin (http)



80.210.30.120
10000
Webmin (http)



80.210.30.120
10000
Webmin (https)



80.210.30.120
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=1d636e5a-90d4-4920-9bee-907c6c0eba94


Last Result: https://check-your-website.server-daten.de/?q=parman.ir - 2022-05-14 15:58:25


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=parman.ir" target="_blank">Check this Site: parman.ir</a>