Check DNS, Urls + Redirects, Certificates and Content of your Website



X

DNS-problem - authoritative Nameserver refused, not defined or timeout

Checked:
23.02.2021 09:31:57


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
portal.ines.co.rs
A
89.216.28.158
Zrenjanin/Vojvodina/Serbia (RS) - Serbia Broadband
No Hostname found
yes
1
0

AAAA

yes


www.portal.ines.co.rs

Name Error
yes
1
0
*.ines.co.rs
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.portal.ines.co.rs
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2021, 00:00:00 +, Signature-Inception: 20.02.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: rs
rs
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 64642, DigestType 2 and Digest 12potB2WpdrZUhZFaJTl5TmYPzmj34ON1Ze98hyLjCs=



1 RRSIG RR to validate DS RR found



RRSIG-Owner rs., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2021, 05:00:00 +, Signature-Inception: 23.02.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 6546, Flags 256



Public Key with Algorithm 8, KeyTag 64642, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner rs., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 03.03.2021, 00:13:28 +, Signature-Inception: 16.02.2021, 16:07:54 +, KeyTag 64642, Signer-Name: rs



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 64642 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 64642, DigestType 2 and Digest "12potB2WpdrZUhZFaJTl5TmYPzmj34ON1Ze98hyLjCs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: co.rs
co.rs
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 21019, DigestType 2 and Digest bIX3RYVEP2cdmuaXwmQn1zTBmdX8dxZFhecmMxlaPKI=



1 RRSIG RR to validate DS RR found



RRSIG-Owner co.rs., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 28.02.2021, 00:33:18 +, Signature-Inception: 14.02.2021, 00:52:03 +, KeyTag 6546, Signer-Name: rs



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 6546 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 21019, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 29220, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner co.rs., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 10.03.2021, 04:34:03 +, Signature-Inception: 10.02.2021, 05:52:03 +, KeyTag 21019, Signer-Name: co.rs



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 21019 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 21019, DigestType 2 and Digest "bIX3RYVEP2cdmuaXwmQn1zTBmdX8dxZFhecmMxlaPKI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: ines.co.rs
ines.co.rs
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "rf8923frpkjasghc4sm3ss9i7mqdknj9" between the hashed NSEC3-owner "r6d66ou1pseid4720fr66homn4sqgfr8" and the hashed NextOwner "urqegj7etsvug6t22au0bhohtk1bbg21". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner r6d66ou1pseid4720fr66homn4sqgfr8.co.rs., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 26.02.2021, 12:52:02 +, Signature-Inception: 29.01.2021, 23:22:02 +, KeyTag 29220, Signer-Name: co.rs



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "8l04s4rnqdfkkrgbmbeomftvdk0pfkn3" as Owner. That's the Hash of "co.rs" with the NextHashedOwnerName "9bui4f6es17takfenuu5633m76uli5gh". So that domain name is the Closest Encloser of "ines.co.rs". Opt-Out: True.
Bitmap: NS, SOA, TXT, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 8l04s4rnqdfkkrgbmbeomftvdk0pfkn3.co.rs., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 13.03.2021, 12:52:08 +, Signature-Inception: 13.02.2021, 02:22:02 +, KeyTag 29220, Signer-Name: co.rs



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 12412, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 21120, Flags 256



Public Key with Algorithm 8, KeyTag 26676, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner ines.co.rs., Algorithm: 8, 3 Labels, original TTL: 86400 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 12412, Signer-Name: ines.co.rs



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 12412 used to validate the DNSKEY RRSet



Error: DNSKEY 12412 signs DNSKEY RRset, but no confirming DS RR in the parent zone found. No chain of trust created.

Zone: portal.ines.co.rs
portal.ines.co.rs
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "vh5i19td24s79uvcosqe92m6knfiuktv" between the hashed NSEC3-owner "vh5i19td24s79uvcosqe92m6knfiuktv" and the hashed NextOwner "vh5i19td24s79uvcosqe92m6knfiuku0". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



0 DNSKEY RR found






RRSIG Type 1 validates the A - Result: 89.216.28.158
Validated: RRSIG-Owner portal.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "vh5i19td24s79uvcosqe92m6knfiuktv" equal the hashed NSEC3-owner "vh5i19td24s79uvcosqe92m6knfiuktv" and the hashed NextOwner "vh5i19td24s79uvcosqe92m6knfiuku0". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC3 RR as result with the hashed query name "vh5i19td24s79uvcosqe92m6knfiuktv" equal the hashed NSEC3-owner "vh5i19td24s79uvcosqe92m6knfiuktv" and the hashed NextOwner "vh5i19td24s79uvcosqe92m6knfiuku0". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "vh5i19td24s79uvcosqe92m6knfiuktv" equal the hashed NSEC3-owner "vh5i19td24s79uvcosqe92m6knfiuktv" and the hashed NextOwner "vh5i19td24s79uvcosqe92m6knfiuku0". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.portal.ines.co.rs) sends a valid NSEC3 RR as result with the hashed owner name "vh5i19td24s79uvcosqe92m6knfiuktv" (unhashed: portal.ines.co.rs). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NXDomain-Proof required and found.



TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "pjt6lsiu8h9gk6qoqsovk4td57pcub54" (unhashed: _tcp.portal.ines.co.rs) with the owner "pjt6lsiu8h9gk6qoqsovk4td57pcub53" and the NextOwner "pjt6lsiu8h9gk6qoqsovk4td57pcub55". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: No Bitmap? Validated: RRSIG-Owner pjt6lsiu8h9gk6qoqsovk4td57pcub53.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NXDomain-Proof required and found.



TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "brjn8p7u9o62rcheqrb5b70duug4h5j1" (unhashed: *.portal.ines.co.rs) with the owner "brjn8p7u9o62rcheqrb5b70duug4h5j0" and the NextOwner "brjn8p7u9o62rcheqrb5b70duug4h5j2". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: No Bitmap? Validated: RRSIG-Owner brjn8p7u9o62rcheqrb5b70duug4h5j0.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NXDomain-Proof required and found.



CAA-Query sends a valid NSEC3 RR as result with the hashed query name "vh5i19td24s79uvcosqe92m6knfiuktv" equal the hashed NSEC3-owner "vh5i19td24s79uvcosqe92m6knfiuktv" and the hashed NextOwner "vh5i19td24s79uvcosqe92m6knfiuku0". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



Status: Good. NoData-Proof required and found.

Zone: www.portal.ines.co.rs
www.portal.ines.co.rs
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "cmhh4dqfobev8goeiq27seaehde4h0p7" between the hashed NSEC3-owner "cmhh4dqfobev8goeiq27seaehde4h0p6" and the hashed NextOwner "cmhh4dqfobev8goeiq27seaehde4h0p8". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner cmhh4dqfobev8goeiq27seaehde4h0p6.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "vh5i19td24s79uvcosqe92m6knfiuktv" as Owner. That's the Hash of "portal.ines.co.rs" with the NextHashedOwnerName "vh5i19td24s79uvcosqe92m6knfiuku0". So that domain name is the Closest Encloser of "www.portal.ines.co.rs". Opt-Out: True.
Bitmap: A, RRSIG Validated: RRSIG-Owner vh5i19td24s79uvcosqe92m6knfiuktv.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs



The ClosestEncloser says, that "*.portal.ines.co.rs" with the Hash "brjn8p7u9o62rcheqrb5b70duug4h5j1" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "brjn8p7u9o62rcheqrb5b70duug4h5j0" and the Next Owner "brjn8p7u9o62rcheqrb5b70duug4h5j2", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: True
Bitmap: No Bitmap? Validated: RRSIG-Owner brjn8p7u9o62rcheqrb5b70duug4h5j0.ines.co.rs., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 04.03.2021, 00:00:00 +, Signature-Inception: 11.02.2021, 00:00:00 +, KeyTag 21120, Signer-Name: ines.co.rs


3. Name Servers

DomainNameserverNS-IP
www.portal.ines.co.rs
  ns1.loopia.se

portal.ines.co.rs
  ns1.loopia.se / s441.loopia.se
93.188.0.20
Västerås/Västmanland County/Sweden (SE) - Loopia AB


 
2a02:250:ffff::20
Västerås/Västmanland County/Sweden (SE) - Loopia AB

ines.co.rs
  ns1.loopia.se / s442.loopia.se
93.188.0.20
Västerås/Västmanland County/Sweden (SE) - Loopia AB


 
2a02:250:ffff::20
Västerås/Västmanland County/Sweden (SE) - Loopia AB


  ns2.loopia.se / s442.loopia.se
93.188.0.21
Västerås/Västmanland County/Sweden (SE) - Loopia AB


 
2a02:250:ffff::21
Västerås/Västmanland County/Sweden (SE) - Loopia AB

co.rs
  a.nic.rs
91.199.17.59
Stari Grad/Central Serbia/Serbia (RS) - Serbian National Internet Domain Registry


 
2001:67c:69c::59
Berlin/Land Berlin/Germany (DE) - Serbian National Internet Domain Registry Foundation


  b.nic.rs
195.178.32.2
Belgrade/Central Serbia/Serbia (RS) - TELEKOM-SRBIJA


 
2a00:e90:0:3::3
Belgrade/Central Serbia/Serbia (RS) - Telekom Srbija


  g.nic.rs
147.91.8.6
Belgrade/Serbia (RS) - School of Electrical Engineering


  h.nic.rs
91.199.17.60
Stari Grad/Central Serbia/Serbia (RS) - Serbian National Internet Domain Registry


 
2001:67c:69c::60
Berlin/Land Berlin/Germany (DE) - Serbian National Internet Domain Registry Foundation


  l.nic.rs / s2.amx
194.146.106.114
Norrtaelje/Stockholm County/Sweden (SE) - NETNOD Internet Exchange i Sverige AB


 
2001:67c:1010:29::53
Zurich/Switzerland (CH) - NETNOD Internet Exchange i Sverige AB

rs
  a.nic.rs


  b.nic.rs


  f.nic.rs / 2.ber.pch


  g.nic.rs


  h.nic.rs


  l.nic.rs / s2.amx


4. SOA-Entries


Domain:rs
Zone-Name:rs
Primary:a.nic.rs
Mail:hostmaster.nic.rs
Serial:2021022319
Refresh:3600
Retry:900
Expire:2419200
TTL:3600
num Entries:6


Domain:co.rs
Zone-Name:co.rs
Primary:a.nic.rs
Mail:hostmaster.nic.rs
Serial:2021022320
Refresh:3600
Retry:1800
Expire:2419200
TTL:3600
num Entries:9


Domain:ines.co.rs
Zone-Name:ines.co.rs
Primary:ns1.loopia.se
Mail:registry.loopia.se
Serial:1613606400
Refresh:10800
Retry:3600
Expire:604800
TTL:86400
num Entries:4


Domain:portal.ines.co.rs
Zone-Name:ines.co.rs
Primary:ns1.loopia.se
Mail:registry.loopia.se
Serial:1613606400
Refresh:10800
Retry:3600
Expire:604800
TTL:86400
num Entries:2


Domain:www.portal.ines.co.rs
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks

DomainnameHttp-StatusredirectSec.G
• http://portal.ines.co.rs/
89.216.28.158
-3

0.190
W
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

• https://portal.ines.co.rs/
89.216.28.158
-14

10.027
T
Timeout - The operation has timed out

• http://portal.ines.co.rs/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
89.216.28.158
-3

0.187
W
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.
Visible Content:

• https://89.216.28.158/
89.216.28.158
-14

10.027
T
Timeout - The operation has timed out

7. Comments


1. General Results, most used to calculate the result

Aname "portal.ines.co.rs" is subdomain, public suffix is ".co.rs", top-level-domain is ".rs", top-level-domain-type is "country-code", Country is Serbia, tld-manager is "Serbian National Internet Domain Registry (RNIDS)", num .rs-domains preloaded: 64 (complete: 142558)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: portal.ines.co.rs has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: portal.ines.co.rs has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
N89.216.28.158:8080


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain portal.ines.co.rs, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 2 Queries complete, 1 with IPv6, 1 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.loopia.se (93.188.0.20), ns2.loopia.se (2a02:250:ffff::21, 93.188.0.21)
AGood (1 - 3.0):: An average of 1.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: ns1.loopia.se, ns2.loopia.se, 2 Name Servers included in Delegation: ns1.loopia.se, ns2.loopia.se, 2 Name Servers included in 1 Zone definitions: ns1.loopia.se, ns2.loopia.se, 1 Name Servers listed in SOA.Primary: ns1.loopia.se.
AGood: Only one SOA.Primary Name Server found.: ns1.loopia.se.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.loopia.se.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.loopia.se, ns2.loopia.se
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: se
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: loopia.se
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: SE
AInfo: Ipv4-Subnet-list: 2 Name Servers, 1 different subnets (first Byte): 93., 1 different subnets (first two Bytes): 93.188., 1 different subnets (first three Bytes): 93.188.0.
XFatal: All Name Server IPv4 addresses from the same subnet. Check https://www.iana.org/help/nameserver-requirements to learn some basics about name server configurations. If you manage these name servers, fix it. If it's your provider, change your provider.:
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 1 different subnets (first block): 2a02:, 1 different subnets (first two blocks): 2a02:0250:, 1 different subnets (first three blocks): 2a02:0250:ffff:, 1 different subnets (first four blocks): 2a02:0250:ffff:0000:
Fatal: All Name Server IPv6 addresses from the same subnet.
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: a.nic.rs: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: b.nic.rs: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: h.nic.rs / 2001:67c:69c::60: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. COOKIE: fatal timeout. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.loopia.se: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://portal.ines.co.rs/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 89.216.28.158
-3

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 100520 milliseconds, 100.520 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
portal.ines.co.rs
portal.ines.co.rs
8080
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
portal.ines.co.rs
portal.ines.co.rs
8080
ok
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
Chain (complete)
1CN=portal.ines.co.rs

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


89.216.28.158
89.216.28.158
8080
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok

89.216.28.158
89.216.28.158
8080
name does not match
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
Chain (complete)
1CN=portal.ines.co.rs

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
CN=portal.ines.co.rs
25.11.2020
23.02.2021
2 days expired
portal.ines.co.rs - 1 entry
1.
1.
CN=portal.ines.co.rs
25.11.2020

23.02.2021
2 days expired
portal.ines.co.rs - 1 entry

KeyalgorithmRSA encryption ( bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:04A069447F304870642E277AFA95EDB6ACCF
Thumbprint:EC8F3460B76460AE6408AE3BCD799CFE65796B75
SHA256 / Certificate:iv3jutYLaiJLYp6eV5U8LKA8PMdEP5u8xhRYf/UZvYs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):03a515bb5abbc74c2295db88629f4871a0e98b2a95e0358e054e3e69e987dcfc
SHA256 hex / Subject Public Key Information (SPKI):9c8c94b0e5d89937c043da87f5f3d98a6a65d9aca9a542068a11aae670b512b0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.int-x3.letsencrypt.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016
17.03.2021
expires in 20 days


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016

17.03.2021
expires in 20 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0A0141420000015385736A0B85ECA708
Thumbprint:E6A3B45B062D509B3382282D196EFE97D5956CCB
SHA256 / Certificate:JYR9Zo608E/dQLErawdAxWfafQJDCOtsLJb+QdneIY0=
SHA256 hex / Cert (DANE * 0 1):25847d668eb4f04fdd40b12b6b0740c567da7d024308eb6c2c96fe41d9de218d
SHA256 hex / PublicKey (DANE * 1 1):60b87575447dcba2a36b7d11ac09fb24a9db406fee12d2cc90180517616e8a18
SHA256 hex / Subject Public Key Information (SPKI):cbb93d32de628874a3ecfb92affadc97f1b795f84cc6f24221a089dee1aa25ad
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://isrg.trustid.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 217 days


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 217 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SHA256 hex / Subject Public Key Information (SPKI):29cc40db5e2de462a311cbbafaa1dc466960002335ecdf3317f2cd05c1d0bedf
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2092931121
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-11-25 09:11:22
2021-02-23 09:11:22
portal.ines.co.rs - 1 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
4

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3695195450
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-11-25 08:11:22
2021-02-23 08:11:22
portal.ines.co.rs
1 entries


3380345413
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-09-14 07:53:19
2020-12-13 08:53:19
portal.ines.co.rs
1 entries


3062205098
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-07-09 04:00:31
2020-10-07 04:00:31
portal.ines.co.rs
1 entries


2860676043
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-05-15 02:38:17
2020-08-13 02:38:17
portal.ines.co.rs
1 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.loopia.se, ns2.loopia.se

QNr.DomainTypeNS used
1
se
NS
g.root-servers.net (192.112.36.4)

Answer: a.ns.se, b.ns.se, c.ns.se, f.ns.se, g.ns.se, i.ns.se, m.ns.se, x.ns.se, y.ns.se, z.ns.se
2
ns1.loopia.se: 93.188.0.20
NS
a.ns.se (2a01:3f0:0:301::53)

Answer: ns2.loopia.se
2a02:250:ffff::21, 93.188.0.21


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
portal.ines.co.rs
0

no CAA entry found
1
0
ines.co.rs
0

no CAA entry found
1
0
co.rs
0

no CAA entry found
1
0
rs
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
ines.co.rs

ok
1
0
portal.ines.co.rs

ok
1
0
_acme-challenge.portal.ines.co.rs

Name Error - The domain name does not exist
1
0
_acme-challenge.portal.ines.co.rs.ines.co.rs

Name Error - The domain name does not exist
1
0
_acme-challenge.portal.ines.co.rs.portal.ines.co.rs

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
portal.ines.co.rs
21
FTP



portal.ines.co.rs
21
FTP



portal.ines.co.rs
22
SSH



portal.ines.co.rs
22
SSH



portal.ines.co.rs
25
SMTP



portal.ines.co.rs
25
SMTP



portal.ines.co.rs
53
DNS



portal.ines.co.rs
53
DNS



portal.ines.co.rs
110
POP3



portal.ines.co.rs
110
POP3



portal.ines.co.rs
143
IMAP



portal.ines.co.rs
143
IMAP



portal.ines.co.rs
465
SMTP (encrypted)



portal.ines.co.rs
465
SMTP (encrypted)



portal.ines.co.rs
587
SMTP (encrypted, submission)



portal.ines.co.rs
587
SMTP (encrypted, submission)



portal.ines.co.rs
993
IMAP (encrypted)



portal.ines.co.rs
993
IMAP (encrypted)



portal.ines.co.rs
995
POP3 (encrypted)



portal.ines.co.rs
995
POP3 (encrypted)



portal.ines.co.rs
1433
MS SQL



portal.ines.co.rs
1433
MS SQL



portal.ines.co.rs
2082
cPanel (http)



portal.ines.co.rs
2082
cPanel (http)



portal.ines.co.rs
2083
cPanel (https)



portal.ines.co.rs
2083
cPanel (https)



portal.ines.co.rs
2086
WHM (http)



portal.ines.co.rs
2086
WHM (http)



portal.ines.co.rs
2087
WHM (https)



portal.ines.co.rs
2087
WHM (https)



portal.ines.co.rs
2089
cPanel Licensing



portal.ines.co.rs
2089
cPanel Licensing



portal.ines.co.rs
2095
cPanel Webmail (http)



portal.ines.co.rs
2095
cPanel Webmail (http)



portal.ines.co.rs
2096
cPanel Webmail (https)



portal.ines.co.rs
2096
cPanel Webmail (https)



portal.ines.co.rs
2222
DirectAdmin (http)



portal.ines.co.rs
2222
DirectAdmin (http)



portal.ines.co.rs
2222
DirectAdmin (https)



portal.ines.co.rs
2222
DirectAdmin (https)



portal.ines.co.rs
3306
mySql



portal.ines.co.rs
3306
mySql



portal.ines.co.rs
5224
Plesk Licensing



portal.ines.co.rs
5224
Plesk Licensing



portal.ines.co.rs
5432
PostgreSQL



portal.ines.co.rs
5432
PostgreSQL



portal.ines.co.rs
8080
Ookla Speedtest (http)
open
http://portal.ines.co.rs:8080/
Http-Status: -3
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

portal.ines.co.rs
8080
Ookla Speedtest (http)
open
http://portal.ines.co.rs:8080/
Http-Status: -3
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

portal.ines.co.rs
8080
Ookla Speedtest (https)
open
https://portal.ines.co.rs:8080/
Http-Status: 200
Certificate is valid
portal.ines.co.rs
8080
Ookla Speedtest (https)
open
https://portal.ines.co.rs:8080/
Http-Status: 200
Certificate is valid
portal.ines.co.rs
8083
VestaCP http



portal.ines.co.rs
8083
VestaCP http



portal.ines.co.rs
8083
VestaCP https



portal.ines.co.rs
8083
VestaCP https



portal.ines.co.rs
8443
Plesk Administration (https)



portal.ines.co.rs
8443
Plesk Administration (https)



portal.ines.co.rs
8447
Plesk Installer + Updates



portal.ines.co.rs
8447
Plesk Installer + Updates



portal.ines.co.rs
8880
Plesk Administration (http)



portal.ines.co.rs
8880
Plesk Administration (http)



portal.ines.co.rs
10000
Webmin (http)



portal.ines.co.rs
10000
Webmin (http)



portal.ines.co.rs
10000
Webmin (https)



portal.ines.co.rs
10000
Webmin (https)



89.216.28.158
21
FTP



89.216.28.158
21
FTP



89.216.28.158
22
SSH



89.216.28.158
22
SSH



89.216.28.158
25
SMTP



89.216.28.158
25
SMTP



89.216.28.158
53
DNS



89.216.28.158
53
DNS



89.216.28.158
110
POP3



89.216.28.158
110
POP3



89.216.28.158
143
IMAP



89.216.28.158
143
IMAP



89.216.28.158
465
SMTP (encrypted)



89.216.28.158
465
SMTP (encrypted)



89.216.28.158
587
SMTP (encrypted, submission)



89.216.28.158
587
SMTP (encrypted, submission)



89.216.28.158
993
IMAP (encrypted)



89.216.28.158
993
IMAP (encrypted)



89.216.28.158
995
POP3 (encrypted)



89.216.28.158
995
POP3 (encrypted)



89.216.28.158
1433
MS SQL



89.216.28.158
1433
MS SQL



89.216.28.158
2082
cPanel (http)



89.216.28.158
2082
cPanel (http)



89.216.28.158
2083
cPanel (https)



89.216.28.158
2083
cPanel (https)



89.216.28.158
2086
WHM (http)



89.216.28.158
2086
WHM (http)



89.216.28.158
2087
WHM (https)



89.216.28.158
2087
WHM (https)



89.216.28.158
2089
cPanel Licensing



89.216.28.158
2089
cPanel Licensing



89.216.28.158
2095
cPanel Webmail (http)



89.216.28.158
2095
cPanel Webmail (http)



89.216.28.158
2096
cPanel Webmail (https)



89.216.28.158
2096
cPanel Webmail (https)



89.216.28.158
2222
DirectAdmin (http)



89.216.28.158
2222
DirectAdmin (http)



89.216.28.158
2222
DirectAdmin (https)



89.216.28.158
2222
DirectAdmin (https)



89.216.28.158
3306
mySql



89.216.28.158
3306
mySql



89.216.28.158
5224
Plesk Licensing



89.216.28.158
5224
Plesk Licensing



89.216.28.158
5432
PostgreSQL



89.216.28.158
5432
PostgreSQL



89.216.28.158
8080
Ookla Speedtest (http)
open
http://89.216.28.158:8080/
Http-Status: -3
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

89.216.28.158
8080
Ookla Speedtest (http)
open
http://89.216.28.158:8080/
Http-Status: -3
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

89.216.28.158
8080
Ookla Speedtest (https)
open
https://89.216.28.158:8080/
Http-Status: 400
Bad Request
Certificate is invalid
89.216.28.158
8080
Ookla Speedtest (https)
open
https://89.216.28.158:8080/
Http-Status: 400
Bad Request
Certificate is invalid
89.216.28.158
8083
VestaCP http



89.216.28.158
8083
VestaCP http



89.216.28.158
8083
VestaCP https



89.216.28.158
8083
VestaCP https



89.216.28.158
8443
Plesk Administration (https)



89.216.28.158
8443
Plesk Administration (https)



89.216.28.158
8447
Plesk Installer + Updates



89.216.28.158
8447
Plesk Installer + Updates



89.216.28.158
8880
Plesk Administration (http)



89.216.28.158
8880
Plesk Administration (http)



89.216.28.158
10000
Webmin (http)



89.216.28.158
10000
Webmin (http)



89.216.28.158
10000
Webmin (https)



89.216.28.158
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=14feb1ec-5f4e-4c35-96d6-964c6ad6e818


Last Result: https://check-your-website.server-daten.de/?q=portal.ines.co.rs - 2021-02-23 09:31:57


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=portal.ines.co.rs" target="_blank">Check this Site: portal.ines.co.rs</a>