Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

X

 

DNS-problem - authoritative Nameserver refused, not defined or timeout

 

Checked:
01.08.2024 09:47:51

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
redtest.ddns.net
A
89.68.144.183
Piastów/Mazovia/Poland (PL) - UPC.pl
Hostname: 89-68-144-183.dynamic.chello.pl
yes
1
0

AAAA

yes


www.redtest.ddns.net

Name Error
yes
1
0
*.redtest.ddns.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20038, Flags 256






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2024, 00:00:00 +, Signature-Inception: 31.07.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: net

net
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=






1 RRSIG RR to validate DS RR found






RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 14.08.2024, 05:00:00 +, Signature-Inception: 01.08.2024, 04:00:00 +, KeyTag 20038, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20038 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 42924, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.08.2024, 14:10:35 +, Signature-Inception: 26.07.2024, 14:05:35 +, KeyTag 37331, Signer-Name: net






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: ddns.net

ddns.net
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "e51o1pdujacqu01c7sqi76kt359m7agm" between the hashed NSEC3-owner "e51ibqtitekbdgofi46o3irqms1j9apj" and the hashed NextOwner "e51peeeeaj4k8hqim65ha9l4sei317p8". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner e51ibqtitekbdgofi46o3irqms1j9apj.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 08.08.2024, 02:48:03 +, Signature-Inception: 01.08.2024, 01:38:03 +, KeyTag 42924, Signer-Name: net






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "ddns.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 08.08.2024, 02:45:51 +, Signature-Inception: 01.08.2024, 01:35:51 +, KeyTag 42924, Signer-Name: net






0 DNSKEY RR found









Zone: redtest.ddns.net

redtest.ddns.net
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: www.redtest.ddns.net

www.redtest.ddns.net
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.redtest.ddns.net
  nf1.no-ip.com

redtest.ddns.net
  nf1.no-ip.com / frana1
194.62.182.53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC


 
2a07:dc00:1820::53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC

ddns.net
  nf1.no-ip.com / frana1
194.62.182.53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC


 
2a07:dc00:1820::53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC


  nf2.no-ip.com / cdgvr1
45.54.64.53
Reno/Nevada/United States (US) - Vitalwerks Internet Solutions, LLC


 
2607:f740:e626::53
Reno/Nevada/United States (US) - Vitalwerks Internet Solutions, LLC


  nf3.no-ip.com / frana1
204.16.253.53
Reno/Nevada/United States (US) - Vitalwerks Internet Solutions, LLC


 
2620:0:2e61::53
Piscataway/New Jersey/United States (US) - Vitalwerks Internet Solutions, LLC


  nf4.no-ip.com / cdgvr1
194.62.183.53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC


 
2a07:dc00:1830::53
Washington/District of Columbia/United States (US) - Vitalwerks Internet Solutions, LLC


  nf5.no-ip.com / frana1
204.16.253.53
Reno/Nevada/United States (US) - Vitalwerks Internet Solutions, LLC


 
2620:0:2e61::53
Piscataway/New Jersey/United States (US) - Vitalwerks Internet Solutions, LLC

net
  a.gtld-servers.net / nnn1-par6


  b.gtld-servers.net / nnn1-elwaw4


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-par6


  e.gtld-servers.net / nnn1-par6


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-ein2


  k.gtld-servers.net / nnn1-frmrs-2


  l.gtld-servers.net / nnn1-frmrs-2


  m.gtld-servers.net / nnn1-frmrs-2

 

4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1722498450
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1722498465
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:8


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644475
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644475
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644475
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644476
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:4


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644476
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:4


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644476
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:4


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644478
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644478
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644478
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644483
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644483
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644483
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:redtest.ddns.net
Zone-Name:ddns.net
Primary:nf1.no-ip.com
Mail:hostmaster.no-ip.com
Serial:2585644495
Refresh:10800
Retry:1800
Expire:604800
TTL:1800
num Entries:2


Domain:www.redtest.ddns.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://redtest.ddns.net/admin/master/console/, address used: https://redtest.ddns.net/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fredtest.ddns.net%2Fadmin%2Fmaster%2Fconsole%2F&state=a216558d-e871-47f9-8d15-22b18278376a&response_mode=query&response_type=code&scope=openid&nonce=6db4da74-7cf8-46f1-9b6f-3147928f62bd&code_challenge=2WbJLO721OWfdKcWP9B9YRxNNE2_Yx3__zVevVuw4sg&code_challenge_method=S256, Screenshot created 2024-08-01 09:51:48 +00:0

 

Mobil (412px x 732px)

 

1179 milliseconds

 

Screenshot mobile - https://redtest.ddns.net/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fredtest.ddns.net%2Fadmin%2Fmaster%2Fconsole%2F&state=a216558d-e871-47f9-8d15-22b18278376a&response_mode=query&response_type=code&scope=openid&nonce=6db4da74-7cf8-46f1-9b6f-3147928f62bd&code_challenge=2WbJLO721OWfdKcWP9B9YRxNNE2_Yx3__zVevVuw4sg&code_challenge_method=S256
Mobil + Landscape (732px x 412px)

 

1182 milliseconds

 

Screenshot mobile landscape - https://redtest.ddns.net/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fredtest.ddns.net%2Fadmin%2Fmaster%2Fconsole%2F&state=a216558d-e871-47f9-8d15-22b18278376a&response_mode=query&response_type=code&scope=openid&nonce=6db4da74-7cf8-46f1-9b6f-3147928f62bd&code_challenge=2WbJLO721OWfdKcWP9B9YRxNNE2_Yx3__zVevVuw4sg&code_challenge_method=S256
Screen (1280px x 1680px)

 

1303 milliseconds

 

Screenshot Desktop - https://redtest.ddns.net/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fredtest.ddns.net%2Fadmin%2Fmaster%2Fconsole%2F&state=a216558d-e871-47f9-8d15-22b18278376a&response_mode=query&response_type=code&scope=openid&nonce=6db4da74-7cf8-46f1-9b6f-3147928f62bd&code_challenge=2WbJLO721OWfdKcWP9B9YRxNNE2_Yx3__zVevVuw4sg&code_challenge_method=S256

 

Mobile- and other Chrome-Checks


widthheight
visual Viewport412732
content Size412732

 

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://redtest.ddns.net/
89.68.144.183
302
https://redtest.ddns.net/
Html is minified: 100.00 %
0.110
A
Location: https://redtest.ddns.net/
Date: Thu, 01 Aug 2024 07:48:52 GMT
Connection: close
Content-Length: 5
Content-Type: text/plain; charset=utf-8

• https://redtest.ddns.net/
89.68.144.183
302
https://redtest.ddns.net/admin/

2.913
A
Location: https://redtest.ddns.net/admin/
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=31536000; includeSubDomains
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Date: Thu, 01 Aug 2024 07:48:52 GMT
Connection: close
Content-Length: 0

• https://redtest.ddns.net/admin/

302
https://redtest.ddns.net/admin/master/console/

2.757
A
Location: https://redtest.ddns.net/admin/master/console/
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=31536000; includeSubDomains
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-XSS-Protection: 1; mode=block
Date: Thu, 01 Aug 2024 07:49:00 GMT
Connection: close
Content-Length: 0

• https://redtest.ddns.net/admin/master/console/

Inline-JavaScript (∑/total): 1/0 Inline-CSS (∑/total): 1/608
200

Html is minified: 150.93 %
Other inline scripts (∑/total): 2/881
2.950
A
Cache-Control: no-cache
Content-Security-Policy: frame-src 'self'; frame-ancestors 'self'; object-src 'none';
Referrer-Policy: no-referrer
Strict-Transport-Security: max-age=31536000; includeSubDomains
Vary: Accept-Encoding
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Robots-Tag: none
X-XSS-Protection: 1; mode=block
Date: Thu, 01 Aug 2024 07:49:08 GMT
Connection: close
Content-Encoding: gzip
Content-Language: en
Content-Type: text/html; charset=utf-8
Content-Length: 1021

• http://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
89.68.144.183
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
0.110
A
Visible Content:
Location: https://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Date: Thu, 01 Aug 2024 07:48:56 GMT
Connection: close
Content-Length: 5
Content-Type: text/plain; charset=utf-8

• https://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
2.783
A
Not Found
Visible Content:
Vary: Accept-Encoding
Date: Thu, 01 Aug 2024 07:49:04 GMT
Connection: close
Content-Length: 146
Content-Type: application/json

• https://89.68.144.183/
89.68.144.183
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
2.883
N
Not Found
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
X-Content-Type-Options: nosniff
Date: Thu, 01 Aug 2024 07:48:56 GMT
Connection: close
Content-Type: text/plain; charset=utf-8
Content-Length: 19

 

7. Comments


1. General Results, most used to calculate the result

Aname "redtest.ddns.net" is domain, public suffix is ".ddns.net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 9342 (complete: 245733)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: redtest.ddns.net has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: redtest.ddns.net has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Ahttps://redtest.ddns.net/admin/
302
https://redtest.ddns.net/admin/master/console/
Correct redirect https to https
Ahttps://redtest.ddns.net/ 89.68.144.183
302
https://redtest.ddns.net/admin/
Correct redirect https to https
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):2 complete Content-Type - header (3 urls)
https://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
Ahttp://redtest.ddns.net/ 89.68.144.183
302
https://redtest.ddns.net/
Correct redirect http - https with the same domain name
Bhttps://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404

Missing HSTS-Header
Mhttps://89.68.144.183/ 89.68.144.183
404

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://89.68.144.183/ 89.68.144.183
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Oredtest.ddns.net / 89.68.144.183 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 4 Cipher Suites without Forward Secrecy found
Oredtest.ddns.net / 89.68.144.183 / 8080


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 4 Cipher Suites without Forward Secrecy found
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are different. So that domain requires Server Name Indication (SNI), so the server is able to select the correct certificate.: Domain redtest.ddns.net, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.redtest.ddns.net

2. Header-Checks

Aredtest.ddns.net
Content-Security-Policy
Ok: Header without syntax errors found: frame-src 'self'; frame-ancestors 'self'; object-src 'none';
F

Bad: Missing default-src directive. A default-src directive is used if one of the specialized fetch directives (child-src, connect-src, font-src, frame-src, img-src, manifest-src, media-src, object-src, prefetch-src, script-src, style-src, worker-src) isn't defined. Missing default-src, all sources are allowed, that's bad. A default-src with 'none' or 'self' blocks that.
E

Bad: No form-action directive found. Use one to limit the form - action - destinations. form-action is a navigation-directive, so default-src isn't used.
A

Good: frame-ancestors directive found. That limits pages who are allowed to use this page in a frame / iframe / object / embed / applet. frame-ancestors is a navigation-directive, so default-src isn't used.
E

Bad: No base-uri directive found. Use one to limit the URLs which can be used in a document's <base> element. Because it's a document directive, default-src isn't used, so an own directive is required.
A

Good: object-src only with 'none' or 'self' found, no scheme, no other urls. That blocks object / embed / applet - elements.
F

Critical: No script-src and no default-src as fallback defined. So scripts are unlimited. That's fatal.
A

Good: frame-src without data: defined or frame-src missing and the default-src used as fallback not allows the data: schema. That blocks hidden code injection. Insert <iframe src="data:text/html;charset=utf-8;base64,PCFET0NUWVBFIGh0bWw+PGh0bWw+PGJvZHk+PHA+YmVmb3JlPHNjcmlwdCB0eXBlPSJ0ZXh0L2phdmFzY3JpcHQiPmFsZXJ0KCdYU1MnKTwvc2NyaXB0PjxwPmFmdGVyPC9ib2R5PjwvaHRtbD4="></iframe> in your page and see what happens.
A
X-Content-Type-Options
Ok: Header without syntax errors found: nosniff
A
Referrer-Policy
Ok: Header without syntax errors found: no-referrer
A
X-Frame-Options
Ok: Header without syntax errors found: SAMEORIGIN
B

Info: Header is deprecated. May not longer work in modern browsers. SAMEORIGIN. Better solution: Use a Content-Security-Policy Header with a frame-ancestors directive. DENY - use 'none', SAMEORIGIN - use 'self'. If you want to allow some domains to frame your page, add these urls.
A
X-Xss-Protection
Ok: Header without syntax errors found: 1; mode=block
B

Info: Header is deprecated. May not longer work in modern browsers. 1; mode=block
Fredtest.ddns.net
Permissions-Policy
Critical: Missing Header:
Bredtest.ddns.net
Cross-Origin-Embedder-Policy
Info: Missing Header
Bredtest.ddns.net
Cross-Origin-Opener-Policy
Info: Missing Header
Bredtest.ddns.net
Cross-Origin-Resource-Policy
Info: Missing Header

3. DNS- and NameServer - Checks

AInfo:: 16 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 5 Name Servers.
AInfo:: 16 Queries complete, 16 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.2 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 5 different Name Servers found: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com, 4 Name Servers included in Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, 5 Name Servers included in 1 Zone definitions: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com, 1 Name Servers listed in SOA.Primary: nf1.no-ip.com.
AGood: Only one SOA.Primary Name Server found.: nf1.no-ip.com.
AGood: SOA.Primary Name Server included in the delegation set.: nf1.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf1.no-ip.com (194.62.182.53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf1.no-ip.com (2a07:dc00:1820::53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf2.no-ip.com (45.54.64.53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf2.no-ip.com (2607:f740:e626::53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf3.no-ip.com (204.16.253.53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf3.no-ip.com (2620:0:2e61::53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf4.no-ip.com (194.62.183.53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf4.no-ip.com (2a07:dc00:1830::53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf5.no-ip.com (204.16.253.53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
XFatal: Inconsistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Read https://www.iana.org/help/nameserver-requirements and send it to your Name Server Hoster.: nf5.no-ip.com (2620:0:2e61::53): Delegation: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, Zone: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com. Name Servers defined in Zone, missing in Delegation: nf5.no-ip.com.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 5 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 5 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 5 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: no-ip.com
Warning: All Name Servers from the same Country / IP location.: 5 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 5 Name Servers, 3 different subnets (first Byte): 194., 204., 45., 3 different subnets (first two Bytes): 194.62., 204.16., 45.54., 4 different subnets (first three Bytes): 194.62.182., 194.62.183., 204.16.253., 45.54.64.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 5 Name Servers with IPv6, 3 different subnets (first block): 2607:, 2620:, 2a07:, 3 different subnets (first two blocks): 2607:f740:, 2620:0000:, 2a07:dc00:, 4 different subnets (first three blocks): 2607:f740:e626:, 2620:0000:2e61:, 2a07:dc00:1820:, 2a07:dc00:1830:, 4 different subnets (first four blocks): 2607:f740:e626:0000:, 2620:0000:2e61:0000:, 2a07:dc00:1820:0000:, 2a07:dc00:1830:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: nf1.no-ip.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, httpd -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory. Create a web.config in that directory. Content: <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>. If you have a redirect http ⇒ https, that's ok, Letsencrypt follows such redirects to port 80 / 443 (same or other server). There must be a certificate. But the certificate may be expired, self signed or with a not matching domain name. Checking the validation file Letsencrypt ignores such certificate errors. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 and greater 1024 Bytes is compressed (gzip, deflate, br checked).
https://redtest.ddns.net/admin/master/console/
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://redtest.ddns.net/admin/master/console/
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
AGood: Every https connection via port 443 supports the http/2 protocol via ALPN.
https://redtest.ddns.net/admin/master/console/
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
AGood: All CSS / JavaScript files are sent compressed (gzip, deflate, br checked). That reduces the content of the files. 2 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 0 external CSS / JavaScript files without Cache-Control-Header, 2 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 2 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://redtest.ddns.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
404
2.783 seconds
Warning: 404 needs more then one second
https://89.68.144.183/ 89.68.144.183
404
2.883 seconds
Warning: 404 needs more then one second
ADuration: 257904 milliseconds, 257.904 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
redtest.ddns.net
redtest.ddns.net
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
redtest.ddns.net
redtest.ddns.net
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=redtest.ddns.net


2CN=R11, O=Let's Encrypt, C=US


redtest.ddns.net
89.68.144.183
443
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

redtest.ddns.net
89.68.144.183
443
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
SNI required
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=redtest.ddns.net


2CN=R11, O=Let's Encrypt, C=US


89.68.144.183
89.68.144.183
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

89.68.144.183
89.68.144.183
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Self signed certificate

1CN=TRAEFIK DEFAULT CERT


redtest.ddns.net
89.68.144.183
8080
ok
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

redtest.ddns.net
89.68.144.183
8080
ok
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=redtest.ddns.net


2CN=R11, O=Let's Encrypt, C=US

 

9. Certificates

1.
1.
CN=redtest.ddns.net
30.07.2024
28.10.2024
205 days expired
redtest.ddns.net - 1 entry
1.
1.
CN=redtest.ddns.net
30.07.2024

28.10.2024
205 days expired


redtest.ddns.net - 1 entry

KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0459F965C4C859ECD069EC7BF421DEC7D510
Thumbprint:9EA6DD96FB0A48C76D831657F9770C2DF3F519A0
SHA256 / Certificate:XUiK4Ceg67cBWcRkUnhjqqZB6R3TqBULHUdiqoV+Nog=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):7519fc7a5da4ba78c96a83e620425abc3688468ad87ec82e7b0a44280552e81c
SHA256 hex / Subject Public Key Information (SPKI):7519fc7a5da4ba78c96a83e620425abc3688468ad87ec82e7b0a44280552e81c (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r11.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=R11, O=Let's Encrypt, C=US
13.03.2024
13.03.2027
expires in 661 days


2.
CN=R11, O=Let's Encrypt, C=US
13.03.2024

13.03.2027
expires in 661 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008A7D3E13D62F30EF2386BD29076B34F8
Thumbprint:696DB3AF0DFFC17E65C6A20D925C5A7BD24DEC7E
SHA256 / Certificate:WR6c5shj06B56fq+FHjHM5omshJp3eeVIRNhAkrjGkQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6ddac18698f7f1f7e1c69b9bce420d974ac6f94ca8b2c761701623f99c767dc7
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3666 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3666 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




2.
1.
CN=TRAEFIK DEFAULT CERT
01.08.2024
01.08.2025
expires in 72 days
2e38d243017f51bd142c0726a51b28ee.3b1d5e6079b1e633067633f181d46241.traefik.default - 1 entry
2.
1.
CN=TRAEFIK DEFAULT CERT
01.08.2024

01.08.2025
expires in 72 days


2e38d243017f51bd142c0726a51b28ee.3b1d5e6079b1e633067633f181d46241.traefik.default - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00EF64CBD402B465CA1581DCDAF9A47130
Thumbprint:CF4CE810E3D7FDBC96DEE12ACE6459D538109892
SHA256 / Certificate:DJsy69PmB/e57HutwJq93TLC/b6pIvyDg+V5S28qKzk=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):fac12b7c510a3db32724cbabf49ee88433c5cb96081f6fa48a78137fdb4b73bc
SHA256 hex / Subject Public Key Information (SPKI):fac12b7c510a3db32724cbabf49ee88433c5cb96081f6fa48a78137fdb4b73bc (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=R10, O=Let's Encrypt, C=US
0
0
1
CN=R11, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7829996287
leaf cert
CN=R11, O=Let's Encrypt, C=US
2024-07-30 11:26:38
2024-10-28 11:26:37
redtest.ddns.net - 1 entries


7829817276
leaf cert
CN=R10, O=Let's Encrypt, C=US
2024-07-30 10:54:22
2024-10-28 10:54:21
redtest.ddns.net - 1 entries


 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=R10, O=Let's Encrypt, C=US
0
0
1
CN=R11, O=Let's Encrypt, C=US
0
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
13947705330
leaf cert
CN=R11, O=Let's Encrypt, C=US
2024-07-30 09:26:38
2024-10-28 10:26:37
redtest.ddns.net
1 entries


13930883795
precert
CN=R10, O=Let's Encrypt, C=US
2024-07-30 08:54:22
2024-10-28 09:54:21
redtest.ddns.net
1 entries


 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://redtest.ddns.net/admin/master/console/
link
stylesheet
1

0
1
0
0
0
0


link
other
1

0
1
0
0
0
0


meta
other
3

0


0
0
0


script

1

0
1
0
0
0
0

 

Details (currently limited to 500 rows - some problems with spam users)

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://redtest.ddns.net/admin/master/console/

link
icon
/resources/apkqf/admin/keycloak.v2/favicon.svg
200

1
ok
image/svg+xml
X-Content-Type-Options nosniff found





Cache-Control: no-cache - max-age missing.
No Compression - 2406 Bytes








link
stylesheet
/resources/apkqf/admin/keycloak.v2/assets/main-CE91Uf3U.css
200

1
ok
text/css
X-Content-Type-Options nosniff found





Cache-Control: no-cache - max-age missing.
Compression required: 88698 Bytes






local SRI possible, possible hash-values:

 

sha256-8aByph30FCD8OIvvSvBItjKe3pk4ahj3HyFmkp9LeXE=
sha384-UBViloCpomkRZlM0gCLQb9HlGK30DYDILbkJqhUVMgeib7DpCQuHYPhAwWKgn72P
sha512-F9aPR1sl0IY+cY4R/ydAivI3kjtjpdSm+CHHKJQHUnHUMADsST/NCQFX5qjcISl0WIuFJFNqQYn5sXEv/yPHtg==

 

<link rel="stylesheet" href="/resources/apkqf/admin/keycloak.v2/assets/main-CE91Uf3U.css" crossorigin="anonymous" integrity="sha256-8aByph30FCD8OIvvSvBItjKe3pk4ahj3HyFmkp9LeXE=" />


Content loaded via url("...")

 

./pf-v5-pficon-CuZoKQg5.woff21
./RedHatDisplay-Bold-4NfIjmgI.woff21
./RedHatDisplay-BoldItalic-pTGisv8w.woff21
./RedHatDisplay-Medium-C1BzJLzv.woff21
./RedHatDisplay-MediumItalic-ZwmBpJRm.woff21
./RedHatDisplayVF-CYDHf1NI.woff21
./RedHatDisplayVF-Italic-CRpusWc8.woff21
./RedHatMono-Italic-CV5TsSDj.woff21
./RedHatMono-Regular-e08YtVYm.woff21
./RedHatMonoVF-C4fMH6Vz.woff21
./RedHatMonoVF-Italic-DGQo2ogW.woff21
./RedHatText-Italic-BLl-MYdo.woff21
./RedHatText-Medium-CFPgPIaW.woff21
./RedHatText-MediumItalic-B14GYUh6.woff21
./RedHatText-Regular-BDARZx4I.woff21
./RedHatTextVF-Italic-Dkj_WqbA.woff21
./RedHatTextVF-wYvZ7prR.woff21

meta
charset
utf-8


1
ok















meta
description
The Keycloak Administration Console is a web-based interface for managing Keycloak.


1
ok















meta
viewport
width=device-width, initial-scale=1


1
ok















script
src
/resources/apkqf/admin/keycloak.v2/assets/main-DaRVFITZ.js
200

1
ok
Missing defer / async attribute. text/javascript
X-Content-Type-Options nosniff found





Cache-Control: no-cache - max-age missing.
Compression required: 188437 Bytes






local SRI possible, possible hash-values:

 

sha256-AE5dS7U2ItlQE1IdD/4ptZo6hfkva+WGfIh0MrfZ8tw=
sha384-aYN+2UueAE+EVbi/jJ9Cg5XWCxifm2xMf8zzD9en0R3pFRyEHZkYOJmWEIV8D6aB
sha512-H7DE1BRF2Z4gNsQ2QOuXVg+enGCbXhM4lKFlwuhP9yjRkrXvyiTRi+6/n8h8Nv4TtlCOV+L2gtWB0m5HX96ACA==

 

<script src="/resources/apkqf/admin/keycloak.v2/assets/main-DaRVFITZ.js" crossorigin="anonymous" integrity="sha256-AE5dS7U2ItlQE1IdD/4ptZo6hfkva+WGfIh0MrfZ8tw=" />


 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: nf1.no-ip.com, nf2.no-ip.com, nf3.no-ip.com, nf4.no-ip.com, nf5.no-ip.com

 

QNr.DomainTypeNS used
1
com
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
nf1.no-ip.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.no-ip.com, ns2.no-ip.com, ns3.no-ip.com, ns4.no-ip.com

Answer: ns1.no-ip.com
194.62.181.53, 2a07:dc00:1810::53

Answer: ns2.no-ip.com
194.62.180.53, 2a07:dc00:180::53

Answer: ns3.no-ip.com
204.16.255.53, 2a07:dc00:2550::53

Answer: ns4.no-ip.com
204.16.254.53, 2620:0:2e64::53
3
nf2.no-ip.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.no-ip.com, ns2.no-ip.com, ns3.no-ip.com, ns4.no-ip.com

Answer: ns1.no-ip.com
194.62.181.53, 2a07:dc00:1810::53

Answer: ns2.no-ip.com
194.62.180.53, 2a07:dc00:180::53

Answer: ns3.no-ip.com
204.16.255.53, 2a07:dc00:2550::53

Answer: ns4.no-ip.com
204.16.254.53, 2620:0:2e64::53
4
nf3.no-ip.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.no-ip.com, ns2.no-ip.com, ns3.no-ip.com, ns4.no-ip.com

Answer: ns1.no-ip.com
194.62.181.53, 2a07:dc00:1810::53

Answer: ns2.no-ip.com
194.62.180.53, 2a07:dc00:180::53

Answer: ns3.no-ip.com
204.16.255.53, 2a07:dc00:2550::53

Answer: ns4.no-ip.com
204.16.254.53, 2620:0:2e64::53
5
nf4.no-ip.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.no-ip.com, ns2.no-ip.com, ns3.no-ip.com, ns4.no-ip.com

Answer: ns1.no-ip.com
194.62.181.53, 2a07:dc00:1810::53

Answer: ns2.no-ip.com
194.62.180.53, 2a07:dc00:180::53

Answer: ns3.no-ip.com
204.16.255.53, 2a07:dc00:2550::53

Answer: ns4.no-ip.com
204.16.254.53, 2620:0:2e64::53
6
nf5.no-ip.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.no-ip.com, ns2.no-ip.com, ns3.no-ip.com, ns4.no-ip.com

Answer: ns1.no-ip.com
194.62.181.53, 2a07:dc00:1810::53

Answer: ns2.no-ip.com
194.62.180.53, 2a07:dc00:180::53

Answer: ns3.no-ip.com
204.16.255.53, 2a07:dc00:2550::53

Answer: ns4.no-ip.com
204.16.254.53, 2620:0:2e64::53
7
nf1.no-ip.com: 194.62.182.53
A
ns1.no-ip.com (2a07:dc00:1810::53)
8
nf1.no-ip.com: 2a07:dc00:1820::53
AAAA
ns1.no-ip.com (2a07:dc00:1810::53)
9
nf2.no-ip.com: 45.54.64.53
A
ns1.no-ip.com (2a07:dc00:1810::53)
10
nf2.no-ip.com: 2607:f740:e626::53
AAAA
ns1.no-ip.com (2a07:dc00:1810::53)
11
nf3.no-ip.com: 204.16.253.53
A
ns1.no-ip.com (2a07:dc00:1810::53)
12
nf3.no-ip.com: 2620:0:2e61::53
AAAA
ns1.no-ip.com (2a07:dc00:1810::53)
13
nf4.no-ip.com: 194.62.183.53
A
ns1.no-ip.com (2a07:dc00:1810::53)
14
nf4.no-ip.com: 2a07:dc00:1830::53
AAAA
ns1.no-ip.com (2a07:dc00:1810::53)
15
nf5.no-ip.com: 204.16.253.53
A
ns1.no-ip.com (2a07:dc00:1810::53)
16
nf5.no-ip.com: 2620:0:2e61::53
AAAA
ns1.no-ip.com (2a07:dc00:1810::53)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
redtest.ddns.net
0

no CAA entry found
1
0
ddns.net
0

no CAA entry found
1
0
net
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
redtest.ddns.net

ok
1
0
_acme-challenge.redtest.ddns.net

Name Error - The domain name does not exist
1
0
_acme-challenge.redtest.ddns.net.redtest.ddns.net

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
redtest.ddns.net
89.68.144.183
443
9 Ciphers58.36 sec
4 without, 5 FS
55.56 %
redtest.ddns.net
89.68.144.183
8080
9 Ciphers58.21 secOokla Speedtest (https)
4 without, 5 FS
55.56 %
Complete

2
18 Ciphers
9.00 Ciphers/Check
116.58 sec58.29 sec/Check
8 without, 10 FS
55.56 %

Details
DomainIPPortCipher (OpenSsl / IANA)
redtest.ddns.net
89.68.144.183
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
9 Ciphers, 58.36 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1



8080
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
9 Ciphers, 58.21 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1

 

18. Portchecks

DomainIPPortDescriptionResultAnswer
redtest.ddns.net
89.68.144.183
21
FTP



redtest.ddns.net
89.68.144.183
21
FTP



redtest.ddns.net
89.68.144.183
22
SSH
open
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11

redtest.ddns.net
89.68.144.183
22
SSH
open
SSH-2.0-OpenSSH_8.2p1 Ubuntu-4ubuntu0.11
Bad: SSH without DNS SSHFP Record found

Possible DNS SSHFP Entries:
redtest.ddns.net IN SSHFP 1 2 0e099ad0d9d462a7821ad8529780812030eadea22d140fd9910a814506a07e16
redtest.ddns.net IN SSHFP 3 2 b30690da671051d6989078dc2719368aa164fcb1aabd7be499845f74e8109e63
redtest.ddns.net IN SSHFP 4 2 474b82ea8111330f797a59d89b677250d0f11b35993baed964fc3f1a07177aa4
redtest.ddns.net
89.68.144.183
25
SMTP



redtest.ddns.net
89.68.144.183
25
SMTP



redtest.ddns.net
89.68.144.183
53
DNS



redtest.ddns.net
89.68.144.183
53
DNS



redtest.ddns.net
89.68.144.183
110
POP3



redtest.ddns.net
89.68.144.183
110
POP3



redtest.ddns.net
89.68.144.183
143
IMAP



redtest.ddns.net
89.68.144.183
143
IMAP



redtest.ddns.net
89.68.144.183
465
SMTP (encrypted)



redtest.ddns.net
89.68.144.183
465
SMTP (encrypted)



redtest.ddns.net
89.68.144.183
587
SMTP (encrypted, submission)



redtest.ddns.net
89.68.144.183
587
SMTP (encrypted, submission)



redtest.ddns.net
89.68.144.183
993
IMAP (encrypted)



redtest.ddns.net
89.68.144.183
993
IMAP (encrypted)



redtest.ddns.net
89.68.144.183
995
POP3 (encrypted)



redtest.ddns.net
89.68.144.183
995
POP3 (encrypted)



redtest.ddns.net
89.68.144.183
1433
MS SQL



redtest.ddns.net
89.68.144.183
1433
MS SQL



redtest.ddns.net
89.68.144.183
2082
cPanel (http)



redtest.ddns.net
89.68.144.183
2082
cPanel (http)



redtest.ddns.net
89.68.144.183
2083
cPanel (https)



redtest.ddns.net
89.68.144.183
2083
cPanel (https)



redtest.ddns.net
89.68.144.183
2086
WHM (http)



redtest.ddns.net
89.68.144.183
2086
WHM (http)



redtest.ddns.net
89.68.144.183
2087
WHM (https)



redtest.ddns.net
89.68.144.183
2087
WHM (https)



redtest.ddns.net
89.68.144.183
2089
cPanel Licensing



redtest.ddns.net
89.68.144.183
2089
cPanel Licensing



redtest.ddns.net
89.68.144.183
2095
cPanel Webmail (http)



redtest.ddns.net
89.68.144.183
2095
cPanel Webmail (http)



redtest.ddns.net
89.68.144.183
2096
cPanel Webmail (https)



redtest.ddns.net
89.68.144.183
2096
cPanel Webmail (https)



redtest.ddns.net
89.68.144.183
2222
DirectAdmin (http)



redtest.ddns.net
89.68.144.183
2222
DirectAdmin (http)



redtest.ddns.net
89.68.144.183
2222
DirectAdmin (https)



redtest.ddns.net
89.68.144.183
2222
DirectAdmin (https)



redtest.ddns.net
89.68.144.183
3306
mySql



redtest.ddns.net
89.68.144.183
3306
mySql



redtest.ddns.net
89.68.144.183
5224
Plesk Licensing



redtest.ddns.net
89.68.144.183
5224
Plesk Licensing



redtest.ddns.net
89.68.144.183
5432
PostgreSQL



redtest.ddns.net
89.68.144.183
5432
PostgreSQL



redtest.ddns.net
89.68.144.183
8080
Ookla Speedtest (http)
open
http://89.68.144.183:8080/
Http-Status: 301
Redirect: http://redtest.ddns.net/dashboard/
redtest.ddns.net
89.68.144.183
8080
Ookla Speedtest (http)
open
http://89.68.144.183:8080/
Http-Status: 301
Redirect: http://redtest.ddns.net/dashboard/
redtest.ddns.net
89.68.144.183
8080
Ookla Speedtest (https)
open
https://89.68.144.183:8080/
Http-Status: 404
Not Found
Certificate is valid
redtest.ddns.net
89.68.144.183
8080
Ookla Speedtest (https)
open
https://89.68.144.183:8080/
Http-Status: 404
Not Found
Certificate is valid
redtest.ddns.net
89.68.144.183
8083
VestaCP http



redtest.ddns.net
89.68.144.183
8083
VestaCP http



redtest.ddns.net
89.68.144.183
8083
VestaCP https



redtest.ddns.net
89.68.144.183
8083
VestaCP https



redtest.ddns.net
89.68.144.183
8443
Plesk Administration (https)



redtest.ddns.net
89.68.144.183
8443
Plesk Administration (https)



redtest.ddns.net
89.68.144.183
8447
Plesk Installer + Updates



redtest.ddns.net
89.68.144.183
8447
Plesk Installer + Updates



redtest.ddns.net
89.68.144.183
8880
Plesk Administration (http)



redtest.ddns.net
89.68.144.183
8880
Plesk Administration (http)



redtest.ddns.net
89.68.144.183
10000
Webmin (http)



redtest.ddns.net
89.68.144.183
10000
Webmin (http)



redtest.ddns.net
89.68.144.183
10000
Webmin (https)



redtest.ddns.net
89.68.144.183
10000
Webmin (https)



 

 

Permalink: https://check-your-website.server-daten.de/?i=ee6d2d26-0c8d-4de0-b478-cd0013f04e70

 

Last Result: https://check-your-website.server-daten.de/?q=redtest.ddns.net - 2024-08-01 09:47:51

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=redtest.ddns.net" target="_blank">Check this Site: redtest.ddns.net</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=redtest.ddns.net