Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

Q

 

http sent over port 443

 

Checked:
25.02.2026 13:41:35

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
rmktestco.customs.gov.my
CNAME
rmktest.customs.gov.my
yes
1
0

A
202.122.153.148
Kuala Lumpur/Malaysia (MY) - Maxis Broadband Sdn Bhd
No Hostname found
yes


www.rmktestco.customs.gov.my

Name Error
yes
1
0
*.customs.gov.my
A
Name Error
yes



A
Name Error
yes



AAAA
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



CNAME
Name Error
yes


*.rmktestco.customs.gov.my
A
Name Error
yes



A
Name Error
yes



AAAA
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 21831, Flags 256






Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2026, 00:00:00 +, Signature-Inception: 20.02.2026, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: my

my
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 47187, DigestType 2 and Digest i3DPTEgjPQYkVWUj6lLFJPFXgAuXRFxqYqjAeDN1Z64=






2 RRSIG RR to validate DS RR found






RRSIG-Owner my., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2026, 05:00:00 +, Signature-Inception: 25.02.2026, 04:00:00 +, KeyTag 21831, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 21831 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 35003, Flags 256






Public Key with Algorithm 13, KeyTag 39626, Flags 256






Public Key with Algorithm 13, KeyTag 47187, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner my., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 01.03.2026, 18:38:14 +, Signature-Inception: 30.01.2026, 12:43:54 +, KeyTag 47187, Signer-Name: my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 47187 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 47187, DigestType 2 and Digest "i3DPTEgjPQYkVWUj6lLFJPFXgAuXRFxqYqjAeDN1Z64=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: gov.my

gov.my
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 52927, DigestType 2 and Digest 9Eb0YycBp5IV+OECn596MYtbrvwtBANo+Sc94G2+T3o=






2 RRSIG RR to validate DS RR found






RRSIG-Owner gov.my., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 01.03.2026, 11:24:42 +, Signature-Inception: 30.01.2026, 12:43:54 +, KeyTag 35003, Signer-Name: my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35003 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 20756, Flags 256






Public Key with Algorithm 13, KeyTag 47199, Flags 256






Public Key with Algorithm 13, KeyTag 52927, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner gov.my., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 02.03.2026, 01:02:29 +, Signature-Inception: 30.01.2026, 12:43:42 +, KeyTag 52927, Signer-Name: gov.my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 52927 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 52927, DigestType 2 and Digest "9Eb0YycBp5IV+OECn596MYtbrvwtBANo+Sc94G2+T3o=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: customs.gov.my

customs.gov.my
2 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 11650, DigestType 1 and Digest t7bpaoXH88YrQhug3ilrgFxmXEQ=






DS with Algorithm 8, KeyTag 11650, DigestType 2 and Digest /AN0uhfxuPmzi21v9NrY6pFenLnBpoi7LDOmwFh6ACs=






2 RRSIG RR to validate DS RR found






RRSIG-Owner customs.gov.my., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 01.03.2026, 08:06:31 +, Signature-Inception: 30.01.2026, 12:43:42 +, KeyTag 47199, Signer-Name: gov.my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 47199 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 11650, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 53340, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner customs.gov.my., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.03.2026, 17:10:50 +, Signature-Inception: 16.02.2026, 16:44:15 +, KeyTag 11650, Signer-Name: customs.gov.my






RRSIG-Owner customs.gov.my., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.03.2026, 17:10:50 +, Signature-Inception: 16.02.2026, 16:44:15 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 11650 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53340 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 11650, DigestType 1 and Digest "t7bpaoXH88YrQhug3ilrgFxmXEQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 11650, DigestType 2 and Digest "/AN0uhfxuPmzi21v9NrY6pFenLnBpoi7LDOmwFh6ACs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: rmktestco.customs.gov.my

rmktestco.customs.gov.my
0 DS RR in the parent zone found






RRSIG Type 5 validates the CNAME - Result: rmktest.customs.gov.my
Validated: RRSIG-Owner rmktestco.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 10.03.2026, 06:28:27 +, Signature-Inception: 19.02.2026, 00:56:47 +, KeyTag 53340, Signer-Name: customs.gov.my



Zone: www.rmktestco.customs.gov.my

www.rmktestco.customs.gov.my
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "6vcji7qtk4b9ur66scs5qktej0d3e3bb" between the hashed NSEC3-owner "6oktre54sib4a085koqnta5r0tib37l8" and the hashed NextOwner "71cnelojt3lbnhtoo3cqs8ps1vcnj3gu". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner 6oktre54sib4a085koqnta5r0tib37l8.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 23.03.2026, 21:39:31 +, Signature-Inception: 21.02.2026, 20:46:20 +, KeyTag 53340, Signer-Name: customs.gov.my






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "5dv0eirka9jg00v88l983k1fc9nksnme" as Owner. That's the Hash of "rmktestco.customs.gov.my" with the NextHashedOwnerName "5g9rkukshbdpudjs4e5j83l25gpavmfb". So that domain name is the Closest Encloser of "www.rmktestco.customs.gov.my". Opt-Out: False.
Bitmap: CNAME, RRSIG Validated: RRSIG-Owner 5dv0eirka9jg00v88l983k1fc9nksnme.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 10.03.2026, 06:28:27 +, Signature-Inception: 19.02.2026, 00:56:47 +, KeyTag 53340, Signer-Name: customs.gov.my






The ClosestEncloser says, that "*.rmktestco.customs.gov.my" with the Hash "35ietgm0f8fvokfbksqmjd3cd26nbp0l" is a possible Wildcard of the DS Query Name. But the DS-Query in the parent zone sends a valid NSEC3 RR With the owner "313vlp5c85poumaruli4f2769tdmupb7" and the Next Owner "3fe8e3cajn8fbeip7qkkear598vpaqt0", so the Hash of the wildcard is between these hashes. So that NSEC3 proves the Not-existence of that wildcard expansion. Opt-Out: False.
Bitmap: A, RRSIG Validated: RRSIG-Owner 313vlp5c85poumaruli4f2769tdmupb7.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 19.03.2026, 17:44:07 +, Signature-Inception: 17.02.2026, 17:30:58 +, KeyTag 53340, Signer-Name: customs.gov.my



Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 21831, Flags 256






Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 13.03.2026, 00:00:00 +, Signature-Inception: 20.02.2026, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: my

my
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 47187, DigestType 2 and Digest i3DPTEgjPQYkVWUj6lLFJPFXgAuXRFxqYqjAeDN1Z64=






2 RRSIG RR to validate DS RR found






RRSIG-Owner my., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.03.2026, 05:00:00 +, Signature-Inception: 25.02.2026, 04:00:00 +, KeyTag 21831, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 21831 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 35003, Flags 256






Public Key with Algorithm 13, KeyTag 39626, Flags 256






Public Key with Algorithm 13, KeyTag 47187, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner my., Algorithm: 13, 1 Labels, original TTL: 3600 sec, Signature-expiration: 01.03.2026, 18:38:14 +, Signature-Inception: 30.01.2026, 12:43:54 +, KeyTag 47187, Signer-Name: my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 47187 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 47187, DigestType 2 and Digest "i3DPTEgjPQYkVWUj6lLFJPFXgAuXRFxqYqjAeDN1Z64=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: gov.my

gov.my
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 52927, DigestType 2 and Digest 9Eb0YycBp5IV+OECn596MYtbrvwtBANo+Sc94G2+T3o=






2 RRSIG RR to validate DS RR found






RRSIG-Owner gov.my., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 01.03.2026, 11:24:42 +, Signature-Inception: 30.01.2026, 12:43:54 +, KeyTag 35003, Signer-Name: my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35003 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 20756, Flags 256






Public Key with Algorithm 13, KeyTag 47199, Flags 256






Public Key with Algorithm 13, KeyTag 52927, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner gov.my., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 02.03.2026, 01:02:29 +, Signature-Inception: 30.01.2026, 12:43:42 +, KeyTag 52927, Signer-Name: gov.my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 52927 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 52927, DigestType 2 and Digest "9Eb0YycBp5IV+OECn596MYtbrvwtBANo+Sc94G2+T3o=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: customs.gov.my

customs.gov.my
2 DS RR in the parent zone found






DS with Algorithm 8, KeyTag 11650, DigestType 1 and Digest t7bpaoXH88YrQhug3ilrgFxmXEQ=






DS with Algorithm 8, KeyTag 11650, DigestType 2 and Digest /AN0uhfxuPmzi21v9NrY6pFenLnBpoi7LDOmwFh6ACs=






2 RRSIG RR to validate DS RR found






RRSIG-Owner customs.gov.my., Algorithm: 13, 3 Labels, original TTL: 86400 sec, Signature-expiration: 01.03.2026, 08:06:31 +, Signature-Inception: 30.01.2026, 12:43:42 +, KeyTag 47199, Signer-Name: gov.my






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 47199 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 11650, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 53340, Flags 256






2 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner customs.gov.my., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.03.2026, 17:10:50 +, Signature-Inception: 16.02.2026, 16:44:15 +, KeyTag 11650, Signer-Name: customs.gov.my






RRSIG-Owner customs.gov.my., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 18.03.2026, 17:10:50 +, Signature-Inception: 16.02.2026, 16:44:15 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 11650 used to validate the DNSKEY RRSet






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 53340 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 11650, DigestType 1 and Digest "t7bpaoXH88YrQhug3ilrgFxmXEQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 11650, DigestType 2 and Digest "/AN0uhfxuPmzi21v9NrY6pFenLnBpoi7LDOmwFh6ACs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: rmktest.customs.gov.my

rmktest.customs.gov.my
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" between the hashed NSEC3-owner "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" and the hashed NextOwner "bo12bh4d5aivde6ic6v7uc4qhcm2cksa". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






0 DNSKEY RR found












RRSIG Type 1 validates the A - Result: 202.122.153.148
Validated: RRSIG-Owner rmktest.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" equal the hashed NSEC3-owner "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" and the hashed NextOwner "bo12bh4d5aivde6ic6v7uc4qhcm2cksa". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NoData-Proof required and found.






TXT-Query sends a valid NSEC3 RR as result with the hashed query name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" equal the hashed NSEC3-owner "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" and the hashed NextOwner "bo12bh4d5aivde6ic6v7uc4qhcm2cksa". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NoData-Proof required and found.






AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" equal the hashed NSEC3-owner "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" and the hashed NextOwner "bo12bh4d5aivde6ic6v7uc4qhcm2cksa". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NoData-Proof required and found.






TLSA-Query (_443._tcp.rmktest.customs.gov.my) sends a valid NSEC3 RR as result with the hashed owner name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" (unhashed: rmktest.customs.gov.my). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "ptg1iat9ikl0ereu1cb8676viqsgfgtu" (unhashed: _tcp.rmktest.customs.gov.my) with the owner "pn3bca3ttplacbsu89p2l8m323kjkli0" and the NextOwner "q0vf9qkbnj9mnamktuin6fpnmpfscgr8". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, AAAA, RRSIG Validated: RRSIG-Owner pn3bca3ttplacbsu89p2l8m323kjkli0.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 07.03.2026, 06:14:01 +, Signature-Inception: 05.02.2026, 05:23:33 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NXDomain-Proof required and found.






TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "2umr6uud6bl6h923vkqm8uagfdgnen7t" (unhashed: *.rmktest.customs.gov.my) with the owner "2tupvku3nluee5j9n9vdp4pqvrebkn8j" and the NextOwner "313vlp5c85poumaruli4f2769tdmupb7". So that NSEC3 confirms the not-existence of the Wildcard expansion.
Bitmap: A, RRSIG Validated: RRSIG-Owner 2tupvku3nluee5j9n9vdp4pqvrebkn8j.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 07.03.2026, 09:04:56 +, Signature-Inception: 05.02.2026, 08:39:32 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NXDomain-Proof required and found.






CAA-Query sends a valid NSEC3 RR as result with the hashed query name "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" equal the hashed NSEC3-owner "bnrdj41o3ekmoo5na6ftuh9mk0h6k0he" and the hashed NextOwner "bo12bh4d5aivde6ic6v7uc4qhcm2cksa". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner bnrdj41o3ekmoo5na6ftuh9mk0h6k0he.customs.gov.my., Algorithm: 8, 4 Labels, original TTL: 3600 sec, Signature-expiration: 08.03.2026, 08:01:14 +, Signature-Inception: 19.02.2026, 00:45:42 +, KeyTag 53340, Signer-Name: customs.gov.my






Status: Good. NoData-Proof required and found.

 

3. Name Servers

DomainNameserverNS-IP
www.rmktestco.customs.gov.my
  dns1.gitn.net.my

customs.gov.my
  dns1.gitn.net.my / unknown
203.62.1.240
Kuala Lumpur/Malaysia (MY) - GITN-SCHOOLNET


T 
2400:7400:0:a3::33
Cyberjaya/Selangor/Malaysia (MY) - GITN-SCHOOLNET


  dns2.gitn.net.my / unknown
202.75.5.191
Kuala Lumpur/Malaysia (MY) - GITN-PCN


 
2401:b00:ffff:2::100
Kuala Lumpur/Malaysia (MY) - GITN Sdn. Bhd.

gov.my
  a.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP
194.169.218.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2001:67c:13cc::1:114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  b.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4
185.24.64.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13cc::1:114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  b.nic.my
103.44.108.153
Seri Kembangan/Selangor/Malaysia (MY) - MYNIC Berhad


T 
2001:ddc:0:53::153
Cyberjaya/Selangor/Malaysia (MY) - MYNIC Berhad


  c.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP
212.18.248.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13ee::114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  d.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4
212.18.249.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13ff::114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  e.nic.my
152.69.217.125
Singapore/South East/Singapore (SG) - Oracle Corporation


 
2603:c024:4518:ad60:242::2
Singapore/South East/Singapore (SG) - Oracle Corporation


  ns01.trs-dns.com / fra01.dns1
64.96.1.1
East Irvine/California/United States (US) - Tucows.com Co.


 
2620:57:4001::1
Toronto/Ontario/Canada (CA) - Tucows.com Co.


  ns01.trs-dns.net / fra02.dns2
64.96.2.1
East Irvine/California/United States (US) - Tucows.com Co.


 
2620:57:4002::1
Montreal/Quebec/Canada (CA) - Tucows.com Co.

my
  a.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP


  a.nic.my


  b.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4


  c.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP


  d.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4


  ns01.trs-dns.com / fra01.dns1


  ns01.trs-dns.net / fra02.dns2


rmktest.customs.gov.my
  dns1.gitn.net.my / unknown
203.62.1.240
Kuala Lumpur/Malaysia (MY) - GITN-SCHOOLNET


T 
2400:7400:0:a3::33
Cyberjaya/Selangor/Malaysia (MY) - GITN-SCHOOLNET

customs.gov.my
  dns1.gitn.net.my / unknown
203.62.1.240
Kuala Lumpur/Malaysia (MY) - GITN-SCHOOLNET


T 
2400:7400:0:a3::33
Cyberjaya/Selangor/Malaysia (MY) - GITN-SCHOOLNET


  dns2.gitn.net.my / unknown
202.75.5.191
Kuala Lumpur/Malaysia (MY) - GITN-PCN


 
2401:b00:ffff:2::100
Kuala Lumpur/Malaysia (MY) - GITN Sdn. Bhd.

gov.my
  a.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP
194.169.218.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2001:67c:13cc::1:114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  b.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4
185.24.64.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13cc::1:114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  b.nic.my
103.44.108.153
Seri Kembangan/Selangor/Malaysia (MY) - MYNIC Berhad


 
2001:ddc:0:53::153
Cyberjaya/Selangor/Malaysia (MY) - MYNIC Berhad


  c.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP
212.18.248.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13ee::114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  d.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4
212.18.249.114
City of London/England/United Kingdom (GB) - CentralNic Ltd


 
2a04:2b00:13ff::114
City of London/England/United Kingdom (GB) - CentralNic Ltd


  e.nic.my
152.69.217.125
Singapore/South East/Singapore (SG) - Oracle Corporation


 
2603:c024:4518:ad60:242::2
Singapore/South East/Singapore (SG) - Oracle Corporation


  ns01.trs-dns.com / fra01.dns1
64.96.1.1
East Irvine/California/United States (US) - Tucows.com Co.


 
2620:57:4001::1
Toronto/Ontario/Canada (CA) - Tucows.com Co.


  ns01.trs-dns.net / fra01.dns2
64.96.2.1
East Irvine/California/United States (US) - Tucows.com Co.


 
2620:57:4002::1
Montreal/Quebec/Canada (CA) - Tucows.com Co.

my
  a.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP


  a.nic.my


  b.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4


  c.mynic.centralnic-dns.com / PGXL-PS5KRW-2C7ZTP


  d.mynic.centralnic-dns.com / CKQV-6AF162-DWW7G4


  ns01.trs-dns.com / fra02.dns1


  ns01.trs-dns.net / fra02.dns2

 

4. SOA-Entries


Domain:my
Zone-Name:my
Primary:a.nic.my
Mail:hostmaster.nic.my
Serial:2026015966
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:1


Domain:my
Zone-Name:my
Primary:a.nic.my
Mail:hostmaster.nic.my
Serial:2026015967
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:6


Domain:gov.my
Zone-Name:gov.my
Primary:b.nic.my
Mail:hostmaster.nic.my
Serial:2026015967
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:16


Domain:customs.gov.my
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:customs.gov.my
Zone-Name:customs.gov.my
Primary:dns1.gitn.net.my
Mail:root.dns1.gitn.net.my
Serial:2026021999
Refresh:3600
Retry:900
Expire:3600000
TTL:3600
num Entries:3


Domain:www.rmktestco.customs.gov.my
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1



Domain:my
Zone-Name:my
Primary:a.nic.my
Mail:hostmaster.nic.my
Serial:2026015967
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:7


Domain:gov.my
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:gov.my
Zone-Name:gov.my
Primary:b.nic.my
Mail:hostmaster.nic.my
Serial:2026015967
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:13


Domain:gov.my
Zone-Name:gov.my
Primary:b.nic.my
Mail:hostmaster.nic.my
Serial:2026015968
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:2


Domain:customs.gov.my
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:customs.gov.my
Zone-Name:customs.gov.my
Primary:dns1.gitn.net.my
Mail:root.dns1.gitn.net.my
Serial:2026021999
Refresh:3600
Retry:900
Expire:3600000
TTL:3600
num Entries:3


Domain:rmktest.customs.gov.my
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:rmktest.customs.gov.my
Zone-Name:customs.gov.my
Primary:dns1.gitn.net.my
Mail:root.dns1.gitn.net.my
Serial:2026021999
Refresh:3600
Retry:900
Expire:3600000
TTL:3600
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://rmktestco.customs.gov.my/
202.122.153.148
-102


1.627
V
ConnectionError (2, 0x80004005). Es konnte keine Verbindung hergestellt werden, da der Zielcomputer die Verbindung verweigerte. (202.122.153.148:80)

• https://rmktestco.customs.gov.my/
202.122.153.148
-103


0.453
P
SecureConnectionError (3, 0x80131501). The SSL connection could not be established, see inner exception. Cannot determine the frame size or a corrupted frame was received

• http://rmktestco.customs.gov.my:443/
202.122.153.148 gzip used - 406 / 692 - 41.33 %
200

Html is minified: 108.13 %
0.437
Q
Visible Content:
Server: nginx/1.24.0,(Ubuntu)
Date: Wed, 25 Feb 2026 12:52:09 GMT
Transfer-Encoding: chunked
Connection: keep-alive
Cross-Origin-Opener-Policy: same-origin
Strict-Transport-Security: max-age=31536000
X-Frame-Options: SAMEORIGIN
Content-Security-Policy: frame-ancestors 'self'
Content-Type: text/html
Content-Encoding: gzip
Content-Length: 406

• http://rmktestco.customs.gov.my/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
202.122.153.148
-102


1.623
V
ConnectionError (2, 0x80004005). Es konnte keine Verbindung hergestellt werden, da der Zielcomputer die Verbindung verweigerte. (202.122.153.148:80)
Visible Content:

• https://202.122.153.148/
202.122.153.148
-103


0.390
P
SecureConnectionError (3, 0x80131501). The SSL connection could not be established, see inner exception. Cannot determine the frame size or a corrupted frame was received

 

7. Comments


1. General Results, most used to calculate the result

Aname "rmktestco.customs.gov.my" is subdomain, public suffix is ".gov.my", top-level-domain is ".my", top-level-domain-type is "country-code", Country is Malaysia, tld-manager is "MYNIC Berhad", num .my-domains preloaded: 234 (complete: 276475)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: rmktestco.customs.gov.my has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: rmktestco.customs.gov.my has no ipv6 address.
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood - only one version with Http-Status 200
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (1 urls)
http://rmktestco.customs.gov.my:443/ 202.122.153.148


Url with incomplete Content-Type - header - missing charset
HFatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Qhttp://rmktestco.customs.gov.my:443/ 202.122.153.148
200

Misconfiguration: http sent over port 443. Wrong port forwarding port 443 to port 80 or wrong vHost definition. If you use a virtual Host <VirtualHost ip-address:443>, try <VirtualHost *:443>.
Vhttp://rmktestco.customs.gov.my/ 202.122.153.148
-102

Connect failure - perhaps firewall
Vhttp://rmktestco.customs.gov.my/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 202.122.153.148
-102

Connect failure - perhaps firewall
XFatal error: Nameserver doesn't support TCP connection: dns1.gitn.net.my / 2400:7400:0:a3::33: Timeout
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain rmktestco.customs.gov.my, 1 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.rmktestco.customs.gov.my

2. Header-Checks

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.dns1.gitn.net.my (203.62.1.240, 2400:7400:0:a3::33), dns2.gitn.net.my (202.75.5.191, 2401:b00:ffff:2::100)
AGood (1 - 3.0):: An average of 1.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: dns1.gitn.net.my, dns2.gitn.net.my, 2 Name Servers included in Delegation: dns1.gitn.net.my, dns2.gitn.net.my, 2 Name Servers included in 1 Zone definitions: dns1.gitn.net.my, dns2.gitn.net.my, 1 Name Servers listed in SOA.Primary: dns1.gitn.net.my.
AGood: Only one SOA.Primary Name Server found.: dns1.gitn.net.my.
AGood: SOA.Primary Name Server included in the delegation set.: dns1.gitn.net.my.
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AInfo: Ipv4-Subnet-list: 2 Name Servers, 2 different subnets (first Byte): 202., 203., 2 different subnets (first two Bytes): 202.75., 203.62., 2 different subnets (first three Bytes): 202.75.5., 203.62.1.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 2 different subnets (first block): 2400:, 2401:, 2 different subnets (first two blocks): 2400:7400:, 2401:0b00:, 2 different subnets (first three blocks): 2400:7400:0000:, 2401:0b00:ffff:, 2 different subnets (first four blocks): 2400:7400:0000:00a3:, 2401:0b00:ffff:0002:
AExcellent: Every Name Server IPv6-address starts with an unique Hex-block
XNameserver Timeout checking Echo Capitalization: b.nic.my / 2001:ddc:0:53::153
XNameserver Timeout checking Echo Capitalization: dns1.gitn.net.my / 2400:7400:0:a3::33
XNameserver Timeout checking EDNS512: dns1.gitn.net.my / 2400:7400:0:a3::33
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com / 194.169.218.114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com / 194.169.218.114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com / 2001:67c:13cc::1:114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.mynic.centralnic-dns.com / 2001:67c:13cc::1:114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.nic.my: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: ok. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: a.nic.my: OP100: ok. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: b.nic.my / 103.44.108.153: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: b.nic.my / 103.44.108.153: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: b.nic.my / 2001:ddc:0:53::153: OP100: ok. FLAGS: ok. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: b.nic.my / 2001:ddc:0:53::153: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com / 212.18.248.114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com / 212.18.248.114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com / 2a04:2b00:13ee::114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: c.mynic.centralnic-dns.com / 2a04:2b00:13ee::114: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (PGXL-PS5KRW-2C7ZTP). COOKIE: SOA expected, but NOT found, NOERR expected, BADVER found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 203.62.1.240: OP100: fatal timeout. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: fatal timeout. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (unknown). COOKIE: ok. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 203.62.1.240: OP100: fatal timeout. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (unknown). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 203.62.1.240: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (unknown). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 2400:7400:0:a3::33: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 2400:7400:0:a3::33: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
Nameserver doesn't pass all EDNS-Checks: dns1.gitn.net.my / 2400:7400:0:a3::33: OP100: fatal timeout. FLAGS: fatal timeout. V1: fatal timeout. V1OP100: fatal timeout. V1FLAGS: fatal timeout. DNSSEC: fatal timeout. V1DNSSEC: fatal timeout. NSID: fatal timeout. COOKIE: fatal timeout. CLIENTSUBNET: fatal timeout.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://rmktestco.customs.gov.my/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 202.122.153.148
-102

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://rmktestco.customs.gov.my:443/ 202.122.153.148
200

Warning: HSTS header sent via http has no effect
ADuration: 644380 milliseconds, 644.380 seconds

 

8. Connections

No connection informations found. Perhaps only http - connections.

 

9. Certificates

No certificate informations found. Perhaps only http - connections.

 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

Issuerlast 7 daysactivenum Certs
CN=GoGetSSL RSA DV CA, O=GoGetSSL, L=Riga, C=LV
0
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
7670442548
precert
CN=GoGetSSL RSA DV CA, O=GoGetSSL, L=Riga, C=LV
2022-10-02 22:00:00
2023-10-03 21:59:59
*.customs.gov.my, customs.gov.my
2 entries


 

11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404

 

12. Html-Parsing via https://validator.w3.org/nu/


No https result http status 200 and Content-Type text/html or text/xml found, no Html-Parsing - Check

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: dns1.gitn.net.my, dns2.gitn.net.my

 

QNr.DomainTypeNS used
1
my
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.mynic.centralnic-dns.com, a.nic.my, b.mynic.centralnic-dns.com, c.mynic.centralnic-dns.com, d.mynic.centralnic-dns.com, ns01.trs-dns.com, ns01.trs-dns.net
2
dns1.gitn.net.my: 203.62.1.240, 2400:7400:0:a3::33
NS
a.mynic.centralnic-dns.com (2001:67c:13cc::1:114)

Answer: dns2.gitn.net.my
202.75.5.191, 2401:b00:ffff:2::100

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
rmktestco.customs.gov.my



2
1
rmktest.customs.gov.my
0

no CAA entry found
1
0
customs.gov.my
0

no CAA entry found
1
0

0

no CAA entry found
1
0
gov.my
0

no CAA entry found
1
0

0

no CAA entry found
1
0
my
0

no CAA entry found
1
0

0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
customs.gov.my
google-site-verification=k4A7Z5xES-HSwpiiP0g4RZOcbPirDJo5Ya_QUI9qrHg
ok
1
0
customs.gov.my
MS=E152584C6C8ACCDC472F496FFC12ECF8F75F40FD
ok
1
0
customs.gov.my
v=spf1 ip4:103.8.147.12/30 ip4:219.92.54.177/32 ip4:103.156.82.32/29 ip4:103.156.83.32/29 include:_spf.google.com ~all
ok
1
0
rmktestco.customs.gov.my


1
0
_acme-challenge.rmktest.customs.gov.my

Name Error - The domain name does not exist
1
0
_acme-challenge.rmktestco.customs.gov.my

Name Error - The domain name does not exist
1
0
_acme-challenge.rmktestco.customs.gov.my.customs.gov.my

Name Error - The domain name does not exist
1
0
_acme-challenge.rmktest.customs.gov.my.rmktest.customs.gov.my

Name Error - The domain name does not exist
1
0
_acme-challenge.rmktestco.customs.gov.my.rmktestco.customs.gov.my

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
SPF
TXT
rmktestco.customs.gov.my

32768TXT expected, but CNAME found. CNAME not allowed, only TXT queries are allowed. See RFC 7208, 4.4.

 

 

17. Cipher Suites

No results

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=fa75b395-d3c6-4110-a660-cefa905cb5af

 

Last Result: https://check-your-website.server-daten.de/?q=rmktestco.customs.gov.my - 2026-02-25 13:41:35

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=rmktestco.customs.gov.my" target="_blank">Check this Site: rmktestco.customs.gov.my</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=rmktestco.customs.gov.my