Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

P

 

Tls-Protocol error

 

Checked:
07.08.2019 12:08:58

 

Older results

 

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
rpz.ru
A
90.156.201.29
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.56
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.101
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.123
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

AAAA
2a00:15f8:a000:5:1:11:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:12:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:13:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:14:5:ce4b
Moscow/Russia (RU) - .masterhost

yes


www.rpz.ru
A
90.156.201.29
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.56
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.101
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

A
90.156.201.123
Moscow/Russia (RU) - .masterhost
Hostname: fe.shared.masterhost.ru
yes
1
0

AAAA
2a00:15f8:a000:5:1:11:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:12:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:13:5:ce4b
Moscow/Russia (RU) - .masterhost

yes



AAAA
2a00:15f8:a000:5:1:14:5:ce4b
Moscow/Russia (RU) - .masterhost

yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 59944, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2019, 00:00:00 +, Signature-Inception: 31.07.2019, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: ru

ru
1 DS RR in the parent zone found






1 RRSIG RR to validate DS RR found






RRSIG-Owner ru., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 20.08.2019, 05:00:00 +, Signature-Inception: 07.08.2019, 04:00:00 +, KeyTag 59944, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 15506, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 44073, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner ru., Algorithm: 8, 1 Labels, original TTL: 345600 sec, Signature-expiration: 24.08.2019, 00:00:00 +, Signature-Inception: 04.08.2019, 00:00:00 +, KeyTag 15506, Signer-Name: ru






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 15506 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 15506, DigestType 2 and Digest "Mxy7GTLnzyAfgaspnvhxGtcXXogSUIZ55HWTDCsUXJc=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: rpz.ru

rpz.ru
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "0ht97e1qrsiq4qde84ql29qh1q4gcrn9" between the hashed NSEC3-owner "0he5t8am5o9okm3e7t8tmbnmvfrf6634" and the hashed NextOwner "0i81h78sntp2af5b33b00emhgfvv18qv". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 0he5t8am5o9okm3e7t8tmbnmvfrf6634.ru., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 29.08.2019, 07:08:41 +, Signature-Inception: 19.07.2019, 08:20:40 +, KeyTag 44073, Signer-Name: ru






0 DNSKEY RR found









Zone: www.rpz.ru

www.rpz.ru
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.rpz.ru
  ns1.masterhost.ru / power1

rpz.ru
  ns.masterhost.ru / power3
217.16.20.15
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.20.16
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.20.20
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.20.30
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
2a00:15f8:a000:10:1:1:0:53
Moscow/Russia (RU) - .masterhost


  ns1.masterhost.ru / power5
217.16.16.15
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.16.16
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.16.20
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
217.16.16.30
Ryazan/Ryazan Oblast/Russia (RU) - .masterhost Arbor


 
2a00:15f8:a000:11:1:1:1:53
Moscow/Russia (RU) - .masterhost


  ns2.masterhost.ru / power1
217.16.22.15
Moscow/Russia (RU) - .masterhost


 
217.16.22.16
Moscow/Russia (RU) - .masterhost


 
217.16.22.20
Moscow/Russia (RU) - .masterhost


 
217.16.22.30
Moscow/Russia (RU) - .masterhost


 
2a00:15f8:a000:12:1:1:2:53
Moscow/Russia (RU) - .masterhost

ru
  a.dns.ripn.net / tau.ripn.net


  b.dns.ripn.net


  d.dns.ripn.net / gamma2-nsk.ripn.net


  e.dns.ripn.net


  f.dns.ripn.net / tau-sin.ripn.net

 

4. SOA-Entries


Domain:ru
Zone-Name:
Primary:a.dns.ripn.net
Mail:hostmaster.ripn.net
Serial:4039210
Refresh:86400
Retry:14400
Expire:2592000
TTL:3600
num Entries:5


Domain:rpz.ru
Zone-Name:
Primary:ns1.masterhost.ru
Mail:hostmaster.masterhost.ru
Serial:1564380580
Refresh:28800
Retry:7200
Expire:1209600
TTL:600
num Entries:15


Domain:www.rpz.ru
Zone-Name:
Primary:ns1.masterhost.ru
Mail:hostmaster.masterhost.ru
Serial:1564380580
Refresh:28800
Retry:7200
Expire:1209600
TTL:600
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://rpz.ru/
90.156.201.29
301
http://rpz.kret.com/

0.070
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://rpz.ru/
90.156.201.56
301
http://rpz.kret.com/

0.074
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://rpz.ru/
90.156.201.101
301
http://rpz.kret.com/

0.096
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://rpz.ru/
90.156.201.123
301
http://rpz.kret.com/

0.073
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://rpz.ru/
2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/

0.083
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://rpz.ru/
2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/

0.083
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://rpz.ru/
2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://rpz.ru/
2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
90.156.201.29
301
http://rpz.kret.com/

0.073
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
90.156.201.56
301
http://rpz.kret.com/

0.073
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
90.156.201.101
301
http://rpz.kret.com/

0.070
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://www.rpz.ru/
90.156.201.123
301
http://rpz.kret.com/

0.070
D
Date: Wed, 07 Aug 2019 10:09:59 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:09:59 GMT

• http://www.rpz.ru/
2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://www.rpz.ru/
2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/

0.087
D
Date: Wed, 07 Aug 2019 10:10:00 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 228
Connection: close
Server: Apache
Location: http://rpz.kret.com/
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:00 GMT

• http://rpz.kret.com/

200


0.213
H
Server: nginx/1.6.2
Date: Wed, 07 Aug 2019 10:10:36 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 674
Connection: close
X-Powered-By: PHP/5.5.21
P3P: policyref="/bitrix/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
X-Powered-CMS: Bitrix Site Manager (cf89c027b9e9c1b7975d569c99a20c61)
Set-Cookie: PHPSESSID=p6g33vdfu2thlv6livqd5onig4; Path=/; Domain=rpz.kret.com; HttpOnly,BITRIX_SM_GUEST_ID=4076650; Path=/; Domain=rpz.kret.com; Expires=2020-08-01 12:10:36,BITRIX_SM_LAST_VISIT=07.08.2019+13%3A10%3A36; Path=/; Domain=rpz.kret.com; Expires=2020-08-01 12:10:36
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *

• https://rpz.ru/
90.156.201.29
-10


0.066
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
90.156.201.56
-10


0.067
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
90.156.201.101
-10


0.063
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
90.156.201.123
-10


0.070
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
2a00:15f8:a000:5:1:11:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
2a00:15f8:a000:5:1:12:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
2a00:15f8:a000:5:1:13:5:ce4b
-10


0.100
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://rpz.ru/
2a00:15f8:a000:5:1:14:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
90.156.201.29
-10


0.074
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
90.156.201.56
-10


0.066
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
90.156.201.101
-10


0.066
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
90.156.201.123
-10


0.067
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
2a00:15f8:a000:5:1:11:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
2a00:15f8:a000:5:1:12:5:ce4b
-10


0.094
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
2a00:15f8:a000:5:1:13:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• https://www.rpz.ru/
2a00:15f8:a000:5:1:14:5:ce4b
-10


0.080
P
SecureChannelFailure - The request was aborted: Could not create SSL/TLS secure channel.

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.29
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.073
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:34 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:34 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.56
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.076
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:34 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:34 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.101
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.100
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:34 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:34 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.123
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.076
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:34 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:34 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.087
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.086
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.090
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.084
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.29
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.073
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.56
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.073
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.101
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.076
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
90.156.201.123
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.073
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:35 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:35 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.087
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:36 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:36 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.083
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:36 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:36 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.086
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:36 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:36 GMT

• http://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

0.087
D
Visible Content:
Date: Wed, 07 Aug 2019 10:10:36 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 297
Connection: close
Server: Apache
Location: http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Cache-Control: max-age=0
Expires: Wed, 07 Aug 2019 10:10:36 GMT

• http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

200


0.163

Visible Content:
Server: nginx/1.6.2
Date: Wed, 07 Aug 2019 10:10:37 GMT
Content-Type: text/html; charset=UTF-8
Content-Length: 674
Connection: close
X-Powered-By: PHP/5.5.21
P3P: policyref="/bitrix/p3p.xml", CP="NON DSP COR CUR ADM DEV PSA PSD OUR UNR BUS UNI COM NAV INT DEM STA"
X-Powered-CMS: Bitrix Site Manager (cf89c027b9e9c1b7975d569c99a20c61)
Set-Cookie: PHPSESSID=gd23knitl87rbbq17uj0is7fl6; Path=/; Domain=rpz.kret.com; HttpOnly,BITRIX_SM_GUEST_ID=4076650; Path=/; Domain=rpz.kret.com; Expires=2020-08-01 12:10:37,BITRIX_SM_LAST_VISIT=07.08.2019+13%3A10%3A37; Path=/; Domain=rpz.kret.com; Expires=2020-08-01 12:10:37
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Access-Control-Allow-Origin: *

 

7. Comments


1. General Results, most used to calculate the result

Aname "rpz.ru" is domain, public suffix is "ru", top-level-domain-type is "country-code", Country is Russian Federation (the), tld-manager is "Coordination Center for TLD RU"
AGood: All ip addresses are public addresses
AGood: No asked Authoritative Name Server had a timeout
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Dhttp://rpz.ru/ 90.156.201.29
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 90.156.201.56
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 90.156.201.101
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 90.156.201.123
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/ 2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 90.156.201.29
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 90.156.201.56
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 90.156.201.101
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 90.156.201.123
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/ 2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.29
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.56
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.101
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.123
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.29
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.56
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.101
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 90.156.201.123
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:11:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:12:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:13:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://www.rpz.ru/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2a00:15f8:a000:5:1:14:5:ce4b
301
http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
HFatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Phttps://rpz.ru/ 90.156.201.29
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 90.156.201.56
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 90.156.201.101
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 90.156.201.123
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 2a00:15f8:a000:5:1:11:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 2a00:15f8:a000:5:1:12:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 2a00:15f8:a000:5:1:13:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://rpz.ru/ 2a00:15f8:a000:5:1:14:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 90.156.201.29
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 90.156.201.56
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 90.156.201.101
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 90.156.201.123
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 2a00:15f8:a000:5:1:11:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 2a00:15f8:a000:5:1:12:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 2a00:15f8:a000:5:1:13:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)
Phttps://www.rpz.ru/ 2a00:15f8:a000:5:1:14:5:ce4b
-10

Error creating a TLS-Connection: IANA TLS Alert No. 80, internal_error. An internal error unrelated to the peer or the correctness of the protocol (such as a memory allocation failure) makes it impossible to continue. SSL_ERROR_INTERNAL_ERROR_ALERT (Mozilla) / ERR_SSL_PROTOCOL_ERROR (Chrome)

2. Header-Checks


3. DNS- and NameServer - Checks

AGood: Nameserver supports TCP connections: 15 good Nameserver
AGood: Nameserver supports Echo Capitalization: 15 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 15 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 15 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://rpz.kret.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Warning: Not existing ACME-file, but Server sends 200, not 404 or redirect. May be a problem creating a Letsencrypt certificate. Checking /.well-known/acme-challenge/random-filename - a http status 404 - Not Found - is expected. If your server sends content and a http status 200, the validation file (87 bytes, token, dot and the hash of the public part of the account key) may be invisible, so Letsencrypt can't validate your domain. If it is an application that sends this content, perhaps create an exception, so /.well-known/acme-challenge sends raw files. Or create a redirect to another domain and / or port 443, but your Letsencrypt client must support such a solution. Certbot: Use webroot as authenticator - https://certbot.eff.org/docs/using.html Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
AInfo: Different Server-Headers found
ADuration: 109110 milliseconds, 109.110 seconds

 

8. Connections

No connection informations found. Perhaps only http - connections.

 

9. Certificates

No certificate informations found. Perhaps only http - connections.

 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Small Code Update - wait one minute

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found

 

11. Html-Content - Entries

Summary

No data found or small Code-update

 

Details (currently limited to 500 rows - some problems with spam users)

Small Code Update - wait one minute

 

12. Html-Parsing via https://validator.w3.org/nu/

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers:

 

No NameServer - IP address informations found. The feature is new (2020-05-07), so recheck this domain.

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.rpz.ru
0

no CAA entry found
1
0
rpz.ru
0

no CAA entry found
1
0
ru
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rpz.ru

ok
1
0
www.rpz.ru

ok
1
0
_acme-challenge.rpz.ru
dmk8uV5L_YFOVEd350Gl7TNnS_l7uw-FG2T0m3tEmyo
looks good, correct length, correct characters
1
0
_acme-challenge.rpz.ru
UlfP-eGL-ncFDUABTerhz4bZIaFpPahFIjibNeoxy-w
looks good, correct length, correct characters
1
0
_acme-challenge.www.rpz.ru

Name Error - The domain name does not exist
1
0
_acme-challenge.rpz.ru.rpz.ru

Name Error - The domain name does not exist
1
0
_acme-challenge.www.rpz.ru.rpz.ru

Name Error - The domain name does not exist
1
0
_acme-challenge.www.rpz.ru.www.rpz.ru

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

No Ciphers found

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=b55f0bb4-665d-438a-b00c-96a509c6d054

 

Last Result: https://check-your-website.server-daten.de/?q=rpz.ru - 2019-08-07 12:08:58

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=rpz.ru" target="_blank">Check this Site: rpz.ru</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=rpz.ru