Check DNS, Urls + Redirects, Certificates and Content of your Website




W

wrong Web-Response

Checked:
09.10.2019 13:01:51


Older results


1. IP-Addresses

HostTIP-Addressis auth.∑ Queries∑ Timeout
rrh.world
A
217.8.92.226
Surgut/Khanty-Mansia/Russia (RU) - Net By Net Holding LLC
Hostname: mail.rrh.world
yes
2
0

AAAA

yes


www.rrh.world
C
rrh.world
yes
1
0

A
217.8.92.226
Surgut/Khanty-Mansia/Russia (RU) - Net By Net Holding LLC
Hostname: mail.rrh.world
yes



2. DNSSEC

Zone (*)DNSSEC - Informations (beta)

Zone: (root)
(root)
1 DS RR published



Status: Valid because published



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 22545, Flags 256



Public Key with Algorithm 8, KeyTag 59944, Flags 256



1 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.10.2019, 00:00:00, Signature-Inception: 01.10.2019, 00:00:00, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: world
world
2 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 22.10.2019, 05:00:00, Signature-Inception: 09.10.2019, 04:00:00, KeyTag 22545, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 36130, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 62421, Flags 256



2 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.11.2019, 19:57:05, Signature-Inception: 07.10.2019, 19:09:23, KeyTag 36130, Signer-Name: world



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 06.11.2019, 19:57:05, Signature-Inception: 07.10.2019, 19:09:23, KeyTag 62421, Signer-Name: world



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 36130 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 62421 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 36130, DigestType 1 and Digest "rE07RSuwzDXchrxmh+5KzbzpL/M=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 36130, DigestType 2 and Digest "Dri6TRtwP006A7xxRMArfOvDKHMT19J8KSv24KQ1oKs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: rrh.world
rrh.world
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed domain name between the hashed NSEC3-owner and the hashed NextOwner. So the parent zone confirmes the non-existence of a DS RR.



0 DNSKEY RR found





Zone: www.rrh.world
www.rrh.world
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
rrh.world
  dns1.yandex.net
213.180.204.213
Moscow/Russia (RU) - Yandex enterprise network


 
2a02:6b8::213
Moscow/Russia (RU) - Yandex network


  dns2.yandex.net
93.158.134.213
Moscow/Russia (RU) - Yandex enterprise network


 
2a02:6b8:0:1::213
Moscow/Russia (RU) - Yandex network

world
  demand.alpha.aridns.net.au / dns1.tky


  demand.beta.aridns.net.au / dns5.ams


  demand.delta.aridns.net.au / dns2.mia


  demand.gamma.aridns.net.au / dns4.mia


4. SOA-Entries


Domain:world
Primary:demand.alpha.aridns.net.au
Mail:hostmaster.donuts.co
Serial:1570618421
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:4


Domain:rrh.world
Primary:dns1.yandex.net
Mail:dns-hosting.yandex.ru
Serial:18
Refresh:900
Retry:90
Expire:86400
TTL:900
num Entries:4


5. Url-Checks

Domainname Http-StatusredirectSec.G
• http://rrh.world/
217.8.92.226
-14

10.034
T
Timeout - Timeout für Vorgang überschritten

• http://www.rrh.world/
217.8.92.226
-14

10.037
T
Timeout - Timeout für Vorgang überschritten

• https://rrh.world/
217.8.92.226
-8

0.646
W
ConnectionClosed - The underlying connection was closed: The connection was closed unexpectedly.

• https://www.rrh.world/
217.8.92.226
-8

0.640
W
ConnectionClosed - The underlying connection was closed: The connection was closed unexpectedly.

• http://rrh.world/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
217.8.92.226
-14

10.047
T
Timeout - Timeout für Vorgang überschritten
Visible Content:

• http://www.rrh.world/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
217.8.92.226
-14

10.023
T
Timeout - Timeout für Vorgang überschritten
Visible Content:

6. Comments (GZip / Html minfied / Cache-Control is beta)

Aname "rrh.world" is domain, public suffix is "world", top-level-domain-type is "generic", tld-manager is "Binky Moon, LLC"
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
N217.8.92.226:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N217.8.92.226:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N217.8.92.226:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 4 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.
http://rrh.world/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 217.8.92.226
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.rrh.world/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 217.8.92.226
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 111807 milliseconds, 111.807 seconds


7. Connections (http/2 - check is BETA)

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
rrh.world
rrh.world
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
rrh.world
rrh.world
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
rrh.world
rrh.world
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
rrh.world
rrh.world
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
rrh.world
rrh.world
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
rrh.world
rrh.world
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
www.rrh.world
www.rrh.world
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
www.rrh.world
www.rrh.world
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
www.rrh.world
www.rrh.world
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
www.rrh.world
www.rrh.world
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
www.rrh.world
www.rrh.world
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
www.rrh.world
www.rrh.world
995
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
217.8.92.226
217.8.92.226
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
217.8.92.226
217.8.92.226
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
217.8.92.226
217.8.92.226
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
217.8.92.226
217.8.92.226
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
217.8.92.226
217.8.92.226
995
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
217.8.92.226
217.8.92.226
995
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=rrh.world, OU=PositiveSSL Multi-Domain

2CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester

3CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester


8. Certificates

1.
1.
CN=rrh.world, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
23.11.2018
24.11.2019
expires in 39 days
rrh.world, mail.farml.ru, www.rrh.world - 3 entries
1.
1.
CN=rrh.world, OU=PositiveSSL Multi-Domain, OU=Domain Control Validated
23.11.2018

24.11.2019
expires in 39 days
rrh.world, mail.farml.ru, www.rrh.world - 3 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00C07FFDB1B03E6BD2789F46F93F6544B6
Thumbprint:0F2E7196E49DF1616FD263763DD0569C7082ED11
SHA256 / Certificate:QYeAPCsPiaEfzkIwxL2KEU4YPGNXCuo+Sb3uQR2hB+8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0c5b5c5afbc07d52ce27504c007b7cc832dbf5d8e658f33bd10aaf961a4021f8
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:yes


2.
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
12.02.2014
12.02.2029
expires in 3407 days


2.
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
12.02.2014

12.02.2029
expires in 3407 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:2B2E6EEAD975366C148A6EDBA37C8C07
Thumbprint:339CDD57CFD5B141169B615FF31428782D1DA639
SHA256 / Certificate:AqtX5OZ6DLSN0v80gw6KxA9EdvsIymvj9c2Eb2RoQPA=
SHA256 hex / Cert (DANE * 0 1):02ab57e4e67a0cb48dd2ff34830e8ac40f4476fb08ca6be3f5cd846f646840f0
SHA256 hex / PublicKey (DANE * 1 1):9253b6de74f67a11435c27f1dde1d30d1112333ddab23d66b8efb86887638ae6
OCSP - Url:http://ocsp.comodoca.com
OCSP - must staple:no
Certificate Transparency:no


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
30.05.2000
30.05.2020
expires in 227 days


3.
CN=COMODO RSA Certification Authority, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
30.05.2000

30.05.2020
expires in 227 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:2766EE56EB49F38EABD770A2FC84DE22
Thumbprint:F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0
SHA256 / Certificate:TzLV3AD3FSUKvMSGUR439QGomd6zv36orbvTrvHEEto=
SHA256 hex / Cert (DANE * 0 1):4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da
SHA256 hex / PublicKey (DANE * 1 1):82b5f84daf47a59c7ab521e4982aefa40a53406a3aec26039efa6b2e0e7244c1
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no


4.
CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
30.05.2000
30.05.2020
expires in 227 days


4.
CN=AddTrust External CA Root, OU=AddTrust External TTP Network, O=AddTrust AB, C=SE
30.05.2000

30.05.2020
expires in 227 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:01
Thumbprint:02FAF3E291435468607857694DF5E45B68851868
SHA256 / Certificate:aH+kUTgieP/wyLEfjUPVdmccbrK86rQT+4PZZdBtL/I=
SHA256 hex / Cert (DANE * 0 1):687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff2
SHA256 hex / PublicKey (DANE * 1 1):942a6916a6e4ae527711c5450247a2a74fb8e156a8254ca66e739a11493bb445
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no



9. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates

Issuerlast 7 daysactivenum Certs
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
640575291
leaf cert
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
2018-11-23 00:00:00
2019-11-23 23:59:59
mail.farml.ru, rrh.world, www.rrh.world - 3 entries



2. Source crt.sh - old and new certificates, sometimes very slow.

Issuerlast 7 daysactivenum Certs
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
969833156
leaf cert
CN=COMODO RSA Domain Validation Secure Server CA, O=COMODO CA Limited, L=Salford, C=GB, ST=Greater Manchester
2018-11-22 23:00:00
2019-11-23 22:59:59
mail.farml.ru, rrh.world, www.rrh.world
3 entries



10. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


11. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.rrh.world



1
0
rrh.world
0

no CAA entry found
1
0
world
0

no CAA entry found
1
0


12. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
rrh.world
v=spf1 ip4:217.8.92.226 +mx -all
ok
1
0
www.rrh.world
v=spf1 ip4:217.8.92.226 +mx -all
ok
1
0
_acme-challenge.rrh.world
v=spf1 -all
missing entry or wrong length
1
0
_acme-challenge.www.rrh.world

Name Error - The domain name does not exist
1
0
_acme-challenge.rrh.world.rrh.world
v=spf1 -all
perhaps wrong
1
0
_acme-challenge.www.rrh.world.rrh.world
v=spf1 -all
perhaps wrong
1
0
_acme-challenge.www.rrh.world.www.rrh.world

Name Error - The domain name does not exist
1
0


13. Portchecks (BETA)

Domain or IPPortDescriptionResultAnswer
rrh.world
21
FTP
open
220 DiskStation FTP server ready.

rrh.world
21
FTP
open
220 DiskStation FTP server ready.

rrh.world
22
SSH



rrh.world
22
SSH



rrh.world
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

rrh.world
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

rrh.world
53
DNS



rrh.world
53
DNS



rrh.world
110
POP3



rrh.world
110
POP3



rrh.world
143
IMAP



rrh.world
143
IMAP



rrh.world
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is valid
rrh.world
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is valid
rrh.world
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

rrh.world
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

rrh.world
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is valid
rrh.world
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is valid
rrh.world
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is valid
rrh.world
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is valid
rrh.world
1433
MS SQL



rrh.world
1433
MS SQL



rrh.world
2082
cPanel (http)



rrh.world
2082
cPanel (http)



rrh.world
2083
cPanel (https)



rrh.world
2083
cPanel (https)



rrh.world
2086
WHM (http)



rrh.world
2086
WHM (http)



rrh.world
2087
WHM (https)



rrh.world
2087
WHM (https)



rrh.world
2089
cPanel Licensing



rrh.world
2089
cPanel Licensing



rrh.world
2095
cPanel Webmail (http)



rrh.world
2095
cPanel Webmail (http)



rrh.world
2096
cPanel Webmail (https)



rrh.world
2096
cPanel Webmail (https)



rrh.world
2222
DirectAdmin (http)



rrh.world
2222
DirectAdmin (http)



rrh.world
2222
DirectAdmin (https)



rrh.world
2222
DirectAdmin (https)



rrh.world
3306
mySql



rrh.world
3306
mySql



rrh.world
5224
Plesk Licensing



rrh.world
5224
Plesk Licensing



rrh.world
5432
PostgreSQL



rrh.world
5432
PostgreSQL



rrh.world
8080
Ookla Speedtest (http)
open
http://rrh.world:8080/
Http-Status: 200

rrh.world
8080
Ookla Speedtest (http)
open
http://rrh.world:8080/
Http-Status: 200

rrh.world
8080
Ookla Speedtest (https)
open
https://rrh.world:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

rrh.world
8080
Ookla Speedtest (https)
open
https://rrh.world:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

rrh.world
8083
VestaCP http



rrh.world
8083
VestaCP http



rrh.world
8083
VestaCP https



rrh.world
8083
VestaCP https



rrh.world
8443
Plesk Administration (https)



rrh.world
8443
Plesk Administration (https)



rrh.world
8447
Plesk Installer + Updates



rrh.world
8447
Plesk Installer + Updates



rrh.world
8880
Plesk Administration (http)



rrh.world
8880
Plesk Administration (http)



rrh.world
10000
Webmin (http)



rrh.world
10000
Webmin (http)



rrh.world
10000
Webmin (https)



rrh.world
10000
Webmin (https)



www.rrh.world
21
FTP
open
220 DiskStation FTP server ready.

www.rrh.world
21
FTP
open
220 DiskStation FTP server ready.

www.rrh.world
22
SSH



www.rrh.world
22
SSH



www.rrh.world
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

www.rrh.world
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

www.rrh.world
53
DNS



www.rrh.world
53
DNS



www.rrh.world
110
POP3



www.rrh.world
110
POP3



www.rrh.world
143
IMAP



www.rrh.world
143
IMAP



www.rrh.world
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is valid
www.rrh.world
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is valid
www.rrh.world
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

www.rrh.world
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

www.rrh.world
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is valid
www.rrh.world
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is valid
www.rrh.world
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is valid
www.rrh.world
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is valid
www.rrh.world
1433
MS SQL



www.rrh.world
1433
MS SQL



www.rrh.world
2082
cPanel (http)



www.rrh.world
2082
cPanel (http)



www.rrh.world
2083
cPanel (https)



www.rrh.world
2083
cPanel (https)



www.rrh.world
2086
WHM (http)



www.rrh.world
2086
WHM (http)



www.rrh.world
2087
WHM (https)



www.rrh.world
2087
WHM (https)



www.rrh.world
2089
cPanel Licensing



www.rrh.world
2089
cPanel Licensing



www.rrh.world
2095
cPanel Webmail (http)



www.rrh.world
2095
cPanel Webmail (http)



www.rrh.world
2096
cPanel Webmail (https)



www.rrh.world
2096
cPanel Webmail (https)



www.rrh.world
2222
DirectAdmin (http)



www.rrh.world
2222
DirectAdmin (http)



www.rrh.world
2222
DirectAdmin (https)



www.rrh.world
2222
DirectAdmin (https)



www.rrh.world
3306
mySql



www.rrh.world
3306
mySql



www.rrh.world
5224
Plesk Licensing



www.rrh.world
5224
Plesk Licensing



www.rrh.world
5432
PostgreSQL



www.rrh.world
5432
PostgreSQL



www.rrh.world
8080
Ookla Speedtest (http)
open
http://www.rrh.world:8080/
Http-Status: 200

www.rrh.world
8080
Ookla Speedtest (http)
open
http://www.rrh.world:8080/
Http-Status: 200

www.rrh.world
8080
Ookla Speedtest (https)
open
https://www.rrh.world:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

www.rrh.world
8080
Ookla Speedtest (https)
open
https://www.rrh.world:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

www.rrh.world
8083
VestaCP http



www.rrh.world
8083
VestaCP http



www.rrh.world
8083
VestaCP https



www.rrh.world
8083
VestaCP https



www.rrh.world
8443
Plesk Administration (https)



www.rrh.world
8443
Plesk Administration (https)



www.rrh.world
8447
Plesk Installer + Updates



www.rrh.world
8447
Plesk Installer + Updates



www.rrh.world
8880
Plesk Administration (http)



www.rrh.world
8880
Plesk Administration (http)



www.rrh.world
10000
Webmin (http)



www.rrh.world
10000
Webmin (http)



www.rrh.world
10000
Webmin (https)



www.rrh.world
10000
Webmin (https)



217.8.92.226
21
FTP
open
220 DiskStation FTP server ready.

217.8.92.226
21
FTP
open
220 DiskStation FTP server ready.

217.8.92.226
22
SSH



217.8.92.226
22
SSH



217.8.92.226
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

217.8.92.226
25
SMTP
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

217.8.92.226
53
DNS



217.8.92.226
53
DNS



217.8.92.226
110
POP3



217.8.92.226
110
POP3



217.8.92.226
143
IMAP



217.8.92.226
143
IMAP



217.8.92.226
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is invalid
217.8.92.226
465
SMTP (encrypted)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)
Mail certificate is invalid
217.8.92.226
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

217.8.92.226
587
SMTP (encrypted, submission)
open
220 mail.rrh.world ESMTP Postfix (Debian/GNU)

217.8.92.226
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is invalid
217.8.92.226
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot ready.
Mail certificate is invalid
217.8.92.226
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is invalid
217.8.92.226
995
POP3 (encrypted)
open
+OK Dovecot ready.
Mail certificate is invalid
217.8.92.226
1433
MS SQL



217.8.92.226
1433
MS SQL



217.8.92.226
2082
cPanel (http)



217.8.92.226
2082
cPanel (http)



217.8.92.226
2083
cPanel (https)



217.8.92.226
2083
cPanel (https)



217.8.92.226
2086
WHM (http)



217.8.92.226
2086
WHM (http)



217.8.92.226
2087
WHM (https)



217.8.92.226
2087
WHM (https)



217.8.92.226
2089
cPanel Licensing



217.8.92.226
2089
cPanel Licensing



217.8.92.226
2095
cPanel Webmail (http)



217.8.92.226
2095
cPanel Webmail (http)



217.8.92.226
2096
cPanel Webmail (https)



217.8.92.226
2096
cPanel Webmail (https)



217.8.92.226
2222
DirectAdmin (http)



217.8.92.226
2222
DirectAdmin (http)



217.8.92.226
2222
DirectAdmin (https)



217.8.92.226
2222
DirectAdmin (https)



217.8.92.226
3306
mySql



217.8.92.226
3306
mySql



217.8.92.226
5224
Plesk Licensing



217.8.92.226
5224
Plesk Licensing



217.8.92.226
5432
PostgreSQL



217.8.92.226
5432
PostgreSQL



217.8.92.226
8080
Ookla Speedtest (http)
open
http://217.8.92.226:8080/
Http-Status: 200

217.8.92.226
8080
Ookla Speedtest (http)
open
http://217.8.92.226:8080/
Http-Status: 200

217.8.92.226
8080
Ookla Speedtest (https)
open
https://217.8.92.226:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

217.8.92.226
8080
Ookla Speedtest (https)
open
https://217.8.92.226:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send. The handshake failed due to an unexpected packet format.

217.8.92.226
8083
VestaCP http



217.8.92.226
8083
VestaCP http



217.8.92.226
8083
VestaCP https



217.8.92.226
8083
VestaCP https



217.8.92.226
8443
Plesk Administration (https)



217.8.92.226
8443
Plesk Administration (https)



217.8.92.226
8447
Plesk Installer + Updates



217.8.92.226
8447
Plesk Installer + Updates



217.8.92.226
8880
Plesk Administration (http)



217.8.92.226
8880
Plesk Administration (http)



217.8.92.226
10000
Webmin (http)



217.8.92.226
10000
Webmin (http)



217.8.92.226
10000
Webmin (https)



217.8.92.226
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=51808676-6c3f-40de-ab03-71071b539de2


Last Result: https://check-your-website.server-daten.de/?q=rrh.world - 2019-10-09 13:01:51


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=rrh.world" target="_blank">Check this Site: rrh.world</a>