Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

T

 

Timeout

 

Checked:
10.01.2025 18:02:52

 

Older results

 

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
rsc.jdgroup.net
A
148.244.149.230
Mexicali/Baja California/Mexico (MX) - Alestra, S. de R.L. de C.V.
Hostname: static-148-244-149-230.alestra.net.mx
yes
1
0

AAAA

yes


www.rsc.jdgroup.net

Name Error
yes
1
0
*.jdgroup.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


*.rsc.jdgroup.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






3 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 8, KeyTag 26470, Flags 256






Public Key with Algorithm 8, KeyTag 61050, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 22.01.2025, 00:00:00 +, Signature-Inception: 01.01.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: net

net
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=






1 RRSIG RR to validate DS RR found






RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.01.2025, 05:00:00 +, Signature-Inception: 10.01.2025, 04:00:00 +, KeyTag 26470, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26470 used to validate the DS RRSet in the parent zone






3 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 10024, Flags 256






Public Key with Algorithm 13, KeyTag 31059, Flags 256






Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 17.01.2025, 15:10:35 +, Signature-Inception: 02.01.2025, 15:05:35 +, KeyTag 37331, Signer-Name: net






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: jdgroup.net

jdgroup.net
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "4ec80ntjphgtu4s7v63o2bfvshkq5oj2" between the hashed NSEC3-owner "4ec6ea5rpkfdr6ad1cuuq5qde0sf4ak7" and the hashed NextOwner "4eca3bucen294u6up0mh46pnlrsmtjls". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 4ec6ea5rpkfdr6ad1cuuq5qde0sf4ak7.net., Algorithm: 13, 2 Labels, original TTL: 900 sec, Signature-expiration: 15.01.2025, 02:58:12 +, Signature-Inception: 08.01.2025, 01:48:12 +, KeyTag 31059, Signer-Name: net






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "jdgroup.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 13, 2 Labels, original TTL: 900 sec, Signature-expiration: 15.01.2025, 03:05:20 +, Signature-Inception: 08.01.2025, 01:55:20 +, KeyTag 31059, Signer-Name: net






0 DNSKEY RR found









Zone: rsc.jdgroup.net

rsc.jdgroup.net
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: www.rsc.jdgroup.net

www.rsc.jdgroup.net
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.rsc.jdgroup.net
  ns20.digicertdns.com

rsc.jdgroup.net
  ns20.digicertdns.com
208.94.148.223
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1800:10::1:1f
Reston/Virginia/United States (US) - Tiggee LLC

jdgroup.net
  ns10.dnsmadeeasy.com
208.94.148.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1800:10::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns11.dnsmadeeasy.com
208.80.124.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1801:11::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns12.dnsmadeeasy.com
208.80.126.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1802:12::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns13.dnsmadeeasy.com
208.80.125.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1801:13::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns14.dnsmadeeasy.com
208.80.127.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1802:14::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns15.dnsmadeeasy.com
208.94.149.4
Reston/Virginia/United States (US) - Tiggee LLC


 
2600:1800:15::1
Reston/Virginia/United States (US) - Tiggee LLC


  ns20.digicertdns.com

net
  a.gtld-servers.net / nnn1-defra-5


  b.gtld-servers.net / nnn1-elwaw4


  c.gtld-servers.net / nnn1-defra-5


  d.gtld-servers.net / nnn1-par6


  e.gtld-servers.net / nnn1-defra-5


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-frmrs-2


  k.gtld-servers.net / nnn1-ein1


  l.gtld-servers.net / nnn1-frmrs-2


  m.gtld-servers.net / nnn1-frmrs-2

 

4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1736528557
Refresh:1800
Retry:900
Expire:604800
TTL:900
num Entries:12


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1736528572
Refresh:1800
Retry:900
Expire:604800
TTL:900
num Entries:1


Domain:jdgroup.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


Domain:jdgroup.net
Zone-Name:jdgroup.net
Primary:ns20.digicertdns.com
Mail:dns.digicertdns.com
Serial:2009014242
Refresh:43200
Retry:3600
Expire:1209600
TTL:180
num Entries:12


Domain:rsc.jdgroup.net
Zone-Name:jdgroup.net
Primary:ns20.digicertdns.com
Mail:dns.digicertdns.com
Serial:2009014242
Refresh:43200
Retry:3600
Expire:1209600
TTL:180
num Entries:2


Domain:www.rsc.jdgroup.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because Chrome (used to create the Screenshot) could not load the url. Instead, there was a redirect to "chrome-error://chromewebdata/", so the content of your website isn't visible.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://rsc.jdgroup.net/
148.244.149.230
-14


10.030
T
Timeout - The operation has timed out.

• https://rsc.jdgroup.net/
148.244.149.230 gzip used - 547 / 952 - 42.54 %
Inline-JavaScript (∑/total): 1/174 Inline-CSS (∑/total): 0/0
200

Html is minified: 140.83 %
Other inline scripts (∑/total): 0/0
6.900
I
Server: nginx/1.18.0,(Ubuntu)
Date: Fri, 10 Jan 2025 17:04:18 GMT
Transfer-Encoding: chunked
Connection: keep-alive
ETag: W/"6780a328-3b8"
Content-Type: text/html
Last-Modified: Fri, 10 Jan 2025 04:33:44 GMT
Content-Encoding: gzip
Content-Length: 547

• http://rsc.jdgroup.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
148.244.149.230
-14


10.030
T
Timeout - The operation has timed out.
Visible Content:

• https://148.244.149.230/
148.244.149.230
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
500

Html is minified: 100.57 %
Other inline scripts (∑/total): 0/0
6.893
N
Internal Server Error
Certificate error: RemoteCertificateNameMismatch
Server: nginx/1.18.0,(Ubuntu)
Date: Fri, 10 Jan 2025 17:04:38 GMT
Connection: keep-alive
X-Powered-By: Express
Content-Security-Policy: default-src 'none'
X-Content-Type-Options: nosniff
Content-Type: text/html; charset=utf-8
Content-Length: 1764

 

7. Comments


1. General Results, most used to calculate the result

Aname "rsc.jdgroup.net" is subdomain, public suffix is ".net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 9994 (complete: 263653)
AGood: All ip addresses are public addresses
Warning: Only one ip address found: rsc.jdgroup.net has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: rsc.jdgroup.net has no ipv6 address.
AGood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
AGood: destination is https
AGood - only one version with Http-Status 200
AGood: one preferred version: non-www is preferred
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):1 complete Content-Type - header (2 urls)
https://rsc.jdgroup.net/ 148.244.149.230


Url with incomplete Content-Type - header - missing charset
Bhttps://rsc.jdgroup.net/ 148.244.149.230
200

Missing HSTS-Header
Ihttps://rsc.jdgroup.net/ 148.244.149.230
200

Content problems or problems with resources included - http links, files doesn't exist, different Content-Type definitions. Check the Html-Content - Part.
Nhttps://148.244.149.230/ 148.244.149.230
500

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
O
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain rsc.jdgroup.net, 1 ip addresses, 1 different http results.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.rsc.jdgroup.net

2. Header-Checks

Frsc.jdgroup.net 148.244.149.230
Content-Security-Policy
Critical: Missing Header:
Frsc.jdgroup.net 148.244.149.230
X-Content-Type-Options
Critical: Missing Header:
Frsc.jdgroup.net 148.244.149.230
Referrer-Policy
Critical: Missing Header:
Frsc.jdgroup.net 148.244.149.230
Permissions-Policy
Critical: Missing Header:
Brsc.jdgroup.net 148.244.149.230
Cross-Origin-Embedder-Policy
Info: Missing Header
Brsc.jdgroup.net 148.244.149.230
Cross-Origin-Opener-Policy
Info: Missing Header
Brsc.jdgroup.net 148.244.149.230
Cross-Origin-Resource-Policy
Info: Missing Header

3. DNS- and NameServer - Checks

AInfo:: 19 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 6 Name Servers.
AInfo:: 19 Queries complete, 19 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.2 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 7 different Name Servers found: ns10.dnsmadeeasy.com, ns11.dnsmadeeasy.com, ns12.dnsmadeeasy.com, ns13.dnsmadeeasy.com, ns14.dnsmadeeasy.com, ns15.dnsmadeeasy.com, ns20.digicertdns.com, 6 Name Servers included in Delegation: ns10.dnsmadeeasy.com, ns11.dnsmadeeasy.com, ns12.dnsmadeeasy.com, ns13.dnsmadeeasy.com, ns14.dnsmadeeasy.com, ns15.dnsmadeeasy.com, 6 Name Servers included in 2 Zone definitions: ns10.dnsmadeeasy.com, ns11.dnsmadeeasy.com, ns12.dnsmadeeasy.com, ns13.dnsmadeeasy.com, ns14.dnsmadeeasy.com, ns15.dnsmadeeasy.com, 1 Name Servers listed in SOA.Primary: ns20.digicertdns.com.
AGood: Only one SOA.Primary Name Server found.: ns20.digicertdns.com.
Error: SOA.Primary Name Server not included in the delegation set.: ns20.digicertdns.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns10.dnsmadeeasy.com, ns11.dnsmadeeasy.com, ns12.dnsmadeeasy.com, ns13.dnsmadeeasy.com, ns14.dnsmadeeasy.com, ns15.dnsmadeeasy.com
AGood: All Name Server Domain Names have a Public Suffix.
Error: Name Server Domain Names with Public Suffix and without ip address found.: 1 Name Servers without ipv4 and ipv6: 1

AGood: Minimal 2 different name servers (public suffix and public ip address) found: 6 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 6 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 6 Name Servers, 1 Top Level Domain: com
AGood: Name Servers with different domain names found.: 2 different Domains found
Warning: All Name Servers from the same Country / IP location.: 6 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 6 Name Servers, 1 different subnets (first Byte): 208., 2 different subnets (first two Bytes): 208.80., 208.94., 6 different subnets (first three Bytes): 208.80.124., 208.80.125., 208.80.126., 208.80.127., 208.94.148., 208.94.149.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 6 Name Servers with IPv6, 1 different subnets (first block): 2600:, 3 different subnets (first two blocks): 2600:1800:, 2600:1801:, 2600:1802:, 6 different subnets (first three blocks): 2600:1800:0010:, 2600:1800:0015:, 2600:1801:0011:, 2600:1801:0013:, 2600:1802:0012:, 2600:1802:0014:, 6 different subnets (first four blocks): 2600:1800:0010:0000:, 2600:1800:0015:0000:, 2600:1801:0011:0000:, 2600:1801:0013:0000:, 2600:1802:0012:0000:, 2600:1802:0014:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns20.digicertdns.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns20.digicertdns.com: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://rsc.jdgroup.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 148.244.149.230
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://rsc.jdgroup.net/ 148.244.149.230
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://rsc.jdgroup.net/ 148.244.149.230
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://rsc.jdgroup.net/ 148.244.149.230
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: Some script Elements (type text/javascript) with a src-Attribute have a defer / async - Attribute. So loading and executing these JavaScripts doesn't block parsing and rendering the Html-Output.
https://rsc.jdgroup.net/ 148.244.149.230
200

Critical: Some script Elements (type text/javascript) with a src-Attribute don't have a defer / async - Attribute. Loading and executing these JavaScripts blocks parsing and rendering the Html-Output. That's bad if your site is large or the connection is slow / mobile usage. Use "async" if the js file has only functions (so nothing is executed after parsing the file) or is independend. Use "defer" if the order of the scripts is important. All "defer" scripts are executed before the DOMContentLoaded event is fired. Check https://developer.mozilla.org/en-US/docs/Web/HTML/Element/script to see some details.: 1 script elements without defer/async.
AGood: All CSS / JavaScript files are sent compressed (gzip, deflate, br checked). That reduces the content of the files. 1 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 3 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 1 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 4 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 906294 milliseconds, 906.294 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
rsc.jdgroup.net
148.244.149.230
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
rsc.jdgroup.net
148.244.149.230
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=*.jdgroup.net


2CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona


3CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona


4OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US


148.244.149.230
148.244.149.230
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok

148.244.149.230
148.244.149.230
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
not supported
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain - too much certificates, don't send root certificates

1CN=*.jdgroup.net


2CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona


3CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, C=US, ST=Arizona


4OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US

 

9. Certificates

1.
1.
CN=*.jdgroup.net
17.06.2024
19.07.2025
expires in 180 days
*.jdgroup.net, jdgroup.net - 2 entries
1.
1.
CN=*.jdgroup.net
17.06.2024

19.07.2025
expires in 180 days


*.jdgroup.net, jdgroup.net - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00930F67CAFC6916E2
Thumbprint:D8949DDCFCA4BE95909A9C2557BAA85C3425A565
SHA256 / Certificate:J3QqPoTeBixHH2qeDPU6RtR/p80I7SZ+uIV6UYkLWVY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049
SHA256 hex / Subject Public Key Information (SPKI):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




2.
CN=*.jdgroup.net
17.06.2024
19.07.2025
expires in 180 days
*.jdgroup.net, jdgroup.net - 2 entries

2.
CN=*.jdgroup.net
17.06.2024

19.07.2025
expires in 180 days


*.jdgroup.net, jdgroup.net - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00930F67CAFC6916E2
Thumbprint:D8949DDCFCA4BE95909A9C2557BAA85C3425A565
SHA256 / Certificate:J3QqPoTeBixHH2qeDPU6RtR/p80I7SZ+uIV6UYkLWVY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049
SHA256 hex / Subject Public Key Information (SPKI):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




3.
CN=*.jdgroup.net
17.06.2024
19.07.2025
expires in 180 days
*.jdgroup.net, jdgroup.net - 2 entries

3.
CN=*.jdgroup.net
17.06.2024

19.07.2025
expires in 180 days


*.jdgroup.net, jdgroup.net - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00930F67CAFC6916E2
Thumbprint:D8949DDCFCA4BE95909A9C2557BAA85C3425A565
SHA256 / Certificate:J3QqPoTeBixHH2qeDPU6RtR/p80I7SZ+uIV6UYkLWVY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049
SHA256 hex / Subject Public Key Information (SPKI):45c5115e793458e18130d4d0de619e659fce71813e4e517b8cfc8055453f9049 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)




4.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 2294 days


4.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 2294 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):973a41276ffd01e027a2aad49e34c37846d3e976ff6a620b6712e33832041aa6
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




5.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 2294 days


5.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 2294 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




6.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 2294 days


6.
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 2294 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:07
Thumbprint:27AC9369FAF25207BB2627CEFACCBE4EF9C319B8
SHA256 / Certificate:lzpBJ2/9AeAnoqrUnjTDeEbT6Xb/amILZxLjODIEGqY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SHA256 hex / Subject Public Key Information (SPKI):f11c3dd048f74edb7c45192b83e5980d2f67ec84b4ddb9396e33ff5173ed698f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




7.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.01.2014
30.05.2031
expires in 2321 days


7.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.01.2014

30.05.2031
expires in 2321 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:1BE715
Thumbprint:340B2880F446FCC04E59ED33F52B3D08D6242964
SHA256 / Certificate:Oi++kokeV/4F1XCH9I5zDxflpfU+9APWGOW3TXp+bss=
SHA256 hex / Cert (DANE * 0 1):3a2fbe92891e57fe05d57087f48e730f17e5a5f53ef403d618e5b74d7a7e6ecb
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




8.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.09.2009
01.01.2038
expires in 4729 days


8.
CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
01.09.2009

01.01.2038
expires in 4729 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00
Thumbprint:47BEABC922EAE80E78783462A79F45C254FDE68B
SHA256 / Certificate:RRQLMkfrnMjFtPDXtTCR9zKSCJ5uWmPidJ3TrKkZjto=
SHA256 hex / Cert (DANE * 0 1):45140b3247eb9cc8c5b4f0d7b53091f73292089e6e5a63e2749dd3aca9198eda
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





9.
CN=Go Daddy Root Certificate Authority - G2, OU=https://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011
03.05.2031
expires in 2294 days


9.
CN=Go Daddy Root Certificate Authority - G2, OU=https://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US
03.05.2011

03.05.2031
expires in 2294 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:2003
Thumbprint:841D4A9FC9D3B2F0CA5FAB95525AB2066ACF8322
SHA256 / Certificate:m/WJZ1RZlhlFEtthdxUa/plwauo9o2/u562fizwFB8s=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SHA256 hex / Subject Public Key Information (SPKI):2a8f2d8af0eb123898f74c866ac3fa669054e23c17bc7a95bd0234192dc635d0
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.godaddy.com/
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




10.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004
29.06.2034
expires in 3447 days


10.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004

29.06.2034
expires in 3447 days




KeyalgorithmRSA encryption ( bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:00
Thumbprint:2796BAE63F1801E277261BA0D77770028F20EEE4
SHA256 / Certificate:w4Rr8kuek8pkJ0wOxnwezF4CT/ys0tdAGTUOgf5UauQ=
SHA256 hex / Cert (DANE * 0 1):c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
SHA256 hex / PublicKey (DANE * 1 1):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SHA256 hex / Subject Public Key Information (SPKI):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:





11.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004
29.06.2034
expires in 3447 days


11.
OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US
29.06.2004

29.06.2034
expires in 3447 days




KeyalgorithmRSA encryption ( bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:00
Thumbprint:2796BAE63F1801E277261BA0D77770028F20EEE4
SHA256 / Certificate:w4Rr8kuek8pkJ0wOxnwezF4CT/ys0tdAGTUOgf5UauQ=
SHA256 hex / Cert (DANE * 0 1):c3846bf24b9e93ca64274c0ec67c1ecc5e024ffcacd2d74019350e81fe546ae4
SHA256 hex / PublicKey (DANE * 1 1):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SHA256 hex / Subject Public Key Information (SPKI):5632d97bfa775bf3c99ddea52fc2553410864016729c52dd6524c8a9c3b4489f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found

 

11. Html-Content - Entries

Summary


Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://rsc.jdgroup.net/
148.244.149.230
link
stylesheet
2

2
2
0
0
0
0


link
other
2

1
1
0
0
0
0


meta
other
2

0


0
0
0


script

2
111,661 Bytes
2
1
1
0
0
0

https://148.244.149.230/
148.244.149.230
meta
other
1

0


0
0
0

 

Details (currently limited to 500 rows - some problems with spam users)

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://rsc.jdgroup.net/
148.244.149.230
link
icon
/JDLogo.svg
-14
Timeout - The operation has timed out.
1
Timeout - The operation has timed out.















link
modulepreload
/assets/vendor-8bbbd385.js


1
ok















link
stylesheet
/assets/index-c1a5557d.css
-14
Timeout - The operation has timed out.
1
Timeout - The operation has timed out.















link
stylesheet
/assets/vendor-b334d8ac.css
-14
Timeout - The operation has timed out.
1
Timeout - The operation has timed out.















meta
charset
UTF-8


1
ok















meta
viewport
width=device-width, initial-scale=1.0


1
ok















script
src
/assets/index-eba6f2a8.js
-14
Timeout - The operation has timed out.
1
Timeout - The operation has timed out.
Missing defer / async attribute.














script
src
https://www.googletagmanager.com/gtag/js?id=G-PTE3QG4RGM
200

1
Problems with Content-Type - Header - see details
async attribute found application/javascript; charset=UTF-8
missing X-Content-Type-Options nosniff


This Combination of MediaType "application" and MediaSubType "javascript" is obsolete. Don't use it. See https://www.iana.org/assignments/media-types/media-types.xhtml to find a correct Combination. Use "text/javascript" instead.


Cache-Control: max-age=900, private - max-age too short.
Compression (br): 111661/335777 Bytes






Server-Header Access-Control-Allow-Origin: https://rsc.jdgroup.net
Cross-Origin Resource Sharing (CORS) not supported


 

12. Html-Parsing via https://validator.w3.org/nu/

Url used (first standard-https-result with http status 200): https://rsc.jdgroup.net/

Summary

Good: No non-document-errors
0 errors
0 warnings

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns10.dnsmadeeasy.com, ns11.dnsmadeeasy.com, ns12.dnsmadeeasy.com, ns13.dnsmadeeasy.com, ns14.dnsmadeeasy.com, ns15.dnsmadeeasy.com

 

QNr.DomainTypeNS used
1
com
NS
l.root-servers.net (2001:500:9f::42)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns10.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
3
ns11.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
4
ns12.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
5
ns13.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
6
ns14.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
7
ns15.dnsmadeeasy.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns0.dnsmadeeasy.com, ns1.dnsmadeeasy.com, ns2.dnsmadeeasy.com, ns3.dnsmadeeasy.com, ns4.dnsmadeeasy.com, ns8.dnsmadeeasy.com

Answer: ns0.dnsmadeeasy.com
208.94.148.2, 2600:1800::1

Answer: ns1.dnsmadeeasy.com
208.80.124.2, 2600:1801:1::1

Answer: ns2.dnsmadeeasy.com
208.80.126.2, 2600:1802:2::1

Answer: ns3.dnsmadeeasy.com
208.80.125.2, 2600:1801:3::1

Answer: ns4.dnsmadeeasy.com
208.80.127.2, 2600:1802:4::1

Answer: ns8.dnsmadeeasy.com
208.94.149.2, 2600:1800:8::1
8
ns10.dnsmadeeasy.com: 208.94.148.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
9
ns10.dnsmadeeasy.com: 2600:1800:10::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)
10
ns11.dnsmadeeasy.com: 208.80.124.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
11
ns11.dnsmadeeasy.com: 2600:1801:11::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)
12
ns12.dnsmadeeasy.com: 208.80.126.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
13
ns12.dnsmadeeasy.com: 2600:1802:12::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)
14
ns13.dnsmadeeasy.com: 208.80.125.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
15
ns13.dnsmadeeasy.com: 2600:1801:13::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)
16
ns14.dnsmadeeasy.com: 208.80.127.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
17
ns14.dnsmadeeasy.com: 2600:1802:14::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)
18
ns15.dnsmadeeasy.com: 208.94.149.4
A
ns0.dnsmadeeasy.com (2600:1800::1)
19
ns15.dnsmadeeasy.com: 2600:1800:15::1
AAAA
ns0.dnsmadeeasy.com (2600:1800::1)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
rsc.jdgroup.net
0

no CAA entry found
1
0
jdgroup.net
0

no CAA entry found
1
0
net
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
jdgroup.net
atlassian-sending-domain-verification=3411d3f0-7b7b-4595-bc8b-ad2749733672
ok
1
0
jdgroup.net
google-site-verification=nXEBsXLMakP82VZlyyxJhRoH8D5HtqMAu6u1B16oWzU
ok
1
0
jdgroup.net
MS=ms45076142
ok
1
0
jdgroup.net
nf8co58k249u4e51cnm0r86t0b
ok
1
0
jdgroup.net
v=spf1 mx a ip4:148.244.149.225/28 ip4:70.167.190.65/27 include:dnsexit.com include:amazonses.com include:_spf.atlassian.net include:spf.protection.outlook.com include:_spf.mlsend.com -all
ok
1
0
rsc.jdgroup.net

ok
1
0
_acme-challenge.rsc.jdgroup.net

Name Error - The domain name does not exist
1
0
_acme-challenge.rsc.jdgroup.net.jdgroup.net

Name Error - The domain name does not exist
1
0
_acme-challenge.rsc.jdgroup.net.rsc.jdgroup.net

Name Error - The domain name does not exist
1
0

 

16. DomainService - Entries

No DomainServiceEntries entries found

 

 

17. Cipher Suites

Complete

1
0 Ciphers
0.00 Ciphers/Check
602.85 sec602.85 sec/Check
0 without, 0 FS

rsc.jdgroup.net
148.244.149.230
443
Fatal: 234 Cipher Suites checked, no connection possible. Duration 600 seconds, that's too long. May be a blocking firewall, AutoBan, FailBan etc. Remove that if you want to check your Cipher Suites.
0 Ciphers, 602.85 sec






 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=66568821-a825-4e4c-9289-e01acfaae439

 

Last Result: https://check-your-website.server-daten.de/?q=rsc.jdgroup.net - 2025-01-10 18:02:52

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=rsc.jdgroup.net" target="_blank">Check this Site: rsc.jdgroup.net</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=rsc.jdgroup.net