A

Top config

Checked:
19.07.2019 01:32:48


Older results


1. IP-Addresses

HostTIP-Addressis auth.∑ Queries∑ Timeout
server.germancoding.com
A
176.9.103.107
Falkenstein/Saxony/Germany (DE) - Hetzner
Hostname: server.germancoding.com
yes
1
0

AAAA
2a01:4f8:151:506c::2
Nuremberg/Bavaria/Germany (DE) - Hetzner

yes


www.server.germancoding.com

Name Error
yes
1
0


2. DNSSEC

Zone (*)DNSSEC - Informations (beta)
(root)
1 DS RR published

Status: Valid because published

2 DNSKEY RR found

Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)

Public Key with Algorithm 8, KeyTag 59944, Flags 256

1 RRSIG RR to validate DNSKEY RR found

Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.08.2019, 00:00:00, Signature-Inception: 11.07.2019, 00:00:00, KeyTag 20326, Signer-Name: (root)

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
com
1 DS RR in the parent zone found

1 RRSIG RR to validate DS RR found

Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 31.07.2019, 17:00:00, Signature-Inception: 18.07.2019, 16:00:00, KeyTag 59944, Signer-Name: (root)

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 59944 used to validate the DS RRSet in the parent zone

3 DNSKEY RR found

Public Key with Algorithm 8, KeyTag 3800, Flags 256

Public Key with Algorithm 8, KeyTag 17708, Flags 256

Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)

1 RRSIG RR to validate DNSKEY RR found

Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.07.2019, 18:25:33, Signature-Inception: 11.07.2019, 18:20:33, KeyTag 30909, Signer-Name: com

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
germancoding.com
2 DS RR in the parent zone found

1 RRSIG RR to validate DS RR found

Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 23.07.2019, 05:04:52, Signature-Inception: 16.07.2019, 03:54:52, KeyTag 17708, Signer-Name: com

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 17708 used to validate the DS RRSet in the parent zone

2 DNSKEY RR found

Public Key with Algorithm 8, KeyTag 25674, Flags 256

Public Key with Algorithm 8, KeyTag 54892, Flags 257 (SEP = Secure Entry Point)

1 RRSIG RR to validate DNSKEY RR found

Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 04.08.2019, 18:50:02, Signature-Inception: 14.07.2019, 18:45:02, KeyTag 54892, Signer-Name: germancoding.com

Status: Good - Algorithmus 8 and DNSKEY with KeyTag 54892 used to validate the DNSKEY RRSet

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 54892, DigestType 1 and Digest "MGjWoP+dkpe364nzFAkmQvFaJpY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 54892, DigestType 2 and Digest "4JycCBoZ6ws/PXk9qb0zXz8Nqilz23EtNSYnHM1Gf9A=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
server.germancoding.com
0 DS RR in the parent zone found

DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed domain name between the hashed NSEC3-owner and the hashed NextOwner. So the parent zone confirmes the non-existence of a DS RR.

0 DNSKEY RR found



RRSIG Type 1, expiration 2019-08-04 18:50:02 validates the A - Result: 176.9.103.107

RRSIG Type 28, expiration 2019-08-04 18:50:02 validates the AAAA - Result: 2A01:04F8:0151:506C:0000:0000:0000:0002

RRSIG Type 50, expiration 2019-08-04 18:50:02 validates the NSEC3 RR that proves the not-existence of the CNAME RR

RRSIG Type 50, expiration 2019-08-04 18:50:02 validates the NSEC3 RR that proves the not-existence of the TXT RR

RRSIG Type 50, expiration 2019-08-04 18:50:02 validates the NSEC3 RR that proves the not-existence of the TLSA RR

RRSIG Type 50, expiration 2019-08-04 18:50:02 validates the NSEC3 RR that proves the not-existence of the CAA RR
www.server.germancoding.com
0 DS RR in the parent zone found

DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed domain name between the hashed NSEC3-owner and the hashed NextOwner. So the parent zone confirmes the non-existence of a DS RR.


3. Name Servers

DomainNameserverNS-IP
www.server.germancoding.com
  ns1.hosting.de

server.germancoding.com
  ns1.hosting.de / ns1a.platformadmin.de
134.0.30.178
Frankfurt am Main/Hesse/Germany (DE) - Hosting.de GmbH


 
2a03:2900:3:1::2
Aachen/North Rhine-Westphalia/Germany (DE) - Hosting.de GmbH

germancoding.com
  ns1.hosting.de / ns1a.platformadmin.de


  ns2.hosting.de / ns-vie1


  ns3.hosting.de / ns3b

com
  a.gtld-servers.net


  b.gtld-servers.net


  c.gtld-servers.net


  d.gtld-servers.net


  e.gtld-servers.net


  f.gtld-servers.net


  g.gtld-servers.net


  h.gtld-servers.net


  i.gtld-servers.net


  j.gtld-servers.net


  k.gtld-servers.net


  l.gtld-servers.net


  m.gtld-servers.net


4. SOA-Entries


Domain:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1563492745
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:10


Domain:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1563492760
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:3


Domain:germancoding.com
Primary:ns1.hosting.de
Mail:hostmaster.germancoding.com
Serial:2019071405
Refresh:3600
Retry:7200
Expire:2419200
TTL:600
num Entries:3


Domain:server.germancoding.com
Primary:ns1.hosting.de
Mail:hostmaster.germancoding.com
Serial:2019071405
Refresh:3600
Retry:7200
Expire:2419200
TTL:600
num Entries:2


5. Url-Checks


show header:
Domainname Http-StatusredirectSec.G
• http://server.germancoding.com/pingtest
176.9.103.107
301
https://server.germancoding.com/pingtest
0.054
A
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:23 GMT
Content-Type: text/html
Content-Length: 185
Connection: close
Location: https://server.germancoding.com/pingtest

• http://server.germancoding.com/pingtest
2a01:4f8:151:506c::2
301
https://server.germancoding.com/pingtest
0.050
A
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:23 GMT
Content-Type: text/html
Content-Length: 185
Connection: close
Location: https://server.germancoding.com/pingtest

• https://server.germancoding.com/pingtest
176.9.103.107
200

0.524
A
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:24 GMT
Content-Length: 0
Connection: close
Strict-Transport-Security: max-age=31536000
Last-Modified: Fri, 09 Nov 2018 22:06:04 GMT
ETag: "0-57a428eb1cb00"
Accept-Ranges: bytes

• https://server.germancoding.com/pingtest
2a01:4f8:151:506c::2
200

0.214
A
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:24 GMT
Content-Length: 0
Connection: close
Strict-Transport-Security: max-age=31536000
Last-Modified: Fri, 09 Nov 2018 22:06:04 GMT
ETag: "0-57a428eb1cb00"
Accept-Ranges: bytes

• http://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
176.9.103.107
301
https://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.496
A
Visible Content: 301 Moved Permanently nginx/1.14.2
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:25 GMT
Content-Type: text/html
Content-Length: 185
Connection: close
Location: https://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• http://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2a01:4f8:151:506c::2
301
https://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.116
A
Visible Content: 301 Moved Permanently nginx/1.14.2
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:25 GMT
Content-Type: text/html
Content-Length: 185
Connection: close
Location: https://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• https://server.germancoding.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

404

0.224
A
Not Found
Visible Content: Not Found The requested URL /.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de was not found on this server. Apache/2.4.38 (Debian) Server at server.germancoding.com Port 7080
Server: nginx/1.14.2
Date: Thu, 18 Jul 2019 23:33:25 GMT
Content-Type: text/html; charset=iso-8859-1
Content-Length: 358
Connection: close
Strict-Transport-Security: max-age=31536000

6. Comments

Aname "server.germancoding.com" is subdomain, public suffix is "com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services"
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Agood: destination is https
Agood - only one version with Http-Status 200
Agood: one preferred version: non-www is preferred
Agood: every https has a Strict Transport Security Header
Agood: HSTS max-age is long enough, 31536000 seconds = 365 days
Ahttp://server.germancoding.com/pingtest 176.9.103.107
301
https://server.germancoding.com/pingtest
correct redirect http - https with the same domain name
Ahttp://server.germancoding.com/pingtest 2a01:4f8:151:506c::2
301
https://server.germancoding.com/pingtest
correct redirect http - https with the same domain name
N176.9.103.107:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N176.9.103.107:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.hosting.de: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Agood: CAA entries found, creating certificate is limited: letsencrypt.org is allowed to create certificates
AGood: All checks /.well-known/acme-challenge/random-filename without redirects answer with the expected http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 challenge should work. If it doesn't work: Check your vHost configuration (apachectl -S, nginx -T). Every combination of port and ServerName / ServerAlias (Apache) or Server (Nginx) must be unique. Merge duplicated entries in one vHost. If you use an IIS, extensionless files must be allowed in the /.well-known/acme-challenge subdirectory ( <configuration><system.webServer><staticContent><mimeMap fileExtension="." mimeType="text/plain" /></staticContent></system.webServer></configuration>).
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN)
ADuration: 45106 milliseconds, 45.106 seconds


7. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
server.germancoding.com
176.9.103.107
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
server.germancoding.com
176.9.103.107
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
server.germancoding.com
2a01:4f8:151:506c::2
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
server.germancoding.com
2a01:4f8:151:506c::2
443
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
supported
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
server.germancoding.com
server.germancoding.com
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
server.germancoding.com
server.germancoding.com
465
ok
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
server.germancoding.com
server.germancoding.com
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
server.germancoding.com
server.germancoding.com
993
ok
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
176.9.103.107
176.9.103.107
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
176.9.103.107
176.9.103.107
465
name does not match
Tls12
ECDH Ephermal
256
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
176.9.103.107
176.9.103.107
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
176.9.103.107
176.9.103.107
993
name does not match
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
Chain (complete)
1CN=*.germancoding.com

2CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


8. Certificates

1.
1.
CN=*.germancoding.com
06.07.2019
04.10.2019
expires in 72 days
*.germancoding.com - 1 entry
1.
1.
CN=*.germancoding.com
06.07.2019

04.10.2019
expires in 72 days
*.germancoding.com - 1 entry

KeyalgorithmEC Public Key (256 bit, prime256v1)
Signatur:SHA256 With RSA-Encryption
Serial Number:048FEA0DE59D2D4F5648ECF9507E6B2E8184
Thumbprint:802EB103C24E71D9C89D2BDA93BEB69425290593
SHA256 / Certificate:6z05FHulmAQvW4QAFzW912H8QAG29OPA0SVMrWEWIQ0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):f2368bff9e218f6c27601b8cd4e7d37bfca7dbf3c7e794f1ed3c02642343becd
OCSP - Url:http://ocsp.int-x3.letsencrypt.org
OCSP - must staple:no
Certificate Transparency:yes


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016
17.03.2021
expires in 602 days


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016

17.03.2021
expires in 602 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0A0141420000015385736A0B85ECA708
Thumbprint:E6A3B45B062D509B3382282D196EFE97D5956CCB
SHA256 / Certificate:JYR9Zo608E/dQLErawdAxWfafQJDCOtsLJb+QdneIY0=
SHA256 hex / Cert (DANE * 0 1):25847d668eb4f04fdd40b12b6b0740c567da7d024308eb6c2c96fe41d9de218d
SHA256 hex / PublicKey (DANE * 1 1):60b87575447dcba2a36b7d11ac09fb24a9db406fee12d2cc90180517616e8a18
OCSP - Url:http://isrg.trustid.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:no


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 799 days


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 799 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no



9. Last Certificates - Certificate Transparency Log Check (BETA)

1. Source CertSpotter - active certificates

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow.

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0
0
9

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
398395654
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-04-14 09:47:24
2018-07-13 09:47:24
server.germancoding.com
1 entries


385894023
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-04-06 19:04:49
2018-07-05 19:04:49
server.germancoding.com
1 entries


323486334
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-02-05 20:50:27
2018-05-06 19:50:27
server.germancoding.com
1 entries


323480807
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-02-05 20:39:53
2018-05-06 19:39:53
server.germancoding.com
1 entries


323479908
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-02-05 20:39:09
2018-05-06 19:39:09
server.germancoding.com
1 entries


323478791
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2018-02-05 20:37:27
2018-05-06 19:37:27
server.germancoding.com
1 entries


272971044
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2017-12-07 19:26:49
2018-03-07 19:26:49
server.germancoding.com
1 entries


272970050
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2017-12-07 19:24:22
2018-03-07 19:24:22
server.germancoding.com
1 entries


269609663
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2017-12-03 13:48:45
2018-03-03 13:48:45
server.germancoding.com
1 entries



10. Html-Content - Entries (BETA - mixed content and other checks)

No Html-Content entries found. Only checked if https + status 200/401/403/404


11. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
server.germancoding.com
0

no CAA entry found
1
0
germancoding.com
5
issue
letsencrypt.org
1
0
com
0

no CAA entry found
1
0


12. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
germancoding.com
v=spf1 mx ~all
ok
1
0
server.germancoding.com

ok
1
0
_acme-challenge.server.germancoding.com

Name Error - The domain name does not exist
1
0
_acme-challenge.server.germancoding.com.germancoding.com
v=spf1 mx ~all
perhaps wrong
1
0
_acme-challenge.server.germancoding.com.server.germancoding.com

Name Error - The domain name does not exist
1
0


13. Portchecks (BETA)

Domain or IPPortDescriptionResultAnswer
server.germancoding.com
21
FTP



server.germancoding.com
21
FTP



server.germancoding.com
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10

server.germancoding.com
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10

server.germancoding.com
25
SMTP
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

server.germancoding.com
25
SMTP
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

server.germancoding.com
53
DNS



server.germancoding.com
53
DNS



server.germancoding.com
110
POP3



server.germancoding.com
110
POP3



server.germancoding.com
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

server.germancoding.com
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

server.germancoding.com
465
SMTP (encrypted)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)
Mail certificate is valid
server.germancoding.com
465
SMTP (encrypted)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)
Mail certificate is valid
server.germancoding.com
587
SMTP (encrypted, submission)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

server.germancoding.com
587
SMTP (encrypted, submission)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

server.germancoding.com
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is valid
server.germancoding.com
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is valid
server.germancoding.com
995
POP3 (encrypted)



server.germancoding.com
995
POP3 (encrypted)



server.germancoding.com
1433
MS SQL



server.germancoding.com
1433
MS SQL



server.germancoding.com
2082
cPanel (http)



server.germancoding.com
2082
cPanel (http)



server.germancoding.com
2083
cPanel (https)



server.germancoding.com
2083
cPanel (https)



server.germancoding.com
2086
WHM (http)



server.germancoding.com
2086
WHM (http)



server.germancoding.com
2087
WHM SSL



server.germancoding.com
2087
WHM SSL



server.germancoding.com
2089
cPanel Licensing



server.germancoding.com
2089
cPanel Licensing



server.germancoding.com
2095
cPanel Webmail (http)



server.germancoding.com
2095
cPanel Webmail (http)



server.germancoding.com
2096
cPanel Webmail (https)



server.germancoding.com
2096
cPanel Webmail (https)



server.germancoding.com
3306
mySql



server.germancoding.com
3306
mySql



server.germancoding.com
5224
Plesk Licensing



server.germancoding.com
5224
Plesk Licensing



server.germancoding.com
5432
PostgreSQL



server.germancoding.com
5432
PostgreSQL



server.germancoding.com
8080
Ookla Speedtest (http)



server.germancoding.com
8080
Ookla Speedtest (http)



server.germancoding.com
8080
Ookla Speedtest (https)



server.germancoding.com
8080
Ookla Speedtest (https)



server.germancoding.com
8083
VestaCP http



server.germancoding.com
8083
VestaCP http



server.germancoding.com
8083
VestaCP https



server.germancoding.com
8083
VestaCP https



server.germancoding.com
8443
Plesk Administration (https)



server.germancoding.com
8443
Plesk Administration (https)



server.germancoding.com
8447
Plesk Installer + Updates



server.germancoding.com
8447
Plesk Installer + Updates



server.germancoding.com
8880
Plesk Administration (http)



server.germancoding.com
8880
Plesk Administration (http)



176.9.103.107
21
FTP



176.9.103.107
21
FTP



176.9.103.107
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10

176.9.103.107
22
SSH
open
SSH-2.0-OpenSSH_7.9p1 Debian-10

176.9.103.107
25
SMTP
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

176.9.103.107
25
SMTP
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

176.9.103.107
53
DNS



176.9.103.107
53
DNS



176.9.103.107
110
POP3



176.9.103.107
110
POP3



176.9.103.107
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

176.9.103.107
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ STARTTLS LOGINDISABLED] Dovecot (Debian) ready.

176.9.103.107
465
SMTP (encrypted)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)
Mail certificate is invalid
176.9.103.107
465
SMTP (encrypted)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)
Mail certificate is invalid
176.9.103.107
587
SMTP (encrypted, submission)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

176.9.103.107
587
SMTP (encrypted, submission)
open
220 server.germancoding.com ESMTP Postfix (Debian/GNU)

176.9.103.107
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
176.9.103.107
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 SASL-IR LOGIN-REFERRALS ID ENABLE IDLE LITERAL+ AUTH=PLAIN] Dovecot (Debian) ready.
Mail certificate is invalid
176.9.103.107
995
POP3 (encrypted)



176.9.103.107
995
POP3 (encrypted)



176.9.103.107
1433
MS SQL



176.9.103.107
1433
MS SQL



176.9.103.107
2082
cPanel (http)



176.9.103.107
2082
cPanel (http)



176.9.103.107
2083
cPanel (https)



176.9.103.107
2083
cPanel (https)



176.9.103.107
2086
WHM (http)



176.9.103.107
2086
WHM (http)



176.9.103.107
2087
WHM SSL



176.9.103.107
2087
WHM SSL



176.9.103.107
2089
cPanel Licensing



176.9.103.107
2089
cPanel Licensing



176.9.103.107
2095
cPanel Webmail (http)



176.9.103.107
2095
cPanel Webmail (http)



176.9.103.107
2096
cPanel Webmail (https)



176.9.103.107
2096
cPanel Webmail (https)



176.9.103.107
3306
mySql



176.9.103.107
3306
mySql



176.9.103.107
5224
Plesk Licensing



176.9.103.107
5224
Plesk Licensing



176.9.103.107
5432
PostgreSQL



176.9.103.107
5432
PostgreSQL



176.9.103.107
8080
Ookla Speedtest (http)



176.9.103.107
8080
Ookla Speedtest (http)



176.9.103.107
8080
Ookla Speedtest (https)



176.9.103.107
8080
Ookla Speedtest (https)



176.9.103.107
8083
VestaCP http



176.9.103.107
8083
VestaCP http



176.9.103.107
8083
VestaCP https



176.9.103.107
8083
VestaCP https



176.9.103.107
8443
Plesk Administration (https)



176.9.103.107
8443
Plesk Administration (https)



176.9.103.107
8447
Plesk Installer + Updates



176.9.103.107
8447
Plesk Installer + Updates



176.9.103.107
8880
Plesk Administration (http)



176.9.103.107
8880
Plesk Administration (http)





Permalink: https://check-your-website.server-daten.de/?i=7162838b-24cc-4f5e-8f69-499ad3e80478


Last Result: https://check-your-website.server-daten.de/?q=server.germancoding.com%2fpingtest - 2019-07-19 01:32:48


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=server.germancoding.com%2fpingtest" target="_blank">Check this Site: server.germancoding.com/pingtest</a>