Check DNS, Urls + Redirects, Certificates and Content of your Website



Q

http sent over port 443

Checked:
01.08.2020 14:34:02


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
someones.net
A
35.204.233.132
Groningen/Netherlands (NL) - Google LLC
Hostname: 132.233.204.35.bc.googleusercontent.com
yes
1
0

AAAA

yes


www.someones.net

Name Error
yes
1
0
*.someones.net
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 46594, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.08.2020, 00:00:00 +, Signature-Inception: 31.07.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: net
net
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=



1 RRSIG RR to validate DS RR found



RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 14.08.2020, 05:00:00 +, Signature-Inception: 01.08.2020, 04:00:00 +, KeyTag 46594, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 46594 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 35886, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 56519, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 07.08.2020, 16:28:30 +, Signature-Inception: 23.07.2020, 16:23:30 +, KeyTag 35886, Signer-Name: net



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 35886 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 35886, DigestType 2 and Digest "eGKyf19Rbr4ZaARE1M5edimBkxhCxGXwAjZAHYvZc+4=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: someones.net
someones.net
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "otj4vr4plva506bltae0gqjv35g951p2" between the hashed NSEC3-owner "otj3569cq8h3fhlo0n82ic3nrv9lugs6" and the hashed NextOwner "otj7ac0fj30oh966agf34bkeijmjj18t". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner otj3569cq8h3fhlo0n82ic3nrv9lugs6.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 08.08.2020, 06:35:16 +, Signature-Inception: 01.08.2020, 05:25:16 +, KeyTag 56519, Signer-Name: net



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1ruuffjkct2q54p78f8ejgj8jbk7i8b". So that domain name is the Closest Encloser of "someones.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 05.08.2020, 06:42:26 +, Signature-Inception: 29.07.2020, 05:32:26 +, KeyTag 56519, Signer-Name: net



0 DNSKEY RR found




Zone: www.someones.net
www.someones.net
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.someones.net
  ns0.someones.net

someones.net
  ns0.someones.net / fringe
94.142.241.57
Almere Stad/Provincie Flevoland/Netherlands (NL) - Netwerkvereniging Coloclue


 
2a02:898:3::53
Almere Stad/Provincie Flevoland/Netherlands (NL) - Netwerkvereniging Coloclue


  ns4.coloclue.net / ns4
95.211.237.213
Amsterdam/North Holland/Netherlands (NL) - LeaseWeb Netherlands B.V.


 
2001:1af8:4500:a060:1::53
Amsterdam/North Holland/Netherlands (NL) - LEASEWEB

net
  a.gtld-servers.net


  b.gtld-servers.net


  c.gtld-servers.net


  d.gtld-servers.net


  e.gtld-servers.net


  f.gtld-servers.net


  g.gtld-servers.net


  h.gtld-servers.net


  i.gtld-servers.net


  j.gtld-servers.net


  k.gtld-servers.net


  l.gtld-servers.net


  m.gtld-servers.net


4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1596285221
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:7


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1596285236
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:6


Domain:someones.net
Zone-Name:someones.net
Primary:ns0.someones.net
Mail:dnsmaster.someones.net
Serial:2020070106
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:4


Domain:www.someones.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://someones.net/
35.204.233.132
-2

1.066
V
ConnectFailure - Unable to connect to the remote server

• https://someones.net/
35.204.233.132
-4

0.087
W
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

• http://someones.net:443/
35.204.233.132 GZip used - 3138 / 10918 - 71.26 %
200

Html is minified: 223.78 %
0.046
Q
Visible Content: Apache2 Ubuntu Default Page It works! This is the default welcome page used to test the correct operation of the Apache2 server after installation on Ubuntu systems. It is based on the equivalent page on Debian, from which the Ubuntu Apache packaging is derived. If you can read this page, it means that the Apache HTTP server installed at this site is working properly. You should replace this file (located at /var/www/html/index.html ) before continuing to operate your HTTP server. If you are a normal user of this web site and don't know what this page is about, this probably means that the site is currently unavailable due to maintenance. If the problem persists, please contact the site's administrator. Configuration Overview Ubuntu's Apache2 default configuration is different from the upstream default configuration, and split into several files optimized for interaction with Ubuntu tools. The configuration system is fully documented in /usr/share/doc/apache2/README.Debian.gz . Refer to this for the full documentation. Documentation for the web server itself can be found by accessing the manual if the apache2-doc package was installed on this server. The configuration layout for an Apache2 web server installation on Ubuntu systems is as follows: /etc/apache2/ |-- apache2.conf | `-- ports.conf |-- mods-enabled | |-- *.load | `-- *.conf |-- conf-enabled | `-- *.conf |-- sites-enabled | `-- *.conf apache2.conf is the main configuration file. It puts the pieces together by including all remaining configuration files when starting up the web server. ports.conf is always included from the main configuration file. It is used to determine the listening ports for incoming connections, and this file can be customized anytime. Configuration files in the mods-enabled/ , conf-enabled/ and sites-enabled/ directories contain particular configuration snippets which manage modules, global configuration fragments, or virtual host configurations, respectively. They are activated by symlinking available configuration files from their respective *-available/ counterparts. These should be managed by using our helpers a2enmod, a2dismod, a2ensite, a2dissite, and a2enconf, a2disconf . See their respective man pages for detailed information. The binary is called apache2. Due to the use of environment variables, in the default configuration, apache2 needs to be started/stopped with /etc/init.d/apache2 or apache2ctl . Calling /usr/bin/apache2 directly will not work with the default configuration. Document Roots By default, Ubuntu does not allow access through the web browser to any file apart of those located in /var/www , public_html directories (when enabled) and /usr/share (for web applications). If your site is using a web document root located elsewhere (such as in /srv ) you may need to whitelist your document root directory in /etc/apache2/apache2.conf . The default Ubuntu document root is /var/www/html . You can make your own virtual hosts under /var/www. This is different to previous releases which provides better security out of the box. Reporting Problems Please use the ubuntu-bug tool to report bugs in the Apache2 package with Ubuntu. However, check existing bug reports before reporting a new bug. Please report bugs specific to modules (such as PHP and others) to respective packages, not to the web server itself.
Date: Sat, 01 Aug 2020 12:34:35 GMT
Server: Apache/2.4.29 (Ubuntu)
Last-Modified: Tue, 03 Jul 2018 10:53:13 GMT
ETag: "2aa6-570161eec32b7-gzip"
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 3138
Connection: close
Content-Type: text/html

• http://someones.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
35.204.233.132
-2

1.070
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• https://35.204.233.132/
35.204.233.132
-4

0.083
W
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

7. Comments


1. General Results, most used to calculate the result

Aname "someones.net" is domain, public suffix is ".net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 5774 (complete: 128404)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: someones.net has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: someones.net has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
Agood - only one version with Http-Status 200
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (1 urls)
http://someones.net:443/ 35.204.233.132


Url with incomplete Content-Type - header - missing charset
Hfatal error: No https - result with http-status 200, no encryption
HFatal error: http result with http-status 200, no encryption. Add a redirect http ⇒ https, so every connection is secure. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop.
Nsomeones.net:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nsomeones.net:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nsomeones.net:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nsomeones.net:8080


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nsomeones.net:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N35.204.233.132:465


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N35.204.233.132:993


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N35.204.233.132:995


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N35.204.233.132:8080


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N35.204.233.132:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Qhttp://someones.net:443/ 35.204.233.132
200

Misconfiguration: http sent over port 443. Wrong port forwarding port 443 to port 80 or wrong vHost definition. If you use a virtual Host <VirtualHost ip-address:443>, try <VirtualHost *:443>.
Vhttp://someones.net/ 35.204.233.132
-2

connect failure - perhaps firewall
Vhttp://someones.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.204.233.132
-2

connect failure - perhaps firewall
Info: Checking the ip addresses of that domain name not exact one certificate found. So it's impossible to check if that domain requires Server Name Indication (SNI).: Domain someones.net, 1 ip addresses.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 2 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns0.someones.net (2a02:898:3::53, 94.142.241.57), ns4.coloclue.net (2001:1af8:4500:a060:1::53, 95.211.237.213)
AGood (1 - 3.0):: An average of 1.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 2 different Name Servers found: ns0.someones.net, ns4.coloclue.net, 2 Name Servers included in Delegation: ns0.someones.net, ns4.coloclue.net, 2 Name Servers included in 1 Zone definitions: ns0.someones.net, ns4.coloclue.net, 1 Name Servers listed in SOA.Primary: ns0.someones.net.
AGood: Only one SOA.Primary Name Server found.: ns0.someones.net.
AGood: SOA.Primary Name Server included in the delegation set.: ns0.someones.net.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns0.someones.net, ns4.coloclue.net
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 2 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 2 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 2 Name Servers, 1 Top Level Domain: net
AGood: Name Servers with different domain names found.: 2 different Domains found
Warning: All Name Servers from the same Country / IP location.: 2 Name Servers, 1 Countries: NL
AInfo: Ipv4-Subnet-list: 2 Name Servers, 2 different subnets (first Byte): 94., 95., 2 different subnets (first two Bytes): 94.142., 95.211., 2 different subnets (first three Bytes): 94.142.241., 95.211.237.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AInfo: IPv6-Subnet-list: 2 Name Servers with IPv6, 2 different subnets (first block): 2001:, 2a02:, 2 different subnets (first two blocks): 2001:1af8:, 2a02:0898:, 2 different subnets (first three blocks): 2001:1af8:4500:, 2a02:0898:0003:, 2 different subnets (first four blocks): 2001:1af8:4500:a060:, 2a02:0898:0003:0000:
AExcellent: Every Name Server IPv6-address starts with an unique Hex-block
AInfo: Nameserver mit different domain names found. May be a problem with DNS-Updates
AGood: Nameserver supports TCP connections: 4 good Nameserver
AGood: Nameserver supports Echo Capitalization: 4 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 4 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns0.someones.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns0.someones.net / 94.142.241.57: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: ok (fringe). COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns0.someones.net / 2a02:898:3::53: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. V1DNSSEC: ok. NSID: ok (fringe). COOKIE: SOA expected, but NOT found, NOERR expectend and NOERR found, Version 0 expectend and found. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://someones.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.204.233.132
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 89880 milliseconds, 89.880 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
someones.net
someones.net
465
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
someones.net
someones.net
465
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


someones.net
someones.net
993
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

someones.net
someones.net
993
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


someones.net
someones.net
995
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

someones.net
someones.net
995
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


someones.net
someones.net
8080
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

someones.net
someones.net
8080
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


someones.net
someones.net
8443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

someones.net
someones.net
8443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=mail-2.someones.net

2CN=mail-2.someones.net

3CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


35.204.233.132
35.204.233.132
465
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

35.204.233.132
35.204.233.132
465
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


35.204.233.132
35.204.233.132
993
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

35.204.233.132
35.204.233.132
993
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


35.204.233.132
35.204.233.132
995
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok

35.204.233.132
35.204.233.132
995
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
384
Aes256
256
Sha384
error checking OCSP stapling
ok
 
Tls.1.2
Tls.1.1
Tls.1.0

Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


35.204.233.132
35.204.233.132
8080
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

35.204.233.132
35.204.233.132
8080
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Self signed certificate
1CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, C=NL, emailAddress=webteam@someones.net


35.204.233.132
35.204.233.132
8443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

35.204.233.132
35.204.233.132
8443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=mail-2.someones.net

2CN=mail-2.someones.net

3CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US


9. Certificates

1.
1.
E=webteam@someones.net, CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, S=Noord_Holland, C=NL
03.07.2018
30.06.2028
expires in 2771 days

1.
1.
E=webteam@someones.net, CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, S=Noord_Holland, C=NL
03.07.2018

30.06.2028
expires in 2771 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00D1BC88AD7C94E9AB
Thumbprint:D0C51B353EE99156301AE80DA93B263BD419D976
SHA256 / Certificate:NLOErCQEA3YsvdPoXJrVrxQZXURlfsnzz4jlgV8SjVY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):649e395c906b6cdc26848695652441c7666b2f2f96b1cac76fe843f26456a90f
SHA256 hex / Subject Public Key Information (SPKI):3e27ed9dbdf71d18da395963e686125769ed908bfaad6b6a7e4bd63d7e08dcbb
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.

2.
1.
E=webteam@someones.net, CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, S=Noord-Holland, C=NL
03.07.2018
30.06.2028
expires in 2771 days

2.
1.
E=webteam@someones.net, CN=mail-2.someones.net, OU=WebTeam, O=SoMeOnEs.NeT, L=Amsterdam, S=Noord-Holland, C=NL
03.07.2018

30.06.2028
expires in 2771 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00A6F47722391AECAF
Thumbprint:24300ADB9CBD56238C77A0CAA9DC19787B5D4B6A
SHA256 / Certificate:BLThJAJmCxBPYIFcY5lWLd/pnd7gi1LVwOooTnBnyus=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):9d1a69b5f1fa26c247ac261e5db1ec964e343f4f337e67d848c7601b726efc81
SHA256 hex / Subject Public Key Information (SPKI):52a6c9674fd016614271d33f98411e6d6022e2b0c447cb7a57e30a94364327ff
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.

3.
1.
CN=mail-2.someones.net
14.06.2020
12.09.2020
77 days expired
mail-2.someones.net - 1 entry
3.
1.
CN=mail-2.someones.net
14.06.2020

12.09.2020
77 days expired
mail-2.someones.net - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:031F66AEB784C2BE72288C55A60AD85B96EA
Thumbprint:C0A8E8AC78692AD9C12DD236D2F7A76A46CEF4A1
SHA256 / Certificate:MllLEMOt7QbhuyQdXZVX28zC/22ce3iA1PyIF2hcNlQ=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):3bab0e9c27284b2514cd2a218f09d45452e703ecea6a05e7f142fff8417c9e77
SHA256 hex / Subject Public Key Information (SPKI):eddb2e4cb9c6f9f05e338d0bff24144534497cc10b7c89abb27f9e31747c3bcf
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.int-x3.letsencrypt.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016
17.03.2021
expires in 109 days


2.
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
17.03.2016

17.03.2021
expires in 109 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0A0141420000015385736A0B85ECA708
Thumbprint:E6A3B45B062D509B3382282D196EFE97D5956CCB
SHA256 / Certificate:JYR9Zo608E/dQLErawdAxWfafQJDCOtsLJb+QdneIY0=
SHA256 hex / Cert (DANE * 0 1):25847d668eb4f04fdd40b12b6b0740c567da7d024308eb6c2c96fe41d9de218d
SHA256 hex / PublicKey (DANE * 1 1):60b87575447dcba2a36b7d11ac09fb24a9db406fee12d2cc90180517616e8a18
SHA256 hex / Subject Public Key Information (SPKI):cbb93d32de628874a3ecfb92affadc97f1b795f84cc6f24221a089dee1aa25ad
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://isrg.trustid.ocsp.identrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 306 days


3.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 306 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SHA256 hex / Subject Public Key Information (SPKI):29cc40db5e2de462a311cbbafaa1dc466960002335ecdf3317f2cd05c1d0bedf
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1745034008
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-07-06 06:38:18
2020-10-04 06:38:18
*.someones.net, someones.net - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
0 /0 new
0
2

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3047867290
precert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-07-06 04:38:18
2020-10-04 04:38:18
*.someones.net, someones.net
2 entries


2611249507
leaf cert
CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
2020-03-22 06:41:20
2020-06-20 05:41:20
*.someones.net, someones.net
2 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns0.someones.net, ns4.coloclue.net

QNr.DomainTypeNS used
1
net
NS
f.root-servers.net (2001:500:2f::f)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns0.someones.net: 2a02:898:3::53, 94.142.241.57
NS
b.gtld-servers.net (2001:503:231d::2:30)

Answer: ns4.coloclue.net
2001:1af8:4500:a060:1::53, 95.211.237.213


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
someones.net
0

no CAA entry found
1
0
net
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
someones.net
v=spf1 mx a ~all
ok
1
0
_acme-challenge.someones.net

Name Error - The domain name does not exist
1
0
_acme-challenge.someones.net.someones.net

Name Error - The domain name does not exist
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
someones.net
21
FTP



someones.net
21
FTP



someones.net
22
SSH
open
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3

someones.net
22
SSH
open
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3

someones.net
25
SMTP
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

someones.net
25
SMTP
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

someones.net
53
DNS
open


someones.net
53
DNS
open


someones.net
110
POP3
open
+OK Dovecot (Ubuntu) ready.

someones.net
110
POP3
open
+OK Dovecot (Ubuntu) ready.

someones.net
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.

someones.net
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.

someones.net
465
SMTP (encrypted)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)
Mail certificate is invalid
someones.net
465
SMTP (encrypted)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)
Mail certificate is invalid
someones.net
587
SMTP (encrypted, submission)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

someones.net
587
SMTP (encrypted, submission)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

someones.net
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
someones.net
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
someones.net
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
someones.net
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
someones.net
1433
MS SQL



someones.net
1433
MS SQL



someones.net
2082
cPanel (http)



someones.net
2082
cPanel (http)



someones.net
2083
cPanel (https)



someones.net
2083
cPanel (https)



someones.net
2086
WHM (http)



someones.net
2086
WHM (http)



someones.net
2087
WHM (https)



someones.net
2087
WHM (https)



someones.net
2089
cPanel Licensing



someones.net
2089
cPanel Licensing



someones.net
2095
cPanel Webmail (http)



someones.net
2095
cPanel Webmail (http)



someones.net
2096
cPanel Webmail (https)



someones.net
2096
cPanel Webmail (https)



someones.net
2222
DirectAdmin (http)



someones.net
2222
DirectAdmin (http)



someones.net
2222
DirectAdmin (https)



someones.net
2222
DirectAdmin (https)



someones.net
3306
mySql



someones.net
3306
mySql



someones.net
5224
Plesk Licensing



someones.net
5224
Plesk Licensing



someones.net
5432
PostgreSQL



someones.net
5432
PostgreSQL



someones.net
8080
Ookla Speedtest (http)
open
http://someones.net:8080/
Http-Status: 400
Bad Request

someones.net
8080
Ookla Speedtest (http)
open
http://someones.net:8080/
Http-Status: 400
Bad Request

someones.net
8080
Ookla Speedtest (https)
open
https://someones.net:8080/
Http-Status: 302
Certificate is invalid Redirect: /login/
someones.net
8080
Ookla Speedtest (https)
open
https://someones.net:8080/
Http-Status: 302
Certificate is invalid Redirect: /login/
someones.net
8083
VestaCP http



someones.net
8083
VestaCP http



someones.net
8083
VestaCP https



someones.net
8083
VestaCP https



someones.net
8443
Plesk Administration (https)
open
https://someones.net:8443/
Http-Status: 200
Certificate is invalid
someones.net
8443
Plesk Administration (https)
open
https://someones.net:8443/
Http-Status: 200
Certificate is invalid
someones.net
8447
Plesk Installer + Updates



someones.net
8447
Plesk Installer + Updates



someones.net
8880
Plesk Administration (http)



someones.net
8880
Plesk Administration (http)



someones.net
10000
Webmin (http)



someones.net
10000
Webmin (http)



someones.net
10000
Webmin (https)



someones.net
10000
Webmin (https)



35.204.233.132
21
FTP



35.204.233.132
21
FTP



35.204.233.132
22
SSH
open
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3

35.204.233.132
22
SSH
open
SSH-2.0-OpenSSH_7.6p1 Ubuntu-4ubuntu0.3

35.204.233.132
25
SMTP
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

35.204.233.132
25
SMTP
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

35.204.233.132
53
DNS
open


35.204.233.132
53
DNS
open


35.204.233.132
110
POP3
open
+OK Dovecot (Ubuntu) ready.

35.204.233.132
110
POP3
open
+OK Dovecot (Ubuntu) ready.

35.204.233.132
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.

35.204.233.132
143
IMAP
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE STARTTLS AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.

35.204.233.132
465
SMTP (encrypted)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)
Mail certificate is invalid
35.204.233.132
465
SMTP (encrypted)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)
Mail certificate is invalid
35.204.233.132
587
SMTP (encrypted, submission)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

35.204.233.132
587
SMTP (encrypted, submission)
open
220 mail-2.someones.net ESMTP Postfix (Ubuntu)

35.204.233.132
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
35.204.233.132
993
IMAP (encrypted)
open
* OK [CAPABILITY IMAP4rev1 LITERAL+ SASL-IR LOGIN-REFERRALS ID ENABLE IDLE AUTH=PLAIN AUTH=LOGIN] Dovecot (Ubuntu) ready.
Mail certificate is invalid
35.204.233.132
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
35.204.233.132
995
POP3 (encrypted)
open
+OK Dovecot (Ubuntu) ready.
Mail certificate is invalid
35.204.233.132
1433
MS SQL



35.204.233.132
1433
MS SQL



35.204.233.132
2082
cPanel (http)



35.204.233.132
2082
cPanel (http)



35.204.233.132
2083
cPanel (https)



35.204.233.132
2083
cPanel (https)



35.204.233.132
2086
WHM (http)



35.204.233.132
2086
WHM (http)



35.204.233.132
2087
WHM (https)



35.204.233.132
2087
WHM (https)



35.204.233.132
2089
cPanel Licensing



35.204.233.132
2089
cPanel Licensing



35.204.233.132
2095
cPanel Webmail (http)



35.204.233.132
2095
cPanel Webmail (http)



35.204.233.132
2096
cPanel Webmail (https)



35.204.233.132
2096
cPanel Webmail (https)



35.204.233.132
2222
DirectAdmin (http)



35.204.233.132
2222
DirectAdmin (http)



35.204.233.132
2222
DirectAdmin (https)



35.204.233.132
2222
DirectAdmin (https)



35.204.233.132
3306
mySql



35.204.233.132
3306
mySql



35.204.233.132
5224
Plesk Licensing



35.204.233.132
5224
Plesk Licensing



35.204.233.132
5432
PostgreSQL



35.204.233.132
5432
PostgreSQL



35.204.233.132
8080
Ookla Speedtest (http)
open
http://35.204.233.132:8080/
Http-Status: 400
Bad Request

35.204.233.132
8080
Ookla Speedtest (http)
open
http://35.204.233.132:8080/
Http-Status: 400
Bad Request

35.204.233.132
8080
Ookla Speedtest (https)
open
https://35.204.233.132:8080/
Http-Status: 302
Certificate is invalid Redirect: /login/
35.204.233.132
8080
Ookla Speedtest (https)
open
https://35.204.233.132:8080/
Http-Status: 302
Certificate is invalid Redirect: /login/
35.204.233.132
8083
VestaCP http



35.204.233.132
8083
VestaCP http



35.204.233.132
8083
VestaCP https



35.204.233.132
8083
VestaCP https



35.204.233.132
8443
Plesk Administration (https)
open
https://35.204.233.132:8443/
Http-Status: 200
Certificate is invalid
35.204.233.132
8443
Plesk Administration (https)
open
https://35.204.233.132:8443/
Http-Status: 200
Certificate is invalid
35.204.233.132
8447
Plesk Installer + Updates



35.204.233.132
8447
Plesk Installer + Updates



35.204.233.132
8880
Plesk Administration (http)



35.204.233.132
8880
Plesk Administration (http)



35.204.233.132
10000
Webmin (http)



35.204.233.132
10000
Webmin (http)



35.204.233.132
10000
Webmin (https)



35.204.233.132
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=ac394aa2-e1a4-45af-8eb4-99d90352b198


Last Result: https://check-your-website.server-daten.de/?q=someones.net - 2020-08-01 14:34:02


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=someones.net" target="_blank">Check this Site: someones.net</a>