Check DNS, Urls + Redirects, Certificates and Content of your Website



N

No trusted Certificate

Checked:
28.11.2021 13:45:28


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
support.jpcvdp.nl
A
35.172.94.1
Ashburn/Virginia/United States (US) - Amazon.com, Inc.
Hostname: staticip.multiscreensite.com
yes
1
0

AAAA

yes


www.support.jpcvdp.nl
A
35.172.94.1
Ashburn/Virginia/United States (US) - Amazon.com, Inc.
Hostname: staticip.multiscreensite.com
yes
1
0

AAAA

yes


*.jpcvdp.nl
A
35.172.94.1
yes



AAAA

yes



CNAME

yes


*.support.jpcvdp.nl
A
35.172.94.1
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14748, Flags 256



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2021, 00:00:00 +, Signature-Inception: 20.11.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: nl
nl
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=



1 RRSIG RR to validate DS RR found



RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 11.12.2021, 05:00:00 +, Signature-Inception: 28.11.2021, 04:00:00 +, KeyTag 14748, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14748 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 34112, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 38503, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner nl., Algorithm: 8, 1 Labels, original TTL: 3600 sec, Signature-expiration: 08.12.2021, 19:35:43 +, Signature-Inception: 25.11.2021, 04:08:36 +, KeyTag 34112, Signer-Name: nl



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 34112 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 34112, DigestType 2 and Digest "PFtfmzVXRVxQdRqb6evpI4yI4Z9fB/kwl2kXtRuVzSI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: jpcvdp.nl
jpcvdp.nl
1 DS RR in the parent zone found



DS with Algorithm 13, KeyTag 35756, DigestType 2 and Digest ylqvAPErMQa3xA47wQC4NrEtUezBh6yUE/qgo2uM16M=



1 RRSIG RR to validate DS RR found



RRSIG-Owner jpcvdp.nl., Algorithm: 8, 2 Labels, original TTL: 3600 sec, Signature-expiration: 12.12.2021, 11:34:55 +, Signature-Inception: 28.11.2021, 03:38:33 +, KeyTag 38503, Signer-Name: nl



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 38503 used to validate the DS RRSet in the parent zone



1 DNSKEY RR found



Public Key with Algorithm 13, KeyTag 35756, Flags 257 (SEP = Secure Entry Point)



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35756 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 35756, DigestType 2 and Digest "ylqvAPErMQa3xA47wQC4NrEtUezBh6yUE/qgo2uM16M=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: support.jpcvdp.nl
support.jpcvdp.nl
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.jpcvdp.nl" and the NextOwner "_dmarc.jpcvdp.nl". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC



0 DNSKEY RR found






RRSIG Type 1 validates the A - Result: 35.172.94.1. RRSIG Owner has 3 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner support.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



A-Query sends a valid NSEC RR as result with the query name "support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that A RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the query name "support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that CNAME RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the query name "support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that TXT RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the query name "support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that AAAA RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TLSA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.support.jpcvdp.nl) sends a valid NSEC RR as result with the query name "_443._tcp.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.support.jpcvdp.nl) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the query name "support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that CAA RR.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.

Zone: www.support.jpcvdp.nl
www.support.jpcvdp.nl
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "*.jpcvdp.nl" and the NextOwner "_dmarc.jpcvdp.nl". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, RRSIG, NSEC



DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: CNAME, RRSIG, NSEC



RRSIG Type 1 validates the A - Result: 35.172.94.1. RRSIG Owner has 4 labels, RRSIG Labels = 2, so it's a wildcard expansion, the Query Name doesn't exists. An additional NSEC/NSEC3 is required to confirm the Not-Existence of the query name.
Validated: RRSIG-Owner www.support.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



A-Query sends a valid NSEC RR as result with the query name "www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that A RR.A-Query sends a valid NSEC RR as result with the parent Wildcard "*.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "www.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CNAME-Query sends a valid NSEC RR as result with the query name "www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that CNAME RR.CNAME-Query sends a valid NSEC RR as result with the parent Wildcard "*.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "www.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TXT-Query sends a valid NSEC RR as result with the query name "www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that TXT RR.TXT-Query sends a valid NSEC RR as result with the parent Wildcard "*.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "www.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



AAAA-Query sends a valid NSEC RR as result with the query name "www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that AAAA RR.AAAA-Query sends a valid NSEC RR as result with the parent Wildcard "*.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TLSA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "_443._tcp.www.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



TLSA-Query (_443._tcp.www.support.jpcvdp.nl) sends a valid NSEC RR as result with the query name "_443._tcp.www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that TLSA RR.TLSA-Query (_443._tcp.www.support.jpcvdp.nl) sends a valid NSEC RR as result with the parent Wildcard "*._tcp.www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the owner name *.jpcvdp.nl as the Wildcard-Expansion of the Closest Encloser of the query name "www.support.jpcvdp.nl". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG, NSEC Validated: RRSIG-Owner *.jpcvdp.nl., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.



CAA-Query sends a valid NSEC RR as result with the query name "www.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that CAA RR.CAA-Query sends a valid NSEC RR as result with the parent Wildcard "*.support.jpcvdp.nl" between the NSEC-owner "mail.jpcvdp.nl" and the NextOwner "totaal.jpcvdp.nl". So the zone confirmes the not-existence of that Wildcard-expansion.
Bitmap: CNAME, RRSIG, NSEC Validated: RRSIG-Owner mail.jpcvdp.nl., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 09.12.2021, 00:00:00 +, Signature-Inception: 18.11.2021, 00:00:00 +, KeyTag 35756, Signer-Name: jpcvdp.nl



Status: Good. NoData-Proof required and found.


3. Name Servers

DomainNameserverNS-IP
www.support.jpcvdp.nl
  nsn1.mijndomein.nl

support.jpcvdp.nl
  nsn1.mijndomein.nl / Auth_Host2.Frankfurt_Node1
156.154.64.107
New York/United States (US) - NeuStar, Inc.


 
2001:502:f3ff::8f
Sterling/Virginia/United States (US) - NeuStar, Inc.

jpcvdp.nl
  nsn1.mijndomein.nl / Auth_Host1.Frankfurt_Node1
156.154.64.107
New York/United States (US) - NeuStar, Inc.


 
2001:502:f3ff::8f
Sterling/Virginia/United States (US) - NeuStar, Inc.


  nsn2.mijndomein.nl / Auth_Host2.Amsterdam_Node1
156.154.65.107
New York/United States (US) - NeuStar, Inc.


 
2610:a1:1014::8f
Chicago/Illinois/United States (US) - NeuStar, Inc.


  nsn3.mijndomein.nl / Auth_Host1.Frankfurt_Node1
156.154.66.107
Washington/District of Columbia/United States (US) - NeuStar, Inc.


 
2610:a1:1015::8f
Fort Lauderdale/Florida/United States (US) - NeuStar, Inc.

nl
  ns1.dns.nl


  ns2.dns.nl


  ns3.dns.nl


4. SOA-Entries


Domain:nl
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:3


Domain:jpcvdp.nl
Zone-Name:jpcvdp.nl
Primary:nsn1.mijndomein.nl
Mail:hostmaster.jpcvdp.nl
Serial:2021112501
Refresh:86400
Retry:3600
Expire:604800
TTL:3600
num Entries:6


Domain:support.jpcvdp.nl
Zone-Name:jpcvdp.nl
Primary:nsn1.mijndomein.nl
Mail:hostmaster.jpcvdp.nl
Serial:2021112501
Refresh:86400
Retry:3600
Expire:604800
TTL:3600
num Entries:2


Domain:www.support.jpcvdp.nl
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

Startaddress: https://support.jpcvdp.nl, address used: https://support.jpcvdp.nl/, Screenshot created 2021-11-28 13:47:37 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

345 milliseconds

Screenshot mobile - https://support.jpcvdp.nl/
Mobil + Landscape (732px x 412px)

335 milliseconds

Screenshot mobile landscape - https://support.jpcvdp.nl/
Screen (1280px x 1680px)

720 milliseconds

Screenshot Desktop - https://support.jpcvdp.nl/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396716
content Size430801

Fatal: Horizontal scrollbar detected. Content-size width is greater then visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_128_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://support.jpcvdp.nl/
35.172.94.1 GZip used - 493 / 916 - 46.18 %
404

Html is minified: 113.37 %
0.240
M
Server: nginx
Date: Sun, 28 Nov 2021 12:46:11 GMT
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Cache-Control: no-cache, no-store, must-revalidate
Expires: Thu, 01 Jan 1970 00:00:00 GMT
X-Content-Type-Options: nosniff
vary: accept-encoding
Content-Encoding: gzip

• http://www.support.jpcvdp.nl/
35.172.94.1 GZip used - 493 / 916 - 46.18 %
404

Html is minified: 113.37 %
0.283
M
Server: nginx
Date: Sun, 28 Nov 2021 12:46:11 GMT
Content-Type: text/html;charset=UTF-8
Transfer-Encoding: chunked
Connection: close
Cache-Control: no-cache, no-store, must-revalidate
Expires: Thu, 01 Jan 1970 00:00:00 GMT
X-Content-Type-Options: nosniff
vary: accept-encoding
Content-Encoding: gzip

• https://support.jpcvdp.nl/
35.172.94.1 GZip used - 493 / 916 - 46.18 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 113.37 %
3.406
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 160)
  Site not found This site is not published or does not have a domain assigned to it. If you have any questions, please contact your website administrator.
server: nginx
date: Sun, 28 Nov 2021 12:46:12 GMT
content-type: text/html;charset=UTF-8
transfer-encoding: chunked
cache-control: no-cache, no-store, must-revalidate
expires: Thu, 01 Jan 1970 00:00:00 GMT
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; preload
vary: accept-encoding
content-encoding: gzip
connection: close

• https://www.support.jpcvdp.nl/
35.172.94.1 GZip used - 493 / 916 - 46.18 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
404

Html is minified: 113.37 %
3.514
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 160)
  Site not found This site is not published or does not have a domain assigned to it. If you have any questions, please contact your website administrator.
server: nginx
date: Sun, 28 Nov 2021 12:46:16 GMT
content-type: text/html;charset=UTF-8
transfer-encoding: chunked
cache-control: no-cache, no-store, must-revalidate
expires: Thu, 01 Jan 1970 00:00:00 GMT
x-content-type-options: nosniff
strict-transport-security: max-age=31536000; preload
vary: accept-encoding
content-encoding: gzip
connection: close

• http://support.jpcvdp.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
35.172.94.1
-14

10.040
T
Timeout - The operation has timed out
Visible Content:

• http://www.support.jpcvdp.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
35.172.94.1
-14

10.027
T
Timeout - The operation has timed out
Visible Content:

• https://35.172.94.1/
35.172.94.1 GZip used - 107 / 146 - 26.71 %
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
403

Html is minified: 110.61 %
3.493
N
Forbidden
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
small visible content (num chars: 19)
403 Forbidden nginx
server: nginx
date: Sun, 28 Nov 2021 12:46:41 GMT
content-type: text/html
transfer-encoding: chunked
content-encoding: gzip
connection: close

7. Comments


1. General Results, most used to calculate the result

Aname "support.jpcvdp.nl" is subdomain, public suffix is ".nl", top-level-domain is ".nl", top-level-domain-type is "country-code", Country is Netherlands (the), tld-manager is "SIDN (Stichting Internet Domeinregistratie Nederland)", num .nl-domains preloaded: 3760 (complete: 168171)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: support.jpcvdp.nl has only one ip address.
Warning: Only one ip address found: www.support.jpcvdp.nl has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: support.jpcvdp.nl has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.support.jpcvdp.nl has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
Agood: HSTS has preload directive
Warning: HSTS preload sent, but not in Preload-List. Never send a preload directive if you don't know what preload means. Check https://hstspreload.org/ to learn the basics about the Google-Preload list. If you send a preload directive, you should **immediately** add your domain to the HSTS preload list via https://hstspreload.org/ . If Google accepts the domain, so the status is "pending": Note that new entries are hardcoded into the Chrome source code and can take several months before they reach the stable version. So you will see this message some months. If you don't want that or if you don't understand "preload", but if you send a preload directive and if you have correct A-redirects, everybody can add your domain to that list. Then you may have problems, it's not easy to undo that. So if you don't want your domain preloaded, remove the preload directive.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):4 complete Content-Type - header (5 urls)
https://35.172.94.1/ 35.172.94.1


Url with incomplete Content-Type - header - missing charset
CError - no version with Http-Status 200
Hfatal error: No https - result with http-status 200, no encryption
Mhttp://support.jpcvdp.nl/ 35.172.94.1
404

Misconfiguration - main pages should never send http status 400 - 499
Mhttp://www.support.jpcvdp.nl/ 35.172.94.1
404

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://support.jpcvdp.nl/ 35.172.94.1
404

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://www.support.jpcvdp.nl/ 35.172.94.1
404

Misconfiguration - main pages should never send http status 400 - 499
Mhttps://35.172.94.1/ 35.172.94.1
403

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://support.jpcvdp.nl/ 35.172.94.1
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://www.support.jpcvdp.nl/ 35.172.94.1
404

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://35.172.94.1/ 35.172.94.1
403

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nsupport.jpcvdp.nl:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nwww.support.jpcvdp.nl:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
N35.172.94.1:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain support.jpcvdp.nl, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.support.jpcvdp.nl, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 10 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 10 Queries complete, 10 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 3.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: nsn1.mijndomein.nl, nsn2.mijndomein.nl, nsn3.mijndomein.nl, 3 Name Servers included in Delegation: nsn1.mijndomein.nl, nsn2.mijndomein.nl, nsn3.mijndomein.nl, 3 Name Servers included in 1 Zone definitions: nsn1.mijndomein.nl, nsn2.mijndomein.nl, nsn3.mijndomein.nl, 1 Name Servers listed in SOA.Primary: nsn1.mijndomein.nl.
AGood: Only one SOA.Primary Name Server found.: nsn1.mijndomein.nl.
AGood: SOA.Primary Name Server included in the delegation set.: nsn1.mijndomein.nl.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: nsn1.mijndomein.nl, nsn2.mijndomein.nl, nsn3.mijndomein.nl
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 3 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 3 Name Servers, 1 Top Level Domain: nl
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: mijndomein.nl
Warning: All Name Servers from the same Country / IP location.: 3 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 3 Name Servers, 1 different subnets (first Byte): 156., 1 different subnets (first two Bytes): 156.154., 3 different subnets (first three Bytes): 156.154.64., 156.154.65., 156.154.66.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 3 Name Servers with IPv6, 2 different subnets (first block): 2001:, 2610:, 2 different subnets (first two blocks): 2001:0502:, 2610:00a1:, 3 different subnets (first three blocks): 2001:0502:f3ff:, 2610:00a1:1014:, 2610:00a1:1015:, 3 different subnets (first four blocks): 2001:0502:f3ff:0000:, 2610:00a1:1014:0000:, 2610:00a1:1015:0000:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 2 good Nameserver
AGood: Nameserver supports Echo Capitalization: 2 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 2 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 2 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.dns.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dns.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dns.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: nsn1.mijndomein.nl: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://support.jpcvdp.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.172.94.1
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.support.jpcvdp.nl/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 35.172.94.1
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All CSS / JavaScript files are sent with GZip. That reduces the content of the files. 4 external CSS / JavaScript files found
Warning: CSS / JavaScript files with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 2 external CSS / JavaScript files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 2 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 4 complete.
Warning: Images with a missing or too short Cache-Control header found. Browsers should cache and re-use these files. 2 image files without Cache-Control-Header, 0 with Cache-Control, but no max-age, 0 with Cache-Control max-age too short (minimum 7 days), 0 with Cache-Control long enough, 2 complete.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
Wrong: img-elements without alt-attribute or empty alt-attribute found. The alt-attribute ("alternative") is required and should describe the img. So Screenreader and search engines are able to use these informations.: 2 img-elements without alt-attribute, 0 img-elements with empty alt-attribute found.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
https://support.jpcvdp.nl/ 35.172.94.1
404
3.406 seconds
Warning: 404 needs more then one second
https://www.support.jpcvdp.nl/ 35.172.94.1
404
3.514 seconds
Warning: 404 needs more then one second
ADuration: 137730 milliseconds, 137.730 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
support.jpcvdp.nl
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
support.jpcvdp.nl
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


www.support.jpcvdp.nl
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

www.support.jpcvdp.nl
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0


35.172.94.1
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok

35.172.94.1
35.172.94.1
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0


support.jpcvdp.nl
support.jpcvdp.nl
8443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

support.jpcvdp.nl
support.jpcvdp.nl
8443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=multiscreensite.com


www.support.jpcvdp.nl
www.support.jpcvdp.nl
8443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.support.jpcvdp.nl
www.support.jpcvdp.nl
8443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=multiscreensite.com


35.172.94.1
35.172.94.1
8443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

35.172.94.1
35.172.94.1
8443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
http/2 via ALPN supported 
Tls.1.2
Tls.1.1
no Tls.1.0
http/2 via ALPN supported
Tls.1.2
Tls.1.1
no Tls.1.0
Chain - incomplete
1CN=multiscreensite.com


9. Certificates

1.
1.
CN=broken-ssl.multiscreensite.com
02.10.2019
29.09.2029
expires in 2802 days
broken-ssl.multiscreensite.com - 1 entry
1.
1.
CN=broken-ssl.multiscreensite.com
02.10.2019

29.09.2029
expires in 2802 days
broken-ssl.multiscreensite.com - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00F2F026F0E84396D6
Thumbprint:A79700FD9E73BBE7C1A722359657827739386F14
SHA256 / Certificate:rB/l5ERGa6ZzyGFMohczartgcmL0XD2LdHeq6ZgAqsk=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):6f0a47f21f071db15523401f6761c247bdab3cf7ad4ebe3d41918ade8be9de39
SHA256 hex / Subject Public Key Information (SPKI):6f0a47f21f071db15523401f6761c247bdab3cf7ad4ebe3d41918ade8be9de39
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.

2.
1.
CN=multiscreensite.com
16.11.2021
14.02.2022
expires in 18 days
*.cdn-website.com, *.editor-sandbox.multiscreensite.com, *.editor.multiscreensite.com, *.multiscreensite.com, *.partnerwebsitedns.com, *.website.thryv.com, multiscreensite.com - 7 entries
2.
1.
CN=multiscreensite.com
16.11.2021

14.02.2022
expires in 18 days
*.cdn-website.com, *.editor-sandbox.multiscreensite.com, *.editor.multiscreensite.com, *.multiscreensite.com, *.partnerwebsitedns.com, *.website.thryv.com, multiscreensite.com - 7 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0400423C1381979C94927CE55E8F7DE217B3
Thumbprint:BD4083C46D1EE0F68B3597946BD0D771CA3341B2
SHA256 / Certificate:pYsQZY3Gq1BHChbiCfvMlyRIwRF7z56JdtKU613SUGw=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):21c8a8d63f05c7e29c600ed9e879d2e08c67f722da97e2b4c7c5d8cbc81710c2
SHA256 hex / Subject Public Key Information (SPKI):21c8a8d63f05c7e29c600ed9e879d2e08c67f722da97e2b4c7c5d8cbc81710c2 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1327 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1327 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 4876 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 4876 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

No CRT - CT-Log entries found


11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://support.jpcvdp.nl/
35.172.94.1
img

1

0
1
0
0
0
0


link
stylesheet
2

0
1
1
1
0
0
-1

meta
other
1

0


0
0
0

https://www.support.jpcvdp.nl/
35.172.94.1
img

1

0
1
0
0
0
0


link
stylesheet
2

0
1
1
1
0
0
-1

meta
other
1

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://support.jpcvdp.nl/
35.172.94.1
img
src
/_dm/s/rt/images/dm404.jpg
200

1
ok
no alt-Attribute, missing X-Content-Type-Options nosniff

23004 Bytes






link
stylesheet
//fonts.googleapis.com/css?family=Source+Sans+Pro:200,300,400,600,700,900
200

1
ok
text/css; charset=utf-8, X-Content-Type-Options nosniff found

GZip: 257/1256 Bytes




Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

sha256-iuk+wtYac30SwZu+E85g83ND2BIT3q9oFA4OyOKeuWo=
sha384-w3Qjk9GKAaD4WDxt05LO2sor6o2zfBj8fCtvAclU0UQdvOLxJ6P0ioCH5r+XZCNf
sha512-6uaeajq77CZ3Hhv+J9TsV5A0SbWl/Bau8k/s2WSeeCno2LQyjyMnD3M2dKKFvricfDOElBRb6rjIfJn6bFWm6Q==

<link rel="stylesheet" href="//fonts.googleapis.com/css?family=Source+Sans+Pro:200,300,400,600,700,900" crossorigin="anonymous" integrity="sha256-iuk+wtYac30SwZu+E85g83ND2BIT3q9oFA4OyOKeuWo=" />



Content loaded via url("...")

https://fonts.gstatic.com/s/sourcesanspro/v18/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7g.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3i54rwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3i94_wlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3ik4zwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3iu4nwlxdr.ttf1

link
stylesheet
/_dm/s/rt/css/error-pages.css
200

1
ok
, missing X-Content-Type-Options nosniff

No Cache-Control - header
GZip: 311/587 Bytes




local SRI possible, possible hash-values:

sha256-X8mTKo4zSO0nUu3vN0331DgeHYBkVbvfeiz3PbeYeo8=
sha384-dzQrvqDm/z35URymgabPVfqgOvoZVKmPKhM1HA2RB/edTmLl2HVkRTngZr6QCXUD
sha512-69l5mncuo5HSKSnsyEr/pT5Gvfa38zMTSKRrlF8sUb1jBZcERbsk4/FGGMhEOyETu1K9fYFNImJ+dEgSolyWcQ==

<link rel="stylesheet" href="/_dm/s/rt/css/error-pages.css" crossorigin="anonymous" integrity="sha256-X8mTKo4zSO0nUu3vN0331DgeHYBkVbvfeiz3PbeYeo8=" />




meta
Content-Type
text/html; charset=utf-8


1
ok







https://www.support.jpcvdp.nl/
35.172.94.1
img
src
/_dm/s/rt/images/dm404.jpg
200

1
ok
no alt-Attribute, missing X-Content-Type-Options nosniff

23004 Bytes






link
stylesheet
//fonts.googleapis.com/css?family=Source+Sans+Pro:200,300,400,600,700,900
200

1
ok
text/css; charset=utf-8, X-Content-Type-Options nosniff found

GZip: 257/1256 Bytes




Server-Header Access-Control-Allow-Origin: *
Cross-Origin Resource Sharing (CORS) supported

missing crossorigin=anonymous|use-credentials and integrity - attribute, possible hash-values:

sha256-iuk+wtYac30SwZu+E85g83ND2BIT3q9oFA4OyOKeuWo=
sha384-w3Qjk9GKAaD4WDxt05LO2sor6o2zfBj8fCtvAclU0UQdvOLxJ6P0ioCH5r+XZCNf
sha512-6uaeajq77CZ3Hhv+J9TsV5A0SbWl/Bau8k/s2WSeeCno2LQyjyMnD3M2dKKFvricfDOElBRb6rjIfJn6bFWm6Q==

<link rel="stylesheet" href="//fonts.googleapis.com/css?family=Source+Sans+Pro:200,300,400,600,700,900" crossorigin="anonymous" integrity="sha256-iuk+wtYac30SwZu+E85g83ND2BIT3q9oFA4OyOKeuWo=" />



Content loaded via url("...")

https://fonts.gstatic.com/s/sourcesanspro/v18/6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7g.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3i54rwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3i94_wlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3ik4zwlxdr.ttf1
https://fonts.gstatic.com/s/sourcesanspro/v18/6xKydSBYKcSV-LCoeQqfX1RYOo3iu4nwlxdr.ttf1

link
stylesheet
/_dm/s/rt/css/error-pages.css
200

1
ok
, missing X-Content-Type-Options nosniff

No Cache-Control - header
GZip: 311/587 Bytes




local SRI possible, possible hash-values:

sha256-X8mTKo4zSO0nUu3vN0331DgeHYBkVbvfeiz3PbeYeo8=
sha384-dzQrvqDm/z35URymgabPVfqgOvoZVKmPKhM1HA2RB/edTmLl2HVkRTngZr6QCXUD
sha512-69l5mncuo5HSKSnsyEr/pT5Gvfa38zMTSKRrlF8sUb1jBZcERbsk4/FGGMhEOyETu1K9fYFNImJ+dEgSolyWcQ==

<link rel="stylesheet" href="/_dm/s/rt/css/error-pages.css" crossorigin="anonymous" integrity="sha256-X8mTKo4zSO0nUu3vN0331DgeHYBkVbvfeiz3PbeYeo8=" />




meta
Content-Type
text/html; charset=utf-8


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: nsn1.mijndomein.nl, nsn2.mijndomein.nl, nsn3.mijndomein.nl

QNr.DomainTypeNS used
1
nl
NS
k.root-servers.net (2001:7fd::1)

Answer: ns1.dns.nl, ns2.dns.nl, ns3.dns.nl
2
nsn1.mijndomein.nl
NS
ns1.dns.nl (2001:678:2c:0:194:0:28:53)

Answer: ns1.mijndomein.nl, ns2.mijndomein.nl, ns3.mijndomein.nl, ns4.mijndomein.nl

Answer: ns1.mijndomein.nl
2001:4860:4802:32::6a, 216.239.32.106

Answer: ns2.mijndomein.nl
2001:4860:4802:34::6a, 216.239.34.106

Answer: ns3.mijndomein.nl
2001:4860:4802:36::6a, 216.239.36.106

Answer: ns4.mijndomein.nl
2001:4860:4802:38::6a, 216.239.38.106
3
nsn2.mijndomein.nl
NS
ns1.dns.nl (2001:678:2c:0:194:0:28:53)

Answer: ns1.mijndomein.nl, ns2.mijndomein.nl, ns3.mijndomein.nl, ns4.mijndomein.nl

Answer: ns1.mijndomein.nl
2001:4860:4802:32::6a, 216.239.32.106

Answer: ns2.mijndomein.nl
2001:4860:4802:34::6a, 216.239.34.106

Answer: ns3.mijndomein.nl
2001:4860:4802:36::6a, 216.239.36.106

Answer: ns4.mijndomein.nl
2001:4860:4802:38::6a, 216.239.38.106
4
nsn3.mijndomein.nl
NS
ns1.dns.nl (2001:678:2c:0:194:0:28:53)

Answer: ns1.mijndomein.nl, ns2.mijndomein.nl, ns3.mijndomein.nl, ns4.mijndomein.nl

Answer: ns1.mijndomein.nl
2001:4860:4802:32::6a, 216.239.32.106

Answer: ns2.mijndomein.nl
2001:4860:4802:34::6a, 216.239.34.106

Answer: ns3.mijndomein.nl
2001:4860:4802:36::6a, 216.239.36.106

Answer: ns4.mijndomein.nl
2001:4860:4802:38::6a, 216.239.38.106
5
nsn1.mijndomein.nl: 156.154.64.107
A
ns1.mijndomein.nl (2001:4860:4802:32::6a)
6
nsn1.mijndomein.nl: 2001:502:f3ff::8f
AAAA
ns1.mijndomein.nl (2001:4860:4802:32::6a)
7
nsn2.mijndomein.nl: 156.154.65.107
A
ns1.mijndomein.nl (2001:4860:4802:32::6a)
8
nsn2.mijndomein.nl: 2610:a1:1014::8f
AAAA
ns1.mijndomein.nl (2001:4860:4802:32::6a)
9
nsn3.mijndomein.nl: 156.154.66.107
A
ns1.mijndomein.nl (2001:4860:4802:32::6a)
10
nsn3.mijndomein.nl: 2610:a1:1015::8f
AAAA
ns1.mijndomein.nl (2001:4860:4802:32::6a)


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.support.jpcvdp.nl
0

no CAA entry found
1
0
support.jpcvdp.nl
0

no CAA entry found
1
0
jpcvdp.nl
0

no CAA entry found
1
0
nl
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
jpcvdp.nl
v=spf1 a mx include:spf.mijndomeinhosting.nl ~all
ok
1
0
support.jpcvdp.nl

ok
1
0
www.support.jpcvdp.nl

ok
1
0
_acme-challenge.support.jpcvdp.nl

missing entry or wrong length
1
0
_acme-challenge.www.support.jpcvdp.nl

missing entry or wrong length
1
0
_acme-challenge.support.jpcvdp.nl.jpcvdp.nl

perhaps wrong
1
0
_acme-challenge.support.jpcvdp.nl.support.jpcvdp.nl

perhaps wrong
1
0
_acme-challenge.www.support.jpcvdp.nl.support.jpcvdp.nl

perhaps wrong
1
0
_acme-challenge.www.support.jpcvdp.nl.www.support.jpcvdp.nl

perhaps wrong
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
support.jpcvdp.nl
21
FTP



support.jpcvdp.nl
21
FTP



support.jpcvdp.nl
22
SSH



support.jpcvdp.nl
22
SSH



support.jpcvdp.nl
25
SMTP



support.jpcvdp.nl
25
SMTP



support.jpcvdp.nl
53
DNS



support.jpcvdp.nl
53
DNS



support.jpcvdp.nl
110
POP3



support.jpcvdp.nl
110
POP3



support.jpcvdp.nl
143
IMAP



support.jpcvdp.nl
143
IMAP



support.jpcvdp.nl
465
SMTP (encrypted)



support.jpcvdp.nl
465
SMTP (encrypted)



support.jpcvdp.nl
587
SMTP (encrypted, submission)



support.jpcvdp.nl
587
SMTP (encrypted, submission)



support.jpcvdp.nl
993
IMAP (encrypted)



support.jpcvdp.nl
993
IMAP (encrypted)



support.jpcvdp.nl
995
POP3 (encrypted)



support.jpcvdp.nl
995
POP3 (encrypted)



support.jpcvdp.nl
1433
MS SQL



support.jpcvdp.nl
1433
MS SQL



support.jpcvdp.nl
2082
cPanel (http)



support.jpcvdp.nl
2082
cPanel (http)



support.jpcvdp.nl
2083
cPanel (https)



support.jpcvdp.nl
2083
cPanel (https)



support.jpcvdp.nl
2086
WHM (http)



support.jpcvdp.nl
2086
WHM (http)



support.jpcvdp.nl
2087
WHM (https)



support.jpcvdp.nl
2087
WHM (https)



support.jpcvdp.nl
2089
cPanel Licensing



support.jpcvdp.nl
2089
cPanel Licensing



support.jpcvdp.nl
2095
cPanel Webmail (http)



support.jpcvdp.nl
2095
cPanel Webmail (http)



support.jpcvdp.nl
2096
cPanel Webmail (https)



support.jpcvdp.nl
2096
cPanel Webmail (https)



support.jpcvdp.nl
2222
DirectAdmin (http)



support.jpcvdp.nl
2222
DirectAdmin (http)



support.jpcvdp.nl
2222
DirectAdmin (https)



support.jpcvdp.nl
2222
DirectAdmin (https)



support.jpcvdp.nl
3306
mySql



support.jpcvdp.nl
3306
mySql



support.jpcvdp.nl
5224
Plesk Licensing



support.jpcvdp.nl
5224
Plesk Licensing



support.jpcvdp.nl
5432
PostgreSQL



support.jpcvdp.nl
5432
PostgreSQL



support.jpcvdp.nl
8080
Ookla Speedtest (http)



support.jpcvdp.nl
8080
Ookla Speedtest (http)



support.jpcvdp.nl
8080
Ookla Speedtest (https)



support.jpcvdp.nl
8080
Ookla Speedtest (https)



support.jpcvdp.nl
8083
VestaCP http



support.jpcvdp.nl
8083
VestaCP http



support.jpcvdp.nl
8083
VestaCP https



support.jpcvdp.nl
8083
VestaCP https



support.jpcvdp.nl
8443
Plesk Administration (https)
open
https://support.jpcvdp.nl:8443/
Http-Status: 404
Certificate is invalid
support.jpcvdp.nl
8443
Plesk Administration (https)
open
https://support.jpcvdp.nl:8443/
Http-Status: 404
Certificate is invalid
support.jpcvdp.nl
8447
Plesk Installer + Updates



support.jpcvdp.nl
8447
Plesk Installer + Updates



support.jpcvdp.nl
8880
Plesk Administration (http)



support.jpcvdp.nl
8880
Plesk Administration (http)



support.jpcvdp.nl
10000
Webmin (http)



support.jpcvdp.nl
10000
Webmin (http)



support.jpcvdp.nl
10000
Webmin (https)



support.jpcvdp.nl
10000
Webmin (https)



www.support.jpcvdp.nl
21
FTP



www.support.jpcvdp.nl
21
FTP



www.support.jpcvdp.nl
22
SSH



www.support.jpcvdp.nl
22
SSH



www.support.jpcvdp.nl
25
SMTP



www.support.jpcvdp.nl
25
SMTP



www.support.jpcvdp.nl
53
DNS



www.support.jpcvdp.nl
53
DNS



www.support.jpcvdp.nl
110
POP3



www.support.jpcvdp.nl
110
POP3



www.support.jpcvdp.nl
143
IMAP



www.support.jpcvdp.nl
143
IMAP



www.support.jpcvdp.nl
465
SMTP (encrypted)



www.support.jpcvdp.nl
465
SMTP (encrypted)



www.support.jpcvdp.nl
587
SMTP (encrypted, submission)



www.support.jpcvdp.nl
587
SMTP (encrypted, submission)



www.support.jpcvdp.nl
993
IMAP (encrypted)



www.support.jpcvdp.nl
993
IMAP (encrypted)



www.support.jpcvdp.nl
995
POP3 (encrypted)



www.support.jpcvdp.nl
995
POP3 (encrypted)



www.support.jpcvdp.nl
1433
MS SQL



www.support.jpcvdp.nl
1433
MS SQL



www.support.jpcvdp.nl
2082
cPanel (http)



www.support.jpcvdp.nl
2082
cPanel (http)



www.support.jpcvdp.nl
2083
cPanel (https)



www.support.jpcvdp.nl
2083
cPanel (https)



www.support.jpcvdp.nl
2086
WHM (http)



www.support.jpcvdp.nl
2086
WHM (http)



www.support.jpcvdp.nl
2087
WHM (https)



www.support.jpcvdp.nl
2087
WHM (https)



www.support.jpcvdp.nl
2089
cPanel Licensing



www.support.jpcvdp.nl
2089
cPanel Licensing



www.support.jpcvdp.nl
2095
cPanel Webmail (http)



www.support.jpcvdp.nl
2095
cPanel Webmail (http)



www.support.jpcvdp.nl
2096
cPanel Webmail (https)



www.support.jpcvdp.nl
2096
cPanel Webmail (https)



www.support.jpcvdp.nl
2222
DirectAdmin (http)



www.support.jpcvdp.nl
2222
DirectAdmin (http)



www.support.jpcvdp.nl
2222
DirectAdmin (https)



www.support.jpcvdp.nl
2222
DirectAdmin (https)



www.support.jpcvdp.nl
3306
mySql



www.support.jpcvdp.nl
3306
mySql



www.support.jpcvdp.nl
5224
Plesk Licensing



www.support.jpcvdp.nl
5224
Plesk Licensing



www.support.jpcvdp.nl
5432
PostgreSQL



www.support.jpcvdp.nl
5432
PostgreSQL



www.support.jpcvdp.nl
8080
Ookla Speedtest (http)



www.support.jpcvdp.nl
8080
Ookla Speedtest (http)



www.support.jpcvdp.nl
8080
Ookla Speedtest (https)



www.support.jpcvdp.nl
8080
Ookla Speedtest (https)



www.support.jpcvdp.nl
8083
VestaCP http



www.support.jpcvdp.nl
8083
VestaCP http



www.support.jpcvdp.nl
8083
VestaCP https



www.support.jpcvdp.nl
8083
VestaCP https



www.support.jpcvdp.nl
8443
Plesk Administration (https)
open
https://www.support.jpcvdp.nl:8443/
Http-Status: 404
Certificate is invalid
www.support.jpcvdp.nl
8443
Plesk Administration (https)
open
https://www.support.jpcvdp.nl:8443/
Http-Status: 404
Certificate is invalid
www.support.jpcvdp.nl
8447
Plesk Installer + Updates



www.support.jpcvdp.nl
8447
Plesk Installer + Updates



www.support.jpcvdp.nl
8880
Plesk Administration (http)



www.support.jpcvdp.nl
8880
Plesk Administration (http)



www.support.jpcvdp.nl
10000
Webmin (http)



www.support.jpcvdp.nl
10000
Webmin (http)



www.support.jpcvdp.nl
10000
Webmin (https)



www.support.jpcvdp.nl
10000
Webmin (https)



35.172.94.1
21
FTP



35.172.94.1
21
FTP



35.172.94.1
22
SSH



35.172.94.1
22
SSH



35.172.94.1
25
SMTP



35.172.94.1
25
SMTP



35.172.94.1
53
DNS



35.172.94.1
53
DNS



35.172.94.1
110
POP3



35.172.94.1
110
POP3



35.172.94.1
143
IMAP



35.172.94.1
143
IMAP



35.172.94.1
465
SMTP (encrypted)



35.172.94.1
465
SMTP (encrypted)



35.172.94.1
587
SMTP (encrypted, submission)



35.172.94.1
587
SMTP (encrypted, submission)



35.172.94.1
993
IMAP (encrypted)



35.172.94.1
993
IMAP (encrypted)



35.172.94.1
995
POP3 (encrypted)



35.172.94.1
995
POP3 (encrypted)



35.172.94.1
1433
MS SQL



35.172.94.1
1433
MS SQL



35.172.94.1
2082
cPanel (http)



35.172.94.1
2082
cPanel (http)



35.172.94.1
2083
cPanel (https)



35.172.94.1
2083
cPanel (https)



35.172.94.1
2086
WHM (http)



35.172.94.1
2086
WHM (http)



35.172.94.1
2087
WHM (https)



35.172.94.1
2087
WHM (https)



35.172.94.1
2089
cPanel Licensing



35.172.94.1
2089
cPanel Licensing



35.172.94.1
2095
cPanel Webmail (http)



35.172.94.1
2095
cPanel Webmail (http)



35.172.94.1
2096
cPanel Webmail (https)



35.172.94.1
2096
cPanel Webmail (https)



35.172.94.1
2222
DirectAdmin (http)



35.172.94.1
2222
DirectAdmin (http)



35.172.94.1
2222
DirectAdmin (https)



35.172.94.1
2222
DirectAdmin (https)



35.172.94.1
3306
mySql



35.172.94.1
3306
mySql



35.172.94.1
5224
Plesk Licensing



35.172.94.1
5224
Plesk Licensing



35.172.94.1
5432
PostgreSQL



35.172.94.1
5432
PostgreSQL



35.172.94.1
8080
Ookla Speedtest (http)



35.172.94.1
8080
Ookla Speedtest (http)



35.172.94.1
8080
Ookla Speedtest (https)



35.172.94.1
8080
Ookla Speedtest (https)



35.172.94.1
8083
VestaCP http



35.172.94.1
8083
VestaCP http



35.172.94.1
8083
VestaCP https



35.172.94.1
8083
VestaCP https



35.172.94.1
8443
Plesk Administration (https)
open
https://35.172.94.1:8443/
Http-Status: 403
Forbidden
Certificate is invalid
35.172.94.1
8443
Plesk Administration (https)
open
https://35.172.94.1:8443/
Http-Status: 403
Forbidden
Certificate is invalid
35.172.94.1
8447
Plesk Installer + Updates



35.172.94.1
8447
Plesk Installer + Updates



35.172.94.1
8880
Plesk Administration (http)



35.172.94.1
8880
Plesk Administration (http)



35.172.94.1
10000
Webmin (http)



35.172.94.1
10000
Webmin (http)



35.172.94.1
10000
Webmin (https)



35.172.94.1
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=108bb231-c373-4010-b716-2f0064bd4f2b


Last Result: https://check-your-website.server-daten.de/?q=support.jpcvdp.nl - 2021-11-28 13:45:28


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=support.jpcvdp.nl" target="_blank">Check this Site: support.jpcvdp.nl</a>