Check DNS, Urls + Redirects, Certificates and Content of your Website




1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
telenor.com.mm
A
103.255.172.177
Yangon/Rangoon/Myanmar (MM) - Telenor Myanmar
No Hostname found
yes
1
0

AAAA

yes


www.telenor.com.mm
A
103.255.172.177
Yangon/Rangoon/Myanmar (MM) - Telenor Myanmar
No Hostname found
yes
1
0

AAAA

yes


*.telenor.com.mm
A
Name Error
yes



AAAA
Name Error
yes



CNAME
Name Error
yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 26116, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.12.2020, 00:00:00 +, Signature-Inception: 20.11.2020, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: mm
mm
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=



1 RRSIG RR to validate DS RR found



RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 10.12.2020, 05:00:00 +, Signature-Inception: 27.11.2020, 04:00:00 +, KeyTag 26116, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26116 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 18589, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 32298, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner mm., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 02.12.2020, 20:50:31 +, Signature-Inception: 25.11.2020, 13:22:01 +, KeyTag 18589, Signer-Name: mm



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18589 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 18589, DigestType 2 and Digest "CmZAPaLOtMOWB1BzkHTVynmTNLRcheP+3Xg44BokNdg=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com.mm
com.mm
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=



1 RRSIG RR to validate DS RR found



RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 03.12.2020, 07:16:33 +, Signature-Inception: 26.11.2020, 12:37:01 +, KeyTag 32298, Signer-Name: mm



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 32298 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 22462, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 65160, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com.mm., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 29.11.2020, 23:57:14 +, Signature-Inception: 22.11.2020, 22:42:01 +, KeyTag 22462, Signer-Name: com.mm



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22462 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 22462, DigestType 2 and Digest "VV5RdRmEhyI5ieA6LrgueLJ8dKty2PU8u+8fT1JILF8=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: telenor.com.mm
telenor.com.mm
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "on2m73e43aj1cih7d5rtkvuae9e75kr0" between the hashed NSEC3-owner "on2m73e43aj1cih7d5rtkvuae9e75kr0" and the hashed NextOwner "on2nukk7hesqia3uti15e73n4g795oou". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: No Bitmap? Validated: RRSIG-Owner on2m73e43aj1cih7d5rtkvuae9e75kr0.com.mm., Algorithm: 8, 3 Labels, original TTL: 3600 sec, Signature-expiration: 01.12.2020, 06:56:57 +, Signature-Inception: 24.11.2020, 15:47:01 +, KeyTag 65160, Signer-Name: com.mm



0 DNSKEY RR found




Zone: www.telenor.com.mm
www.telenor.com.mm
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.telenor.com.mm
  ns3.nic.net.mm

telenor.com.mm
  ns3.nic.net.mm
203.81.64.22
Yangon/Rangoon/Myanmar (MM) - Myanma Post & Telecommunication


  ns4.nic.net.mm
203.81.64.23
Yangon/Rangoon/Myanmar (MM) - Myanma Post & Telecommunication


  ns5.nic.net.mm
203.81.92.8
Yangon/Rangoon/Myanmar (MM) - Myanma Post & Telecommunication

com.mm
  a.nic.net.mm / dns1.sesto1
37.209.192.4
London/England/United Kingdom (GB) - NeuStar, Inc.


  b.nic.net.mm / dns2.nlams1
37.209.194.4
London/England/United Kingdom (GB) - NeuStar, Inc.


  c.nic.net.mm / dns4.nlams1
37.209.196.4
London/England/United Kingdom (GB) - NeuStar, Inc.


  d.nic.net.mm / dns3.nlams1
37.209.198.4
London/England/United Kingdom (GB) - NeuStar, Inc.

mm
  a.nic.net.mm / dns1.sesto1


  b.nic.net.mm / dns3.nlams1


  c.nic.net.mm / dns4.nlams1


  d.nic.net.mm / dns1.nlams1


4. SOA-Entries


Domain:mm
Zone-Name:mm
Primary:a.nic.net.mm
Mail:admin.registry.gov.mm
Serial:1606475221
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:4


Domain:com.mm
Zone-Name:com.mm
Primary:a.nic.net.mm
Mail:admin.registry.gov.mm
Serial:1606478881
Refresh:1800
Retry:900
Expire:604800
TTL:3600
num Entries:4


Domain:telenor.com.mm
Zone-Name:telenor.com.mm
Primary:ns3.nic.net.mm
Mail:hostmaster.nic.net.mm
Serial:2020112000
Refresh:7200
Retry:1800
Expire:1209600
TTL:3600
num Entries:3


Domain:www.telenor.com.mm
Zone-Name:telenor.com.mm
Primary:ns3.nic.net.mm
Mail:hostmaster.nic.net.mm
Serial:2020112000
Refresh:7200
Retry:1800
Expire:1209600
TTL:3600
num Entries:1


5. Screenshots

No Screenshot listed, because no url-check with https + http status 200-299, 400-599 + not-ACME-check found.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://telenor.com.mm/
103.255.172.177
302
https://telenor.com.mm/
0.640
A
Location: https://telenor.com.mm/
Server: BigIP
Connection: close
Content-Length: 0

• http://www.telenor.com.mm/
103.255.172.177
302
https://www.telenor.com.mm/
0.640
A
Location: https://www.telenor.com.mm/
Server: BigIP
Connection: close
Content-Length: 0

• https://telenor.com.mm/
103.255.172.177
-3

10.220
W
ReceiveFailure - The underlying connection was closed: An unexpected error occurred on a receive.

• https://www.telenor.com.mm/
103.255.172.177
-14

16.560
T
Timeout - The operation has timed out

• http://telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
103.255.172.177
302
https://telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.640
A
Visible Content:
Location: https://telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Server: BigIP
Connection: close
Content-Length: 0

• http://www.telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
103.255.172.177
302
https://www.telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
0.640
A
Visible Content:
Location: https://www.telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Server: BigIP
Connection: close
Content-Length: 0

• https://telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

-14

14.920
T
Timeout - The operation has timed out
Visible Content: --------------------BeginCertificate-------------------- <?xml version="1.0" encoding="utf-16"?> 0 None CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US 2020-01-27 01:00:00:0000 2022-02-25 13:00:00:0000 0DE81BFEF73F78DADE885068F0CB24AC 1.2.840.113549.1.1.11 CN=*.telenor.com.mm CN=*.telenor.com.mm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 98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=53ca1759fc6bc003212f1aaee4aaa81c8256da75 Schlüsselkennung des Antragstellers 2.5.29.14 710a8a45acc3c4c4b52cd2d69810992c834cbdc0 Alternativer Antragstellername 2.5.29.17 *.telenor.com.mm, telenor.com.mm - 2 entries Schlüsselverwendung 2.5.29.15 Digitale Signatur, Schlüsselverschlüsselung (a0) Erweiterte Schlüsselverwendung 2.5.29.37 Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2) Sperrlisten-Verteilungspunkte 2.5.29.31 [1]Sperrlisten-Verteilungspunkt: Name des Verteilungspunktes:Vollst. Name:URL=http://cdp.rapidssl.com/RapidSSLRSACA2018.crl Zertifikatrichtlinien 2.5.29.32 [1]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.2, [1,1]Richtlinienqualifiziererinfo:Kennung des Richtlinienqualifizierers=CPS, Qualifizierer:https://www.digicert.com/CPS, [2]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.1 Zugriff auf Stelleninformationen 1.3.6.1.5.5.7.1.1 [1]Stelleninformationszugriff: Zugriffsmethode=Onlinestatusprotokoll des Zertifikats (1.3.6.1.5.5.7.48.1), Alternativer Name=URL=http://status.rapidssl.com, [2]Stelleninformationszugriff: Zugriffsmethode=Zertifizierungsstellenaussteller (1.3.6.1.5.5.7.48.2), Alternativer Name=URL=http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Endeinheit, Einschränkung der Pfadlänge=Keine SCT-Liste 1.3.6.1.4.1.11129.2.4.2 v1, a4b90990b418581487bb13a2cc67700a3c359804f91bdfb8e377cd0ec80ddc10, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3045022100fb32c9592d769f11c7993d8c7aa388c22292e871da2278cb60917d735741273a0220648ed3122f4cebef0855751a1cee7064b91266ac7473e154e198d24275e18b35, v1, 2245450759552456963fa12ff1f76d86e0232663adc04b7f5dc6835c6ee20f02, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3044022047fa709571c1857f607c7715419e0e298b339bb9a211dcffa0cf6eb5f1bdc2fc022074ffc0b32c9072b9599261e98ca82c70d543dc79f42c786a9fed9ab4abf593fc, v1, 51a3b0f5fd01799c566db837788f0ca47acc1b27cbf79e88429a0dfed48b05e5, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3045022100cb0651ead1b4be6f5e9589fc4c5c134d4644b2f6e4c50336a11ff5841b9ab71202202ff2ca1949c64755355b2956245973147d8f5305cc8ab31231479d9f4d756d7b CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2017-11-06 13:23:33:0000 2027-11-06 13:23:33:0000 08A5A246CD4B5C8C83D702B4BBAB5349 1.2.840.113549.1.1.11 CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc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 A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Schlüsselkennung des Antragstellers 2.5.29.14 53ca1759fc6bc003212f1aaee4aaa81c8256da75 Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=03de503556d14cbb66f0a3e21b1bc397b23dd155 Schlüsselverwendung 2.5.29.15 Digitale Signatur, Zertifikatsignatur, Offline Signieren der Zertifikatsperrliste, Signieren der Zertifikatsperrliste (86) Erweiterte Schlüsselverwendung 2.5.29.37 Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2) Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Zertifizierungsstelle, Einschränkung der Pfadlänge=0 Zugriff auf Stelleninformationen 1.3.6.1.5.5.7.1.1 [1]Stelleninformationszugriff: Zugriffsmethode=Onlinestatusprotokoll des Zertifikats (1.3.6.1.5.5.7.48.1), Alternativer Name=URL=http://ocsp.digicert.com Sperrlisten-Verteilungspunkte 2.5.29.31 [1]Sperrlisten-Verteilungspunkt: Name des Verteilungspunktes:Vollst. Name:URL=http://crl3.digicert.com/DigiCertGlobalRootCA.crl Zertifikatrichtlinien 2.5.29.32 [1]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.2, [1,1]Richtlinienqualifiziererinfo:Kennung des Richtlinienqualifizierers=CPS, Qualifizierer:https://www.digicert.com/CPS, [2]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.1, [3]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.1, [4]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.2 DigiCert CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2006-11-10 01:00:00:0000 2031-11-10 01:00:00:0000 083BE056904246B1A1756AC95991C74A 1.2.840.113549.1.1.5 CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc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 Schlüsselverwendung 2.5.29.15 Digitale Signatur, Zertifikatsignatur, Offline Signieren der Zertifikatsperrliste, Signieren der Zertifikatsperrliste (86) Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Zertifizierungsstelle, Einschränkung der Pfadlänge=Keine Schlüsselkennung des Antragstellers 2.5.29.14 03de503556d14cbb66f0a3e21b1bc397b23dd155 Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=03de503556d14cbb66f0a3e21b1bc397b23dd155 0</time-to-create><err_message /> --------------------EndCertificate-------------------- --------------------BeginSslConnection-------------------- <?xml version="1.0" encoding="utf-16"?> <ip_address>telenor.com.mm</ip_address> telenor.com.mm 443 Tls12 44550 256 Aes128 128 Sha256 0 <OCSP_stapling>0</OCSP_stapling><OCSC_stapling_error>Try process to close</OCSC_stapling_error> 0</alpn-h2> 0 s:CN=*.telenor.com.mm i:CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US 0 s:CN = *.telenor.com.mm</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = RapidSSL RSA CA 2018</issuer-original></chain-element> 1 s:CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US i:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 1 s:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = RapidSSL RSA CA 2018</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</issuer-original></chain-element> 2 s:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US i:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2 s:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</issuer-original></chain-element></cert-chain-list> depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA verify error:num=19:self signed certificate in certificate chain DONE </openssl-error-output> Start, connected, SslStream opened, AuthenticateAsClient, SslStream closed! Call check_OCSP_stapling_Support After check_OCSP_stapling_Support <_i_Status>200</_i_Status> Tls 44550 256 Aes128 128 Sha1 160 </single-protocol-check> Tls11 44550 256 Aes128 128 Sha1 160 </single-protocol-check> Tls12 44550 256 Aes128 128 Sha256 0 </single-protocol-check> --------------------EndSslConnection--------------------

• https://www.telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

-14

16.060
T
Timeout - The operation has timed out
Visible Content: --------------------BeginCertificate-------------------- <?xml version="1.0" encoding="utf-16"?> 0 None CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US 2020-01-27 01:00:00:0000 2022-02-25 13:00:00:0000 0DE81BFEF73F78DADE885068F0CB24AC 1.2.840.113549.1.1.11 CN=*.telenor.com.mm CN=*.telenor.com.mm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 98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=53ca1759fc6bc003212f1aaee4aaa81c8256da75 Schlüsselkennung des Antragstellers 2.5.29.14 710a8a45acc3c4c4b52cd2d69810992c834cbdc0 Alternativer Antragstellername 2.5.29.17 *.telenor.com.mm, telenor.com.mm - 2 entries Schlüsselverwendung 2.5.29.15 Digitale Signatur, Schlüsselverschlüsselung (a0) Erweiterte Schlüsselverwendung 2.5.29.37 Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2) Sperrlisten-Verteilungspunkte 2.5.29.31 [1]Sperrlisten-Verteilungspunkt: Name des Verteilungspunktes:Vollst. Name:URL=http://cdp.rapidssl.com/RapidSSLRSACA2018.crl Zertifikatrichtlinien 2.5.29.32 [1]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.2, [1,1]Richtlinienqualifiziererinfo:Kennung des Richtlinienqualifizierers=CPS, Qualifizierer:https://www.digicert.com/CPS, [2]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.1 Zugriff auf Stelleninformationen 1.3.6.1.5.5.7.1.1 [1]Stelleninformationszugriff: Zugriffsmethode=Onlinestatusprotokoll des Zertifikats (1.3.6.1.5.5.7.48.1), Alternativer Name=URL=http://status.rapidssl.com, [2]Stelleninformationszugriff: Zugriffsmethode=Zertifizierungsstellenaussteller (1.3.6.1.5.5.7.48.2), Alternativer Name=URL=http://cacerts.rapidssl.com/RapidSSLRSACA2018.crt Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Endeinheit, Einschränkung der Pfadlänge=Keine SCT-Liste 1.3.6.1.4.1.11129.2.4.2 v1, a4b90990b418581487bb13a2cc67700a3c359804f91bdfb8e377cd0ec80ddc10, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3045022100fb32c9592d769f11c7993d8c7aa388c22292e871da2278cb60917d735741273a0220648ed3122f4cebef0855751a1cee7064b91266ac7473e154e198d24275e18b35, v1, 2245450759552456963fa12ff1f76d86e0232663adc04b7f5dc6835c6ee20f02, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3044022047fa709571c1857f607c7715419e0e298b339bb9a211dcffa0cf6eb5f1bdc2fc022074ffc0b32c9072b9599261e98ca82c70d543dc79f42c786a9fed9ab4abf593fc, v1, 51a3b0f5fd01799c566db837788f0ca47acc1b27cbf79e88429a0dfed48b05e5, ‎Montag, ‎27. ‎Januar ‎2020 08:52:12, SHA256, ECDSA, 3045022100cb0651ead1b4be6f5e9589fc4c5c134d4644b2f6e4c50336a11ff5841b9ab71202202ff2ca1949c64755355b2956245973147d8f5305cc8ab31231479d9f4d756d7b CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2017-11-06 13:23:33:0000 2027-11-06 13:23:33:0000 08A5A246CD4B5C8C83D702B4BBAB5349 1.2.840.113549.1.1.11 CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc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 A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 Schlüsselkennung des Antragstellers 2.5.29.14 53ca1759fc6bc003212f1aaee4aaa81c8256da75 Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=03de503556d14cbb66f0a3e21b1bc397b23dd155 Schlüsselverwendung 2.5.29.15 Digitale Signatur, Zertifikatsignatur, Offline Signieren der Zertifikatsperrliste, Signieren der Zertifikatsperrliste (86) Erweiterte Schlüsselverwendung 2.5.29.37 Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2) Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Zertifizierungsstelle, Einschränkung der Pfadlänge=0 Zugriff auf Stelleninformationen 1.3.6.1.5.5.7.1.1 [1]Stelleninformationszugriff: Zugriffsmethode=Onlinestatusprotokoll des Zertifikats (1.3.6.1.5.5.7.48.1), Alternativer Name=URL=http://ocsp.digicert.com Sperrlisten-Verteilungspunkte 2.5.29.31 [1]Sperrlisten-Verteilungspunkt: Name des Verteilungspunktes:Vollst. Name:URL=http://crl3.digicert.com/DigiCertGlobalRootCA.crl Zertifikatrichtlinien 2.5.29.32 [1]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.2, [1,1]Richtlinienqualifiziererinfo:Kennung des Richtlinienqualifizierers=CPS, Qualifizierer:https://www.digicert.com/CPS, [2]Zertifikatrichtlinie:Richtlinienkennung=2.16.840.1.114412.1.1, [3]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.1, [4]Zertifikatrichtlinie:Richtlinienkennung=2.23.140.1.2.2 DigiCert CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2006-11-10 01:00:00:0000 2031-11-10 01:00:00:0000 083BE056904246B1A1756AC95991C74A 1.2.840.113549.1.1.5 CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc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 Schlüsselverwendung 2.5.29.15 Digitale Signatur, Zertifikatsignatur, Offline Signieren der Zertifikatsperrliste, Signieren der Zertifikatsperrliste (86) Basiseinschränkungen 2.5.29.19 Typ des Antragstellers=Zertifizierungsstelle, Einschränkung der Pfadlänge=Keine Schlüsselkennung des Antragstellers 2.5.29.14 03de503556d14cbb66f0a3e21b1bc397b23dd155 Stellenschlüsselkennung 2.5.29.35 Schlüssel-ID=03de503556d14cbb66f0a3e21b1bc397b23dd155 2.9865</time-to-create><err_message /> --------------------EndCertificate-------------------- --------------------BeginSslConnection-------------------- <?xml version="1.0" encoding="utf-16"?> <ip_address>www.telenor.com.mm</ip_address> www.telenor.com.mm 443 Tls12 44550 256 Aes128 128 Sha256 0 <OCSP_stapling>0</OCSP_stapling><OCSC_stapling_error>Try process to close</OCSC_stapling_error> 0</alpn-h2> 0 s:CN=*.telenor.com.mm i:CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US 0 s:CN = *.telenor.com.mm</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = RapidSSL RSA CA 2018</issuer-original></chain-element> 1 s:CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US i:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 1 s:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = RapidSSL RSA CA 2018</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</issuer-original></chain-element> 2 s:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US i:CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US 2 s:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</cert-original> i:C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA</issuer-original></chain-element></cert-chain-list> depth=2 C = US, O = DigiCert Inc, OU = www.digicert.com, CN = DigiCert Global Root CA verify error:num=19:self signed certificate in certificate chain DONE </openssl-error-output> Start, connected, SslStream opened, AuthenticateAsClient, SslStream closed! Call check_OCSP_stapling_Support After check_OCSP_stapling_Support <_i_Status>200</_i_Status> Tls 44550 256 Aes128 128 Sha1 160 </single-protocol-check> Tls11 44550 256 Aes128 128 Sha1 160 </single-protocol-check> Tls12 44550 256 Aes128 128 Sha256 0 </single-protocol-check> --------------------EndSslConnection--------------------

• https://103.255.172.177/
103.255.172.177
301
https://www.103.255.172.177/
Html is minified: 100.00 %
15.043
N
Certificate error: RemoteCertificateNameMismatch
Date: Fri, 27 Nov 2020 12:17:06 GMT
X-Content-Type-Options: nosniff
Location: https://www.103.255.172.177/
Cache-Control: max-age=1209600
Expires: Fri, 11 Dec 2020 12:17:06 GMT
Content-Length: 236
Connection: close
Content-Type: text/html; charset=iso-8859-1
Set-Cookie: TS01d00eea=01a0b811ee688c8d21fc0efdfc4bac2267485f7bed90b56766a9cbc0dd9ddc5bc777d8aa63db38bd492d2af334a4448a3acdfead34; Path=/

• https://www.103.255.172.177/

-1

0.000
R
NameResolutionFailure - The remote name could not be resolved: 'www.103.255.172.177'

7. Comments


1. General Results, most used to calculate the result

Aname "telenor.com.mm" is domain, public suffix is ".*.mm", top-level-domain is ".mm", top-level-domain-type is "country-code", Country is Myanmar, tld-manager is "Ministry of Transport and Communications", num .mm-domains preloaded: 0 (complete: 131120)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: telenor.com.mm has only one ip address.
Warning: Only one ip address found: www.telenor.com.mm has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: telenor.com.mm has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.telenor.com.mm has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Bhttps://103.255.172.177/ 103.255.172.177
301
TS01d00eea=01a0b811ee688c8d21fc0efdfc4bac2267485f7bed90b56766a9cbc0dd9ddc5bc777d8aa63db38bd492d2af334a4448a3acdfead34; Path=/
Cookie sent via https, but not marked as secure
Bhttps://103.255.172.177/ 103.255.172.177
301
TS01d00eea=01a0b811ee688c8d21fc0efdfc4bac2267485f7bed90b56766a9cbc0dd9ddc5bc777d8aa63db38bd492d2af334a4448a3acdfead34; Path=/
Cookie without a SameSite-Attribute. Possible values are: Strict/Lax/None. Cookie may not work as expected, if "None" is wanted, but browsers use "Lax" as default value.
CError - no version with Http-Status 200
Hfatal error: No https - result with http-status 200, no encryption
Nhttps://103.255.172.177/ 103.255.172.177
301
https://www.103.255.172.177/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Rhttps://103.255.172.177/ 103.255.172.177
301
https://www.103.255.172.177/
redirect to not existing domain
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain telenor.com.mm, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.telenor.com.mm, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 2 Queries complete, 1 with IPv6, 1 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns3.nic.net.mm (203.81.64.22), ns4.nic.net.mm (203.81.64.23), ns5.nic.net.mm (203.81.92.8)
AGood (1 - 3.0):: An average of 0.7 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: ns3.nic.net.mm, ns4.nic.net.mm, ns5.nic.net.mm, 3 Name Servers included in Delegation: ns3.nic.net.mm, ns4.nic.net.mm, ns5.nic.net.mm, 3 Name Servers included in 1 Zone definitions: ns3.nic.net.mm, ns4.nic.net.mm, ns5.nic.net.mm, 1 Name Servers listed in SOA.Primary: ns3.nic.net.mm.
AGood: Only one SOA.Primary Name Server found.: ns3.nic.net.mm.
AGood: SOA.Primary Name Server included in the delegation set.: ns3.nic.net.mm.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns3.nic.net.mm, ns4.nic.net.mm, ns5.nic.net.mm
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 3 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 3 Name Servers, 1 Top Level Domain: *.mm
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: net.mm
Warning: All Name Servers from the same Country / IP location.: 3 Name Servers, 1 Countries: MM
AInfo: Ipv4-Subnet-list: 3 Name Servers, 1 different subnets (first Byte): 203., 1 different subnets (first two Bytes): 203.81., 2 different subnets (first three Bytes): 203.81.64., 203.81.92.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports TCP connections: 3 good Nameserver
AGood: Nameserver supports Echo Capitalization: 3 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 3 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 3 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

https://telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://www.telenor.com.mm/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 207620 milliseconds, 207.620 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
telenor.com.mm
103.255.172.177
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
telenor.com.mm
103.255.172.177
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.telenor.com.mm

2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

3CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US


www.telenor.com.mm
103.255.172.177
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.telenor.com.mm
103.255.172.177
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.telenor.com.mm

2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

3CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US


telenor.com.mm
telenor.com.mm
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

telenor.com.mm
telenor.com.mm
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.telenor.com.mm

2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

3CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US


www.telenor.com.mm
www.telenor.com.mm
443
ok
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

www.telenor.com.mm
www.telenor.com.mm
443
ok
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.telenor.com.mm

2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

3CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US


103.255.172.177
103.255.172.177
443
name does not match
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok

103.255.172.177
103.255.172.177
443
name does not match
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
Chain - too much certificates, don't send root certificates
1CN=*.telenor.com.mm

2CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US

3CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US


9. Certificates

1.
1.
CN=*.telenor.com.mm
27.01.2020
25.02.2022
expires in 454 days
*.telenor.com.mm, telenor.com.mm - 2 entries
1.
1.
CN=*.telenor.com.mm
27.01.2020

25.02.2022
expires in 454 days
*.telenor.com.mm, telenor.com.mm - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:0DE81BFEF73F78DADE885068F0CB24AC
Thumbprint:06EECA2A2D1A1F0952113D6FAEF3525BC62F008B
SHA256 / Certificate:7KDBeuFrfBVJYiO8cYQVovHf529nnVrG2Hlr1jX6FRY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2f75d56c3eb16ec9f2aece35baed623177228bfde6f0d06393c402f3226596f2
SHA256 hex / Subject Public Key Information (SPKI):7ae4b3c4e6a50b0b2e583346d27f302bcbc3b0686a56d4a87888548f05c5930d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://status.rapidssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017
06.11.2027
expires in 2534 days


2.
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
06.11.2017

06.11.2027
expires in 2534 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:08A5A246CD4B5C8C83D702B4BBAB5349
Thumbprint:98C6A8DC887963BA3CF9C2731CBDD3F7DE05AC2D
SHA256 / Certificate:x5C0cShEfsC2DyK/y3ldccMm3ZEO4Sy7TMWoYZHrkbw=
SHA256 hex / Cert (DANE * 0 1):c790b47128447ec0b60f22bfcb795d71c326dd910ee12cbb4cc5a86191eb91bc
SHA256 hex / PublicKey (DANE * 1 1):9ca59cb18adcfb2e48f2f2dfd55181ca36edf879dab2397ef61f2534a272b681
SHA256 hex / Subject Public Key Information (SPKI):67d284ad78e776a395af75e14148579cd682f39ee09249842c9090d09ffa0133
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.digicert.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Server Authentication (1.3.6.1.5.5.7.3.1), Client Authentication (1.3.6.1.5.5.7.3.2)


3.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006
10.11.2031
expires in 3999 days


3.
CN=DigiCert Global Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US
10.11.2006

10.11.2031
expires in 3999 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:083BE056904246B1A1756AC95991C74A
Thumbprint:A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436
SHA256 / Certificate:Q0ig6URMeMsmXgWNXolEtNhPlmK9Jtslf4k0pEPHAWE=
SHA256 hex / Cert (DANE * 0 1):4348a0e9444c78cb265e058d5e8944b4d84f9662bd26db257f8934a443c70161
SHA256 hex / PublicKey (DANE * 1 1):aff988906dde12955d9bebbf928fdcc31cce328d5b9384f21c8941ca26e20391
SHA256 hex / Subject Public Key Information (SPKI):3286b9f475e53f685e0a6a41ce072a95e6a359b79f387a1c691caf50a756d5a3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
0
0
3
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
0
1
1
CN=GeoTrust SSL CA - G3, O=GeoTrust Inc., C=US
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1391361733
precert
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2020-01-27 00:00:00
2022-02-25 12:00:00
*.telenor.com.mm, telenor.com.mm - 2 entries


525141740
precert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-09-03 00:00:00
2020-02-07 12:00:00
*.telenor.com.mm, telenor.com.mm - 2 entries


300909490
leaf cert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-02-07 00:00:00
2020-05-04 12:00:00
av.telenor.com.mm, cswebext.telenor.com.mm, lyncdiscover.telenor.com.mm, meet.telenor.com.mm, sip.telenor.com.mm, telenor.com.mm, telenorowa.telenor.com.mm, webconf.telenor.com.mm - 8 entries


300909497
leaf cert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-02-07 00:00:00
2020-02-07 12:00:00
*.telenor.com.mm, telenor.com.mm - 2 entries


106054592
leaf cert
CN=GeoTrust SSL CA - G3, O=GeoTrust Inc., C=US
2017-04-05 00:00:00
2020-05-04 23:59:59
av.telenor.com.mm, cswebext.telenor.com.mm, lyncdiscover.telenor.com.mm, meet.telenor.com.mm, sip.telenor.com.mm, telenor.com.mm, telenorowa.telenor.com.mm, webconf.telenor.com.mm - 8 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
0
0
3
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
0
1
1
CN=GeoTrust SSL CA - G3, O=GeoTrust Inc., C=US
0
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2401245660
leaf cert
CN=RapidSSL RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2020-01-26 23:00:00
2022-02-25 11:00:00
*.telenor.com.mm, telenor.com.mm
2 entries


709899824
precert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-09-02 22:00:00
2020-02-07 11:00:00
*.telenor.com.mm, telenor.com.mm
2 entries


740712818
leaf cert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-02-06 23:00:00
2020-05-04 10:00:00
av.telenor.com.mm, cswebext.telenor.com.mm, lyncdiscover.telenor.com.mm, meet.telenor.com.mm, sip.telenor.com.mm, telenor.com.mm, telenorowa.telenor.com.mm, webconf.telenor.com.mm
8 entries


334470510
leaf cert
CN=GeoTrust RSA CA 2018, OU=www.digicert.com, O=DigiCert Inc, C=US
2018-02-06 23:00:00
2020-02-07 11:00:00
*.telenor.com.mm, telenor.com.mm
2 entries


249486440
leaf cert
CN=GeoTrust SSL CA - G3, O=GeoTrust Inc., C=US
2017-04-04 22:00:00
2020-05-04 21:59:59
av.telenor.com.mm, cswebext.telenor.com.mm, lyncdiscover.telenor.com.mm, meet.telenor.com.mm, sip.telenor.com.mm, telenor.com.mm, telenorowa.telenor.com.mm, webconf.telenor.com.mm
8 entries



11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns3.nic.net.mm, ns4.nic.net.mm, ns5.nic.net.mm

QNr.DomainTypeNS used
1
mm
NS
a.root-servers.net (2001:503:ba3e::2:30)

Answer: a.nic.net.mm, b.nic.net.mm, c.nic.net.mm, d.nic.net.mm
2
ns3.nic.net.mm: 203.81.64.22
NS
a.nic.net.mm (37.209.192.4)

Answer: ns4.nic.net.mm
203.81.64.23

Answer: ns5.nic.net.mm
203.81.92.8


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.telenor.com.mm
0

no CAA entry found
1
0
telenor.com.mm
0

no CAA entry found
1
0
com.mm
0

no CAA entry found
1
0
mm
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
telenor.com.mm
2kJvCgr3KXfF1/TQ7ZjIkIhGJcGutkaGeyobs268XogItA3O/x48xZQ0a1rqpAYf0VSGGy6P3FNy1F9zMTMSVA==
ok
1
0
telenor.com.mm
MS=C1452EFC58E0126BA83D82EDC6D4625B4BF2D4F9
ok
1
0
telenor.com.mm
v=spf1 ip4:103.255.172.181 include:spf.protection.outlook.com include:io.dimelo.com -all
ok
1
0
telenor.com.mm
V=TXT MS=ms75568307
ok
1
0
www.telenor.com.mm

ok
1
0
_acme-challenge.telenor.com.mm

Name Error - The domain name does not exist
1
0
_acme-challenge.www.telenor.com.mm

Name Error - The domain name does not exist
1
0
_acme-challenge.telenor.com.mm.telenor.com.mm

Name Error - The domain name does not exist
1
0
_acme-challenge.www.telenor.com.mm.telenor.com.mm

Name Error - The domain name does not exist
1
0
_acme-challenge.www.telenor.com.mm.www.telenor.com.mm

Name Error - The domain name does not exist
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=83cdf15c-5fb0-4280-aeb2-948a170708d3


Last Result: https://check-your-website.server-daten.de/?q=telenor.com.mm - 2020-11-27 13:14:41


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=telenor.com.mm" target="_blank">Check this Site: telenor.com.mm</a>