Check DNS, Urls + Redirects, Certificates and Content of your Website




1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
test.com
A
69.172.200.235
Los Angeles/California/United States (US) - DosArrest
No Hostname found
yes
1
0

AAAA

yes


www.test.com
A
69.172.200.235
Los Angeles/California/United States (US) - DosArrest
No Hostname found
yes
1
0

AAAA

yes


*.test.com
A
69.172.200.109
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 42351, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.02.2021, 00:00:00 +, Signature-Inception: 11.01.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com
com
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest 4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=



1 RRSIG RR to validate DS RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.01.2021, 05:00:00 +, Signature-Inception: 13.01.2021, 04:00:00 +, KeyTag 42351, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 42351 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 30909, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 31510, Flags 256



Public Key with Algorithm 8, KeyTag 58540, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 25.01.2021, 19:24:21 +, Signature-Inception: 10.01.2021, 19:19:21 +, KeyTag 30909, Signer-Name: com



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 30909 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 30909, DigestType 2 and Digest "4tPJFvbe6scylOgmj7WIUESoM/xUWViPSpGEz8QaV2Y=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: test.com
test.com
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "9p65bhhrhhqao67b2lg968j76929g9mu" between the hashed NSEC3-owner "9p64mp6gvpmeuij0jcd6jhkjqj8ddfhi" and the hashed NextOwner "9p6631ktm72e3k8875c2i6ehvu2mcpfe". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 9p64mp6gvpmeuij0jcd6jhkjqj8ddfhi.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 20.01.2021, 05:26:34 +, Signature-Inception: 13.01.2021, 04:16:34 +, KeyTag 31510, Signer-Name: com



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "ck0pojmg874ljref7efn8430qvit8bsm" as Owner. That's the Hash of "com" with the NextHashedOwnerName "ck0q1gin43n1arrc9osm6qpqr81h5m9a". So that domain name is the Closest Encloser of "test.com". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner ck0pojmg874ljref7efn8430qvit8bsm.com., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 20.01.2021, 05:41:11 +, Signature-Inception: 13.01.2021, 04:31:11 +, KeyTag 31510, Signer-Name: com



0 DNSKEY RR found




Zone: www.test.com
www.test.com
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.test.com
  ns1.hosting.com / auth02.nwk01.hosting.com

test.com
  ns1.hosting.com / auth03.nwk01.hosting.com
204.12.76.1
Chicago/Illinois/United States (US) - HostMySite


  ns2.hosting.com / auth01.nwk01.hosting.com
76.12.92.1
Chicago/Illinois/United States (US) - HostMySite


  ns3.hosting.com / auth04.den02.hosting.com
216.74.36.1
Chicago/Illinois/United States (US) - HostMySite

com
  a.gtld-servers.net / nnn1-fra6


  b.gtld-servers.net / nnn1-eltxl2


  c.gtld-servers.net / nnn1-fra6


  d.gtld-servers.net / nnn1-fra6


  e.gtld-servers.net / nnn1-fra6


  f.gtld-servers.net / nnn1-fra5


  g.gtld-servers.net / nnn1-fra5


  h.gtld-servers.net / nnn1-fra5


  i.gtld-servers.net / nnn1-fra5


  j.gtld-servers.net / nnn1-ams5


  k.gtld-servers.net / nnn1-ams5


  l.gtld-servers.net / nnn1-ams5


  m.gtld-servers.net / nnn1-ams5


4. SOA-Entries


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525057
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:7


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525057
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:7


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525067
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:1


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525067
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:1


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525072
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:com
Zone-Name:com
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1610525072
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:test.com
Zone-Name:test.com
Primary:ns1.hosting.com
Mail:jposch.testcentral.com
Serial:61
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:3


Domain:www.test.com
Zone-Name:test.com
Primary:ns1.hosting.com
Mail:jposch.testcentral.com
Serial:61
Refresh:10800
Retry:3600
Expire:604800
TTL:3600
num Entries:1


5. Screenshots

Startaddress: https://www.test.com, address used: https://www.test.com/, Screenshot created 2021-01-13 09:06:11 +00:0

Mobil (412px x 732px)

630 milliseconds

Screenshot mobile - https://www.test.com/
Mobil + Landscape (732px x 412px)

619 milliseconds

Screenshot mobile landscape - https://www.test.com/
Screen (1280px x 1680px)

1446 milliseconds

Screenshot Desktop - https://www.test.com/

Mobile- and other Chrome-Checks

widthheight
visual Viewport396732
content Size3961457

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.2, ECDHE_RSA with X25519, and AES_256_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://test.com/
69.172.200.235
301
http://www.test.com/
Html is minified: 100.00 %
0.060
D
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:27 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: b6b4c2d79db1df648684205032689ac2
Location: http://www.test.com/

• http://www.test.com/
69.172.200.235
301
https://www.test.com/
Html is minified: 100.00 %
0.060
A
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:27 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: dee54f223c0ac7649285f0d7de7d24cd
Location: https://www.test.com/

• https://test.com/
69.172.200.235
301
https://www.test.com/
Html is minified: 100.00 %
3.954
B
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:28 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: ab7adbaf8b5d02d06639d16a57a328a2
Location: https://www.test.com/

• https://www.test.com/
69.172.200.235 GZip used - 773 / 1556 - 50.32 %
Inline-JavaScript (∑/total): 1/1099 Inline-CSS (∑/total): 0/0
200

Html is minified: 376.76 %
3.487
B
small visible content (num chars: 117)
This site requires JavaScript and Cookies to be enabled. Please change your browser settings or upgrade your browser.
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:32 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: 48d94d96b0a614d7680fceda5f70be54
P3P: CP="NON DSP COR ADMa OUR IND UNI COM NAV INT"
Cache-Control: no-cache
Content-Encoding: gzip

• http://test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
69.172.200.235
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
http://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
0.053
D
Visible Content: 301 Moved Permanently Object moved to here . DOSarrest Internet Security
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:36 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: c96885119e39c441dd70cfa053d1c557
Location: http://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• http://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
69.172.200.235
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
301
https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
0.050
A
Visible Content: 301 Moved Permanently Object moved to here . DOSarrest Internet Security
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:36 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: 01533541109b4a115e0733041548b29e
Location: https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

• https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
GZip used - 773 / 1556 - 50.32 %
Inline-JavaScript (∑/total): 1/1099 Inline-CSS (∑/total): 0/0
200

Html is minified: 376.76 %
3.310

Visible Content: This site requires JavaScript and Cookies to be enabled. Please change your browser settings or upgrade your browser.
Info: Html-Content with meta and/or script, may be a problem creating a Letsencrypt certificate using http-01 validation
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:40 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: 1d351372395f5f0116cce5e52b7e3dee
P3P: CP="NON DSP COR ADMa OUR IND UNI COM NAV INT"
Cache-Control: no-cache
Content-Encoding: gzip

• https://69.172.200.235/
69.172.200.235
301
https://www.69.172.200.235/
Html is minified: 100.00 %
3.524
N
Certificate error: RemoteCertificateNameMismatch
Server: nginx/1.18.0
Date: Wed, 13 Jan 2021 08:05:36 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: close
X-DIS-Request-ID: e9af50c95800514ca2ad82fe17095f80
Location: https://www.69.172.200.235/

• https://www.69.172.200.235/

-1

0.020
R
NameResolutionFailure - The remote name could not be resolved: 'www.69.172.200.235'

7. Comments


1. General Results, most used to calculate the result

Aname "test.com" is domain, public suffix is ".com", top-level-domain is ".com", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .com-domains preloaded: 55723 (complete: 142558)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: test.com has only one ip address.
Warning: Only one ip address found: www.test.com has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: test.com has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.test.com has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
Agood: destination is https
Agood - only one version with Http-Status 200
Agood: one preferred version: www is preferred
AGood: No cookie sent via http.
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: Some urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset):0 complete Content-Type - header (2 urls)
https://www.test.com/ 69.172.200.235


Url with incomplete Content-Type - header - missing charset
https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de


Url with incomplete Content-Type - header - missing charset
Ahttp://www.test.com/ 69.172.200.235
301
https://www.test.com/
correct redirect http - https with the same domain name
Bhttps://test.com/ 69.172.200.235
301

Missing HSTS-Header
Bhttps://www.test.com/ 69.172.200.235
200

Missing HSTS-Header
Bhttps://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Missing HSTS-Header
Dhttp://test.com/ 69.172.200.235
301
http://www.test.com/
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Dhttp://test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 69.172.200.235
301
http://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Wrong redirect one domain http to other domain http. First redirect to https without changing the domain, so no new dns query is required. So the server can send the HSTS header. That's fundamental using HSTS (Http Strict Transport Security). First step: Add correct redirects http ⇒ https. Perhaps in your port 80 vHost something like "RewriteEngine on" + "RewriteRule ^ https://%{SERVER_NAME}%{REQUEST_URI} [END,QSA,R=permanent]" (two rows, without the "). Don't add this in your port 443 vHost, that would create a loop. Then recheck your domain, should be Grade C. There is the rule to select one https version as preferred version.
Nhttps://69.172.200.235/ 69.172.200.235
301
https://www.69.172.200.235/
Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Rhttps://69.172.200.235/ 69.172.200.235
301
https://www.69.172.200.235/
redirect to not existing domain
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain test.com, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.test.com, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 3 Name Servers.
AInfo:: 2 Queries complete, 1 with IPv6, 1 with IPv4.
Warning: Only some DNS Queries done via ipv6. IPv6 is the future, so the name servers of your name servers should have ipv6 addresses.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.hosting.com (204.12.76.1), ns2.hosting.com (76.12.92.1), ns3.hosting.com (216.74.36.1)
AGood (1 - 3.0):: An average of 0.7 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 3 different Name Servers found: ns1.hosting.com, ns2.hosting.com, ns3.hosting.com, 3 Name Servers included in Delegation: ns1.hosting.com, ns2.hosting.com, ns3.hosting.com, 3 Name Servers included in 1 Zone definitions: ns1.hosting.com, ns2.hosting.com, ns3.hosting.com, 1 Name Servers listed in SOA.Primary: ns1.hosting.com.
AGood: Only one SOA.Primary Name Server found.: ns1.hosting.com.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.hosting.com.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.hosting.com, ns2.hosting.com, ns3.hosting.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 3 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 3 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 3 Name Servers, 1 Top Level Domain: com
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used: hosting.com
Warning: All Name Servers from the same Country / IP location.: 3 Name Servers, 1 Countries: US
AInfo: Ipv4-Subnet-list: 3 Name Servers, 3 different subnets (first Byte): 204., 216., 76., 3 different subnets (first two Bytes): 204.12., 216.74., 76.12., 3 different subnets (first three Bytes): 204.12.76., 216.74.36., 76.12.92.
AExcellent: Every Name Server IPv4-address starts with an unique Byte.
AGood: Nameserver supports TCP connections: 3 good Nameserver
AGood: Nameserver supports Echo Capitalization: 3 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 3 good Nameserver
AGood: Nameserver has passed 10 EDNS-Checks (OP100, FLAGS, V1, V1OP100, V1FLAGS, DNSSEC, V1DNSSEC, NSID, COOKIE, CLIENTSUBNET): 3 good Nameserver
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Warning: Not existing ACME-file, but Server sends 200, not 404 or redirect. May be a problem creating a Letsencrypt certificate. Checking /.well-known/acme-challenge/random-filename - a http status 404 - Not Found - is expected. If your server sends content and a http status 200, the validation file (87 bytes, token, dot and the hash of the public part of the account key) may be invisible, so Letsencrypt can't validate your domain. If it is an application that sends this content, perhaps create an exception, so /.well-known/acme-challenge sends raw files. Or create a redirect to another domain and / or port 443, but your Letsencrypt client must support such a solution. Certbot: Use webroot as authenticator - https://certbot.eff.org/docs/using.html Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Every https result with status 200 supports GZip.
https://www.test.com/ 69.172.200.235
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.test.com/ 69.172.200.235
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.test.com/ 69.172.200.235
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://www.test.com/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 97707 milliseconds, 97.707 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
test.com
69.172.200.235
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
test.com
69.172.200.235
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=www.test.com

2CN=www.test.com

3CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA


www.test.com
69.172.200.235
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.test.com
69.172.200.235
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
No SNI required - domain included in main certificate
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=www.test.com

2CN=www.test.com

3CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA


www.test.com
www.test.com
443
ok
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.test.com
www.test.com
443
ok
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=www.test.com

2CN=www.test.com

3CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA


69.172.200.235
69.172.200.235
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

69.172.200.235
69.172.200.235
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
Tls.1.1
Tls.1.0
Chain - duplicate certificates
1CN=www.test.com

2CN=www.test.com

3CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA


9. Certificates

1.
1.
CN=www.test.com
07.01.2020
25.01.2022
expires in 367 days
www.test.com, test.com - 2 entries
1.
1.
CN=www.test.com
07.01.2020

25.01.2022
expires in 367 days
www.test.com, test.com - 2 entries

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:6372F802CCEAB78B0CECF1373729D01D
Thumbprint:075DCC5D1A89788AF7EEAF5A2450A5AAA85655E9
SHA256 / Certificate:ObHRZPY9YETpK0ty/wVKatDpWElosTKp4fzZC0tF1Ek=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0bad019cf2884f07647a870f26c9da046d28cb7ef36c7f57e556da3c82e6ab5b
SHA256 hex / Subject Public Key Information (SPKI):2e29fa2dc50d1487c0b38048542b3fc52c09528cad34636f91e76e3e1bd811ec
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://ocsp.netsolssl.com
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, S=VA, C=US
24.09.2014
24.09.2024
expires in 1340 days


2.
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, S=VA, C=US
24.09.2014

24.09.2024
expires in 1340 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:00C82252FA9D69ED49E9B763D8338AC9B3
Thumbprint:90854CE574D03218DF2E7B4A054AA53F6951C1D2
SHA256 / Certificate:GtUWhBmK+R6iQ525x5ID9Hp0nr2JYnm3fcYn+D/+SdY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):1bc835f625e884fcbd2991ab890f34ec0e7d95cca532ef35662f215f3e71c6c3
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:http://ocsp.usertrust.com
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010
19.01.2038
expires in 6205 days


3.
CN=USERTrust RSA Certification Authority, O=The USERTRUST Network, L=Jersey City, S=New Jersey, C=US
01.02.2010

19.01.2038
expires in 6205 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA384 With RSA Encryption
Serial Number:01FD6D30FCA3CA51A81BBC640E35032D
Thumbprint:2B8F1B57330DBBA2D07A6C51F70EE90DDAB9AD8E
SHA256 / Certificate:55PJsC/YqhPiHDEiisywgRlkO3SciYlksXRtRsPUy9I=
SHA256 hex / Cert (DANE * 0 1):e793c9b02fd8aa13e21c31228accb08119643b749c898964b1746d46c3d4cbd2
SHA256 hex / PublicKey (DANE * 1 1):c784333d20bcd742b9fdc3236f4e509b8937070e73067e254dd3bf9c45bf4dde
SHA256 hex / Subject Public Key Information (SPKI):00900315f64f7673565b9b22273ed3a56d67c2e2c9cf930ce845ccfed80af0ce
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

Issuerlast 7 daysactivenum Certs
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
0
1
2
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
0
1
2
CN=Certinomis - Easy CA, OU=0002 433998903, O=Certinomis, C=FR
0
0
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
2074719281
precert
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
2020-11-17 14:15:52
2021-11-17 14:14:52
*.test.com, test.com - 2 entries


1349890154
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2020-01-07 00:00:00
2022-01-24 23:59:59
test.com, www.test.com - 2 entries


568310222
precert
CN=Certinomis - Easy CA, OU=0002 433998903, O=Certinomis, C=FR
2018-10-03 12:22:00
2019-10-03 12:22:00
test.com - 1 entries


284904764
leaf cert
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
2017-12-21 16:03:41
2020-12-17 22:03:41
*.test.com, secure.test.com, test.com, www.test.com - 4 entries


72566883
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2017-01-15 00:00:00
2020-01-24 23:59:59
test.com, www.test.com - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
0
1
4
CN=Actalis Domain Validation Server CA G1 Test, O=Actalis S.p.A., L=Ponte San Pietro, C=IT, ST=Bergamo
0
0
3
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
0
1
2
CN=Trustwave OV SHA256 Pre-Certificate CA, O="Trustwave Holdings, Inc.", L=Chicago, C=US, ST=Illinois
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
3695303580
leaf cert
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
2020-11-17 13:15:52
2021-11-17 13:14:52
*.test.com, test.com
2 entries


3660846799
precert
CN=Trustwave OV SHA256 Pre-Certificate CA, O="Trustwave Holdings, Inc.", L=Chicago, C=US, ST=Illinois
2020-11-17 13:15:52
2021-11-17 13:14:52
*.test.com, test.com
2 entries


2299864849
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2020-01-06 23:00:00
2022-01-24 22:59:59
test.com, www.test.com
2 entries


1845610149
precert
CN=Actalis Domain Validation Server CA G1 Test, O=Actalis S.p.A., L=Ponte San Pietro, C=IT, ST=Bergamo
2019-09-04 12:28:11
2020-09-04 12:28:11
test.com
1 entries


1253395161
precert
CN=Actalis Domain Validation Server CA G1 Test, O=Actalis S.p.A., L=Ponte San Pietro, C=IT, ST=Bergamo
2019-03-04 09:13:59
2020-03-04 09:13:59
test.com
1 entries


1243104251
precert
CN=Actalis Domain Validation Server CA G1 Test, O=Actalis S.p.A., L=Ponte San Pietro, C=IT, ST=Bergamo
2019-03-01 07:40:39
2020-03-01 07:40:39
test.com
1 entries


307985535
leaf cert
CN="Trustwave Organization Validation SHA256 CA, Level 1", O="Trustwave Holdings, Inc.", L=Chicago, C=US, emailAddress=ca@trustwave.com
2017-12-21 15:03:41
2020-12-17 21:03:41
*.test.com, secure.test.com, test.com, www.test.com
4 entries


78636323
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2017-01-14 23:00:00
2020-01-24 22:59:59
test.com, www.test.com
2 entries


2303619373
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2017-01-13 23:00:00
2020-01-24 22:59:59
test.com, www.test.com
2 entries


2303613932
leaf cert
CN=Network Solutions DV Server CA 2, O=Network Solutions L.L.C., L=Herndon, C=US, ST=VA
2017-01-09 23:00:00
2020-01-24 22:59:59
test.com, www.test.com
2 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://www.test.com/
69.172.200.235
meta
other
2

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://www.test.com/
69.172.200.235
meta
Content-Script-Type
text/javascript


1
ok








meta
Content-Type
text/html; charset=iso-8859-1


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.hosting.com, ns2.hosting.com, ns3.hosting.com

QNr.DomainTypeNS used
1
com
NS
d.root-servers.net (199.7.91.13)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.hosting.com: 204.12.76.1
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns2.hosting.com
76.12.92.1

Answer: ns3.hosting.com
216.74.36.1


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.test.com
0

no CAA entry found
1
0
test.com
0

no CAA entry found
1
0
com
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
test.com
google-site-verification=kW9t2V_S7WjOX57zq0tP8Ae_WJhRwUcZoqpdEkvuXJk
ok
1
0
www.test.com

ok
1
0
_acme-challenge.test.com
v=spf1 ~all
missing entry or wrong length
1
0
_acme-challenge.www.test.com

Name Error - The domain name does not exist
1
0
_acme-challenge.test.com.test.com
v=spf1 ~all
perhaps wrong
1
0
_acme-challenge.www.test.com.test.com
v=spf1 ~all
perhaps wrong
1
0
_acme-challenge.www.test.com.www.test.com

Name Error - The domain name does not exist
1
0


15. Portchecks

No Port checks



Permalink: https://check-your-website.server-daten.de/?i=201ffe6c-0002-449e-968e-efea2b5200dc


Last Result: https://check-your-website.server-daten.de/?q=test.com - 2021-01-13 09:04:40


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=test.com" target="_blank">Check this Site: test.com</a>