Check DNS, Urls + Redirects, Certificates and Content of your Website



V

Connect failure - perhaps firewall

Checked:
22.07.2021 05:45:19


Older results

No older results found


1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
tortfeaser.duckdns.org
A
124.148.112.120
Canberra/Australian Capital Territory/Australia (AU) - TPG Internet Pty Ltd
Hostname: 124-148-112-120.dyn.iinet.net.au
yes
1
0

AAAA

yes


www.tortfeaser.duckdns.org
A
124.148.112.120
Canberra/Australian Capital Territory/Australia (AU) - TPG Internet Pty Ltd
Hostname: 124-148-112-120.dyn.iinet.net.au
yes
1
0

AAAA

yes


*.tortfeaser.duckdns.org
A
124.148.112.120
yes



AAAA

yes



CNAME

yes



2. DNSSEC

Zone (*)DNSSEC - Informations

Zone: (root)
(root)
1 DS RR published



DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 26838, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 11.08.2021, 00:00:00 +, Signature-Inception: 21.07.2021, 00:00:00 +, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: org
org
1 DS RR in the parent zone found



DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=



1 RRSIG RR to validate DS RR found



RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 03.08.2021, 21:00:00 +, Signature-Inception: 21.07.2021, 20:00:00 +, KeyTag 26838, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26838 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 5643, Flags 256



Public Key with Algorithm 8, KeyTag 26974, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 63813, Flags 256



1 RRSIG RR to validate DNSKEY RR found



RRSIG-Owner org., Algorithm: 8, 1 Labels, original TTL: 900 sec, Signature-expiration: 07.08.2021, 15:27:57 +, Signature-Inception: 17.07.2021, 14:27:57 +, KeyTag 26974, Signer-Name: org



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 26974 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 26974, DigestType 2 and Digest "T+3ilMU/Q4oVjEHTlInNeKhr6w2KCur/FHRcDRbh3jI=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: duckdns.org
duckdns.org
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "3gitsp85pi8earriv69nd1drdiv6j8m1" between the hashed NSEC3-owner "3ginlhrgpifn8r643q1vlajm0a4afjnq" and the hashed NextOwner "3giuuaks70tm1fiabnkqdb77rdg4p5o4". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner 3ginlhrgpifn8r643q1vlajm0a4afjnq.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 07.08.2021, 15:27:57 +, Signature-Inception: 17.07.2021, 14:27:57 +, KeyTag 5643, Signer-Name: org



DS-Query in the parent zone sends valid NSEC3 RR with the Hash "1i870vj5h429vj9pci7ar6e9gki74tr7" as Owner. That's the Hash of "org" with the NextHashedOwnerName "1i87r64gaju4o91mhkbu7i9ekbs7k8ut". So that domain name is the Closest Encloser of "duckdns.org". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner 1i870vj5h429vj9pci7ar6e9gki74tr7.org., Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 12.08.2021, 03:45:36 +, Signature-Inception: 22.07.2021, 02:45:36 +, KeyTag 5643, Signer-Name: org



0 DNSKEY RR found




Zone: tortfeaser.duckdns.org
tortfeaser.duckdns.org
0 DS RR in the parent zone found



0 DNSKEY RR found




Zone: www.tortfeaser.duckdns.org
www.tortfeaser.duckdns.org
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.tortfeaser.duckdns.org
  ns1.duckdns.org


  ns2.duckdns.org


  ns3.duckdns.org


  ns4.duckdns.org


  ns5.duckdns.org


  ns6.duckdns.org

tortfeaser.duckdns.org
  ns1.duckdns.org
99.79.143.35
Toronto/Ontario/Canada (CA) - Amazon.com, Inc.


  ns2.duckdns.org
35.182.183.211
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns3.duckdns.org
35.183.157.249
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns4.duckdns.org
3.97.51.116
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns5.duckdns.org
99.79.16.64
Toronto/Ontario/Canada (CA) - Amazon.com, Inc.


  ns6.duckdns.org
3.97.58.28
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.

duckdns.org
  ns1.duckdns.org
99.79.143.35
Toronto/Ontario/Canada (CA) - Amazon.com, Inc.


  ns2.duckdns.org
35.182.183.211
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns3.duckdns.org
35.183.157.249
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns4.duckdns.org
3.97.51.116
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.


  ns5.duckdns.org
99.79.16.64
Toronto/Ontario/Canada (CA) - Amazon.com, Inc.


  ns6.duckdns.org
3.97.58.28
Toronto/Ontario/Canada (CA) - Amazon Technologies Inc.

org
  a0.org.afilias-nst.info / ns000a.app32.ams2.afilias-nst.info


  a2.org.afilias-nst.info / LHR8


  b0.org.afilias-nst.org / app1.lax1.hosts.meta.redstone.afilias-nst.info-1617291490


  b2.org.afilias-nst.org / LHR8


T  c0.org.afilias-nst.info / app21.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


  d0.org.afilias-nst.org / app21.iad1.hosts.meta.redstone.afilias-nst.info-2020121101


4. SOA-Entries


Domain:org
Zone-Name:org
Primary:a0.org.afilias-nst.info
Mail:noc.afilias-nst.info
Serial:2014441414
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:5


Domain:org
Zone-Name:org
Primary:a0.org.afilias-nst.info
Mail:noc.afilias-nst.info
Serial:2014441415
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns1.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns2.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns3.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns4.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns5.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:duckdns.org
Zone-Name:duckdns.org
Primary:ns6.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns1.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns2.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns3.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns4.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns5.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns6.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns1.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns2.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns3.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns4.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns5.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


Domain:www.tortfeaser.duckdns.org
Zone-Name:duckdns.org
Primary:ns6.duckdns.org
Mail:hostmaster.duckdns.org
Serial:2021061901
Refresh:6000
Retry:120
Expire:2419200
TTL:600
num Entries:1


5. Screenshots

Startaddress: https://tortfeaser.duckdns.org, address used: https://tortfeaser.duckdns.org/auth/authorize?response_type=code&redirect_uri=https%3A%2F%2Ftortfeaser.duckdns.org%2F%3Fauth_callback%3D1&client_id=https%3A%2F%2Ftortfeaser.duckdns.org%2F&state=eyJoYXNzVXJsIjoiaHR0cHM6Ly90b3J0ZmVhc2VyLmR1Y2tkbnMub3JnIiwiY2xpZW50SWQiOiJodHRwczovL3RvcnRmZWFzZXIuZHVja2Rucy5vcmcvIn0%3D, Screenshot created 2021-07-22 06:10:26 +00:0 url is insecure, certificate invalid

Mobil (412px x 732px)

5078 milliseconds

Screenshot mobile - https://tortfeaser.duckdns.org/auth/authorize?response_type=code&redirect_uri=https%3A%2F%2Ftortfeaser.duckdns.org%2F%3Fauth_callback%3D1&client_id=https%3A%2F%2Ftortfeaser.duckdns.org%2F&state=eyJoYXNzVXJsIjoiaHR0cHM6Ly90b3J0ZmVhc2VyLmR1Y2tkbnMub3JnIiwiY2xpZW50SWQiOiJodHRwczovL3RvcnRmZWFzZXIuZHVja2Rucy5vcmcvIn0%3D
Mobil + Landscape (732px x 412px)

3109 milliseconds

Screenshot mobile landscape - https://tortfeaser.duckdns.org/auth/authorize?response_type=code&redirect_uri=https%3A%2F%2Ftortfeaser.duckdns.org%2F%3Fauth_callback%3D1&client_id=https%3A%2F%2Ftortfeaser.duckdns.org%2F&state=eyJoYXNzVXJsIjoiaHR0cHM6Ly90b3J0ZmVhc2VyLmR1Y2tkbnMub3JnIiwiY2xpZW50SWQiOiJodHRwczovL3RvcnRmZWFzZXIuZHVja2Rucy5vcmcvIn0%3D
Screen (1280px x 1680px)

3916 milliseconds

Screenshot Desktop - https://tortfeaser.duckdns.org/auth/authorize?response_type=code&redirect_uri=https%3A%2F%2Ftortfeaser.duckdns.org%2F%3Fauth_callback%3D1&client_id=https%3A%2F%2Ftortfeaser.duckdns.org%2F&state=eyJoYXNzVXJsIjoiaHR0cHM6Ly90b3J0ZmVhc2VyLmR1Y2tkbnMub3JnIiwiY2xpZW50SWQiOiJodHRwczovL3RvcnRmZWFzZXIuZHVja2Rucy5vcmcvIn0%3D

Mobile- and other Chrome-Checks

widthheight
visual Viewport412732
content Size412732

Good: No horizontal scrollbar. Content-size width = visual Viewport width.

Chrome-Connection: secure. secure connection settings. The connection to this site is encrypted and authenticated using TLS 1.3, X25519, and AES_256_GCM.

Chrome-Resources : secure. all served securely. All resources on this page are served securely.

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://tortfeaser.duckdns.org/
124.148.112.120
-2

2.030
V
ConnectFailure - Unable to connect to the remote server

• http://www.tortfeaser.duckdns.org/
124.148.112.120
-2

2.034
V
ConnectFailure - Unable to connect to the remote server

• https://tortfeaser.duckdns.org/
124.148.112.120 No GZip used - 1718 / 3449 - 49.81 % possible
Inline-JavaScript (∑/total): 6/1284 Inline-CSS (∑/total): 2/421
200

Html is minified: 171.59 %
6.920
N
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 17)
</home-assistant>
Content-Type: text/html; charset=utf-8
Content-Length: 3449
Date: Thu, 22 Jul 2021 04:08:19 GMT
Server: Python/3.9 aiohttp/3.7.4.post0
Connection: close

• https://www.tortfeaser.duckdns.org/
124.148.112.120 No GZip used - 1718 / 3449 - 49.81 % possible
Inline-JavaScript (∑/total): 6/1284 Inline-CSS (∑/total): 2/421
200

Html is minified: 171.59 %
6.466
N
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 17)
</home-assistant>
Content-Type: text/html; charset=utf-8
Content-Length: 3449
Date: Thu, 22 Jul 2021 04:08:27 GMT
Server: Python/3.9 aiohttp/3.7.4.post0
Connection: close

• http://tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
124.148.112.120
-2

2.017
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• http://www.tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
124.148.112.120
-2

2.047
V
ConnectFailure - Unable to connect to the remote server
Visible Content:

• https://124.148.112.120/
124.148.112.120 No GZip used - 1718 / 3449 - 49.81 % possible
Inline-JavaScript (∑/total): 6/1284 Inline-CSS (∑/total): 2/421
200

Html is minified: 171.59 %
6.467
N
Certificate error: RemoteCertificateNameMismatch
small visible content (num chars: 17)
</home-assistant>
Content-Type: text/html; charset=utf-8
Content-Length: 3449
Date: Thu, 22 Jul 2021 04:08:39 GMT
Server: Python/3.9 aiohttp/3.7.4.post0
Connection: close

7. Comments


1. General Results, most used to calculate the result

Aname "tortfeaser.duckdns.org" is domain, public suffix is ".duckdns.org", top-level-domain is ".org", top-level-domain-type is "generic", tld-manager is "Public Interest Registry (PIR)", num .org-domains preloaded: 5296 (complete: 151507)
Agood: All ip addresses are public addresses
Warning: Only one ip address found: tortfeaser.duckdns.org has only one ip address.
Warning: Only one ip address found: www.tortfeaser.duckdns.org has only one ip address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: tortfeaser.duckdns.org has no ipv6 address.
Warning: No ipv6 address found. Ipv6 is the future with a lot of new features. So every domain name should have an ipv6 address. See https://en.wikipedia.org/wiki/IPv6: www.tortfeaser.duckdns.org has no ipv6 address.
Agood: No asked Authoritative Name Server had a timeout
Agood: destination is https
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
AGood: All urls with http status 200/404 have a complete Content-Type header (MediaType / MediaSubType + correct charset)
Bhttps://tortfeaser.duckdns.org/ 124.148.112.120
200

Missing HSTS-Header
Bhttps://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Missing HSTS-Header
CError - no preferred version www or non-www. Select one version as preferred version, then add a redirect https + not-preferred version to https + preferred version. Perhaps in your port 443 vHost something like "RewriteEngine on" + "RewriteCond %{SERVER_NAME} = example.com" + "ReWriteRule ^ https://www.example.com%{REQUEST_URI} [END,QSA,R=permanent]" (three rows, without the "). That should create a redirect https + example.com ⇒ https + www.example.com. Or switch both values to use the non-www version as your preferred version.
CError - more then one version with Http-Status 200. After all redirects, all users (and search engines) should see the same https url: Non-www or www, but not both with http status 200.
Nhttps://tortfeaser.duckdns.org/ 124.148.112.120
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Nhttps://124.148.112.120/ 124.148.112.120
200

Error - Certificate isn't trusted, RemoteCertificateNameMismatch
Vhttp://tortfeaser.duckdns.org/ 124.148.112.120
-2

connect failure - perhaps firewall
Vhttp://www.tortfeaser.duckdns.org/ 124.148.112.120
-2

connect failure - perhaps firewall
Vhttp://tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 124.148.112.120
-2

connect failure - perhaps firewall
Vhttp://www.tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 124.148.112.120
-2

connect failure - perhaps firewall
XFatal error: Nameserver doesn't support TCP connection: ns1.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns1.duckdns.org / 99.79.143.35: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns2.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns2.duckdns.org / 35.182.183.211: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns3.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns3.duckdns.org / 35.183.157.249: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns4.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns4.duckdns.org / 3.97.51.116: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns5.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns5.duckdns.org / 99.79.16.64: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns6.duckdns.org: Timeout
XFatal error: Nameserver doesn't support TCP connection: ns6.duckdns.org / 3.97.58.28: Timeout
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain tortfeaser.duckdns.org, 1 ip addresses, 1 different http results.
Info: Checking all ip addresses of that domain without sending the hostname only one certificate found. Checking all ip addresses and sending the hostname only one certificate found. Both certificates are the same. So that domain doesn't require Server Name Indication (SNI), it's the primary certificate of that set of ip addresses.: Domain www.tortfeaser.duckdns.org, 1 ip addresses, 1 different http results.

2. DNS- and NameServer - Checks

AInfo:: 2 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 6 Name Servers.
AInfo:: 2 Queries complete, 2 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
AGood: Some ip addresses of name servers found with the minimum of two DNS Queries. One to find the TLD-Zone, one to ask the TLD-Zone.ns1.duckdns.org (99.79.143.35), ns2.duckdns.org (35.182.183.211), ns3.duckdns.org (35.183.157.249), ns4.duckdns.org (3.97.51.116), ns5.duckdns.org (99.79.16.64), ns6.duckdns.org (3.97.58.28)
AGood (1 - 3.0):: An average of 0.3 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 6 different Name Servers found: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org, 6 Name Servers included in Delegation: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org, 6 Name Servers included in 1 Zone definitions: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org, 6 Name Servers listed in SOA.Primary: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org.
Error: Different SOA.Primary Name Servers found, different SOA Definitions.: ns1.duckdns.org,ns2.duckdns.org,ns3.duckdns.org,ns4.duckdns.org,ns5.duckdns.org,ns6.duckdns.org.
AGood: SOA.Primary Name Server included in the delegation set.: ns1.duckdns.org,ns2.duckdns.org,ns3.duckdns.org,ns4.duckdns.org,ns5.duckdns.org,ns6.duckdns.org.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 6 different Name Servers found
Warning: No Name Server IPv6 address found. IPv6 is the future, so your name servers should be visible via IPv6.: 6 different Name Servers found
Warning: All Name Servers have the same Top Level Domain / Public Suffix. If there is a problem with that Top Level Domain, your domain may be affected. Better: Use Name Servers with different top level domains.: 6 Name Servers, 1 Top Level Domain: duckdns.org
Warning: All Name Servers have the same domain name. If there is a problem with that domain name (or with the name servers of that domain name), your domain may be affected. Better: Use Name Servers with different domain names / different top level domains.: Only one domain name used:
Warning: All Name Servers from the same Country / IP location.: 6 Name Servers, 1 Countries: CA
AInfo: Ipv4-Subnet-list: 6 Name Servers, 3 different subnets (first Byte): 3., 35., 99., 4 different subnets (first two Bytes): 3.97., 35.182., 35.183., 99.79., 6 different subnets (first three Bytes): 3.97.51., 3.97.58., 35.182.183., 35.183.157., 99.79.143., 99.79.16.
AGood: Name Server IPv4-addresses from different subnet found:
AGood: Nameserver supports Echo Capitalization: 6 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 6 good Nameserver
XNameserver Timeout checking EDNS512: c0.org.afilias-nst.info
Nameserver doesn't pass all EDNS-Checks: b0.org.afilias-nst.org: OP100: ok. FLAGS: ok. V1: ok. V1OP100: ok. V1FLAGS: ok. DNSSEC: ok. V1DNSSEC: ok. NSID: ok (app1.lax1.hosts.meta.redstone.afilias-nst.info-1617291490). COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.duckdns.org / 99.79.143.35: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns1.duckdns.org / 99.79.143.35: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.duckdns.org / 35.182.183.211: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns2.duckdns.org / 35.182.183.211: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.duckdns.org / 35.183.157.249: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns3.duckdns.org / 35.183.157.249: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns4.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns4.duckdns.org / 3.97.51.116: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns4.duckdns.org / 3.97.51.116: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns5.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns5.duckdns.org / 99.79.16.64: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns5.duckdns.org / 99.79.16.64: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns6.duckdns.org: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns6.duckdns.org / 3.97.58.28: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
Nameserver doesn't pass all EDNS-Checks: ns6.duckdns.org / 3.97.58.28: OP100: ok. FLAGS: ok. V1: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. V1OP100: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found, no OPT100 expected, no OPT100 found. V1FLAGS: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. DNSSEC: ok. V1DNSSEC: SOA NOT expected, but found, BADVER expected, NOERR found, Version 0 expectend and found. NSID: ok. COOKIE: ok. CLIENTSUBNET: ok.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

3. Content- and Performance-critical Checks

http://tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 124.148.112.120
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://www.tortfeaser.duckdns.org/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 124.148.112.120
-2

Fatal: Check of /.well-known/acme-challenge/random-filename is blocked, http connection error. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: https result with status 200 and size greater then 1024 Bytes without GZip found. Add GZip support so the html content is compressed.
https://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: https result with status 200 and size greater then 1024 Bytes without GZip found. Add GZip support so the html content is compressed.
https://124.148.112.120/ 124.148.112.120
200

Warning: https result with status 200 and size greater then 1024 Bytes without GZip found. Add GZip support so the html content is compressed.
https://tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://124.148.112.120/ 124.148.112.120
200

Warning: Https + http status 200 + Inline CSS / JavaScript found. Don't use inline CSS / JavaScript. These are compiled and re-used ressources, save these with a long Cache-Control max-age - header.
https://tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://124.148.112.120/ 124.148.112.120
200

Warning: Https result with status 200 found, Html-Content is too big. Should be max. 110 %. May contain inline CSS / JavaScript, too much comments or white space. Re-used ressources - create files with a long Cache-Control max-age header. Remove comments and white space.
https://tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://www.tortfeaser.duckdns.org/ 124.148.112.120
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
https://124.148.112.120/ 124.148.112.120
200

Warning: Https connections (Standard Port 443) found without support of the http/2 protocol via ALPN. Http/2 is the new Http-Version (old: http 1.1) with some important new features. Update your server software so http/2 is available. Only one TCP-connection per Server (that's a performance boost), Header-Compression and Server Pushs are available. Domain Sharding and Inline-CSS/Javascript shouldn't used with http/2.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 1516180 milliseconds, 1516.180 seconds


8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
tortfeaser.duckdns.org
124.148.112.120
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
tortfeaser.duckdns.org
124.148.112.120
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=tortfeaser.crabdance.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


www.tortfeaser.duckdns.org
124.148.112.120
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

www.tortfeaser.duckdns.org
124.148.112.120
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=tortfeaser.crabdance.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


124.148.112.120
124.148.112.120
443
name does not match
Tls12
ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok

124.148.112.120
124.148.112.120
443
name does not match
Tls12

ECDH Ephermal
255
Aes256
256
Sha384
error checking OCSP stapling
ok
no http/2 via ALPN 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no http/2 via ALPN
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
Chain (complete)
1CN=tortfeaser.crabdance.com

2CN=R3, O=Let's Encrypt, C=US

3CN=ISRG Root X1, O=Internet Security Research Group, C=US


9. Certificates

1.
1.
CN=tortfeaser.crabdance.com
22.07.2021
20.10.2021
expires in 78 days
tortfeaser.crabdance.com - 1 entry
1.
1.
CN=tortfeaser.crabdance.com
22.07.2021

20.10.2021
expires in 78 days
tortfeaser.crabdance.com - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:040E4FDBC5170C3689A91733319E2753049C
Thumbprint:847C2A85DF1AC152DC250F3D664CBD9545101DDB
SHA256 / Certificate:jM1kiLONW5aWbWM+Zz23GZUZ7goDj0G3wWO89GFJo3g=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0c62251de22f50a1bb1a3ea0ba46908d64b804f82a2c4f452f862836a5104607
SHA256 hex / Subject Public Key Information (SPKI):c179f8d965082c7fbc0225ac42645128a211ea29e0ffe0b718072a3c2ecb0040
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


2.
CN=tortfeaser.crabdance.com
22.07.2021
20.10.2021
expires in 78 days
tortfeaser.crabdance.com - 1 entry

2.
CN=tortfeaser.crabdance.com
22.07.2021

20.10.2021
expires in 78 days
tortfeaser.crabdance.com - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:040E4FDBC5170C3689A91733319E2753049C
Thumbprint:847C2A85DF1AC152DC250F3D664CBD9545101DDB
SHA256 / Certificate:jM1kiLONW5aWbWM+Zz23GZUZ7goDj0G3wWO89GFJo3g=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0c62251de22f50a1bb1a3ea0ba46908d64b804f82a2c4f452f862836a5104607
SHA256 hex / Subject Public Key Information (SPKI):c179f8d965082c7fbc0225ac42645128a211ea29e0ffe0b718072a3c2ecb0040
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


3.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1504 days


3.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1504 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


4.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 1504 days


4.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 1504 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)


5.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
20.01.2021
30.09.2024
expires in 1154 days


5.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
20.01.2021

30.09.2024
expires in 1154 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:4001772137D4E942B8EE76AA3C640AB7
Thumbprint:933C6DDEE95C9C41A40F9F50493D82BE03AD87BF
SHA256 / Certificate:bZn7Jl6xxbN0R2X8vGSPPNjhv/r9xML5m51Hz3/xwk8=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:


6.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 5053 days


6.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 5053 days


KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):e08f5907885b2cdda941938dde3ce12cc4a121e362bb95aa124d4ee3385c998f
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



7.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000
30.09.2021
expires in 58 days


7.
CN=DST Root CA X3, O=Digital Signature Trust Co.
30.09.2000

30.09.2021
expires in 58 days


KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA-1 with RSA Encryption
Serial Number:44AFB080D6A327BA893039862EF8406B
Thumbprint:DAC9024F54D8F6DF94935FB1732638CA6AD77C13
SHA256 / Certificate:BocmAzGnJAPZCfEF5pvPDTLhvSST/8bZIG0RvNZ3Bzk=
SHA256 hex / Cert (DANE * 0 1):0687260331a72403d909f105e69bcf0d32e1bd2493ffc6d9206d11bcd6770739
SHA256 hex / PublicKey (DANE * 1 1):563b3caf8cfef34c2335caf560a7a95906e8488462eb75ac59784830df9e5b2b
SHA256 hex / Subject Public Key Information (SPKI):29cc40db5e2de462a311cbbafaa1dc466960002335ecdf3317f2cd05c1d0bedf
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:



10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found


2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > 2019 are listed

Issuerlast 7 daysactivenum Certs
CN=R3, O=Let's Encrypt, C=US
0 /0 new
0
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
4348741611
leaf cert
CN=R3, O=Let's Encrypt, C=US
2021-04-09 03:07:23
2021-07-08 03:07:23
thekellys.duckdns.org, tortfeaser.crabdance.com, tortfeaser.duckdns.org
3 entries



11. Html-Content - Entries

Summary

Subresource Integrity (SRI)
DomainnameHtmlElementrel/property∑ size∑ problems∑ int.∑ ext.∑ Origin poss.∑ SRI ParseErrors∑ SRI valid∑ SRI missing
https://tortfeaser.duckdns.org/
124.148.112.120
link
other
6
22,730 Bytes
0
3
0
0
0
0


meta
apple
4

0


0
0
0


meta
other
11
10,922 Bytes
0
4
0
0
0
0

https://www.tortfeaser.duckdns.org/
124.148.112.120
link
other
6
22,730 Bytes
0
3
0
0
0
0


meta
apple
4

0


0
0
0


meta
other
11
10,922 Bytes
0
4
0
0
0
0

https://124.148.112.120/
124.148.112.120
link
other
6

0


0
0
0


meta
apple
4

0


0
0
0


meta
other
11

0


0
0
0

Details

DomainnameHtml-Elementname/equiv/ property/relhref/src/contentHttpStatusmsgStatus
https://tortfeaser.duckdns.org/
124.148.112.120
link
apple-touch-icon
/static/icons/favicon-apple-180x180.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 4340 Bytes






link
icon
/static/icons/favicon.ico
200

1
ok
image/x-icon, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 16800 Bytes






link
manifest
/manifest.json


1
ok








link
mask-icon
/static/icons/mask-icon.svg
200

1
ok
image/svg+xml, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 1590 Bytes






link
modulepreload
/frontend_latest/app.62541dd1.js


1
ok








link
modulepreload
/frontend_latest/core.821a37cc.js


1
ok








meta

utf-8


1
ok








meta
apple-itunes-app
app-id=1099568401


1
ok








meta
apple-mobile-web-app-capable
yes


1
ok








meta
apple-mobile-web-app-status-bar-style
default


1
ok








meta
apple-mobile-web-app-title
Home Assistant


1
ok








meta
color-scheme
dark light


1
ok








meta
mobile-web-app-capable
yes


1
ok








meta
msapplication-square150x150logo
/static/icons/tile-win-150x150.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 2139 Bytes






meta
msapplication-square310x310logo
/static/icons/tile-win-310x310.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 5312 Bytes






meta
msapplication-square70x70logo
/static/icons/tile-win-70x70.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 824 Bytes






meta
msapplication-TileColor
#03a9f4ff


1
ok








meta
msapplication-wide310x150logo
/static/icons/tile-win-310x150.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 2647 Bytes






meta
referrer
same-origin


1
ok








meta
theme-color
#03A9F4


1
ok








meta
viewport
width=device-width,user-scalable=no,viewport-fit=cover


1
ok







https://www.tortfeaser.duckdns.org/
124.148.112.120
link
apple-touch-icon
/static/icons/favicon-apple-180x180.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 4340 Bytes






link
icon
/static/icons/favicon.ico
200

1
ok
image/x-icon, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 16800 Bytes






link
manifest
/manifest.json


1
ok








link
mask-icon
/static/icons/mask-icon.svg
200

1
ok
image/svg+xml, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 1590 Bytes






link
modulepreload
/frontend_latest/app.62541dd1.js


1
ok








link
modulepreload
/frontend_latest/core.821a37cc.js


1
ok








meta

utf-8


1
ok








meta
apple-itunes-app
app-id=1099568401


1
ok








meta
apple-mobile-web-app-capable
yes


1
ok








meta
apple-mobile-web-app-status-bar-style
default


1
ok








meta
apple-mobile-web-app-title
Home Assistant


1
ok








meta
color-scheme
dark light


1
ok








meta
mobile-web-app-capable
yes


1
ok








meta
msapplication-square150x150logo
/static/icons/tile-win-150x150.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 2139 Bytes






meta
msapplication-square310x310logo
/static/icons/tile-win-310x310.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 5312 Bytes






meta
msapplication-square70x70logo
/static/icons/tile-win-70x70.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 824 Bytes






meta
msapplication-TileColor
#03a9f4ff


1
ok








meta
msapplication-wide310x150logo
/static/icons/tile-win-310x150.png
200

1
ok
image/png, missing X-Content-Type-Options nosniff

Cache-Control: public, max-age=2678400 with long duration found.
No GZip - 2647 Bytes






meta
referrer
same-origin


1
ok








meta
theme-color
#03A9F4


1
ok








meta
viewport
width=device-width,user-scalable=no,viewport-fit=cover


1
ok







https://124.148.112.120/
124.148.112.120
link
apple-touch-icon
/static/icons/favicon-apple-180x180.png


1
ok








link
icon
/static/icons/favicon.ico


1
ok








link
manifest
/manifest.json


1
ok








link
mask-icon
/static/icons/mask-icon.svg


1
ok








link
modulepreload
/frontend_latest/app.62541dd1.js


1
ok








link
modulepreload
/frontend_latest/core.821a37cc.js


1
ok








meta

utf-8


1
ok








meta
apple-itunes-app
app-id=1099568401


1
ok








meta
apple-mobile-web-app-capable
yes


1
ok








meta
apple-mobile-web-app-status-bar-style
default


1
ok








meta
apple-mobile-web-app-title
Home Assistant


1
ok








meta
color-scheme
dark light


1
ok








meta
mobile-web-app-capable
yes


1
ok








meta
msapplication-square150x150logo
/static/icons/tile-win-150x150.png


1
ok








meta
msapplication-square310x310logo
/static/icons/tile-win-310x310.png


1
ok








meta
msapplication-square70x70logo
/static/icons/tile-win-70x70.png


1
ok








meta
msapplication-TileColor
#03a9f4ff


1
ok








meta
msapplication-wide310x150logo
/static/icons/tile-win-310x150.png


1
ok








meta
referrer
same-origin


1
ok








meta
theme-color
#03A9F4


1
ok








meta
viewport
width=device-width,user-scalable=no,viewport-fit=cover


1
ok








12. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.duckdns.org, ns2.duckdns.org, ns3.duckdns.org, ns4.duckdns.org, ns5.duckdns.org, ns6.duckdns.org

QNr.DomainTypeNS used
1
org
NS
b.root-servers.net (2001:500:200::b)

Answer: a0.org.afilias-nst.info, a2.org.afilias-nst.info, b0.org.afilias-nst.org, b2.org.afilias-nst.org, c0.org.afilias-nst.info, d0.org.afilias-nst.org
2
ns1.duckdns.org: 99.79.143.35
NS
a0.org.afilias-nst.info (2001:500:e::1)

Answer: ns2.duckdns.org
35.182.183.211

Answer: ns3.duckdns.org
35.183.157.249

Answer: ns4.duckdns.org
3.97.51.116

Answer: ns5.duckdns.org
99.79.16.64

Answer: ns6.duckdns.org
3.97.58.28


13. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.tortfeaser.duckdns.org



1
0
tortfeaser.duckdns.org



1
0
duckdns.org
0

no CAA entry found
1
0
org
0

no CAA entry found
1
0


14. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
tortfeaser.duckdns.org

ok
1
0
www.tortfeaser.duckdns.org

ok
1
0
_acme-challenge.tortfeaser.duckdns.org

missing entry or wrong length
1
0
_acme-challenge.www.tortfeaser.duckdns.org

missing entry or wrong length
1
0
_acme-challenge.tortfeaser.duckdns.org.tortfeaser.duckdns.org

perhaps wrong
1
0
_acme-challenge.www.tortfeaser.duckdns.org.tortfeaser.duckdns.org

perhaps wrong
1
0
_acme-challenge.www.tortfeaser.duckdns.org.www.tortfeaser.duckdns.org

perhaps wrong
1
0


15. Portchecks

Domain or IPPortDescriptionResultAnswer
tortfeaser.duckdns.org
21
FTP



tortfeaser.duckdns.org
21
FTP



tortfeaser.duckdns.org
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

tortfeaser.duckdns.org
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

tortfeaser.duckdns.org
25
SMTP



tortfeaser.duckdns.org
25
SMTP



tortfeaser.duckdns.org
53
DNS



tortfeaser.duckdns.org
53
DNS



tortfeaser.duckdns.org
110
POP3



tortfeaser.duckdns.org
110
POP3



tortfeaser.duckdns.org
143
IMAP



tortfeaser.duckdns.org
143
IMAP



tortfeaser.duckdns.org
465
SMTP (encrypted)



tortfeaser.duckdns.org
465
SMTP (encrypted)



tortfeaser.duckdns.org
587
SMTP (encrypted, submission)



tortfeaser.duckdns.org
587
SMTP (encrypted, submission)



tortfeaser.duckdns.org
993
IMAP (encrypted)



tortfeaser.duckdns.org
993
IMAP (encrypted)



tortfeaser.duckdns.org
995
POP3 (encrypted)



tortfeaser.duckdns.org
995
POP3 (encrypted)



tortfeaser.duckdns.org
1433
MS SQL



tortfeaser.duckdns.org
1433
MS SQL



tortfeaser.duckdns.org
2082
cPanel (http)



tortfeaser.duckdns.org
2082
cPanel (http)



tortfeaser.duckdns.org
2083
cPanel (https)



tortfeaser.duckdns.org
2083
cPanel (https)



tortfeaser.duckdns.org
2086
WHM (http)



tortfeaser.duckdns.org
2086
WHM (http)



tortfeaser.duckdns.org
2087
WHM (https)



tortfeaser.duckdns.org
2087
WHM (https)



tortfeaser.duckdns.org
2089
cPanel Licensing



tortfeaser.duckdns.org
2089
cPanel Licensing



tortfeaser.duckdns.org
2095
cPanel Webmail (http)



tortfeaser.duckdns.org
2095
cPanel Webmail (http)



tortfeaser.duckdns.org
2096
cPanel Webmail (https)



tortfeaser.duckdns.org
2096
cPanel Webmail (https)



tortfeaser.duckdns.org
2222
DirectAdmin (http)



tortfeaser.duckdns.org
2222
DirectAdmin (http)



tortfeaser.duckdns.org
2222
DirectAdmin (https)



tortfeaser.duckdns.org
2222
DirectAdmin (https)



tortfeaser.duckdns.org
3306
mySql



tortfeaser.duckdns.org
3306
mySql



tortfeaser.duckdns.org
5224
Plesk Licensing



tortfeaser.duckdns.org
5224
Plesk Licensing



tortfeaser.duckdns.org
5432
PostgreSQL



tortfeaser.duckdns.org
5432
PostgreSQL



tortfeaser.duckdns.org
8080
Ookla Speedtest (http)
open
http://tortfeaser.duckdns.org:8080/
Http-Status: 200

tortfeaser.duckdns.org
8080
Ookla Speedtest (http)
open
http://tortfeaser.duckdns.org:8080/
Http-Status: 200

tortfeaser.duckdns.org
8080
Ookla Speedtest (https)
open
https://tortfeaser.duckdns.org:8080/
Http-Status: -14
Timeout - The operation has timed out

tortfeaser.duckdns.org
8080
Ookla Speedtest (https)
open
https://tortfeaser.duckdns.org:8080/
Http-Status: -14
Timeout - The operation has timed out

tortfeaser.duckdns.org
8083
VestaCP http



tortfeaser.duckdns.org
8083
VestaCP http



tortfeaser.duckdns.org
8083
VestaCP https



tortfeaser.duckdns.org
8083
VestaCP https



tortfeaser.duckdns.org
8443
Plesk Administration (https)



tortfeaser.duckdns.org
8443
Plesk Administration (https)



tortfeaser.duckdns.org
8447
Plesk Installer + Updates



tortfeaser.duckdns.org
8447
Plesk Installer + Updates



tortfeaser.duckdns.org
8880
Plesk Administration (http)



tortfeaser.duckdns.org
8880
Plesk Administration (http)



tortfeaser.duckdns.org
10000
Webmin (http)



tortfeaser.duckdns.org
10000
Webmin (http)



tortfeaser.duckdns.org
10000
Webmin (https)



tortfeaser.duckdns.org
10000
Webmin (https)



www.tortfeaser.duckdns.org
21
FTP



www.tortfeaser.duckdns.org
21
FTP



www.tortfeaser.duckdns.org
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

www.tortfeaser.duckdns.org
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

www.tortfeaser.duckdns.org
25
SMTP



www.tortfeaser.duckdns.org
25
SMTP



www.tortfeaser.duckdns.org
53
DNS



www.tortfeaser.duckdns.org
53
DNS



www.tortfeaser.duckdns.org
110
POP3



www.tortfeaser.duckdns.org
110
POP3



www.tortfeaser.duckdns.org
143
IMAP



www.tortfeaser.duckdns.org
143
IMAP



www.tortfeaser.duckdns.org
465
SMTP (encrypted)



www.tortfeaser.duckdns.org
465
SMTP (encrypted)



www.tortfeaser.duckdns.org
587
SMTP (encrypted, submission)



www.tortfeaser.duckdns.org
587
SMTP (encrypted, submission)



www.tortfeaser.duckdns.org
993
IMAP (encrypted)



www.tortfeaser.duckdns.org
993
IMAP (encrypted)



www.tortfeaser.duckdns.org
995
POP3 (encrypted)



www.tortfeaser.duckdns.org
995
POP3 (encrypted)



www.tortfeaser.duckdns.org
1433
MS SQL



www.tortfeaser.duckdns.org
1433
MS SQL



www.tortfeaser.duckdns.org
2082
cPanel (http)



www.tortfeaser.duckdns.org
2082
cPanel (http)



www.tortfeaser.duckdns.org
2083
cPanel (https)



www.tortfeaser.duckdns.org
2083
cPanel (https)



www.tortfeaser.duckdns.org
2086
WHM (http)



www.tortfeaser.duckdns.org
2086
WHM (http)



www.tortfeaser.duckdns.org
2087
WHM (https)



www.tortfeaser.duckdns.org
2087
WHM (https)



www.tortfeaser.duckdns.org
2089
cPanel Licensing



www.tortfeaser.duckdns.org
2089
cPanel Licensing



www.tortfeaser.duckdns.org
2095
cPanel Webmail (http)



www.tortfeaser.duckdns.org
2095
cPanel Webmail (http)



www.tortfeaser.duckdns.org
2096
cPanel Webmail (https)



www.tortfeaser.duckdns.org
2096
cPanel Webmail (https)



www.tortfeaser.duckdns.org
2222
DirectAdmin (http)



www.tortfeaser.duckdns.org
2222
DirectAdmin (http)



www.tortfeaser.duckdns.org
2222
DirectAdmin (https)



www.tortfeaser.duckdns.org
2222
DirectAdmin (https)



www.tortfeaser.duckdns.org
3306
mySql



www.tortfeaser.duckdns.org
3306
mySql



www.tortfeaser.duckdns.org
5224
Plesk Licensing



www.tortfeaser.duckdns.org
5224
Plesk Licensing



www.tortfeaser.duckdns.org
5432
PostgreSQL



www.tortfeaser.duckdns.org
5432
PostgreSQL



www.tortfeaser.duckdns.org
8080
Ookla Speedtest (http)
open
http://www.tortfeaser.duckdns.org:8080/
Http-Status: 200

www.tortfeaser.duckdns.org
8080
Ookla Speedtest (http)
open
http://www.tortfeaser.duckdns.org:8080/
Http-Status: 200

www.tortfeaser.duckdns.org
8080
Ookla Speedtest (https)
open
https://www.tortfeaser.duckdns.org:8080/
Http-Status: -14
Timeout - The operation has timed out

www.tortfeaser.duckdns.org
8080
Ookla Speedtest (https)
open
https://www.tortfeaser.duckdns.org:8080/
Http-Status: -14
Timeout - The operation has timed out

www.tortfeaser.duckdns.org
8083
VestaCP http



www.tortfeaser.duckdns.org
8083
VestaCP http



www.tortfeaser.duckdns.org
8083
VestaCP https



www.tortfeaser.duckdns.org
8083
VestaCP https



www.tortfeaser.duckdns.org
8443
Plesk Administration (https)



www.tortfeaser.duckdns.org
8443
Plesk Administration (https)



www.tortfeaser.duckdns.org
8447
Plesk Installer + Updates



www.tortfeaser.duckdns.org
8447
Plesk Installer + Updates



www.tortfeaser.duckdns.org
8880
Plesk Administration (http)



www.tortfeaser.duckdns.org
8880
Plesk Administration (http)



www.tortfeaser.duckdns.org
10000
Webmin (http)



www.tortfeaser.duckdns.org
10000
Webmin (http)



www.tortfeaser.duckdns.org
10000
Webmin (https)



www.tortfeaser.duckdns.org
10000
Webmin (https)



124.148.112.120
21
FTP



124.148.112.120
21
FTP



124.148.112.120
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

124.148.112.120
22
SSH
open
SSH-2.0-OpenSSH_8.2 FreeBSD-openssh-portable-8.2.p1_1,1

124.148.112.120
25
SMTP



124.148.112.120
25
SMTP



124.148.112.120
53
DNS



124.148.112.120
53
DNS



124.148.112.120
110
POP3



124.148.112.120
110
POP3



124.148.112.120
143
IMAP



124.148.112.120
143
IMAP



124.148.112.120
465
SMTP (encrypted)



124.148.112.120
465
SMTP (encrypted)



124.148.112.120
587
SMTP (encrypted, submission)



124.148.112.120
587
SMTP (encrypted, submission)



124.148.112.120
993
IMAP (encrypted)



124.148.112.120
993
IMAP (encrypted)



124.148.112.120
995
POP3 (encrypted)



124.148.112.120
995
POP3 (encrypted)



124.148.112.120
1433
MS SQL



124.148.112.120
1433
MS SQL



124.148.112.120
2082
cPanel (http)



124.148.112.120
2082
cPanel (http)



124.148.112.120
2083
cPanel (https)



124.148.112.120
2083
cPanel (https)



124.148.112.120
2086
WHM (http)



124.148.112.120
2086
WHM (http)



124.148.112.120
2087
WHM (https)



124.148.112.120
2087
WHM (https)



124.148.112.120
2089
cPanel Licensing



124.148.112.120
2089
cPanel Licensing



124.148.112.120
2095
cPanel Webmail (http)



124.148.112.120
2095
cPanel Webmail (http)



124.148.112.120
2096
cPanel Webmail (https)



124.148.112.120
2096
cPanel Webmail (https)



124.148.112.120
2222
DirectAdmin (http)



124.148.112.120
2222
DirectAdmin (http)



124.148.112.120
2222
DirectAdmin (https)



124.148.112.120
2222
DirectAdmin (https)



124.148.112.120
3306
mySql



124.148.112.120
3306
mySql



124.148.112.120
5224
Plesk Licensing



124.148.112.120
5224
Plesk Licensing



124.148.112.120
5432
PostgreSQL



124.148.112.120
5432
PostgreSQL



124.148.112.120
8080
Ookla Speedtest (http)
open
http://124.148.112.120:8080/
Http-Status: 200

124.148.112.120
8080
Ookla Speedtest (http)
open
http://124.148.112.120:8080/
Http-Status: 200

124.148.112.120
8080
Ookla Speedtest (https)
open
https://124.148.112.120:8080/
Http-Status: -14
Timeout - The operation has timed out

124.148.112.120
8080
Ookla Speedtest (https)
open
https://124.148.112.120:8080/
Http-Status: -14
Timeout - The operation has timed out

124.148.112.120
8083
VestaCP http



124.148.112.120
8083
VestaCP http



124.148.112.120
8083
VestaCP https



124.148.112.120
8083
VestaCP https



124.148.112.120
8443
Plesk Administration (https)



124.148.112.120
8443
Plesk Administration (https)



124.148.112.120
8447
Plesk Installer + Updates



124.148.112.120
8447
Plesk Installer + Updates



124.148.112.120
8880
Plesk Administration (http)



124.148.112.120
8880
Plesk Administration (http)



124.148.112.120
10000
Webmin (http)



124.148.112.120
10000
Webmin (http)



124.148.112.120
10000
Webmin (https)



124.148.112.120
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=ced8fab4-77a4-4983-9312-687e100bdb84


Last Result: https://check-your-website.server-daten.de/?q=tortfeaser.duckdns.org - 2021-07-22 05:45:19


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=tortfeaser.duckdns.org" target="_blank">Check this Site: tortfeaser.duckdns.org</a>