Check DNS, Urls + Redirects, Certificates and Content of your Website




T

Timeout

Checked:
10.12.2019 19:23:48


Older results


1. IP-Addresses

HostTIP-Addressis auth.∑ Queries∑ Timeout
unifi.avsion.com.au
A
122.106.37.27
Maroubra/New South Wales/Australia (AU) - SingTel Optus Pty Ltd
Hostname: c122-106-37-27.rosby1.nsw.optusnet.com.au
yes
1
0

AAAA

yes


www.unifi.avsion.com.au

Name Error
yes
1
0


2. DNSSEC

Zone (*)DNSSEC - Informations (beta)

Zone: (root)
(root)
1 DS RR published



Status: Valid because published



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 22545, Flags 256



1 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 31.12.2019, 00:00:00, Signature-Inception: 10.12.2019, 00:00:00, KeyTag 20326, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: au
au
4 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 23.12.2019, 17:00:00, Signature-Inception: 10.12.2019, 16:00:00, KeyTag 22545, Signer-Name: (root)



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 22545 used to validate the DS RRSet in the parent zone



3 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 18875, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 20647, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 49951, Flags 256



3 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2020, 19:25:38, Signature-Inception: 09.12.2019, 19:09:50, KeyTag 18875, Signer-Name: au



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2020, 19:25:38, Signature-Inception: 09.12.2019, 19:09:50, KeyTag 20647, Signer-Name: au



Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 08.03.2020, 19:25:38, Signature-Inception: 09.12.2019, 19:09:50, KeyTag 49951, Signer-Name: au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 18875 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20647 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 49951 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 18875, DigestType 1 and Digest "pjYtk4QpR3wPXlHh9Ho1FrOdKBs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 18875, DigestType 2 and Digest "/nc7L3e7am3TG6J+sZ6PZCV5N2Isq5jzkm7nf+or558=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20647, DigestType 1 and Digest "ocLzYCzRcc8/vNolUjwIaGfSnMY=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20647, DigestType 2 and Digest "78eXX8of7Std82JKfvq17SCvQtyD9dnsHTtMmQuOK1Q=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: com.au
com.au
2 DS RR in the parent zone found



1 RRSIG RR to validate DS RR found



Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 09.03.2020, 13:32:48, Signature-Inception: 10.12.2019, 13:32:05, KeyTag 49951, Signer-Name: au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 49951 used to validate the DS RRSet in the parent zone



2 DNSKEY RR found



Public Key with Algorithm 8, KeyTag 14185, Flags 257 (SEP = Secure Entry Point)



Public Key with Algorithm 8, KeyTag 14968, Flags 256



2 RRSIG RR to validate DNSKEY RR found



Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.12.2019, 15:17:44, Signature-Inception: 09.12.2019, 14:17:44, KeyTag 14185, Signer-Name: com.au



Algorithm: 8, 2 Labels, original TTL: 86400 sec, Signature-expiration: 30.12.2019, 15:17:44, Signature-Inception: 09.12.2019, 14:17:44, KeyTag 14968, Signer-Name: com.au



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14185 used to validate the DNSKEY RRSet



Status: Good - Algorithmus 8 and DNSKEY with KeyTag 14968 used to validate the DNSKEY RRSet



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14185, DigestType 1 and Digest "LwMkLkF6mgH36ROfYFtIzDii1FQ=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 14185, DigestType 2 and Digest "k5S+oJ9evZE4SqXNA5ems5X9KymceRKXkkPNaJujh9s=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone

Zone: avsion.com.au
avsion.com.au
0 DS RR in the parent zone found



DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed domain name between the hashed NSEC3-owner and the hashed NextOwner. So the parent zone confirmes the non-existence of a DS RR.



0 DNSKEY RR found





Zone: unifi.avsion.com.au
unifi.avsion.com.au
0 DS RR in the parent zone found



0 DNSKEY RR found





Zone: www.unifi.avsion.com.au
www.unifi.avsion.com.au
0 DS RR in the parent zone found


3. Name Servers

DomainNameserverNS-IP
www.unifi.avsion.com.au
  ns1.hosting-services.net.au

unifi.avsion.com.au
  ns1.hosting-services.net.au

avsion.com.au
  ns1.ventraip.net.au


  ns2.ventraip.net.au


  ns3.ventraip.net.au

com.au
  q.au / app17.iad1.hosts.meta.redstone.afilias-nst.info-2


  r.au / ns096b.app7.ams2.afilias-nst.info


  s.au / ns096b.app9.ams2.afilias-nst.info


  t.au / 5.fra.pch

au
  a.au / lax.01.au


  c.au / 67m24


  d.au / 67m20


  m.au


  n.au


  q.au / app9.iad1.hosts.meta.redstone.afilias-nst.info-2


  r.au / ns096b.app8.ams2.afilias-nst.info


  s.au / ns096a.app32.ams2.afilias-nst.info


  t.au / 5.fra.pch


4. SOA-Entries


Domain:au
Primary:a.au
Mail:dns.audns.net.au
Serial:2019111889
Refresh:86400
Retry:900
Expire:1209600
TTL:43200
num Entries:9


Domain:com.au
Primary:q.au
Mail:noc.afilias-nst.info
Serial:1531818431
Refresh:10800
Retry:3600
Expire:2764800
TTL:900
num Entries:4


Domain:avsion.com.au
Primary:ns1.hosting-services.net.au
Mail:servers.vip-servers.com
Serial:2019022401
Refresh:86400
Retry:7200
Expire:3600000
TTL:1800
num Entries:3


5. Url-Checks

Domainname Http-StatusredirectSec.G
• http://unifi.avsion.com.au/
122.106.37.27
-14

10.027
T
Timeout - The operation has timed out

• https://unifi.avsion.com.au/
122.106.37.27
-14

10.046
T
Timeout - The operation has timed out

• http://unifi.avsion.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
122.106.37.27
-14

10.046
T
Timeout - The operation has timed out
Visible Content:

6. Comments (GZip / Html minfied / Cache-Control is beta)

Aname "unifi.avsion.com.au" is subdomain, public suffix is "com.au", top-level-domain-type is "country-code", Country is Australia, tld-manager is ".au Domain Administration (auDA)"
Agood: All ip addresses are public addresses
Agood: No asked Authoritative Name Server had a timeout
ADNS: "Name Error" means: No www-dns-entry defined. This isn't a problem
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Nunifi.avsion.com.au:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
N122.106.37.27:8443


Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
AGood: Nameserver supports TCP connections: 3 good Nameserver
AGood: Nameserver supports Echo Capitalization: 3 good Nameserver
AGood: Nameserver supports EDNS with max. 512 Byte Udp payload, message is smaller: 3 good Nameserver
Nameserver doesn't pass all EDNS-Checks: ns1.hosting-services.net.au: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.hosting-services.net.au: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.
http://unifi.avsion.com.au/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 122.106.37.27
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
ADuration: 141067 milliseconds, 141.067 seconds


7. Connections (http/2- and additional Tls.1.0/1.1/1.2 checks are BETA)

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
unifi.avsion.com.au
unifi.avsion.com.au
8443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
unifi.avsion.com.au
unifi.avsion.com.au
8443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN Tls.1.2
Tls.1.1
no Tls.1.0
no http/2 via ALPN Tls.1.2
Tls.1.1
no Tls.1.0
Self signed certificate
1CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, C=US, ST=CA
122.106.37.27
122.106.37.27
8443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
122.106.37.27
122.106.37.27
8443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
256
Aes128
128
Sha256
error checking OCSP stapling
ok
no http/2 via ALPN Tls.1.2
Tls.1.1
no Tls.1.0
no http/2 via ALPN Tls.1.2
Tls.1.1
no Tls.1.0
Self signed certificate
1CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, C=US, ST=CA


8. Certificates

1.
1.
CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, S=CA, C=US
22.10.2019
24.01.2022
expires in 774 days
UniFi - 1 entry
1.
1.
CN=UniFi, OU=UniFi, O=ubnt.com, L=San Jose, S=CA, C=US
22.10.2019

24.01.2022
expires in 774 days
UniFi - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:5DAF38D0
Thumbprint:E34F01B2DFC649A70F15248677C3466915AACCB9
SHA256 / Certificate:uQRxAetu2gx9LNRaIcFUN961+E8/pPIQO2ynC1n0bDs=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):cd38abb50df9e28a3c501c07f067a8587bc0767dd0449821b5ce96ea48b768a6
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no

UntrustedRoot: A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider.


9. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates

Issuerlast 7 daysactivenum Certs
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
1

CertSpotter-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
803393168
leaf cert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2019-03-10 00:00:00
2021-03-09 23:59:59
unifi.avsion.com.au, www.unifi.avsion.com.au - 2 entries



2. Source crt.sh - old and new certificates, sometimes very slow (currently no newer certificates - read Crt.sh has stopped - Letsencrypt-forum - may work next week again - 2019-12-02 - but I must check the code).

Issuerlast 7 daysactivenum Certs
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
0
1
1

CRT-IdIssuernot beforenot afterDomain namesLE-Duplicatenext LE
1273468225
leaf cert
CN=Sectigo RSA Domain Validation Secure Server CA, O=Sectigo Limited, L=Salford, C=GB, ST=Greater Manchester
2019-03-09 23:00:00
2021-03-09 22:59:59
unifi.avsion.com.au, www.unifi.avsion.com.au
2 entries



10. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404


11. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
unifi.avsion.com.au
0

no CAA entry found
1
0
avsion.com.au
0

no CAA entry found
1
0
com.au
0

no CAA entry found
1
0
au
0

no CAA entry found
1
0


12. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
avsion.com.au
v=spf1 +a +mx +ip4:103.9.171.247 +ip4:27.50.66.188 +include:spf.hostedmail.net.au ~all
ok
1
0
unifi.avsion.com.au

ok
1
0
_acme-challenge.unifi.avsion.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.unifi.avsion.com.au.avsion.com.au

Name Error - The domain name does not exist
1
0
_acme-challenge.unifi.avsion.com.au.unifi.avsion.com.au

Name Error - The domain name does not exist
1
0


13. Portchecks (BETA)

Domain or IPPortDescriptionResultAnswer
unifi.avsion.com.au
21
FTP



unifi.avsion.com.au
21
FTP



unifi.avsion.com.au
22
SSH



unifi.avsion.com.au
22
SSH



unifi.avsion.com.au
25
SMTP



unifi.avsion.com.au
25
SMTP



unifi.avsion.com.au
53
DNS



unifi.avsion.com.au
53
DNS



unifi.avsion.com.au
110
POP3



unifi.avsion.com.au
110
POP3



unifi.avsion.com.au
143
IMAP



unifi.avsion.com.au
143
IMAP



unifi.avsion.com.au
465
SMTP (encrypted)



unifi.avsion.com.au
465
SMTP (encrypted)



unifi.avsion.com.au
587
SMTP (encrypted, submission)



unifi.avsion.com.au
587
SMTP (encrypted, submission)



unifi.avsion.com.au
993
IMAP (encrypted)



unifi.avsion.com.au
993
IMAP (encrypted)



unifi.avsion.com.au
995
POP3 (encrypted)



unifi.avsion.com.au
995
POP3 (encrypted)



unifi.avsion.com.au
1433
MS SQL



unifi.avsion.com.au
1433
MS SQL



unifi.avsion.com.au
2082
cPanel (http)



unifi.avsion.com.au
2082
cPanel (http)



unifi.avsion.com.au
2083
cPanel (https)



unifi.avsion.com.au
2083
cPanel (https)



unifi.avsion.com.au
2086
WHM (http)



unifi.avsion.com.au
2086
WHM (http)



unifi.avsion.com.au
2087
WHM (https)



unifi.avsion.com.au
2087
WHM (https)



unifi.avsion.com.au
2089
cPanel Licensing



unifi.avsion.com.au
2089
cPanel Licensing



unifi.avsion.com.au
2095
cPanel Webmail (http)



unifi.avsion.com.au
2095
cPanel Webmail (http)



unifi.avsion.com.au
2096
cPanel Webmail (https)



unifi.avsion.com.au
2096
cPanel Webmail (https)



unifi.avsion.com.au
2222
DirectAdmin (http)



unifi.avsion.com.au
2222
DirectAdmin (http)



unifi.avsion.com.au
2222
DirectAdmin (https)



unifi.avsion.com.au
2222
DirectAdmin (https)



unifi.avsion.com.au
3306
mySql



unifi.avsion.com.au
3306
mySql



unifi.avsion.com.au
5224
Plesk Licensing



unifi.avsion.com.au
5224
Plesk Licensing



unifi.avsion.com.au
5432
PostgreSQL



unifi.avsion.com.au
5432
PostgreSQL



unifi.avsion.com.au
8080
Ookla Speedtest (http)
open
http://unifi.avsion.com.au:8080/
Http-Status: 302
Redirect: /manage
unifi.avsion.com.au
8080
Ookla Speedtest (http)
open
http://unifi.avsion.com.au:8080/
Http-Status: 302
Redirect: /manage
unifi.avsion.com.au
8080
Ookla Speedtest (https)
open
https://unifi.avsion.com.au:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

unifi.avsion.com.au
8080
Ookla Speedtest (https)
open
https://unifi.avsion.com.au:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

unifi.avsion.com.au
8083
VestaCP http



unifi.avsion.com.au
8083
VestaCP http



unifi.avsion.com.au
8083
VestaCP https



unifi.avsion.com.au
8083
VestaCP https



unifi.avsion.com.au
8443
Plesk Administration (https)
open
https://unifi.avsion.com.au:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
unifi.avsion.com.au
8443
Plesk Administration (https)
open
https://unifi.avsion.com.au:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
unifi.avsion.com.au
8447
Plesk Installer + Updates



unifi.avsion.com.au
8447
Plesk Installer + Updates



unifi.avsion.com.au
8880
Plesk Administration (http)



unifi.avsion.com.au
8880
Plesk Administration (http)



unifi.avsion.com.au
10000
Webmin (http)



unifi.avsion.com.au
10000
Webmin (http)



unifi.avsion.com.au
10000
Webmin (https)



unifi.avsion.com.au
10000
Webmin (https)



122.106.37.27
21
FTP



122.106.37.27
21
FTP



122.106.37.27
22
SSH



122.106.37.27
22
SSH



122.106.37.27
25
SMTP



122.106.37.27
25
SMTP



122.106.37.27
53
DNS



122.106.37.27
53
DNS



122.106.37.27
110
POP3



122.106.37.27
110
POP3



122.106.37.27
143
IMAP



122.106.37.27
143
IMAP



122.106.37.27
465
SMTP (encrypted)



122.106.37.27
465
SMTP (encrypted)



122.106.37.27
587
SMTP (encrypted, submission)



122.106.37.27
587
SMTP (encrypted, submission)



122.106.37.27
993
IMAP (encrypted)



122.106.37.27
993
IMAP (encrypted)



122.106.37.27
995
POP3 (encrypted)



122.106.37.27
995
POP3 (encrypted)



122.106.37.27
1433
MS SQL



122.106.37.27
1433
MS SQL



122.106.37.27
2082
cPanel (http)



122.106.37.27
2082
cPanel (http)



122.106.37.27
2083
cPanel (https)



122.106.37.27
2083
cPanel (https)



122.106.37.27
2086
WHM (http)



122.106.37.27
2086
WHM (http)



122.106.37.27
2087
WHM (https)



122.106.37.27
2087
WHM (https)



122.106.37.27
2089
cPanel Licensing



122.106.37.27
2089
cPanel Licensing



122.106.37.27
2095
cPanel Webmail (http)



122.106.37.27
2095
cPanel Webmail (http)



122.106.37.27
2096
cPanel Webmail (https)



122.106.37.27
2096
cPanel Webmail (https)



122.106.37.27
2222
DirectAdmin (http)



122.106.37.27
2222
DirectAdmin (http)



122.106.37.27
2222
DirectAdmin (https)



122.106.37.27
2222
DirectAdmin (https)



122.106.37.27
3306
mySql



122.106.37.27
3306
mySql



122.106.37.27
5224
Plesk Licensing



122.106.37.27
5224
Plesk Licensing



122.106.37.27
5432
PostgreSQL



122.106.37.27
5432
PostgreSQL



122.106.37.27
8080
Ookla Speedtest (http)
open
http://122.106.37.27:8080/
Http-Status: 302
Redirect: /manage
122.106.37.27
8080
Ookla Speedtest (http)
open
http://122.106.37.27:8080/
Http-Status: 302
Redirect: /manage
122.106.37.27
8080
Ookla Speedtest (https)
open
https://122.106.37.27:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

122.106.37.27
8080
Ookla Speedtest (https)
open
https://122.106.37.27:8080/
Http-Status: -4
SendFailure - The underlying connection was closed: An unexpected error occurred on a send.

122.106.37.27
8083
VestaCP http



122.106.37.27
8083
VestaCP http



122.106.37.27
8083
VestaCP https



122.106.37.27
8083
VestaCP https



122.106.37.27
8443
Plesk Administration (https)
open
https://122.106.37.27:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
122.106.37.27
8443
Plesk Administration (https)
open
https://122.106.37.27:8443/
Http-Status: 302
Certificate is invalid Redirect: /manage
122.106.37.27
8447
Plesk Installer + Updates



122.106.37.27
8447
Plesk Installer + Updates



122.106.37.27
8880
Plesk Administration (http)



122.106.37.27
8880
Plesk Administration (http)



122.106.37.27
10000
Webmin (http)



122.106.37.27
10000
Webmin (http)



122.106.37.27
10000
Webmin (https)



122.106.37.27
10000
Webmin (https)





Permalink: https://check-your-website.server-daten.de/?i=b6e7e916-40c6-4bc3-be3a-8c4ff48cbbe2


Last Result: https://check-your-website.server-daten.de/?q=unifi.avsion.com.au - 2019-12-10 19:23:48


Do you like this page? Support this tool, add a link on your page:

<a href="https://check-your-website.server-daten.de/?q=unifi.avsion.com.au" target="_blank">Check this Site: unifi.avsion.com.au</a>