Check DNS, Urls + Redirects, Certificates and Content of your Website


 

 

N

 

No trusted Certificate

 

Checked:
11.06.2024 11:37:15

 

Older results

No older results found

 

1. IP-Addresses

HostTypeIP-Addressis auth.∑ Queries∑ Timeout
vijffm.dynv6.net
A
79.194.41.7
Oberursel/Hesse/Germany (DE) - Deutsche Telekom AG
Hostname: p4fc22907.dip0.t-ipconnect.de
yes
1
0

AAAA
2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
Oberursel/Hesse/Germany (DE) - Deutsche Telekom AG

yes


www.vijffm.dynv6.net
A

yes
1
0

AAAA

yes


*.vijffm.dynv6.net
A

yes



AAAA

yes



CNAME

yes


 

2. DNSSEC

Zone (*)DNSSEC - Informations


Zone: (root)

(root)
1 DS RR published






DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=






Status: Valid because published






2 DNSKEY RR found






Public Key with Algorithm 8, KeyTag 5613, Flags 256






Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 01.07.2024, 00:00:00 +, Signature-Inception: 10.06.2024, 00:00:00 +, KeyTag 20326, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: net

net
1 DS RR in the parent zone found






DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=






1 RRSIG RR to validate DS RR found






RRSIG-Owner net., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 24.06.2024, 05:00:00 +, Signature-Inception: 11.06.2024, 04:00:00 +, KeyTag 5613, Signer-Name: (root)






Status: Good - Algorithmus 8 and DNSKEY with KeyTag 5613 used to validate the DS RRSet in the parent zone






2 DNSKEY RR found






Public Key with Algorithm 13, KeyTag 37331, Flags 257 (SEP = Secure Entry Point)






Public Key with Algorithm 13, KeyTag 51809, Flags 256






1 RRSIG RR to validate DNSKEY RR found






RRSIG-Owner net., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.06.2024, 14:10:35 +, Signature-Inception: 06.06.2024, 14:05:35 +, KeyTag 37331, Signer-Name: net






Status: Good - Algorithmus 13 and DNSKEY with KeyTag 37331 used to validate the DNSKEY RRSet






Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 37331, DigestType 2 and Digest "LwvsLW95370dCP0ho6+S0OOaS57x4/QRH/8oJJDaRTs=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone



Zone: dynv6.net

dynv6.net
0 DS RR in the parent zone found






DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "oi6dibn2el5qkpkjhc77dnl9s59ed5um" between the hashed NSEC3-owner "oi6cludaiu72nfec7u7pro4pf4rbh4j8" and the hashed NextOwner "oi6dq5hihdm2r3817tage1dta7apnc8m". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: NS, DS, RRSIG Validated: RRSIG-Owner oi6cludaiu72nfec7u7pro4pf4rbh4j8.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 15.06.2024, 06:58:35 +, Signature-Inception: 08.06.2024, 05:48:35 +, KeyTag 51809, Signer-Name: net






DS-Query in the parent zone sends valid NSEC3 RR with the Hash "a1rt98bs5qgc9nfi51s9hci47uljg6jh" as Owner. That's the Hash of "net" with the NextHashedOwnerName "a1rtlnpgulogn7b9a62shje1u3ttp8dr". So that domain name is the Closest Encloser of "dynv6.net". Opt-Out: True.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner a1rt98bs5qgc9nfi51s9hci47uljg6jh.net., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 17.06.2024, 06:55:16 +, Signature-Inception: 10.06.2024, 05:45:16 +, KeyTag 51809, Signer-Name: net






0 DNSKEY RR found









Zone: vijffm.dynv6.net

vijffm.dynv6.net
0 DS RR in the parent zone found






0 DNSKEY RR found









Zone: www.vijffm.dynv6.net

www.vijffm.dynv6.net
0 DS RR in the parent zone found

 

3. Name Servers

DomainNameserverNS-IP
www.vijffm.dynv6.net
  ns1.dynv6.net

vijffm.dynv6.net
  ns1.dynv6.com
95.216.144.82
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


 
2a01:4f9:c010:95b::
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


  ns1.dynv6.net
95.216.144.82
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


 
2a01:4f9:c010:95b::
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


  ns2.dynv6.com
5.45.100.251
Nuremberg/Bavaria/Germany (DE) - netcup GmbH


 
2a03:4000:6:569::
Nuremberg/Bavaria/Germany (DE) - netcup GmbH


  ns3.dynv6.com
159.69.43.243
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:1c1c:4c96::
Leverkusen/North Rhine-Westphalia/Germany (DE) - Hetzner Online GmbH

dynv6.net
  ns1.dynv6.com
95.216.144.82
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


 
2a01:4f9:c010:95b::
Helsinki/Uusimaa/Finland (FI) - Hetzner Online GmbH


  ns2.dynv6.net
5.45.100.251
Nuremberg/Bavaria/Germany (DE) - netcup GmbH


 
2a03:4000:6:569::
Nuremberg/Bavaria/Germany (DE) - netcup GmbH


  ns3.dynv6.net
159.69.43.243
Nuremberg/Bavaria/Germany (DE) - Hetzner Online GmbH


 
2a01:4f8:1c1c:4c96::
Leverkusen/North Rhine-Westphalia/Germany (DE) - Hetzner Online GmbH

net
  a.gtld-servers.net / nnn1-par6


  b.gtld-servers.net / nnn1-elwaw4


  c.gtld-servers.net / nnn1-par6


  d.gtld-servers.net / nnn1-par6


  e.gtld-servers.net / nnn1-defra-5


  f.gtld-servers.net / nnn1-defra-4


  g.gtld-servers.net / nnn1-defra-4


  h.gtld-servers.net / nnn1-defra-4


  i.gtld-servers.net / nnn1-defra-4


  j.gtld-servers.net / nnn1-frmrs-2


  k.gtld-servers.net / nnn1-ein3


  l.gtld-servers.net / nnn1-frmrs-2


  m.gtld-servers.net / nnn1-ein1

 

4. SOA-Entries


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1718098609
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:7


Domain:net
Zone-Name:net
Primary:a.gtld-servers.net
Mail:nstld.verisign-grs.com
Serial:1718098629
Refresh:1800
Retry:900
Expire:604800
TTL:86400
num Entries:6


Domain:dynv6.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:6


Domain:vijffm.dynv6.net
Zone-Name:vijffm.dynv6.net
Primary:ns1.dynv6.net
Mail:hostmaster.dyvn6.net
Serial:0
Refresh:3600
Retry:900
Expire:604800
TTL:180
num Entries:8


Domain:www.vijffm.dynv6.net
Zone-Name:
Primary:
Mail:
Serial:
Refresh:
Retry:
Expire:
TTL:
num Entries:1


5. Screenshots

No Screenshot listed, because no screenshot found. Perhaps the check is too old, the feature startet 2019-12-23.

 

 

6. Url-Checks


:

:
DomainnameHttp-StatusredirectSec.G
• http://vijffm.dynv6.net/
79.194.41.7
302
https://vijffm.dynv6.net/
Html is minified: 100.00 %
0.030
A
Date: Tue, 11 Jun 2024 09:38:08 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains
Location: https://vijffm.dynv6.net/
Connection: close
Content-Length: 209
Content-Type: text/html; charset=iso-8859-1

• http://vijffm.dynv6.net/
2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
-14


10.010
T
Timeout - The operation has timed out.

• https://vijffm.dynv6.net/
79.194.41.7
302
https://vijffm.dynv6.net/index.php/login

2.414
N
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Tue, 11 Jun 2024 09:38:18 GMT
Server: Apache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-ZC9CRjZ1ZVhUZGlUeFN5aTlMRURld3BodzN3OUdTTUpVa2toUGd3RnQ2Zz06UE44VGhOSFNPWlh5azBueWdjQkhPbVZLcHpCY1ZoQm1Nejl2WjNWQzh1TT0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
Cache-Control: no-store, must-revalidate, no-cache
Pragma: no-cache
Set-Cookie: oc_sessionPassphrase=Kzq4igYl9RVyLD1SAbSxYEktT2yGjNCqzkxpoSxsyRDMRd0IiOMLl9INCQ06lWW5NrvV1nZ896ZwkRGvfQlp7BnJzl%2B12cxOTjmmHRMwVyUzcCQuA6M4OfrIRS4BMov4; path=/; secure; HttpOnly; SameSite=Lax, __Host-nc_sameSiteCookielax=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=lax, __Host-nc_sameSiteCookiestrict=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=strict, oc03ggf8pkfs=pbkg0161ukc15jj64bn6ab45a3; path=/; secure; HttpOnly; SameSite=Lax
Strict-Transport-Security: max-age=15768000; includeSubDomains
Referrer-Policy: no-referrer
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: noindex, nofollow
X-XSS-Protection: 1; mode=block
Upgrade: h2, h2c
Connection: Upgrade, close
Location: https://vijffm.dynv6.net/index.php/login
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Length: 0
Content-Type: text/html; charset=UTF-8

• https://vijffm.dynv6.net/
2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
-14


10.010
T
Timeout - The operation has timed out.

• https://vijffm.dynv6.net/index.php/login

-14


10.017
T
Timeout - The operation has timed out.

• http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
79.194.41.7
Inline-JavaScript (∑/total): 0/0 Inline-CSS (∑/total): 0/0
302
https://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Html is minified: 100.00 %
Other inline scripts (∑/total): 0/0
0.034
A
Visible Content:
Date: Tue, 11 Jun 2024 09:38:31 GMT
Server: Apache
Strict-Transport-Security: max-age=15768000; includeSubDomains
Location: https://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
Connection: close
Content-Length: 278
Content-Type: text/html; charset=iso-8859-1

• http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
-14


10.010
T
Timeout - The operation has timed out.
Visible Content:

• https://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de

-14


10.014
T
Timeout - The operation has timed out.
Visible Content:

• https://79.194.41.7/
79.194.41.7
400

Html is minified: 102.70 %
2.213
N
Bad Request
Certificate error: RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Date: Tue, 11 Jun 2024 09:38:42 GMT
Server: Apache
Content-Security-Policy: default-src 'self'; script-src 'self' 'nonce-czM5dVd4Mm0yWkRYWFIxTTdGSUhld09wUjRZNE5FMk53aHlrRnZvS3p3Zz06M0VaY0lsdVVvZnY4RENrVXRHQmdPbFNRSXMxelp5eTdtbXY4VXEwem4wbz0='; style-src 'self' 'unsafe-inline'; frame-src *; img-src * data: blob:; font-src 'self' data:; media-src *; connect-src *; object-src 'none'; base-uri 'self';
Cache-Control: no-store, must-revalidate, no-cache
Pragma: no-cache
Set-Cookie: oc_sessionPassphrase=5OvfgR%2F512KjtOct3T2xrNvqjwVX%2FlW1GTmJtpJN9kdAZLtkEvW2NUJTz%2FW8zs%2BF82%2FtcR2u8mFzXmtt5lCiDPExJ7yLoz0JsqATAmPysK%2Fr3%2FFP5d4oK3y%2BxcclLFK7; path=/; secure; HttpOnly; SameSite=Lax, __Host-nc_sameSiteCookielax=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=lax, __Host-nc_sameSiteCookiestrict=true; path=/; httponly;secure; expires=Fri, 31-Dec-2100 23:59:59 GMT; SameSite=strict, oc03ggf8pkfs=r3kmmlfb6g2piflos0u3atuglf; path=/; secure; HttpOnly; SameSite=Lax
Strict-Transport-Security: max-age=15768000; includeSubDomains
Referrer-Policy: no-referrer
X-Content-Type-Options: nosniff
X-Frame-Options: SAMEORIGIN
X-Permitted-Cross-Domain-Policies: none
X-Robots-Tag: noindex, nofollow
X-XSS-Protection: 1; mode=block
Upgrade: h2, h2c
Connection: Upgrade, close
Transfer-Encoding: chunked
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Content-Type: text/html; charset=UTF-8

• https://[2003:00fb:0f1e:2400:d3ea:acd2:1b27:08e7]/
2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
-14


10.013
T
Timeout - The operation has timed out.

 

7. Comments


1. General Results, most used to calculate the result

Aname "vijffm.dynv6.net" is domain, public suffix is ".dynv6.net", top-level-domain is ".net", top-level-domain-type is "generic", tld-manager is "VeriSign Global Registry Services", num .net-domains preloaded: 9342 (complete: 245733)
AGood: All ip addresses are public addresses
AGood: Minimal 2 ip addresses per domain name found: vijffm.dynv6.net has 2 different ip addresses (authoritative).
AGood: Ipv4 and Ipv6 addresses per domain name found: vijffm.dynv6.net has 1 ipv4, 1 ipv6 addresses
AGood: No asked Authoritative Name Server had a timeout
AGood: No cookie sent via http.
AGood: every cookie sent via https is marked as secure
AGood: Every cookie has a SameSite Attribute with a correct value Strict/Lax/None
HSTS-Preload-Status: unknown. Domain never included in the Preload-list. Check https://hstspreload.org/ to learn some basics about the Google-Preload-List.
Ahttp://vijffm.dynv6.net/ 79.194.41.7
302
https://vijffm.dynv6.net/
Correct redirect http - https with the same domain name
BWarning: HSTS max-age is too short - minimum 31536000 = 365 days required, 15768000 seconds = 182 days found
CError - no version with Http-Status 200
HFatal error: No https - result with http-status 200, no encryption
Khttp://vijffm.dynv6.net/ 79.194.41.7, Status 302

http://vijffm.dynv6.net/ 2003:fb:f1e:2400:d3ea:acd2:1b27:8e7, Status -14
Configuration problem - different ip addresses with different status
Khttps://vijffm.dynv6.net/ 79.194.41.7, Status 302

https://vijffm.dynv6.net/ 2003:fb:f1e:2400:d3ea:acd2:1b27:8e7, Status -14
Configuration problem - different ip addresses with different status
Khttp://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 79.194.41.7, Status 302

http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2003:fb:f1e:2400:d3ea:acd2:1b27:8e7, Status -14
Configuration problem - different ip addresses with different status
Mhttps://79.194.41.7/ 79.194.41.7
400

Misconfiguration - main pages should never send http status 400 - 499
Nhttps://vijffm.dynv6.net/ 79.194.41.7
302
https://vijffm.dynv6.net/index.php/login
Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Nhttps://79.194.41.7/ 79.194.41.7
400

Error - Certificate isn't trusted, RemoteCertificateNameMismatch, RemoteCertificateChainErrors
Ovijffm.dynv6.net / 79.194.41.7 / 443


Old connection: Cipher Suites without Forward Secrecy (FS) found. Remove all of these Cipher Suites, use only Cipher Suites with Forward Secrecy: Starting with ECDHE- or DHE - the last "E" says: "ephemeral". Or use Tls.1.3, then all Cipher Suites use FS. 6 Cipher Suites without Forward Secrecy found
XFatal error: Nameserver doesn't support TCP connection: ns1.dynv6.com / 95.216.144.82: NXDOMAIN
XFatal error: Nameserver doesn't support TCP connection: ns1.dynv6.com / 2a01:4f9:c010:95b::: NXDOMAIN
XFatal error: Nameserver doesn't support TCP connection: ns2.dynv6.net / 5.45.100.251: NXDOMAIN
XFatal error: Nameserver doesn't support TCP connection: ns2.dynv6.net / 2a03:4000:6:569::: NXDOMAIN
XFatal error: Nameserver doesn't support TCP connection: ns3.dynv6.net / 159.69.43.243: NXDOMAIN
XFatal error: Nameserver doesn't support TCP connection: ns3.dynv6.net / 2a01:4f8:1c1c:4c96::: NXDOMAIN
AGood: More then one ip address per domain name found, checking all ip addresses the same http status and the same certificate found: Domain vijffm.dynv6.net, 2 ip addresses.
BNo _mta-sts TXT record found (mta-sts: Mail Transfer Agent Strict Transport Security - see RFC 8461). Read the result of server-daten.de (Url-Checks, Comments, Connections and DomainServiceRecords) to see a complete definition. Domainname: _mta-sts.vijffm.dynv6.net

2. Header-Checks (Cross-Origin-* headers are alpha - started 2024-06-05)

U

No https result with http status 2** or 4** (standard-check) found, no header checked.

3. DNS- and NameServer - Checks

AInfo:: 16 Root-climbing DNS Queries required to find all IPv4- and IPv6-Addresses of 4 Name Servers.
AInfo:: 16 Queries complete, 16 with IPv6, 0 with IPv4.
AGood: All DNS Queries done via IPv6.
Ok (4 - 8):: An average of 4.0 queries per domain name server required to find all ip addresses of all name servers.
AInfo:: 4 different Name Servers found: ns1.dynv6.com, ns1.dynv6.net, ns2.dynv6.com, ns3.dynv6.com, 3 Name Servers included in Delegation: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com, 3 Name Servers included in 1 Zone definitions: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com, 1 Name Servers listed in SOA.Primary: ns1.dynv6.net.
AGood: Only one SOA.Primary Name Server found.: ns1.dynv6.net.
Error: SOA.Primary Name Server not included in the delegation set.: ns1.dynv6.net.
AGood: Consistency between delegation and zone. The set of NS records served by the authoritative name servers must match those proposed for the delegation in the parent zone. Ordered list of name servers: ns1.dynv6.com, ns2.dynv6.com, ns3.dynv6.com
AGood: All Name Server Domain Names have a Public Suffix.
AGood: All Name Server Domain Names ending with a Public Suffix have minimal one IPv4- or IPv6 address.
AGood: All Name Server ip addresses are public.
AGood: Minimal 2 different name servers (public suffix and public ip address) found: 4 different Name Servers found
AGood: All name servers have ipv4- and ipv6-addresses.: 4 different Name Servers found
AGood: Name servers with different Top Level Domains / Public Suffix List entries found: 4 Name Servers, 2 Top Level Domains: com, dynv6.net
AGood: Name Servers with different domain names found.: 2 different Domains found
AGood: Name servers with different Country locations found: 4 Name Servers, 2 Countries: DE, FI
AInfo: Ipv4-Subnet-list: 4 Name Servers, 3 different subnets (first Byte): 159., 5., 95., 3 different subnets (first two Bytes): 159.69., 5.45., 95.216., 3 different subnets (first three Bytes): 159.69.43., 5.45.100., 95.216.144.
AGood: Name Server IPv4-addresses from different subnet found:
AInfo: IPv6-Subnet-list: 4 Name Servers with IPv6, 2 different subnets (first block): 2a01:, 2a03:, 3 different subnets (first two blocks): 2a01:04f8:, 2a01:04f9:, 2a03:4000:, 3 different subnets (first three blocks): 2a01:04f8:1c1c:, 2a01:04f9:c010:, 2a03:4000:0006:, 3 different subnets (first four blocks): 2a01:04f8:1c1c:4c96:, 2a01:04f9:c010:095b:, 2a03:4000:0006:0569:
AGood: Name Server IPv6 addresses from different subnets found.
AGood: Nameserver supports TCP connections: 8 good Nameserver
AGood: Nameserver supports Echo Capitalization: 8 good Nameserver
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns1.dynv6.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns1.dynv6.net
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns2.dynv6.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns2.dynv6.net
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns3.dynv6.com
XFatal error: Nameserver doesn't support EDNS with max. 512 Byte Udp payload or sends more then 512 Bytes: ns3.dynv6.net
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 95.216.144.82: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 95.216.144.82: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 2a01:4f9:c010:95b::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.com / 2a01:4f9:c010:95b::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net / 95.216.144.82: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns1.dynv6.net / 2a01:4f9:c010:95b::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.com / 5.45.100.251: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.com / 2a03:4000:6:569::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.net / 5.45.100.251: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns2.dynv6.net / 2a03:4000:6:569::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.com / 159.69.43.243: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.com / 2a01:4f8:1c1c:4c96::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.net / 159.69.43.243: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
Nameserver doesn't pass all EDNS-Checks: ns3.dynv6.net / 2a01:4f8:1c1c:4c96::: OP100: no result. FLAGS: no result. V1: no result. V1OP100: no result. V1FLAGS: no result. DNSSEC: no result. V1DNSSEC: no result. NSID: no result. COOKIE: no result. CLIENTSUBNET: no result.
AGood: All SOA have the same Serial Number
Warning: No CAA entry with issue/issuewild found, every CAA can create a certificate. Read https://en.wikipedia.org/wiki/DNS_Certification_Authority_Authorization to learn some basics about the idea of CAA. Your name server must support such an entry. Not all dns providers support CAA entries.

4. Content- and Performance-critical Checks

http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2003:fb:f1e:2400:d3ea:acd2:1b27:8e7
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
https://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de
-14

Fatal: Check of /.well-known/acme-challenge/random-filename has a timeout. Creating a Letsencrypt certificate via http-01 challenge can't work. You need a running webserver (http) and an open port 80. If it's a home server + ipv4, perhaps a correct port forwarding port 80 extern ⇒ working port intern is required. Port 80 / http can redirect to another domain port 80 or port 443, but not other ports. If it's a home server, perhaps your ISP blocks port 80. Then you may use the dns-01 challenge. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 2003:fb:f1e:2400:d3ea:acd2:1b27:8e7, Status -14

http://vijffm.dynv6.net/.well-known/acme-challenge/check-your-website-dot-server-daten-dot-de 79.194.41.7, Status 302
Fatal: Check of /.well-known/acme-challenge/random-filename has different answers checking ipv6 / ipv4. Ipv6 doesn't have the expected result http status 404 - Not Found. Creating a Letsencrypt certificate via http-01 validation may not work. Checking the validation file in /.well-known/acme-challenge Letsencrypt prefers ipv6. Two options: Remove your ipv6 / AAAA DNS entry or (better) fix your ipv6, so your webserver handles ipv6 correct. Perhaps add "Listen [::]:80". Don't use <VirtualHost ip-address:80>, switch to <VirtualHost *:80>. If you use IIS, check your bindings. Don't select a single ip address. Use this tool to check your raw ipv6 address. Add your domain name in the "Hostname" - field. Trouble creating a certificate? Use https://community.letsencrypt.org/ to ask.
AGood: All checked attribute values are enclosed in quotation marks (" or ').
AInfo: No img element found, no alt attribute checked
AGood: Domainname is not on the "Specially Designated Nationals And Blocked Persons List" (SDN). That's an US-list of individuals and companies owned or controlled by, or acting for or on behalf of, targeted countries. It also lists individuals, groups, and entities, such as terrorists and narcotics traffickers designated under programs that are not country-specific. Collectively, such individuals and companies are called "Specially Designated Nationals" or "SDNs." Their assets are blocked and U.S. persons are generally prohibited from dealing with them. So if a domain name is on that list, it's impossible to create a Letsencrypt certificate with that domain name. Check the list manual - https://www.treasury.gov/resource-center/sanctions/sdn-list/pages/default.aspx
http://vijffm.dynv6.net/ 79.194.41.7
302

Warning: HSTS header sent via http has no effect
ADuration: 290773 milliseconds, 290.773 seconds

 

8. Connections

DomainIPPortCert.ProtocolKeyExchangeStrengthCipherStrengthHashAlgorithmOCSP stapling
Domain/KeyExchangeIP/StrengthPort/CipherCert./StrengthProtocol/HashAlgorithmOCSP stapling
vijffm.dynv6.net
79.194.41.7
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
vijffm.dynv6.net
79.194.41.7
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=bwrqa1enxri0v5su.myfritz.net


2CN=R3, O=Let's Encrypt, C=US


79.194.41.7
79.194.41.7
443
Certificate/chain invalid and wrong name
Tls12
ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok

79.194.41.7
79.194.41.7
443
Certificate/chain invalid and wrong name
Tls12

ECDH Ephermal
255
Aes128
128
Sha256
not supported
ok
http/2 via ALPN supported 
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
http/2 via ALPN supported
Cert sent without SNI
Tls.1.2
no Tls.1.1
no Tls.1.0
no Ssl3
no Ssl2
Chain (complete)

1CN=bwrqa1enxri0v5su.myfritz.net


2CN=R3, O=Let's Encrypt, C=US

 

9. Certificates

1.
1.
CN=bwrqa1enxri0v5su.myfritz.net
07.03.2024
05.06.2024
162 days expired
bwrqa1enxri0v5su.myfritz.net - 1 entry
1.
1.
CN=bwrqa1enxri0v5su.myfritz.net
07.03.2024

05.06.2024
162 days expired


bwrqa1enxri0v5su.myfritz.net - 1 entry

KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:035D5939B12B08116E008BCB591150034BCC
Thumbprint:03395E1F5993BACA2362FF4A3F75C3C106D35C7B
SHA256 / Certificate:E+JeS1I5+o/LY9A8tVecUh1KulluVeIj//liuLJopJY=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):2a4554f27b1bb05408df13cb2422220354ca239c2d12c072b6faa2dd4a82f640
SHA256 hex / Subject Public Key Information (SPKI):2a4554f27b1bb05408df13cb2422220354ca239c2d12c072b6faa2dd4a82f640 (is buggy, ignore the result)
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:http://r3.o.lencr.org
OCSP - must staple:no
Certificate Transparency:yes
Enhanced Key Usage:Serverauthentifizierung (1.3.6.1.5.5.7.3.1), Clientauthentifizierung (1.3.6.1.5.5.7.3.2)


NotTimeValid: A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
RevocationStatusUnknown: The revocation function was unable to check revocation for the certificate.
OfflineRevocation: The revocation function was unable to check revocation because the revocation server was offline.


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020
15.09.2025
expires in 305 days


2.
CN=R3, O=Let's Encrypt, C=US
04.09.2020

15.09.2025
expires in 305 days




KeyalgorithmRSA encryption (2048 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:00912B084ACF0C18A753F6D62E25A75F5A
Thumbprint:A053375BFE84E8B748782C7CEE15827A6AF5A405
SHA256 / Certificate:Z63RFmsCCuYbj1/JaBPATCqliZYHloZVcqPH5zdhPf0=
SHA256 hex / Cert (DANE * 0 1):e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA256 hex / PublicKey (DANE * 1 1):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SHA256 hex / Subject Public Key Information (SPKI):8d02536c887482bc34ff54e41d2ba659bf85b341a0a20afadb5813dcfbcf286d
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Check unknown. No result 404 / 200
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:Clientauthentifizierung (1.3.6.1.5.5.7.3.2), Serverauthentifizierung (1.3.6.1.5.5.7.3.1)




3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015
04.06.2035
expires in 3854 days


3.
CN=ISRG Root X1, O=Internet Security Research Group, C=US
04.06.2015

04.06.2035
expires in 3854 days




KeyalgorithmRSA encryption (4096 bit)
Signatur:SHA256 With RSA-Encryption
Serial Number:008210CFB0D240E3594463E0BB63828B00
Thumbprint:CABD2A79A1076A31F21D253635CB039D4329A5E8
SHA256 / Certificate:lrzsBiZJdvN0YHeazyjFp8/oo8Cq4RqP/O4FwL3fCMY=
SHA256 hex / Cert (DANE * 0 1):96bcec06264976f37460779acf28c5a7cfe8a3c0aae11a8ffcee05c0bddf08c6
SHA256 hex / PublicKey (DANE * 1 1):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SHA256 hex / Subject Public Key Information (SPKI):0b9fa5a59eed715c26c1020c711b4f6ec42d58b0015e14337a39dad301c5afc3
SPKI checked via https://v1.pwnedkeys.com/spki-hash:Good: Key isn't compromised
OCSP - Url:
OCSP - must staple:no
Certificate Transparency:no
Enhanced Key Usage:




 

10. Last Certificates - Certificate Transparency Log Check

1. Source CertSpotter - active certificates (one check per day)

No CertSpotter - CT-Log entries found

 

2. Source crt.sh - old and new certificates, sometimes very slow - only certificates with "not after" > of the last months are listed

No CRT - CT-Log entries found

 

11. Html-Content - Entries

No Html-Content entries found. Only checked if https + status 200/401/403/404

 

12. Html-Parsing via https://validator.nu/ / https://validator.w3.org/nu/ (started 2024-09-28, 09:00, alpha)

  Unfortunately, there are differences between the first used validator.nu and validator.w3.org/nu/ - switched to validator.w3.org/nu/. Looks like some error messages (link - fetchpriority attribute) of validator.nu are obsolete, not seen in the w3.org-version and not found in the current specification: link may have a fetchpriority attribute.

Small Code update, wait one minute

 

13. Nameserver - IP-Adresses

Required Root-climbing DNS-Queries to find ip addresses of all Name Servers: ns1.dynv6.com, ns1.dynv6.net, ns2.dynv6.com, ns3.dynv6.com

 

QNr.DomainTypeNS used
1
com
NS
k.root-servers.net (2001:7fd::1)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
2
ns1.dynv6.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
3
net
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.gtld-servers.net, b.gtld-servers.net, c.gtld-servers.net, d.gtld-servers.net, e.gtld-servers.net, f.gtld-servers.net, g.gtld-servers.net, h.gtld-servers.net, i.gtld-servers.net, j.gtld-servers.net, k.gtld-servers.net, l.gtld-servers.net, m.gtld-servers.net
4
ns1.dynv6.net
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.dynv6.com, ns2.dynv6.net, ns3.dynv6.net

Answer: ns2.dynv6.net
2a03:4000:6:569::, 5.45.100.251

Answer: ns3.dynv6.net
159.69.43.243, 2a01:4f8:1c1c:4c96::
5
ns2.dynv6.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
6
ns3.dynv6.com
NS
a.gtld-servers.net (2001:503:a83e::2:30)

Answer: ns1.digineo.de, ns2.digineo.de, ns3.digineo.de
7
de
NS
d.root-servers.net (2001:500:2d::d)

Answer: a.nic.de, f.nic.de, l.de.net, n.de.net, s.de.net, z.nic.de
8
ns1.digineo.de: 2a03:4000:6:568::1, 5.45.100.168
NS
a.nic.de (2001:678:2::53)

Answer: ns2.digineo.de
195.201.93.228, 2a01:4f8:1c1c:5172::1

Answer: ns3.digineo.de
185.117.215.53, 2a06:8781::53
9
ns1.dynv6.com: 95.216.144.82
A
ns1.digineo.de (2a03:4000:6:568::1)
10
ns1.dynv6.com: 2a01:4f9:c010:95b::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)
11
ns1.dynv6.net: 95.216.144.82
A
ns1.dynv6.com (2a01:4f9:c010:95b::)
12
ns1.dynv6.net: 2a01:4f9:c010:95b::
AAAA
ns1.dynv6.com (2a01:4f9:c010:95b::)
13
ns2.dynv6.com: 5.45.100.251
A
ns1.digineo.de (2a03:4000:6:568::1)
14
ns2.dynv6.com: 2a03:4000:6:569::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)
15
ns3.dynv6.com: 159.69.43.243
A
ns1.digineo.de (2a03:4000:6:568::1)
16
ns3.dynv6.com: 2a01:4f8:1c1c:4c96::
AAAA
ns1.digineo.de (2a03:4000:6:568::1)

 

14. CAA - Entries

DomainnameflagNameValue∑ Queries∑ Timeout
www.vijffm.dynv6.net
0

no CAA entry found
1
0
vijffm.dynv6.net
0

no CAA entry found
1
0
dynv6.net
-3

Name Error - The domain name does not exist
1
0
net
0

no CAA entry found
1
0

 

15. TXT - Entries

DomainnameTXT EntryStatus∑ Queries∑ Timeout
vijffm.dynv6.net

ok
1
0
www.vijffm.dynv6.net

ok
1
0
_acme-challenge.vijffm.dynv6.net

missing entry or wrong length
1
0
_acme-challenge.www.vijffm.dynv6.net

missing entry or wrong length
1
0
_acme-challenge.vijffm.dynv6.net.vijffm.dynv6.net

perhaps wrong
1
0
_acme-challenge.www.vijffm.dynv6.net.vijffm.dynv6.net

perhaps wrong
1
0
_acme-challenge.www.vijffm.dynv6.net.www.vijffm.dynv6.net

perhaps wrong
1
0

 

16. DomainService - Entries

TypeDomainPrefValueDNS-errornum AnswersStatusDescription
_dmarc
TXT
_dmarc.vijffm.dynv6.net

00ok

 

 

17. Cipher Suites

Summary
DomainIPPortnum CipherstimeStd.ProtocolForward Secrecy
vijffm.dynv6.net
79.194.41.7
443
13 Ciphers56.65 sec
6 without, 7 FS
53.85 %
Complete

1
13 Ciphers
13.00 Ciphers/Check
56.65 sec56.65 sec/Check
6 without, 7 FS
53.85 %

Details
DomainIPPortCipher (OpenSsl / IANA)
vijffm.dynv6.net
79.194.41.7
443
ECDHE-RSA-CHACHA20-POLY1305
(Secure)
TLSv1.2
0xCC,0xA8
FS
13 Ciphers, 56.65 sec
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256

ECDH
RSA
CHACHA20/POLY1305(256)
AEAD




ECDHE-RSA-AES256-GCM-SHA384
(Secure)
TLSv1.2
0xC0,0x30
FS

TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384

ECDH
RSA
AESGCM(256)
AEAD




ECDHE-RSA-AES128-GCM-SHA256
(Secure)
TLSv1.2
0xC0,0x2F
FS

TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

ECDH
RSA
AESGCM(128)
AEAD




ECDHE-RSA-AES256-SHA384
(Weak)
TLSv1.2
0xC0,0x28
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384

ECDH
RSA
AES(256)
SHA384




AES256-GCM-SHA384
(Weak)
TLSv1.2
0x00,0x9D
No FS

TLS_RSA_WITH_AES_256_GCM_SHA384

RSA
RSA
AESGCM(256)
AEAD




AES256-SHA256
(Weak)
TLSv1.2
0x00,0x3D
No FS

TLS_RSA_WITH_AES_256_CBC_SHA256

RSA
RSA
AES(256)
SHA256




ECDHE-RSA-AES128-SHA256
(Weak)
TLSv1.2
0xC0,0x27
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256

ECDH
RSA
AES(128)
SHA256




AES128-GCM-SHA256
(Weak)
TLSv1.2
0x00,0x9C
No FS

TLS_RSA_WITH_AES_128_GCM_SHA256

RSA
RSA
AESGCM(128)
AEAD




AES128-SHA256
(Weak)
TLSv1.2
0x00,0x3C
No FS

TLS_RSA_WITH_AES_128_CBC_SHA256

RSA
RSA
AES(128)
SHA256




ECDHE-RSA-AES256-SHA
(Weak)
TLSv1
0xC0,0x14
FS

TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

ECDH
RSA
AES(256)
SHA1




ECDHE-RSA-AES128-SHA
(Weak)
TLSv1
0xC0,0x13
FS

TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

ECDH
RSA
AES(128)
SHA1




AES256-SHA
(Weak)
SSLv3
0x00,0x35
No FS

TLS_RSA_WITH_AES_256_CBC_SHA

RSA
RSA
AES(256)
SHA1




AES128-SHA
(Weak)
SSLv3
0x00,0x2F
No FS

TLS_RSA_WITH_AES_128_CBC_SHA

RSA
RSA
AES(128)
SHA1

 

18. Portchecks

No open Ports <> 80 / 443 found, so no additional Ports checked.

 

 

Permalink: https://check-your-website.server-daten.de/?i=c78bb303-2c16-49d6-9cc5-0086dca5fffa

 

Last Result: https://check-your-website.server-daten.de/?q=vijffm.dynv6.net - 2024-06-11 11:37:15

 

Do you like this page? Support this tool, add a link on your page:

 

<a href="https://check-your-website.server-daten.de/?q=vijffm.dynv6.net" target="_blank">Check this Site: vijffm.dynv6.net</a>

 

 

Do you really want to support this project? Donate: Check-your-website, IBAN DE98 1001 0010 0575 2211 07, SWIFT/BIC PBNKDEFF, Euro

 

QR-Code of this page - https://check-your-website.server-daten.de/?d=vijffm.dynv6.net