SSL check results of 123.st

NEW You can also bulk check multiple servers.

Discover if the mail servers for 123.st can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 20 Nov 2020 06:20:29 +0000

We can not guarantee a secure connection to the mailservers of 123.st!

Please contact the operator of 123.st and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/123.st

Servers

Incoming Mails

These servers are responsible for incoming mails to @123.st addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.maxns.net
51.255.209.246
1
supported
vps706077
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx.fakemx.net
95.216.253.132
Results incomplete
2 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @123.st address so far. Test mail delivery

Certificates

First seen at:

CN=vps706077

Certificate chain
  • vps706077 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • vps706077
Alternative Names
  • vps706077
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-10-09
Not valid after
2029-10-06
Fingerprints
SHA256
C9:32:8F:DE:3F:FE:01:C5:43:8D:24:07:14:50:D4:2F:0B:63:62:A5:45:9C:B4:D6:ED:1A:85:ED:5D:8E:8C:90
SHA1
0C:C0:FD:34:B7:01:AA:04:D8:A2:DB:76:39:6F:B3:BC:3C:6E:10:39