SSL check results of email.shipdocs.app

NEW You can also bulk check multiple servers.

Discover if the mail servers for email.shipdocs.app can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 05 Nov 2025 19:25:38 +0000

We can not guarantee a secure connection to the mailservers of email.shipdocs.app!

Please contact the operator of email.shipdocs.app and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/email.shipdocs.app

Servers

Incoming Mails

These servers are responsible for incoming mails to @email.shipdocs.app addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
email.shipdocs.app
128.140.73.213
-
supported
rcgen self signed cert
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
email.shipdocs.app
2a01:4f8:1c1a:711c::1
Results incomplete
- not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @email.shipdocs.app address so far. Test mail delivery

Certificates

First seen at:

CN=rcgen self signed cert

Certificate chain
  • rcgen self signed cert (Certificate is self-signed.)
    • remaining
    • 256 bit
    • ecdsa-with-SHA256
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • rcgen self signed cert
Common Name is not included in Alternative Names
Alternative Names
  • localhost
Issuer

Certificate is self-signed.

validity period
Not valid before
1975-01-01
Not valid after
4096-01-01
Fingerprints
SHA256
7F:98:18:FF:70:8A:C6:26:9E:3C:AE:92:CC:BB:44:EA:F1:D9:54:F6:00:22:FB:A5:97:91:D0:E9:BC:58:91:2E
SHA1
DB:1F:A0:53:41:05:11:9D:21:43:E4:01:FF:8F:0D:70:76:DC:C0:D6

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.email.shipdocs.app
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid