SSL check results of exklusive-fincas-mallorca.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for exklusive-fincas-mallorca.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 18 Oct 2025 16:41:45 +0000

The mailservers of exklusive-fincas-mallorca.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @exklusive-fincas-mallorca.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
alcudia.webseitenserver.com
2a03:4000:20:2f0:152:53:172:169
10
supported
alcudia.webseitenserver.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s
alcudia.webseitenserver.com
152.53.172.169
10
supported
alcudia.webseitenserver.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @exklusive-fincas-mallorca.de address so far. Test mail delivery

Certificates

First seen at:

CN=alcudia.webseitenserver.com

Certificate chain
  • alcudia.webseitenserver.com
    • remaining
    • 384 bit
    • ecdsa-with-SHA384

      • E8
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • alcudia.webseitenserver.com
Alternative Names
  • alcudia.webseitenserver.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E8
validity period
Not valid before
2025-09-03
Not valid after
2025-12-02
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
79:BB:47:60:E5:0B:39:EC:1E:0A:BB:17:08:77:EA:10:B4:71:A3:FE:29:31:F1:8F:68:B6:19:16:05:7F:06:D3
SHA1
61:B6:9C:5D:39:98:1E:1C:86:6B:CD:02:48:76:80:6A:12:2C:D7:8A
X509v3 extensions
subjectKeyIdentifier
  • AE:2C:30:65:CF:2C:19:9E:A2:01:A9:05:D7:C5:F2:83:7E:51:17:1A
authorityKeyIdentifier
  • keyid:8F:0D:13:A2:F6:2E:7E:D1:50:6C:33:18:38:5D:59:8E:23:72:91:CA
authorityInfoAccess
  • CA Issuers - URI:http://e8.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e8.c.lencr.org/4.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:
  • 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0
  • Timestamp : Sep 3 15:00:09.365 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:8B:5F:31:9F:1C:30:87:DA:66:03:38:
  • 2A:22:56:D3:B0:75:52:AC:EA:29:DD:2D:FA:53:05:22:
  • 7F:90:F1:2E:73:02:21:00:82:5C:7E:1A:56:6F:13:B6:
  • 98:40:C1:6F:65:1B:8A:75:AE:C9:A5:55:6A:A9:BB:14:
  • 50:33:0F:91:EF:2A:85:52
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Sep 3 15:00:09.388 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:CD:9E:25:E6:E4:73:3E:AA:20:94:02:
  • 58:85:04:B0:12:0A:B9:24:06:EF:63:69:64:2F:4E:3F:
  • FA:DB:29:D6:85:02:20:3A:0F:09:3F:18:32:58:1D:9D:
  • E8:B1:26:A4:EC:9A:1C:DA:CE:8E:2F:ED:90:E2:D9:01:
  • 28:01:64:CF:DE:75:D2

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.alcudia.webseitenserver.com
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid