SSL check results of flushfactorplus.colibrim.store

NEW You can also bulk check multiple servers.

Discover if the mail servers for flushfactorplus.colibrim.store can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 29 Aug 2025 20:23:52 +0000

The mailservers of flushfactorplus.colibrim.store can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @flushfactorplus.colibrim.store addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
flushfactorplus.colibrim.store
35.208.211.169
-
supported
*.colibrim.store
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s

Outgoing Mails

We have not received any emails from a @flushfactorplus.colibrim.store address so far. Test mail delivery

Certificates

First seen at:

CN=*.colibrim.store

Certificate chain
  • *.colibrim.store
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • *.colibrim.store
Alternative Names
  • *.colibrim.store
  • colibrim.store
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2025-07-17
Not valid after
2025-10-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
A8:62:03:CC:41:7D:DC:27:F3:B5:76:4B:81:FA:7C:1F:77:14:A0:A1:B7:6C:12:3D:92:3B:82:84:12:B1:28:27
SHA1
B7:CD:9A:76:A7:19:AA:A8:CE:CC:DF:27:A9:68:71:1A:8F:5B:25:CE
X509v3 extensions
subjectKeyIdentifier
  • 5B:4F:3F:A5:FD:1B:08:6C:09:2C:D2:D5:4E:1F:A1:8A:0F:A8:7D:5F
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r10.c.lencr.org/7.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Jul 17 01:44:41.222 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:BD:EB:FB:0E:D2:C5:E6:B3:5E:51:A4:
  • 96:2B:94:5E:F4:CB:23:3D:89:A4:0D:3C:D6:CA:34:2B:
  • 28:8A:15:BB:5D:02:20:21:04:F7:12:79:94:F8:73:97:
  • B7:C2:A7:28:39:56:85:1F:C4:BD:D9:15:FF:35:C1:AB:
  • CC:AA:FB:F0:95:5E:F2
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:
  • 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0
  • Timestamp : Jul 17 01:44:43.222 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:4E:CB:D1:E4:D5:C4:37:12:7E:06:AA:B8:
  • 0B:8B:7C:9F:8D:60:9C:CF:95:93:5E:D0:7D:E8:A8:04:
  • 4D:FD:89:8D:02:20:7D:EE:E9:F8:F8:AD:33:A3:99:9A:
  • CF:B4:7A:4D:84:10:0B:51:B4:E9:10:E4:8D:DB:3C:A8:
  • 39:9D:A3:86:28:E1