SSL check results of mail.dileyinyapalim.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.dileyinyapalim.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 07 Nov 2025 14:00:29 +0000

The mailservers of mail.dileyinyapalim.com can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.dileyinyapalim.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.dileyinyapalim.com
212.253.84.212
10
supported
mail.dileyinyapalim.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
7 s

Outgoing Mails

We have not received any emails from a @mail.dileyinyapalim.com address so far. Test mail delivery

Certificates

First seen at:

CN=mail.dileyinyapalim.com

Certificate chain
  • mail.dileyinyapalim.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R12
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.dileyinyapalim.com
Alternative Names
  • admin.mail.dileyinyapalim.com
  • autoconfig.mail.dileyinyapalim.com
  • autodiscover.mail.dileyinyapalim.com
  • mail.dileyinyapalim.com
  • mail.mail.dileyinyapalim.com
  • webmail.mail.dileyinyapalim.com
  • www.mail.dileyinyapalim.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R12
validity period
Not valid before
2025-08-31
Not valid after
2025-11-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
66:6D:18:A1:56:15:C8:B4:72:3F:5B:DF:A0:EC:66:92:E0:EC:5F:EC:C9:AB:85:65:35:E3:4B:D4:B1:3E:39:0D
SHA1
65:66:14:34:98:E8:E2:40:8E:34:5E:28:C7:32:40:BA:F2:51:6B:F7
X509v3 extensions
subjectKeyIdentifier
  • 2C:2E:DA:79:E2:9F:AD:EE:89:19:D9:36:18:20:3A:4D:E3:8B:DF:36
authorityKeyIdentifier
  • keyid:00:B5:29:F2:2D:8E:6F:31:E8:9B:4C:AD:78:3E:FA:DC:E9:0C:D1:D2
authorityInfoAccess
  • CA Issuers - URI:http://r12.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r12.c.lencr.org/36.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : Aug 31 09:37:02.706 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:87:E8:6E:05:79:B3:33:5B:8E:F2:C2:
  • E8:F3:87:01:45:FE:7D:1E:A7:94:E2:4B:CB:71:CF:87:
  • B9:90:C2:FD:2C:02:21:00:FA:75:62:02:8C:F4:CB:09:
  • 1C:D8:54:32:14:6F:58:68:A4:92:BD:7A:12:F2:47:72:
  • D5:78:B3:75:E3:D2:BC:04
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DD:DC:CA:34:95:D7:E1:16:05:E7:95:32:FA:C7:9F:F8:
  • 3D:1C:50:DF:DB:00:3A:14:12:76:0A:2C:AC:BB:C8:2A
  • Timestamp : Aug 31 09:37:02.777 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D5:BA:E5:BA:9E:FD:C5:49:4D:51:A1:
  • D0:8A:84:54:7A:F6:5B:89:A2:E9:A0:AD:61:9C:F6:78:
  • F8:3B:E0:F6:60:02:21:00:96:94:95:F5:E9:3B:3C:73:
  • 7B:4A:D9:1C:00:79:DD:45:6F:F6:3F:83:AE:01:B1:67:
  • 54:06:94:E0:BF:BB:9E:D4