SSL check results of mail.powertechmax.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.powertechmax.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 08 Jul 2025 13:32:53 +0000

We can not guarantee a secure connection to the mailservers of mail.powertechmax.com!

Please contact the operator of mail.powertechmax.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mail.powertechmax.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.powertechmax.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.powertechmax.com
82.112.238.165
-
supported
mail.powertechmax.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s
mail.powertechmax.com
2a02:4780:12:eb6f::1
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @mail.powertechmax.com address so far. Test mail delivery

Certificates

First seen at:

CN=mail.powertechmax.com

Certificate chain
  • mail.powertechmax.com
    • remaining
    • 256 bit
    • ecdsa-with-SHA384
    • Expired

      • E6
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.powertechmax.com
Alternative Names
  • mail.powertechmax.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E6
validity period
Not valid before
2025-03-24
Not valid after
2025-06-22
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
27:33:BA:E7:91:74:68:55:FF:89:30:A4:E7:4C:C6:F0:48:AB:CC:30:E3:A6:D3:BA:B8:34:2F:58:BF:B3:84:1F
SHA1
6E:B7:BD:2D:23:D7:D9:BD:32:38:46:CE:8B:3F:3B:5D:86:EF:B5:46
X509v3 extensions
subjectKeyIdentifier
  • AF:B1:4A:1F:9B:B1:4D:50:41:EA:8F:EC:BD:22:C3:F1:CC:C2:79:99
authorityKeyIdentifier
  • keyid:93:27:46:98:03:A9:51:68:8E:98:D6:C4:42:48:DB:23:BF:58:94:D2
authorityInfoAccess
  • OCSP - URI:http://e6.o.lencr.org
  • CA Issuers - URI:http://e6.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e6.c.lencr.org/61.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Mar 24 09:41:02.818 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:73:6D:C5:07:E2:6B:72:7F:A6:66:7E:47:
  • 21:77:BF:A0:54:2B:2B:40:3F:3F:4D:24:3C:9C:1C:FC:
  • EB:E2:EF:2C:02:21:00:E3:A4:AB:67:76:CE:82:B8:F7:
  • B9:EB:26:58:94:59:A2:72:B7:F8:7E:96:17:82:5E:A1:
  • C3:39:EB:09:A4:3C:2B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : Mar 24 09:41:04.800 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:50:3B:FB:70:75:E9:21:4A:22:94:1A:CD:
  • FD:DE:C8:BF:90:64:C1:03:7D:49:53:BF:AC:F5:42:76:
  • 06:E3:E9:C1:02:21:00:EB:8A:B7:15:E4:29:8D:A6:84:
  • 94:8E:BC:F8:C4:34:09:07:2B:9B:CA:6F:5E:17:07:74:
  • 60:AA:E9:36:E9:0B:CA