SSL check results of micropayment.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for micropayment.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 10 Jun 2025 11:03:51 +0000

The mailservers of micropayment.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @micropayment.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx2-eu1.ppe-hosted.com
185.132.181.17
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
7 s
mx2-eu1.ppe-hosted.com
91.209.104.156
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mx1-eu1.ppe-hosted.com
185.132.181.16
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mx1-eu1.ppe-hosted.com
91.209.104.155
Results incomplete
5
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
smail.micropayment.de
193.159.183.230
10
supported
*.micropayment.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail2.micropayment.de
193.159.183.231
20
supported
*.micropayment.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @micropayment.de address so far. Test mail delivery

Certificates

First seen at:

CN=*.micropayment.de,O=micropayment GmbH,L=Berlin,ST=Berlin,C=DE

Certificate chain
Subject
Country (C)
  • DE
State (ST)
  • Berlin
Locality (L)
  • Berlin
Organization (O)
  • micropayment GmbH
Common Name (CN)
  • *.micropayment.de
Alternative Names
  • *.micropayment.de
  • micropayment.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • Thawte TLS RSA CA G1
validity period
Not valid before
2025-05-26
Not valid after
2026-06-26
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
5D:0B:3E:53:84:1F:5D:E2:7D:04:38:9A:4C:71:0D:3F:C3:52:C8:D1:84:B8:05:7B:D4:D6:89:A6:4E:21:D7:2F
SHA1
D6:81:1A:0F:49:79:96:BD:15:15:A3:18:6B:C4:83:EC:8B:45:11:5A
X509v3 extensions
authorityKeyIdentifier
  • keyid:A5:8C:FE:32:CC:EB:0F:2C:D4:19:C6:08:B8:00:24:88:5D:C3:C5:B7
subjectKeyIdentifier
  • 8E:92:45:3A:72:1B:B4:0D:61:22:44:6D:B9:22:97:7F:87:E5:ED:4A
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.thawte.com/ThawteTLSRSACAG1.crl
authorityInfoAccess
  • OCSP - URI:http://status.thawte.com
  • CA Issuers - URI:http://cacerts.thawte.com/ThawteTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0E:57:94:BC:F3:AE:A9:3E:33:1B:2C:99:07:B3:F7:90:
  • DF:9B:C2:3D:71:32:25:DD:21:A9:25:AC:61:C5:4E:21
  • Timestamp : May 26 09:45:28.596 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C9:C9:83:B4:F0:32:95:04:D6:27:95:
  • DA:2F:EC:87:6F:25:24:A0:69:AA:94:58:B3:55:C5:DF:
  • 05:24:54:6C:1D:02:21:00:D6:7C:F3:D1:C2:36:78:F8:
  • 7A:C6:E6:36:83:47:8E:C1:E5:74:71:4F:3F:F1:1F:E5:
  • F3:41:C8:D9:57:38:8E:E8
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
  • 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
  • Timestamp : May 26 09:45:28.659 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E9:15:1A:40:E4:4F:DA:39:64:28:BD:
  • 81:44:46:05:64:DA:49:F3:35:85:2F:8C:C7:B5:2F:2D:
  • BA:DF:73:B1:A5:02:20:53:F9:F5:F0:36:D0:57:DB:2A:
  • 32:F6:ED:02:20:E1:08:2E:DA:4B:8A:DF:C6:CC:6A:72:
  • 4B:6F:22:63:DB:4D:54
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:
  • 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3
  • Timestamp : May 26 09:45:28.670 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:70:E8:AB:13:60:BC:9A:86:E1:4B:FA:DB:
  • 5A:24:18:A7:43:65:3E:D7:CF:5C:CA:E7:04:2D:C1:F3:
  • 56:2F:9C:FF:02:20:77:87:56:8B:F2:C1:D9:76:EB:72:
  • 87:C4:99:AC:8E:9D:32:0E:4F:1F:D6:CE:8E:07:21:3A:
  • 26:F3:7A:5F:6B:C3