SSL check results of multidisc.es

NEW You can also bulk check multiple servers.

Discover if the mail servers for multidisc.es can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 18 Oct 2025 12:22:27 +0000

The mailservers of multidisc.es can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @multidisc.es addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.multidisc.es
2001:41d0:203:2d3d::1
10
supported
multidisc.es
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail.multidisc.es
178.33.167.210
10
supported
multidisc.es
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @multidisc.es address so far. Test mail delivery

Certificates

First seen at:

CN=multidisc.es

Certificate chain
  • multidisc.es
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • multidisc.es
Alternative Names
  • *.multidisc.es
  • multidisc.es
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2025-10-17
Not valid after
2026-01-15
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
9C:04:6C:DF:64:F8:38:25:39:95:ED:C4:EE:F1:A2:E0:67:AD:8B:A2:24:2C:AD:F1:16:96:25:77:BC:B1:D7:52
SHA1
72:7B:34:7C:79:98:EC:F1:16:3D:26:92:69:53:4E:B5:38:B9:15:45
X509v3 extensions
subjectKeyIdentifier
  • C3:69:4F:42:BE:F7:44:17:F6:29:F4:82:80:02:76:A0:ED:5F:BC:1F
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/77.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
  • 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
  • Timestamp : Oct 17 12:11:49.911 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:94:B6:35:93:31:36:76:90:06:15:AC:
  • DC:4F:AA:1B:D2:59:71:8B:61:3A:7F:D2:46:E4:18:18:
  • 31:3F:96:69:D1:02:20:08:E0:7D:92:18:D7:D9:48:B1:
  • E8:36:D1:C8:34:75:EF:9C:76:F9:C7:3D:45:70:8C:6F:
  • 0B:88:CA:42:EE:41:E0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
  • F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
  • Timestamp : Oct 17 12:11:51.926 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:14:9F:6B:57:90:11:E9:0A:F1:DE:30:A1:
  • F9:8C:DE:3A:A9:B3:9B:E3:CF:D7:91:F4:B9:37:0A:80:
  • 98:72:9C:DA:02:21:00:A8:DB:82:18:5B:DC:7E:BA:52:
  • 22:9F:82:BD:53:43:1E:CF:26:FE:D9:F1:FA:50:52:3C:
  • 9A:39:AA:85:71:98:1C

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.multidisc.es
  • DANE-EE: Domain Issued Certificate
  • Use full certificate
  • SHA-256 Hash
valid
valid