SSL check results of remotevideo.ca

NEW You can also bulk check multiple servers.

Discover if the mail servers for remotevideo.ca can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 10 Nov 2024 01:31:15 +0000

The mailservers of remotevideo.ca can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @remotevideo.ca addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx.spamexperts.com
2001:978:2:2c::137:100
10
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx.spamexperts.com
149.13.75.27
10
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
2001:978:2:2c::137:100
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
2001:978:2:7::162:100
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
2001:978:2:19::e:100
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
130.117.54.106
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
154.59.104.23
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
fallbackmx.spamexperts.eu
149.13.75.27
20
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
lastmx.spamexperts.net
2001:550:2:9::280:100
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10 s
lastmx.spamexperts.net
2001:978:2:7::162:100
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
lastmx.spamexperts.net
2001:550:2:61::2fc:100
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
7 s
lastmx.spamexperts.net
2001:978:2:2c::137:100
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
lastmx.spamexperts.net
154.59.104.23
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
lastmx.spamexperts.net
149.13.75.27
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
lastmx.spamexperts.net
38.89.254.156
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
6 s
lastmx.spamexperts.net
38.111.198.185
30
supported
*.antispamcloud.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
10 s

Outgoing Mails

We have not received any emails from a @remotevideo.ca address so far. Test mail delivery

Certificates

First seen at:

CN=*.antispamcloud.com,O=N-ABLE TECHNOLOGIES LTD,L=Dundee,C=GB

Certificate chain
Subject
Country (C)
  • GB
Locality (L)
  • Dundee
Organization (O)
  • N-ABLE TECHNOLOGIES LTD
Common Name (CN)
  • *.antispamcloud.com
Alternative Names
  • *.antispamcloud.com
  • *.spamexperts.com
  • *.spamexperts.eu
  • *.spamexperts.net
  • *.mtaroutes.com
  • *.smtp.antispamcloud.com
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Common Name (CN)
  • DigiCert Global G2 TLS RSA SHA256 2020 CA1
validity period
Not valid before
2023-12-11
Not valid after
2025-01-10
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
49:BC:02:4A:F9:69:5F:E2:D7:1E:4F:CA:6F:DC:6B:22:A6:98:31:0A:79:99:F3:8B:99:52:1E:03:D4:65:E5:0E
SHA1
95:6F:EF:66:28:4F:54:AF:1B:8F:82:D6:35:FB:B0:75:B2:AD:2B:2E
X509v3 extensions
authorityKeyIdentifier
  • keyid:74:85:80:C0:66:C7:DF:37:DE:CF:BD:29:37:AA:03:1D:BE:ED:CD:17
subjectKeyIdentifier
  • 38:E5:DF:1C:FD:4E:2E:98:90:6E:02:A4:8C:6D:04:26:A6:EC:95:49
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://crl3.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
  • Full Name:
  • URI:http://crl4.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.digicert.com
  • CA Issuers - URI:http://cacerts.digicert.com/DigiCertGlobalG2TLSRSASHA2562020CA1-1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 4E:75:A3:27:5C:9A:10:C3:38:5B:6C:D4:DF:3F:52:EB:
  • 1D:F0:E0:8E:1B:8D:69:C0:B1:FA:64:B1:62:9A:39:DF
  • Timestamp : Dec 11 17:51:04.116 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:3F:EB:45:46:8C:07:74:D4:35:DA:C6:4D:
  • 56:1F:38:27:33:17:B9:53:C5:B0:6B:CC:0C:BD:E3:5A:
  • D9:72:23:36:02:20:4E:79:41:5A:AE:43:84:B5:CF:BA:
  • 72:A3:53:1E:7D:49:88:86:CF:7F:64:EC:65:EB:9B:D3:
  • B7:90:C9:86:C6:DC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 3F:17:4B:4F:D7:22:47:58:94:1D:65:1C:84:BE:0D:12:
  • ED:90:37:7F:1F:85:6A:EB:C1:BF:28:85:EC:F8:64:6E
  • Timestamp : Dec 11 17:51:04.181 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B7:5A:F2:60:BB:86:F2:00:7C:F8:C0:
  • AD:A9:F9:CF:24:DD:7F:73:A6:0B:F8:6F:95:77:1A:4F:
  • 58:07:9F:BE:2B:02:21:00:AD:52:03:3F:16:6B:24:AA:
  • B8:04:CA:73:1A:DA:27:61:7F:E2:F6:D2:55:C6:E7:25:
  • 9F:AA:7F:EB:9B:36:1F:D4
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Dec 11 17:51:04.161 2023 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4C:24:DA:14:21:40:F9:62:2D:06:75:F2:
  • 2E:63:BF:B4:C9:E8:19:06:A3:BD:D7:65:7D:F6:0F:E2:
  • 07:73:C7:F7:02:21:00:DA:F2:A1:2C:26:7A:E2:4F:23:
  • 2D:6C:6D:B1:2E:2C:91:83:EE:7F:67:46:4F:1F:B0:94:
  • 11:2B:06:93:BD:00:D1