SSL check results of vitecco.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for vitecco.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sat, 18 Oct 2025 16:42:19 +0000

The mailservers of vitecco.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @vitecco.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx0.viteccoserver.de
2a03:4000:20:2d9:37:120:183:42
10
supported
mx0.viteccoserver.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
8 s
mx0.viteccoserver.de
37.120.183.42
10
supported
mx0.viteccoserver.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
8 s

Outgoing Mails

We have not received any emails from a @vitecco.de address so far. Test mail delivery

Certificates

First seen at:

CN=mx0.viteccoserver.de

Certificate chain
  • mx0.viteccoserver.de
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E7
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mx0.viteccoserver.de
Alternative Names
  • mx0.viteccoserver.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E7
validity period
Not valid before
2025-09-26
Not valid after
2025-12-25
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
56:B7:2F:E8:E0:94:22:0F:28:9E:98:6B:8E:A2:AE:FA:54:A8:2B:25:68:0E:93:EF:1F:85:11:0E:92:7A:F1:F8
SHA1
9D:AD:A5:D3:AC:3E:33:A1:F4:7D:0B:0F:A3:7D:39:01:65:78:E4:6A
X509v3 extensions
subjectKeyIdentifier
  • 39:28:64:8B:A8:FC:AD:E7:40:D3:68:A8:9A:0D:D0:B0:5F:20:B2:E2
authorityKeyIdentifier
  • keyid:AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
authorityInfoAccess
  • CA Issuers - URI:http://e7.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e7.c.lencr.org/64.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Sep 26 03:05:12.592 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:42:14:AD:EF:B8:58:A1:B1:2F:E3:64:CE:
  • 1E:55:C6:0E:17:B6:85:13:C1:D4:97:DC:77:15:7C:24:
  • B4:F0:F7:97:02:20:3C:9E:94:03:41:85:FB:78:2D:49:
  • 1A:E1:FC:30:E7:ED:44:0C:F9:A0:EE:1D:C7:39:A6:80:
  • CE:AA:D7:86:0A:FA
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:
  • 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0
  • Timestamp : Sep 26 03:05:14.613 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:FE:62:26:DB:31:C5:F5:26:BE:6E:C5:
  • 9D:D6:D3:CC:37:A9:23:F8:30:3B:2A:F4:BF:46:89:35:
  • 36:A0:FE:C4:0F:02:20:28:AF:98:DB:25:EF:C9:85:2F:
  • 8A:B8:B8:34:44:2E:4C:26:41:9C:DB:D0:56:93:FC:25:
  • 95:A3:FA:74:DB:08:6C

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mx0.viteccoserver.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid