SSL check results of bogus.ltd

NEW You can also bulk check multiple servers.

Discover if the webservers of bogus.ltd can be reached through a secure connection.

Summary

Report created Fri, 13 Dec 2024 04:21:12 +0000

The webservers of bogus.ltd can be reached through a secure connection.

Servers

Hostname / IP address Certificates Protocol
bogus.ltd
152.53.111.77
bogus.ltd
HSTS
unexpected EOF
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
bogus.ltd
2a0a:4cc0:80:3393::1
bogus.ltd
HSTS
unexpected EOF
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Certificates

First seen at:

CN=bogus.ltd

Certificate chain
  • bogus.ltd
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E5
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • bogus.ltd
Alternative Names
  • *.bogus.ltd
  • bogus.ltd
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E5
validity period
Not valid before
2024-12-06
Not valid after
2025-03-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
D0:F2:C7:EC:3B:3B:D8:7A:4F:5B:89:18:D2:6A:10:6B:53:E2:7B:37:E5:AC:26:25:9D:D9:0D:7D:DF:16:3C:AD
SHA1
A9:23:F2:04:90:1A:B3:42:A9:56:AD:B5:DD:0A:D7:A4:BC:8B:3E:C0
X509v3 extensions
subjectKeyIdentifier
  • E6:42:68:A8:B1:2F:F2:23:25:0F:EB:EE:CC:B8:0E:6F:D1:00:B2:1B
authorityKeyIdentifier
  • keyid:9F:2B:5F:CF:3C:21:4F:9D:04:B7:ED:2B:2C:C4:C6:70:8B:D2:D7:0D
authorityInfoAccess
  • OCSP - URI:http://e5.o.lencr.org
  • CA Issuers - URI:http://e5.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 73:20:22:0F:08:16:8A:F9:F3:C4:A6:8B:0A:B2:6A:9A:
  • 4A:00:EE:F5:77:85:8A:08:4D:05:00:D4:A5:42:44:59
  • Timestamp : Dec 6 09:47:24.190 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:51:91:B4:52:B6:17:56:51:DC:C1:C4:16:
  • 34:7F:69:F1:65:B0:A2:57:0F:8D:BE:C5:19:A4:25:C6:
  • F0:D5:84:11:02:20:3D:B9:73:B5:16:58:EB:2A:41:76:
  • 41:34:D8:1B:35:09:C3:38:10:F9:B1:DD:5D:37:43:9B:
  • A5:BA:3F:7C:D0:FF
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Dec 6 09:47:24.233 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:71:9C:52:97:CE:B4:43:04:16:5A:A9:77:
  • 6C:62:25:8B:08:3B:28:38:00:9D:C7:3C:98:B1:11:9D:
  • F1:5E:4B:A5:02:20:33:0F:EC:D2:5E:68:E0:9E:4D:E0:
  • A8:9D:70:B1:20:C4:A3:54:41:E4:8E:EB:75:CC:28:77:
  • 76:6E:92:70:02:0C

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_443._tcp.bogus.ltd
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_443._tcp.bogus.ltd
  • DANE-TA: Trust Anchor Assertion
  • Use subject public key
  • SHA-256 Hash
valid
valid