SSL check results of 1402.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for 1402.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 27 Jul 2020 12:04:40 +0000

No connection to the mailservers of 1402.com could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @1402.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail1.filteredmx.net
50.115.17.101
Results incomplete
10
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail1.filteredmx.net
91.197.228.101
Results incomplete
10
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail2.filteredmx.net
91.197.228.103
Results incomplete
20
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail2.filteredmx.net
50.115.17.103
Results incomplete
20
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
3 s
mail3.filteredmx.net
50.115.17.104
Results incomplete
30
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mail3.filteredmx.net
91.197.228.104
Results incomplete
30
supported
*.filteredmx.net
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have received emails from these servers with @1402.com sender addresses. Test mail delivery

Host TLS Version & Cipher
unknown (200.54.221.202)
Insecure - not encrypted!
unknown (121.101.186.242)
Insecure - not encrypted!
unknown (185.188.218.14)
Insecure - not encrypted!
unknown (31.147.227.19)
Insecure - not encrypted!
unknown (143.202.136.51)
Insecure - not encrypted!
unknown (41.169.70.219)
Insecure - not encrypted!
unknown (103.78.183.54)
Insecure - not encrypted!

Certificates

First seen at:

CN=*.filteredmx.net

Certificate chain
Subject
Common Name (CN)
  • *.filteredmx.net
Alternative Names
  • *.filteredmx.net
  • filteredmx.net
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2020-01-20
Not valid after
2022-02-18
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
5A:AD:3E:92:39:BA:32:45:05:AE:B2:A2:78:9B:18:6C:D3:3B:9B:98:CC:D8:07:77:1F:6F:6B:41:36:42:0F:65
SHA1
42:9E:F0:3D:41:35:B1:31:72:C6:44:73:AA:79:A5:08:30:3D:50:60
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • 10:9D:F0:DA:40:BE:98:CA:48:31:44:C0:EF:DA:EA:AA:8E:AB:75:C5
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
certificatePolicies
  • Policy: 2.16.840.1.114412.1.2
  • CPS: https://www.digicert.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
  • 38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
  • Timestamp : Jan 20 09:06:46.954 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:27:C0:39:52:F2:D3:25:1E:9C:E5:AA:17:
  • 4C:40:3E:87:9E:F9:FA:63:95:11:6C:5B:CE:DE:C9:2D:
  • 10:E7:85:43:02:21:00:F0:B2:DC:94:21:16:E9:F0:28:
  • 13:84:78:CC:52:F1:53:C6:41:4D:65:89:86:75:63:96:
  • 0D:A9:26:4F:46:BB:BD
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 22:45:45:07:59:55:24:56:96:3F:A1:2F:F1:F7:6D:86:
  • E0:23:26:63:AD:C0:4B:7F:5D:C6:83:5C:6E:E2:0F:02
  • Timestamp : Jan 20 09:06:47.043 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:AE:55:B6:E4:59:09:40:15:9C:44:32:
  • 72:63:86:2E:5D:A5:8B:2E:DF:58:17:3F:AF:7F:65:24:
  • AA:DA:8A:F4:47:02:21:00:C5:4C:00:D1:DB:7D:23:F0:
  • F7:06:30:41:AA:F0:D0:86:52:AF:43:B6:BF:DE:C6:E1:
  • 1E:AA:60:DF:1B:FC:97:04
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 51:A3:B0:F5:FD:01:79:9C:56:6D:B8:37:78:8F:0C:A4:
  • 7A:CC:1B:27:CB:F7:9E:88:42:9A:0D:FE:D4:8B:05:E5
  • Timestamp : Jan 20 09:06:47.062 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:5E:FE:2B:46:9D:63:0C:12:A1:DD:E1:62:
  • D2:1A:7E:4B:0D:3C:35:4E:F8:E5:ED:84:8D:05:7E:DF:
  • 6B:67:B2:B4:02:21:00:8D:E5:3A:DB:F9:B7:0D:91:A7:
  • 6F:EA:65:66:5E:19:6C:20:D0:70:7C:7F:C5:83:EF:34:
  • 21:95:EA:DB:B4:E9:CA