SSL check results of blu4.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for blu4.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 20 Jan 2025 05:10:02 +0000

The mailservers of blu4.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @blu4.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx01.goneo.de
2001:1640:5::11:2
10
supported
*.goneo.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s
mx01.goneo.de
85.220.143.6
10
supported
*.goneo.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s
mx02.goneo.de
2001:1640:5::12:2
10
supported
*.goneo.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
1 s
mx02.goneo.de
85.220.165.130
10
supported
*.goneo.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @blu4.de sender addresses. Test mail delivery

Host TLS Version & Cipher
mout.kundenserver.de (212.227.126.187)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.126.134)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.126.131)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (217.72.192.74)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.17.24)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.126.135)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.126.130)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.17.10)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.126.133)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (212.227.17.13)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (217.72.192.73)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout.kundenserver.de (217.72.192.75)
TLSv1.3 TLS_AES_256_GCM_SHA384
mout-xforward.kundenserver.de (82.165.159.37)
TLSv1.3 TLS_AES_256_GCM_SHA384

Certificates

First seen at:

CN=*.goneo.de

Certificate chain
Subject
Common Name (CN)
  • *.goneo.de
Alternative Names
  • *.goneo.de
  • goneo.de
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2024-04-15
Not valid after
2025-04-14
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
A0:5B:63:75:D5:AD:C5:42:E7:B0:81:F9:84:16:01:00:0A:8C:05:C2:C3:11:1B:FD:61:01:74:18:D4:9B:8F:36
SHA1
16:00:5C:26:D2:9C:83:F4:36:AE:7A:03:F0:7F:90:45:D1:C0:85:10
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • A9:4D:1C:BE:13:3D:51:66:E5:CE:15:67:2C:8C:2D:96:CA:B3:03:6D
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CF:11:56:EE:D5:2E:7C:AF:F3:87:5B:D9:69:2E:9B:E9:
  • 1A:71:67:4A:B0:17:EC:AC:01:D2:5B:77:CE:CC:3B:08
  • Timestamp : Apr 15 07:24:06.559 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:49:E9:B8:79:84:62:14:4C:1E:5D:0F:24:
  • FD:26:A1:51:28:3B:63:FB:D3:67:1D:8C:B0:D6:BB:85:
  • 6B:A6:BA:FE:02:20:46:BF:EB:FA:16:54:5C:F3:CA:A5:
  • 31:CC:07:BA:FA:94:8B:79:DF:6D:B9:E7:39:01:C1:4D:
  • F4:B4:0E:9E:9C:F5
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 7D:59:1E:12:E1:78:2A:7B:1C:61:67:7C:5E:FD:F8:D0:
  • 87:5C:14:A0:4E:95:9E:B9:03:2F:D9:0E:8C:2E:79:B8
  • Timestamp : Apr 15 07:24:06.561 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:4B:C0:A8:1E:1F:84:C8:3F:0E:B6:ED:CA:
  • 1F:40:85:E4:D3:58:9A:5E:4E:24:5A:1B:B6:BC:AB:F3:
  • D9:5E:11:B8:02:21:00:D9:EE:60:85:EC:A6:30:6A:05:
  • 24:77:25:FC:4F:EB:F0:9F:17:C1:0E:4F:6C:CA:3F:4F:
  • AA:70:BD:5B:5A:51:E8
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E6:D2:31:63:40:77:8C:C1:10:41:06:D7:71:B9:CE:C1:
  • D2:40:F6:96:84:86:FB:BA:87:32:1D:FD:1E:37:8E:50
  • Timestamp : Apr 15 07:24:06.583 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:9F:53:B3:5C:B0:A0:A7:CC:5F:41:98:
  • 70:35:0A:5F:9C:78:4D:45:2E:1A:AE:3A:10:04:B4:F1:
  • 7A:32:1C:D0:F8:02:20:56:3D:F9:AC:67:5B:C2:BA:43:
  • A8:79:30:A9:4B:01:23:63:82:7B:6E:42:E0:A9:E5:3B:
  • 02:2B:60:A0:10:CF:A5