SSL check results of clicklocal.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for clicklocal.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 14 Aug 2025 00:30:46 +0000

The mailservers of clicklocal.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @clicklocal.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.web-seo-consulting.eu
2a01:4f8:c013:af9::1
10
supported
mail.web-seo-consulting.eu
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
9 s
mail.web-seo-consulting.eu
91.99.113.177
10
supported
mail.web-seo-consulting.eu
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
5 s

Outgoing Mails

We have not received any emails from a @clicklocal.de address so far. Test mail delivery

Certificates

First seen at:

CN=mail.web-seo-consulting.eu

Certificate chain
  • mail.web-seo-consulting.eu
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R10
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.web-seo-consulting.eu
Alternative Names
  • mail.web-seo-consulting.eu
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R10
validity period
Not valid before
2025-08-07
Not valid after
2025-11-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
EB:5B:73:1C:C4:5A:CA:07:3D:75:5C:97:D9:C8:A2:B4:69:6C:B0:4F:DE:F5:FF:EE:EA:33:8B:FC:F8:E2:D6:DE
SHA1
9D:B6:5F:2D:A4:B2:D3:46:FF:3A:AA:56:2B:F4:E6:F8:81:98:0F:76
X509v3 extensions
subjectKeyIdentifier
  • 27:05:3F:A2:CE:C9:DE:A7:E1:B0:49:C3:BC:56:36:BD:CB:63:78:C1
authorityKeyIdentifier
  • keyid:BB:BC:C3:47:A5:E4:BC:A9:C6:C3:A4:72:0C:10:8D:A2:35:E1:C8:E8
authorityInfoAccess
  • CA Issuers - URI:http://r10.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r10.c.lencr.org/17.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : ED:3C:4B:D6:E8:06:C2:A4:A2:00:57:DB:CB:24:E2:38:
  • 01:DF:51:2F:ED:C4:86:C5:70:0F:20:DD:B7:3E:3F:E0
  • Timestamp : Aug 7 10:35:42.957 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:81:34:39:03:93:FB:32:46:9A:B6:1F:
  • 1A:17:29:18:BC:FA:BD:E3:8D:F4:3F:01:2E:2C:42:B8:
  • EB:0C:22:0C:B4:02:21:00:F5:66:60:9A:69:8D:0E:CC:
  • 46:DF:E0:2E:F9:4B:0A:D1:B8:3C:4F:7C:30:FA:FF:3D:
  • E3:51:A6:0E:C1:C3:D1:68
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Aug 7 10:35:42.960 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:0B:A4:6C:A6:A2:2C:6B:0D:62:9A:4F:ED:
  • 9A:13:62:53:E1:B0:A9:7E:AB:6D:1D:1C:A4:A5:51:64:
  • 9F:B4:7A:B8:02:21:00:C2:20:EA:76:42:C2:57:34:FA:
  • 4D:38:8E:88:B4:FA:B1:39:08:17:3A:1A:A3:DC:2B:1A:
  • 49:45:43:68:37:F6:71

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.web-seo-consulting.eu
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug
valid