SSL check results of emailn.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for emailn.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 26 Aug 2025 19:47:47 +0000

No connection to the mailservers of emailn.de could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @emailn.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.emailn.de
46.182.21.2
Results incomplete
10
supported
*.emailn.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have received emails from these servers with @emailn.de sender addresses. Test mail delivery

Host TLS Version & Cipher
mail.emailn.de (46.182.21.2)
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
mail.emailn.de (46.182.20.28)
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384

Certificates

First seen at:

CN=*.emailn.de

Certificate chain
Subject
Common Name (CN)
  • *.emailn.de
Alternative Names
  • *.emailn.de
  • emailn.de
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign GCC R6 AlphaSSL CA 2025
validity period
Not valid before
2025-08-24
Not valid after
2026-09-25
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
0D:B0:05:39:D5:B0:37:FA:8F:47:6C:67:ED:2B:84:77:CF:8B:1A:CD:34:D6:E4:E2:A1:A0:08:BD:AB:AE:FC:12
SHA1
AD:63:8A:D3:F0:0B:23:30:15:27:3E:10:7A:55:D7:E1:8A:EA:46:FF
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr6alphasslca2025.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsgccr6alphasslca2025
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • Policy: 1.3.6.1.4.1.4146.10.1.3
  • CPS: https://www.globalsign.com/repository/
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsgccr6alphasslca2025.crl
authorityKeyIdentifier
  • keyid:C5:B4:93:8F:6F:2B:DC:1E:48:BF:B7:10:30:85:CE:D1:B2:BB:48:2D
subjectKeyIdentifier
  • 10:3B:E3:4E:70:96:93:C3:DC:4A:EB:A1:B3:98:A1:FD:D7:8F:FD:7D
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 94:4E:43:87:FA:EC:C1:EF:81:F3:19:24:26:A8:18:65:
  • 01:C7:D3:5F:38:02:01:3F:72:67:7D:55:37:2E:19:D8
  • Timestamp : Aug 24 13:54:02.962 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:D0:88:A8:21:50:53:28:44:EF:BF:3D:
  • D4:CB:FC:FE:53:8D:16:00:AD:8F:8F:CA:1F:52:90:8F:
  • D7:FB:75:3D:A0:02:21:00:96:7F:A1:B0:DA:FC:3D:C4:
  • F7:23:69:EB:6D:F8:27:79:A4:75:A1:66:4D:48:74:A9:
  • BE:3D:81:31:10:69:C5:78
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : AC:AB:30:70:6C:EB:EC:84:31:F4:13:D2:F4:91:5F:11:
  • 1E:42:24:43:B1:F2:A6:8C:4F:3C:2B:3B:A7:1E:02:C3
  • Timestamp : Aug 24 13:54:02.955 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:52:D8:38:FE:AA:A4:EC:E4:F5:E8:18:23:
  • A8:C6:64:91:6A:E2:5A:01:F3:7F:A6:01:6D:08:C4:B4:
  • 64:E4:E7:AA:02:21:00:A7:F3:A8:BE:EF:1F:CE:49:FB:
  • 4A:74:8E:C3:3A:9B:43:59:FC:31:61:83:99:7B:4E:6A:
  • E2:CD:DB:A0:E0:1D:8B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : C2:31:7E:57:45:19:A3:45:EE:7F:38:DE:B2:90:41:EB:
  • C7:C2:21:5A:22:BF:7F:D5:B5:AD:76:9A:D9:0E:52:CD
  • Timestamp : Aug 24 13:54:02.916 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:F3:B2:67:15:96:64:66:0F:AA:5B:24:
  • E1:20:57:C4:C0:51:F5:A9:07:6B:D6:FE:52:6E:B2:3D:
  • E0:A3:7F:B0:AA:02:21:00:F8:66:8C:E7:B9:1C:22:42:
  • BF:34:FD:0A:DF:91:E1:B6:A4:AF:A3:84:4F:FD:4C:22:
  • 0C:78:E4:81:8E:77:40:BA

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.emailn.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid