SSL check results of hotelarion.ro

NEW You can also bulk check multiple servers.

Discover if the mail servers for hotelarion.ro can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 07 Sep 2025 00:30:55 +0000

We can not guarantee a secure connection to the mailservers of hotelarion.ro!

Please contact the operator of hotelarion.ro and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/hotelarion.ro

Servers

Incoming Mails

These servers are responsible for incoming mails to @hotelarion.ro addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.smartsoftserv.ro
5.2.229.238
10
supported
mail.smartsoftserv.ro
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
9 s
mail.blackseasuppliers.ro
5.2.229.242
Results incomplete
20
supported
not checked
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @hotelarion.ro address so far. Test mail delivery

Certificates

First seen at:

CN=mail.smartsoftserv.ro

Certificate chain
  • mail.smartsoftserv.ro
    • remaining
    • 256 bit
    • ecdsa-with-SHA384

      • E7
        • remaining
        • 384 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mail.smartsoftserv.ro
Alternative Names
  • mail.smartsoftserv.ro
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • E7
validity period
Not valid before
2025-09-01
Not valid after
2025-11-30
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
3C:90:B2:DB:8B:DE:CE:6B:FA:D1:E7:D4:FB:B4:B5:28:B0:C3:32:94:8B:5C:31:B0:8F:CD:C1:FA:24:F2:34:88
SHA1
CA:95:2A:EC:0B:EC:31:77:FB:BD:A5:B4:49:68:7C:7E:B3:DF:56:C7
X509v3 extensions
subjectKeyIdentifier
  • 2A:A8:9E:63:C8:74:71:1E:DE:C2:A0:18:13:79:5D:3B:56:7F:84:DA
authorityKeyIdentifier
  • keyid:AE:48:9E:DC:87:1D:44:A0:6F:DA:A2:E5:60:74:04:78:C2:9C:00:80
authorityInfoAccess
  • CA Issuers - URI:http://e7.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://e7.c.lencr.org/22.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 12:F1:4E:34:BD:53:72:4C:84:06:19:C3:8F:3F:7A:13:
  • F8:E7:B5:62:87:88:9C:6D:30:05:84:EB:E5:86:26:3A
  • Timestamp : Sep 1 05:28:52.869 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:D5:A7:50:E4:40:36:5C:1B:BD:85:65:
  • 55:2C:5B:A1:18:91:95:3D:5F:CB:3A:B3:1A:1D:8B:D0:
  • AF:0E:01:6A:A9:02:20:52:D9:54:C7:2D:92:9D:5E:8B:
  • F7:31:27:5C:A8:C5:8F:33:D3:BB:13:25:33:7B:55:F2:
  • 54:C1:EC:4C:93:85:89
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CC:FB:0F:6A:85:71:09:65:FE:95:9B:53:CE:E9:B2:7C:
  • 22:E9:85:5C:0D:97:8D:B6:A9:7E:54:C0:FE:4C:0D:B0
  • Timestamp : Sep 1 05:28:54.883 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:86:C9:02:56:2C:9F:0B:7D:3E:12:23:
  • 9C:AD:7D:95:1E:4F:C3:3E:F7:40:F7:CE:EA:E8:97:BC:
  • AD:CD:26:73:96:02:21:00:D2:82:47:14:B1:16:B7:C7:
  • 65:1F:AE:90:E4:11:88:C0:65:F6:22:D0:E2:FB:CE:AE:
  • 50:9F:CE:EC:E4:B1:0A:BF