SSL check results of ieleven.eu

NEW You can also bulk check multiple servers.

Discover if the mail servers for ieleven.eu can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 18 Sep 2025 00:30:19 +0000

We can not guarantee a secure connection to the mailservers of ieleven.eu!

Please contact the operator of ieleven.eu and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/ieleven.eu

Servers

Incoming Mails

These servers are responsible for incoming mails to @ieleven.eu addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
smtp.i11-sh.de
2a01:4f9:1a:9e88:cafe::519e
10
supported
smtp.i11-sh.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s
smtp.i11-sh.de
5.230.226.78
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
7 s

Outgoing Mails

We have not received any emails from a @ieleven.eu address so far. Test mail delivery

Certificates

First seen at:

CN=smtp.i11-sh.de

Certificate chain
  • smtp.i11-sh.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R12
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • smtp.i11-sh.de
Alternative Names
  • smtp.i11-sh.de
  • smtp.ieleven.eu
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R12
validity period
Not valid before
2025-09-17
Not valid after
2025-12-16
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
CB:DA:80:54:47:E9:06:12:EB:BD:6B:80:54:D8:A6:0A:BC:79:BF:BE:1C:E6:C7:34:F0:91:68:12:43:66:EF:04
SHA1
D0:1B:23:78:00:CD:03:AF:EE:FD:A3:14:3E:88:2E:7A:6B:2E:06:F4
X509v3 extensions
subjectKeyIdentifier
  • 72:69:EA:11:8B:88:A5:F5:B7:19:97:8B:EA:BA:15:BF:BA:37:7D:C1
authorityKeyIdentifier
  • keyid:00:B5:29:F2:2D:8E:6F:31:E8:9B:4C:AD:78:3E:FA:DC:E9:0C:D1:D2
authorityInfoAccess
  • CA Issuers - URI:http://r12.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r12.c.lencr.org/48.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A4:42:C5:06:49:60:61:54:8F:0F:D4:EA:9C:FB:7A:2D:
  • 26:45:4D:87:A9:7F:2F:DF:45:59:F6:27:4F:3A:84:54
  • Timestamp : Sep 17 13:54:22.619 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:C2:E3:5B:4B:49:01:95:D8:48:53:3C:
  • 73:56:30:09:06:1F:9C:FC:F4:0C:8F:0B:BE:EA:F7:66:
  • 88:8F:91:5A:7F:02:20:48:92:9B:32:F1:E2:CD:7B:46:
  • A9:94:4E:C6:2C:B9:A6:E3:B5:F3:83:7C:6D:8D:35:7D:
  • A5:B1:4A:3B:F6:91:96
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 0D:E1:F2:30:2B:D3:0D:C1:40:62:12:09:EA:55:2E:FC:
  • 47:74:7C:B1:D7:E9:30:EF:0E:42:1E:B4:7E:4E:AA:34
  • Timestamp : Sep 17 13:54:22.630 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:49:11:59:DF:57:28:7C:45:B0:5F:7F:C2:
  • AD:00:1B:FA:B3:24:12:F1:31:96:2A:23:3E:47:2E:09:
  • 90:F4:FC:88:02:20:28:E4:9A:39:36:DE:60:70:98:A5:
  • C1:06:62:69:51:20:DE:E7:78:21:D8:06:DC:CE:26:0D:
  • 56:FE:0E:56:6F:D8

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.smtp.i11-sh.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid