SSL check results of m.inver.sk

NEW You can also bulk check multiple servers.

Discover if the mail servers for m.inver.sk can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 26 Apr 2026 00:30:27 +0000

The mailservers of m.inver.sk can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @m.inver.sk addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
m.inver.sk
5.178.52.114
-
supported
m.inver.sk
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s

Outgoing Mails

We have not received any emails from a @m.inver.sk address so far. Test mail delivery

Certificates

First seen at:

CN=m.inver.sk

Certificate chain
  • m.inver.sk
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • m.inver.sk
Alternative Names
  • admin.inver.sk
  • m.inver.sk
  • sogo.inver.sk
  • wm.inver.sk
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2026-03-14
Not valid after
2026-06-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
21:C1:FC:FD:EC:61:16:89:FA:70:89:1F:44:8C:9D:15:84:EF:D1:01:34:50:74:B8:C5:09:17:5F:09:39:40:59
SHA1
39:05:B4:FD:0A:B7:94:49:CD:46:EC:83:16:59:1D:F2:B9:D1:7A:F6
X509v3 extensions
subjectKeyIdentifier
  • 05:97:D9:5E:8D:FD:16:63:E7:3F:46:BF:37:A3:C6:C6:DA:E4:DC:E4
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/68.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:
  • 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3
  • Timestamp : Mar 14 21:23:11.272 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:51:48:4E:19:D7:8C:0A:59:B5:8D:A4:7B:
  • 3C:20:8E:CD:CF:C1:D2:04:DC:1C:0F:8F:8C:24:92:01:
  • 90:B9:E4:0A:02:20:43:E9:56:61:E1:97:6A:47:F4:C4:
  • 48:86:E1:DD:6E:61:C2:28:FB:9C:6D:9C:5F:B8:BC:90:
  • B8:2A:03:B2:3B:52
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : E3:23:8D:F2:8D:A2:88:E0:AA:E0:AC:F0:FA:90:C9:85:
  • F0:B6:BF:F5:D2:A5:27:B0:01:FC:1C:44:58:C4:B6:E8
  • Timestamp : Mar 14 21:23:11.524 2026 GMT
  • Extensions: 00:00:05:00:35:93:09:E6
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:33:81:91:93:01:5A:EB:C4:B3:14:28:BC:
  • D7:D0:6E:9A:70:66:33:78:20:29:1B:E3:82:31:10:C4:
  • EC:D5:AD:B6:02:21:00:C4:45:64:80:CC:1A:05:30:BB:
  • 35:CC:F4:04:D4:B6:B6:6E:4F:D7:D1:B2:0A:3E:42:90:
  • 76:0B:9F:1A:AB:30:BA

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.m.inver.sk
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug
valid