SSL check results of mail.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 15 Apr 2026 21:08:10 +0000

The mailservers of mail.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx01.mail.de
2001:868:100:600::210
10
supported
*.mail.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mx01.mail.de
62.201.172.18
10
supported
*.mail.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mx02.mail.de
2001:868:100:600::211
10
supported
*.mail.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s
mx02.mail.de
62.201.172.19
10
supported
*.mail.de
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @mail.de sender addresses. Test mail delivery

Host TLS Version & Cipher
shout02.mail.de (IPv6:2001:868:100:600::217)
TLSv1.2 AECDH-AES256-SHA
shout01.mail.de (IPv6:2001:868:100:600::216)
TLSv1.2 AECDH-AES256-SHA
shout11.mail.de (IPv6:2001:868:100:600::f153)
TLSv1.3 TLS_AES_256_GCM_SHA384
shout12.mail.de (IPv6:2001:868:100:600::f154)
TLSv1.3 TLS_AES_256_GCM_SHA384

Certificates

First seen at:

CN=*.mail.de

Certificate chain
  • *.mail.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • *.mail.de
Alternative Names
  • *.mail.de
  • mail.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2026-03-03
Not valid after
2026-06-01
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
68:0D:E3:E6:54:19:21:13:03:94:0A:53:BB:D8:C6:91:E6:BA:23:FE:15:B2:B8:7F:66:88:25:C6:82:5C:EE:6D
SHA1
F2:DE:26:92:25:13:97:45:12:35:3B:AD:C2:44:2E:22:EB:44:A3:87
X509v3 extensions
subjectKeyIdentifier
  • EB:30:CE:14:11:DC:3E:8A:18:74:E6:F5:B5:95:76:BC:C6:58:16:EC
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/38.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1A:8B:9D:69:4A:57:98:C8:99:A0:CA:88:BD:F4:8F:C0:
  • B4:56:60:CC:C3:60:0D:1F:71:F4:69:FF:C7:D1:AC:A3
  • Timestamp : Mar 3 11:06:00.742 2026 GMT
  • Extensions: 00:00:05:00:51:85:CB:B0
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:28:EE:49:67:21:51:4C:BE:E1:91:55:B4:
  • 90:DC:E1:D2:66:D8:A4:EF:6B:6B:2D:CC:52:5E:81:98:
  • 14:57:ED:B2:02:21:00:BF:31:ED:5E:AA:1B:97:D0:EC:
  • 6E:8F:2F:6C:A8:B7:44:A3:9C:32:04:99:A4:7C:C3:27:
  • 86:FA:F6:9D:8A:AA:AC
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : D1:6E:A9:A5:68:07:7E:66:35:A0:3F:37:A5:DD:BC:03:
  • A5:3C:41:12:14:D4:88:18:F5:E9:31:B3:23:CB:95:04
  • Timestamp : Mar 3 11:06:00.981 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:12:17:7C:EB:BE:42:52:4D:A3:5C:66:86:
  • 63:CC:7B:0B:94:38:1F:D7:46:E1:16:DE:BC:15:BC:54:
  • FD:EF:72:12:02:20:4B:58:66:A8:18:EF:2A:8B:92:5A:
  • 58:A9:DE:84:C1:36:8D:70:58:7B:7F:A5:4F:73:C4:28:
  • 84:05:1C:B1:78:5D

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mx01.mail.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mx01.mail.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid
_25._tcp.mx02.mail.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mx02.mail.de
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid