SSL check results of mail.selfmodif.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.selfmodif.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Mon, 27 Oct 2025 14:47:54 +0000

We can not guarantee a secure connection to the mailservers of mail.selfmodif.com!

Please contact the operator of mail.selfmodif.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/mail.selfmodif.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.selfmodif.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.selfmodif.com
95.142.64.149
-
supported
mail.selfmodif.com
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mail.selfmodif.com
2a00:1100:fe:80:1004::99
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s

Outgoing Mails

We have not received any emails from a @mail.selfmodif.com address so far. Test mail delivery

Certificates

First seen at:

CN=mail.selfmodif.com

Certificate chain
  • mail.selfmodif.com
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption
    • Expired
    • Unknown Authority

      Sectigo RSA Domain Validation Secure Server CA
Subject
Common Name (CN)
  • mail.selfmodif.com
Alternative Names
  • mail.selfmodif.com
  • www.mail.selfmodif.com
Issuer
Country (C)
  • GB
State (ST)
  • Greater Manchester
Locality (L)
  • Salford
Organization (O)
  • Sectigo Limited
Common Name (CN)
  • Sectigo RSA Domain Validation Secure Server CA
validity period
Not valid before
2020-12-11
Not valid after
2022-01-11
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
47:8E:10:9E:56:8A:AD:6C:81:51:60:31:B8:34:89:6D:0D:E9:42:79:BA:05:3C:74:AA:06:9F:4D:5D:8A:A4:0B
SHA1
EA:D9:68:83:EE:F5:33:AF:86:5D:E1:7F:E7:E5:34:BD:ED:40:A0:1A
X509v3 extensions
authorityKeyIdentifier
  • keyid:8D:8C:5E:C4:54:AD:8A:E1:77:E9:9B:F9:9B:05:E1:B8:01:8D:61:E1
subjectKeyIdentifier
  • 04:36:AB:93:07:10:5B:1C:54:3B:5A:02:C8:96:B1:B0:9F:61:4E:0A
certificatePolicies
  • Policy: 1.3.6.1.4.1.6449.1.2.2.7
  • CPS: https://sectigo.com/CPS
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 46:A5:55:EB:75:FA:91:20:30:B5:A2:89:69:F4:F3:7D:
  • 11:2C:41:74:BE:FD:49:B8:85:AB:F2:FC:70:FE:6D:47
  • Timestamp : Dec 11 14:03:29.879 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:81:D5:A2:CD:20:8F:31:4C:30:A7:BD:
  • 2E:07:E9:41:D9:08:80:27:5A:3B:16:A8:20:3C:C8:63:
  • 81:4F:24:FE:2D:02:20:32:A8:C8:B1:DB:73:CE:10:D2:
  • E4:A5:1A:D4:97:C5:54:07:0F:FE:2A:8B:3F:5D:AC:C1:
  • AD:13:8B:B0:FF:29:3C
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : DF:A5:5E:AB:68:82:4F:1F:6C:AD:EE:B8:5F:4E:3E:5A:
  • EA:CD:A2:12:A4:6A:5E:8E:3B:12:C0:20:44:5C:2A:73
  • Timestamp : Dec 11 14:03:29.919 2020 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:9A:B7:3A:19:FB:26:71:52:5B:8E:77:
  • F8:7D:12:9D:31:35:FB:98:6F:4B:DA:DC:2F:01:5D:63:
  • 8C:6B:75:99:6A:02:20:61:9B:17:4D:64:FA:36:C5:57:
  • D5:78:F8:77:A1:B1:86:54:A8:F9:22:33:65:DD:C6:54:
  • F1:91:33:BF:35:99:6C