SSL check results of mail.teragon.at

NEW You can also bulk check multiple servers.

Discover if the mail servers for mail.teragon.at can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Sun, 15 Jun 2025 00:31:51 +0000

No connection to the mailservers of mail.teragon.at could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mail.teragon.at addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.teragon.at
152.53.109.89
Results incomplete
-
supported
mail.teragon.at
DANE
errors
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
8 s

Outgoing Mails

We have not received any emails from a @mail.teragon.at address so far. Test mail delivery

Certificates

First seen at:

CN=mail.teragon.at

Certificate chain
Subject
Common Name (CN)
  • mail.teragon.at
Alternative Names
  • mail.teragon.at
  • www.mail.teragon.at
Issuer
Country (C)
  • AE
Organization (O)
  • SSL2BUY EMEA LLC
Common Name (CN)
  • SSL2BUY EMEA ECC Domain Validation Secure Server CA
validity period
Not valid before
2025-02-11
Not valid after
2026-03-14
This certifcate has been verified for the following usages:
  • Digital Signature
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
8A:55:F3:73:80:63:49:8A:B4:A8:CF:F4:2E:65:0E:6D:96:16:01:DF:AD:09:09:14:46:77:D7:2C:E5:31:8D:58
SHA1
2E:0A:51:EE:47:E3:30:C7:90:41:8D:39:9E:56:0E:41:58:9F:73:1E
X509v3 extensions
authorityKeyIdentifier
  • keyid:C4:6D:2F:B1:7D:22:CF:FA:44:13:AA:CB:A9:E5:0F:46:BA:73:3E:64
subjectKeyIdentifier
  • 69:B4:F9:BA:B3:3C:0B:42:D6:E4:3D:66:2D:FC:C0:B1:7C:8C:15:B4
certificatePolicies
  • Policy: 2.23.140.1.2.1
authorityInfoAccess
  • CA Issuers - URI:http://crt.sectigo.com/SSL2BUYEMEAECCDomainValidationSecureServerCA.crt
  • OCSP - URI:http://ocsp.sectigo.com
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:
  • E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6
  • Timestamp : Feb 11 10:06:19.016 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:BB:DB:F7:3A:22:D6:BB:ED:1F:A8:41:
  • 48:94:DB:BB:FC:DB:E7:80:49:DE:3D:08:F3:DB:B4:EC:
  • AC:DA:56:31:AD:02:20:6A:08:97:0F:E6:AF:F7:34:F6:
  • AB:62:58:07:E0:A4:1E:F6:20:9F:93:5E:62:CB:F6:FC:
  • C2:53:F7:7D:B4:41:7E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 19:86:D4:C7:28:AA:6F:FE:BA:03:6F:78:2A:4D:01:91:
  • AA:CE:2D:72:31:0F:AE:CE:5D:70:41:2D:25:4C:C7:D4
  • Timestamp : Feb 11 10:06:18.911 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:BA:89:80:91:8B:CC:30:27:B4:C1:F4:
  • DE:BD:28:5A:29:5E:C1:4B:1C:0A:02:E3:40:EC:B6:EA:
  • DF:C9:7F:01:A8:02:20:30:E7:5C:79:BE:B0:B8:30:89:
  • 94:04:8B:0D:00:6E:D3:A9:83:EF:A7:A4:B9:3F:FE:B7:
  • B0:42:E9:66:E8:9A:7B
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
  • F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
  • Timestamp : Feb 11 10:06:18.951 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:1F:1B:9A:55:5C:43:3C:0F:27:99:0A:FC:
  • 4B:6D:D4:E9:06:21:51:17:22:86:78:3D:AA:AD:7E:2E:
  • E8:8E:B3:0D:02:20:22:5A:80:E1:C1:DA:A6:4E:2B:66:
  • 1D:B2:A6:AE:F0:F5:04:5E:42:A3:A2:B2:F4:8A:AC:5F:
  • 24:56:CB:7B:D2:11

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mail.teragon.at
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
error
Debug