SSL check results of mallouki.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for mallouki.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 25 Apr 2024 06:48:05 +0000

The mailservers of mallouki.de can be reached through a secure connection.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mallouki.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mallouki.de
46.163.116.48
0
supported
mallouki.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
mail.mallouki.de
46.163.116.48
10
supported
mallouki.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @mallouki.de address so far. Test mail delivery

Certificates

First seen at:

CN=mallouki.de

Certificate chain
  • mallouki.de
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R3
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mallouki.de
Alternative Names
  • *.mallouki.de
  • mallouki.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R3
validity period
Not valid before
2024-03-02
Not valid after
2024-05-31
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
E4:02:AB:CF:31:F6:38:C6:D7:36:D1:4F:A6:24:7C:AA:2E:14:E7:33:C6:72:85:3C:51:E6:C2:36:80:92:B2:DA
SHA1
0A:C5:20:64:66:22:22:A4:97:EB:BA:5E:AA:0B:70:B3:81:37:63:26
X509v3 extensions
subjectKeyIdentifier
  • 9E:2B:B0:2F:58:2E:25:7F:7C:00:9E:78:B3:42:37:CD:32:43:B8:10
authorityKeyIdentifier
  • keyid:14:2E:B3:17:B7:58:56:CB:AE:50:09:40:E6:1F:AF:9D:8B:14:C2:C6
authorityInfoAccess
  • OCSP - URI:http://r3.o.lencr.org
  • CA Issuers - URI:http://r3.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB:
  • 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73
  • Timestamp : Mar 2 22:45:10.592 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:73:79:F9:DD:5F:06:1C:82:9E:33:DA:86:
  • 21:E0:FA:86:3E:DA:8B:48:EE:96:20:20:10:A8:E2:BF:
  • CA:A5:01:6F:02:21:00:91:7B:D9:9A:97:05:89:F7:E0:
  • 01:E6:C5:2B:26:61:98:66:9C:64:DB:EB:5D:BB:69:58:
  • 1D:50:06:BB:F6:EC:16
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:E2:BF:D6:1E:DE:2F:2F:07:A0:D6:4E:6D:37:A7:DC:
  • 65:43:B0:C6:B5:2E:A2:DA:B7:8A:F8:9A:6D:F5:17:D8
  • Timestamp : Mar 2 22:45:10.763 2024 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:B6:F8:0F:7C:AB:6F:27:5D:0B:3F:BB:
  • 71:61:5B:14:ED:2E:3A:59:CE:F0:43:53:21:3F:A2:B8:
  • 8A:F8:87:59:BC:02:21:00:CC:FD:68:4A:D6:9C:1F:D1:
  • 09:FB:17:9C:C3:EC:43:E0:12:5C:1A:69:6A:78:D4:6C:
  • 2D:2D:03:25:C3:BD:14:10