SSL check results of mucciarelli.it

NEW You can also bulk check multiple servers.

Discover if the mail servers for mucciarelli.it can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 03 Aug 2021 11:11:14 +0000

No connection to the mailservers of mucciarelli.it could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @mucciarelli.it addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.mucciarelli.it
87.241.34.11
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
smtp.ipnext.it
212.121.67.25
Results incomplete
90
supported
*.ipnext.it
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • SSLv3
2 s
smtp.ipnext.it
212.121.67.26
Results incomplete
90
supported
*.ipnext.it
DANE
missing
PFS
unsupported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • TLSv1.2
  • SSLv3
2 s

Outgoing Mails

We have received emails from these servers with @mucciarelli.it sender addresses. Test mail delivery

Host TLS Version & Cipher
smtpcmd13146.aruba.it (62.149.156.146)
Insecure - not encrypted!

Certificates

First seen at:

CN=*.ipnext.it

Certificate chain
Subject
Common Name (CN)
  • *.ipnext.it
Alternative Names
  • *.ipnext.it
  • ipnext.it
Issuer
Country (C)
  • BE
Organization (O)
  • GlobalSign nv-sa
Common Name (CN)
  • GlobalSign GCC R3 DV TLS CA 2020
validity period
Not valid before
2021-02-08
Not valid after
2022-03-12
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
52:20:AC:9A:7E:A0:63:7A:23:95:AA:0F:CA:74:4E:37:90:FF:2E:92:3D:95:3C:FB:47:6F:AF:40:12:E3:31:00
SHA1
85:1F:1D:6F:29:9E:7A:FE:15:C4:8D:22:4C:08:7C:61:F3:B7:84:40
X509v3 extensions
authorityInfoAccess
  • CA Issuers - URI:http://secure.globalsign.com/cacert/gsgccr3dvtlsca2020.crt
  • OCSP - URI:http://ocsp.globalsign.com/gsgccr3dvtlsca2020
certificatePolicies
  • Policy: 1.3.6.1.4.1.4146.1.10
  • CPS: https://www.globalsign.com/repository/
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://crl.globalsign.com/gsgccr3dvtlsca2020.crl
authorityKeyIdentifier
  • keyid:0D:98:C0:73:7F:AB:BD:BD:D9:47:4B:49:AD:0A:4A:0C:AC:3E:C7:7C
subjectKeyIdentifier
  • 5F:CE:02:0E:6F:50:2A:97:C3:45:94:05:EF:09:D8:DB:4A:6D:89:69
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 29:79:BE:F0:9E:39:39:21:F0:56:73:9F:63:A5:77:E5:
  • BE:57:7D:9C:60:0A:F8:F9:4D:5D:26:5C:25:5D:C7:84
  • Timestamp : Feb 8 11:35:08.980 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:33:7F:C1:3C:72:4F:AE:6C:50:DE:C1:AE:
  • 09:EA:39:2C:6F:17:38:EC:35:46:A6:C6:83:6F:C6:4B:
  • 3B:BB:B4:3A:02:21:00:8B:C4:D3:E5:2F:9B:2C:54:D6:
  • 06:47:4F:D6:52:6C:2F:80:0C:E1:5C:F0:4B:F7:2A:4A:
  • 67:5C:E0:66:CD:27:71
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 51:A3:B0:F5:FD:01:79:9C:56:6D:B8:37:78:8F:0C:A4:
  • 7A:CC:1B:27:CB:F7:9E:88:42:9A:0D:FE:D4:8B:05:E5
  • Timestamp : Feb 8 11:35:08.310 2021 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:E9:16:32:95:F9:52:73:F4:9B:82:1C:
  • B6:E3:51:7B:4F:C0:2F:C7:B2:42:93:C5:35:07:80:16:
  • 1A:38:1B:41:46:02:20:72:B2:55:F9:90:E2:DD:80:A2:
  • 76:4A:55:48:01:14:07:A6:63:58:5E:C1:D7:EA:A8:F1:
  • 63:33:AF:78:FD:13:61