SSL check results of murl.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for murl.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Thu, 02 Apr 2026 18:27:06 +0000

We can not guarantee a secure connection to the mailservers of murl.de!

Please contact the operator of murl.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/murl.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @murl.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
nke.ipv64.net
2a01:4f8:c2c:d5a9::1
Results incomplete
10 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
nke.ipv64.net
193.159.132.221
10
supported
mxx.murl.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
3 s

Outgoing Mails

We have not received any emails from a @murl.de address so far. Test mail delivery

Certificates

First seen at:

emailAddress=matthias@murl.de,CN=mxx.murl.de,OU=home,O=privat,L=Munich,ST=Bayern,C=DE

Certificate chain
  • mxx.murl.de (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha1WithRSAEncryption
    • Hostname Mismatch
    • Expired
    • Unknown Authority

Subject
Country (C)
  • DE
State (ST)
  • Bayern
Locality (L)
  • Munich
Organization (O)
  • privat
Organizational Unit (OU)
  • home
Common Name (CN)
  • mxx.murl.de
Common Name is not included in Alternative Names
Email
  • matthias@murl.de
Alternative Names
  • email:matthias@murl.de
Issuer

Certificate is self-signed.

validity period
Not valid before
2010-02-07
Not valid after
2020-02-05
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
Fingerprints
SHA256
E3:73:CD:E4:FD:4B:59:CE:21:F6:41:07:1C:AE:FD:17:67:9D:ED:10:A8:E5:DC:88:88:4D:18:55:DE:01:7D:80
SHA1
B8:F5:8B:8E:91:E7:0A:73:C0:20:E2:19:0D:9A:A0:48:7D:DD:4C:52
X509v3 extensions
subjectKeyIdentifier
  • D4:C6:52:2A:DB:72:9C:45:4C:00:6C:87:D1:8B:CB:5E:C6:FA:20:83
authorityKeyIdentifier
  • keyid:00:9B:E3:65:33:02:FC:DC:5F:71:04:08:A6:3F:94:18:A9:CC:4A:98
  • DirName:/C=DE/ST=Bayern/L=Munich/O=privat/OU=home/CN=mxx.murl.de/emailAddress=matthias@murl.de
  • serial:98:93:C1:1C:4B:A8:35:90
issuerAltName
  • email:matthias@murl.de
crlDistributionPoints
  • Full Name:
  • URI:http://mystic.pca.dfn.de/SCA.crl
nsCertType
  • SSL Server
nsBaseUrl
  • http://www.dfn-pca.de/
nsCaPolicyUrl
  • http://www.dfn-pca.de/certification/policies/x509policy.html
nsComment
  • This certificate was issued by a Server CA
nsRevocationUrl
  • cgi/non-CA-rev.cgi?