SSL check results of op.kickbuzz.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for op.kickbuzz.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 10 Oct 2025 00:31:01 +0000

We can not guarantee a secure connection to the mailservers of op.kickbuzz.de!

Please contact the operator of op.kickbuzz.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/op.kickbuzz.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @op.kickbuzz.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
op.kickbuzz.de
176.9.8.119
-
supported
ci
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s
op.kickbuzz.de
2a01:4f8:141:515b::2
Results incomplete
- not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @op.kickbuzz.de address so far. Test mail delivery

Certificates

First seen at:

CN=ci

Certificate chain
  • ci (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • ci
Alternative Names
  • ci
Issuer

Certificate is self-signed.

validity period
Not valid before
2019-12-16
Not valid after
2029-12-13
Fingerprints
SHA256
94:55:7A:F4:7D:6C:CA:66:EE:F9:E6:FC:43:CC:1E:7F:49:C3:CA:E8:34:11:5A:A9:E1:33:31:24:31:64:7C:57
SHA1
7A:32:26:B7:89:EB:64:0B:A4:12:B8:B2:00:D7:E8:CB:DB:C8:87:78