SSL check results of soft-xpansion.com

NEW You can also bulk check multiple servers.

Discover if the mail servers for soft-xpansion.com can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Fri, 21 Nov 2025 10:28:04 +0000

We can not guarantee a secure connection to the mailservers of soft-xpansion.com!

Please contact the operator of soft-xpansion.com and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/soft-xpansion.com

Servers

Incoming Mails

These servers are responsible for incoming mails to @soft-xpansion.com addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.soft-xpansion.com
89.22.103.33
Results incomplete
5 not checked
DANE
missing
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
1 s
mail.factsoft.de
116.202.56.139
15
supported
mailserv.factsoft.de
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
supported
  • SSL_RSA_WITH_RC4_128_SHA
  • SSL_RSA_EXPORT_WITH_RC4_40_MD5
  • TLSv1.0
  • SSLv3
1 s

Outgoing Mails

We have not received any emails from a @soft-xpansion.com address so far. Test mail delivery

Certificates

First seen at:

CN=mailserv.factsoft.de

Certificate chain
  • mailserv.factsoft.de
    • remaining
    • 4096 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • mailserv.factsoft.de
Alternative Names
  • mail.factsoft.de
  • mailserv.factsoft.de
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2025-11-08
Not valid after
2026-02-06
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
  • TLS Web Client Authentication
Fingerprints
SHA256
25:67:8E:9F:F5:DD:D5:18:DB:76:78:AA:48:DE:B3:C3:01:6C:AE:DB:21:E3:32:60:79:1E:DA:2D:3E:50:E7:14
SHA1
62:37:2B:B0:AF:80:29:C7:90:2B:95:6D:F8:72:95:4B:C9:27:1A:14
X509v3 extensions
subjectKeyIdentifier
  • 54:8E:EA:68:65:D9:2D:E6:88:52:C0:39:DA:2E:A6:A9:DD:99:78:0B
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/8.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 64:11:C4:6C:A4:12:EC:A7:89:1C:A2:02:2E:00:BC:AB:
  • 4F:28:07:D4:1E:35:27:AB:EA:FE:D5:03:C9:7D:CD:F0
  • Timestamp : Nov 8 08:34:38.671 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:EE:BE:14:F9:86:A0:F9:96:4E:E2:F0:
  • 04:48:27:60:E9:DC:7D:7A:4C:12:8F:E8:56:76:F9:49:
  • 09:F4:A9:8E:DC:02:21:00:EA:85:30:53:4E:C3:BB:A9:
  • 8A:77:77:4B:E9:BB:A6:1E:01:8B:7D:38:BC:7E:67:76:
  • B0:BF:12:62:AF:89:CF:AF
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : CB:38:F7:15:89:7C:84:A1:44:5F:5B:C1:DD:FB:C9:6E:
  • F2:9A:59:CD:47:0A:69:05:85:B0:CB:14:C3:14:58:E7
  • Timestamp : Nov 8 08:34:38.692 2025 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:20:2B:98:4D:D3:22:81:0D:33:90:D6:29:56:
  • 31:3E:D9:08:F0:D7:7B:FB:0D:B6:6D:60:A0:58:4B:A9:
  • 35:8A:00:2D:02:21:00:D8:76:CB:06:45:C5:80:BE:EC:
  • CF:89:DC:81:BB:67:C1:2B:74:5A:67:33:55:ED:7D:E8:
  • 2A:01:F6:46:21:C3:9C