SSL check results of till-wiese.de

NEW You can also bulk check multiple servers.

Discover if the mail servers for till-wiese.de can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Wed, 08 Apr 2026 05:59:16 +0000

We can not guarantee a secure connection to the mailservers of till-wiese.de!

Please contact the operator of till-wiese.de and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/till-wiese.de

Servers

Incoming Mails

These servers are responsible for incoming mails to @till-wiese.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
aspmx1.migadu.com
2001:41d0:403:4876::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
2001:41d0:303:d163::1
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
17 s
aspmx1.migadu.com
2001:41d0:403:58f0::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
2001:41d0:303:ff4d::1
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
2001:41d0:303:e224::
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
141.94.97.118
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
51.178.91.99
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx1.migadu.com
141.94.75.77
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
45 s
aspmx1.migadu.com
51.210.223.36
10
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
48 s
aspmx1.migadu.com
57.128.22.240
Results incomplete
10
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
2001:41d0:403:58f0::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
2001:41d0:303:d163::1
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx2.migadu.com
2001:41d0:303:e224::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx2.migadu.com
2001:41d0:403:4876::
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
16 s
aspmx2.migadu.com
2001:41d0:303:ff4d::1
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
141.94.75.77
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
48 s
aspmx2.migadu.com
51.210.223.36
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
141.94.97.118
20
supported
aspmx1.migadu.com
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
42 s
aspmx2.migadu.com
51.178.91.99
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s
aspmx2.migadu.com
57.128.22.240
Results incomplete
20
unsupported
not checked
DANE
errors
PFS
not checked
Heartbleed
not checked
Weak ciphers
not checked
11 s

Outgoing Mails

We have not received any emails from a @till-wiese.de address so far. Test mail delivery

Certificates

First seen at:

CN=aspmx1.migadu.com

Certificate chain
  • aspmx1.migadu.com
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption

      • R13
        • remaining
        • 2048 bit
        • sha256WithRSAEncryption

          • ISRG Root X1 (Certificate is self-signed.)
            • remaining
            • 4096 bit
            • sha256WithRSAEncryption

Subject
Common Name (CN)
  • aspmx1.migadu.com
Alternative Names
  • aspmx1.migadu.com
  • aspmx2.migadu.com
  • mx.migadu.com
Issuer
Country (C)
  • US
Organization (O)
  • Let's Encrypt
Common Name (CN)
  • R13
validity period
Not valid before
2026-02-28
Not valid after
2026-05-29
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
D1:9E:74:C4:D8:34:8E:38:BD:4E:54:15:D9:28:26:5C:E9:2E:9D:18:D1:BD:88:52:16:AC:B3:54:DB:A8:5E:02
SHA1
9D:CA:35:A0:6A:05:65:6C:DA:1C:3C:AF:31:59:2F:7D:28:B4:73:8E
X509v3 extensions
subjectKeyIdentifier
  • 55:88:A3:6D:D5:F0:81:53:E6:AB:AC:0F:3A:69:4D:35:6F:CE:08:36
authorityKeyIdentifier
  • keyid:E7:AB:9F:0F:2C:33:A0:53:D3:5E:4F:78:C8:B2:84:0E:3B:D6:92:33
authorityInfoAccess
  • CA Issuers - URI:http://r13.i.lencr.org/
certificatePolicies
  • Policy: 2.23.140.1.2.1
crlDistributionPoints
  • Full Name:
  • URI:http://r13.c.lencr.org/36.crl
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 49:9C:9B:69:DE:1D:7C:EC:FC:36:DE:CD:87:64:A6:B8:
  • 5B:AF:0A:87:80:19:D1:55:52:FB:E9:EB:29:DD:F8:C3
  • Timestamp : Feb 28 05:04:33.499 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:DF:1C:5D:F8:F2:0E:32:0E:DE:0B:1F:
  • EF:FF:C7:1B:50:5A:63:53:22:32:90:E9:29:55:B7:C4:
  • 1D:E5:31:FC:09:02:20:2B:3C:16:39:45:BD:15:F5:16:
  • 1D:87:FE:F6:5A:0F:E1:DB:13:E1:B6:83:6F:73:65:2C:
  • 16:30:CD:5F:31:86:89
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 96:97:64:BF:55:58:97:AD:F7:43:87:68:37:08:42:77:
  • E9:F0:3A:D5:F6:A4:F3:36:6E:46:A4:3F:0F:CA:A9:C6
  • Timestamp : Feb 28 05:04:33.577 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:DD:A0:57:3B:94:01:68:75:F2:3D:F6:
  • BE:94:03:50:C6:4E:67:11:F6:42:C2:EA:61:2E:F0:08:
  • 67:2F:D5:36:12:02:21:00:82:1E:28:26:C2:62:F5:C0:
  • 4A:D7:A1:8E:D1:09:7E:BF:40:01:66:37:D8:08:9A:3A:
  • 87:6F:EA:CC:5F:5F:7C:9B

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.aspmx2.migadu.com
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.aspmx1.migadu.com
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid