SSL check results of toptranslation.it

NEW You can also bulk check multiple servers.

Discover if the mail servers for toptranslation.it can be reached through a secure connection.

To establish a secure connection a mail server has to offer STARTTLS (SSL), a trustworthy SSL certificate, support for the Diffie-Hellman-Algorithm to guarantee Perfect Forward Secrecy and must not be vulnerable against the Heartbleed attack. Futhermore we recommend using end-to-end encryption with GnuPG.

Summary

Report created Tue, 06 Apr 2021 14:44:52 +0000

We can not guarantee a secure connection to the mailservers of toptranslation.it!

Please contact the operator of toptranslation.it and ask him or her to solve this problem. This result stays accessible under the following address:

/mailservers/toptranslation.it

Servers

Incoming Mails

These servers are responsible for incoming mails to @toptranslation.it addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mail.toptranslation.it
79.10.246.86
Results incomplete
10
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
1 s
toptranslation.duckdns.org
79.10.246.86
Results incomplete
20
supported
not checked
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • SSLv3
6 s
mx10.serverlet.com
178.32.137.64
30
supported
Debian9
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s
mx11.serverlet.com
185.24.68.164
40
supported
Debian9
DANE
missing
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
2 s

Outgoing Mails

We have not received any emails from a @toptranslation.it address so far. Test mail delivery

Certificates

First seen at:

CN=Debian9

Certificate chain
  • Debian9 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • Debian9
Alternative Names
  • Debian9
Issuer

Certificate is self-signed.

validity period
Not valid before
2018-11-26
Not valid after
2028-11-23
Fingerprints
SHA256
A6:8C:5F:61:84:0F:D5:C0:92:36:4F:37:CD:59:4B:78:E8:3D:6B:94:85:D7:F7:C2:A0:24:BA:0E:33:B5:F0:AB
SHA1
47:38:BC:B4:F6:E5:16:BC:B2:A0:3D:76:2D:C7:B9:F9:11:AC:AF:62
First seen at:

CN=Debian9

Certificate chain
  • Debian9 (Certificate is self-signed.)
    • remaining
    • 2048 bit
    • sha256WithRSAEncryption
    • Hostname Mismatch
    • Unknown Authority

Subject
Common Name (CN)
  • Debian9
Alternative Names
  • Debian9
Issuer

Certificate is self-signed.

validity period
Not valid before
2018-11-26
Not valid after
2028-11-23
Fingerprints
SHA256
2B:EF:DD:6C:9D:E3:C4:FF:36:EF:9E:F1:AD:00:9B:62:B4:E5:53:3E:54:C7:BB:CF:80:61:07:1F:96:85:E1:20
SHA1
83:28:0F:83:FA:B8:E1:03:52:E8:C5:66:6B:50:19:A2:5A:3F:B8:9C