SSL check results of posta.muko.cz

NEW You can also bulk check multiple servers.

Discover if the webservers of posta.muko.cz can be reached through a secure connection.

Summary

Report created Tue, 03 Mar 2026 19:06:18 +0000

The webservers of posta.muko.cz can be reached through a secure connection.

Servers

Hostname / IP address Certificates Protocol
posta.muko.cz
86.61.149.149
posta.muko.cz
HSTS
missing
DANE
valid
PFS
supported
Heartbleed
not vulnerable
Weak ciphers
not found
  • TLSv1.2
  • TLSv1.1
  • TLSv1.0
  • SSLv3
1 s

Certificates

First seen at:

CN=posta.muko.cz

Certificate chain
Subject
Common Name (CN)
  • posta.muko.cz
Alternative Names
  • posta.muko.cz
Issuer
Country (C)
  • US
Organization (O)
  • DigiCert Inc
Organizational Unit (OU)
  • www.digicert.com
Common Name (CN)
  • RapidSSL TLS RSA CA G1
validity period
Not valid before
2026-03-03
Not valid after
2026-09-17
This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Server Authentication
Fingerprints
SHA256
A3:41:ED:79:D4:21:24:BB:50:BA:F3:EB:11:BE:9E:76:9D:26:9E:89:04:9A:6E:2E:9B:1D:8C:5B:A2:C7:57:96
SHA1
77:5B:C4:9C:6C:71:61:BA:EC:A5:F5:64:AD:CC:92:01:45:08:2E:C7
X509v3 extensions
authorityKeyIdentifier
  • keyid:0C:DB:6C:82:49:0F:4A:67:0A:B8:14:EE:7A:C4:48:52:88:EB:56:38
subjectKeyIdentifier
  • F6:6A:60:EE:6F:3A:DE:64:F3:C9:BC:A9:EB:FE:D6:15:87:3C:B5:6F
certificatePolicies
  • Policy: 2.23.140.1.2.1
  • CPS: http://www.digicert.com/CPS
crlDistributionPoints
  • Full Name:
  • URI:http://cdp.rapidssl.com/RapidSSLTLSRSACAG1.crl
authorityInfoAccess
  • OCSP - URI:http://status.rapidssl.com
  • CA Issuers - URI:http://cacerts.rapidssl.com/RapidSSLTLSRSACAG1.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : C2:31:7E:57:45:19:A3:45:EE:7F:38:DE:B2:90:41:EB:
  • C7:C2:21:5A:22:BF:7F:D5:B5:AD:76:9A:D9:0E:52:CD
  • Timestamp : Mar 3 10:11:55.390 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:EC:69:7C:93:8B:25:36:CA:39:D3:D6:
  • 50:ED:82:C0:62:2C:FA:48:39:56:12:47:A8:46:AE:FD:
  • 7B:1E:47:C1:05:02:20:4A:73:04:54:73:45:68:59:F5:
  • F4:C4:2F:B3:1A:C8:69:D3:F0:DB:CA:94:72:8B:EF:6E:
  • FD:A7:FF:8A:34:48:B0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : D7:6D:7D:10:D1:A7:F5:77:C2:C7:E9:5F:D7:00:BF:F9:
  • 82:C9:33:5A:65:E1:D0:B3:01:73:17:C0:C8:C5:69:77
  • Timestamp : Mar 3 10:11:55.386 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:6F:91:F8:D3:6D:EE:5D:56:DA:B3:39:D6:
  • 2E:6C:E0:26:3F:EA:FC:FB:DE:68:42:80:3C:EE:25:44:
  • C1:43:BE:0F:02:20:08:2E:60:FD:EB:99:59:4F:7C:57:
  • 96:50:48:3F:6B:16:40:1C:B4:1E:1F:53:62:9E:CB:30:
  • 3D:21:B8:05:01:46
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 94:4E:43:87:FA:EC:C1:EF:81:F3:19:24:26:A8:18:65:
  • 01:C7:D3:5F:38:02:01:3F:72:67:7D:55:37:2E:19:D8
  • Timestamp : Mar 3 10:11:55.401 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:C9:5F:E7:3C:7D:A2:45:50:29:6D:C3:
  • 86:1D:B2:03:CC:85:B5:6F:67:7C:92:E2:15:EA:15:0B:
  • F7:D4:F2:E9:5F:02:21:00:83:43:06:FF:9E:13:14:34:
  • BE:E2:B2:28:28:12:40:7E:AF:DF:46:2A:F0:A7:EC:88:
  • 00:CE:6C:30:A6:78:C7:5C

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_443._tcp.posta.muko.cz
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
valid