SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
It's all good. We have not detected any issues.
Hostname: | done Matches Common Name or/and SAN |
Expired: | done No (62 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | done Yes, we were able to verify the certificate |
Self-Signed: | done No, the end-entity certificate is not self-signed |
Chain Issues: | done No, we were unable to detect any issues in the certificate chain sent by the server |
Weak signatures: | done No, certificates sent by the server were not signed utilizing a weak hash function |
OCSP Status: | done OCSP Responder returned "good" status for the end-entity certificate |
DNS Information
Resolves To: | 209.126.84.122 |
Reverse IP lookup: | vmi2201708.contaboserver.net. |
Nameserver: | ns3.directnic.com. |
Nameserver: | ns0.directnic.com. |
Nameserver: | ns2.directnic.com. |
Nameserver: | ns1.directnic.com. |
General Information
Common Name: | *.my-elixir-dev.xyz |
SANs: | DNS:*.my-elixir-dev.xyz Total number of SANs: 1 |
Signature Algorithm: | ecdsa-with-SHA384 |
Key Type: | ECDSA (secp256r1) |
Key size: | 256 bits |
Serial Number: | 46a41e5c82f147d324e30ac2c73872887f5 |
Not Before: | Jan 08, 2025 18:30:13 GMT |
Not After: | Apr 08, 2025 18:30:12 GMT |
Number of certs: | 2 |
Revocation Status: | good |
OCSP Stapling: | Not Supported |
Server: | nginx/1.16.0 |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: *.my-elixir-dev.xyz
Decode this certificate for verbose information → launchSubject Common Name | *.my-elixir-dev.xyz |
Issuer Common Name | E6 |
Issuer Organization | Let's Encrypt |
Not Before: | Jan 08, 2025 18:30:13 GMT |
Not After: | Apr 08, 2025 18:30:12 GMT |
Signature Algorithm: | ecdsa-with-SHA384 |
Serial Number: | 46a41e5c82f147d324e30ac2c73872887f5 |
SHA1 Fingerprint: | F0:1C:06:F6:95:43:82:63:A0:5A:4B:BC:12:82:B9:16:81:88:F5:C1 |
MD5 Fingerprint: | A5:03:E4:06:D2:A7:9A:25:BD:78:14:D5:96:6E:64:B2 |
Certificate # 2 - Common Name: E6
Decode this certificate for verbose information → launchIn place? | Yes, this certificate directly certifies the preceding one |
Subject Common Name | E6 |
Subject Organization | Let's Encrypt |
Issuer Common Name | ISRG Root X1 |
Issuer Organization | Internet Security Research Group |
Not Before: | Mar 13, 2024 00:00:00 GMT |
Not After: | Mar 12, 2027 23:59:59 GMT |
Signature Algorithm: | sha256WithRSAEncryption |
Serial Number: | b0573e9173972770dbb487cb3a452b38 |
SHA1 Fingerprint: | C9:4D:C4:83:1A:90:1A:9F:EC:0F:B4:9B:71:BD:49:B5:AA:D4:FA:D0 |
MD5 Fingerprint: | 26:86:4C:28:A4:DE:37:F5:69:C1:EC:87:A0:EC:CB:27 |
OpenSSL Handshake
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1 verify return:1 depth=1 C = US, O = Let's Encrypt, CN = E6 verify return:1 depth=0 CN = *.my-elixir-dev.xyz verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:CN = *.my-elixir-dev.xyz i:C = US, O = Let's Encrypt, CN = E6 -----BEGIN CERTIFICATE----- MIIDiDCCAw6gAwIBAgISBGpB5cgvFH0yTjCsLHOHKIf1MAoGCCqGSM49BAMDMDIx CzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQDEwJF NjAeFw0yNTAxMDgxODMwMTNaFw0yNTA0MDgxODMwMTJaMB4xHDAaBgNVBAMMEyou bXktZWxpeGlyLWRldi54eXowWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAS9RQcL jp0QDdJZCCiEkDGUKsM2wCBAkfS40A9vWgEMMVZwFbOmIv+lwNtQqC+z19lQI4Mj rgupivsuZNBcy2kMo4ICFjCCAhIwDgYDVR0PAQH/BAQDAgeAMB0GA1UdJQQWMBQG CCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSSbLgP u7Z1BMKs4QTSLBw/be0b2jAfBgNVHSMEGDAWgBSTJ0aYA6lRaI6Y1sRCSNsjv1iU 0jBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9lNi5vLmxlbmNy Lm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL2U2LmkubGVuY3Iub3JnLzAeBgNVHREE FzAVghMqLm15LWVsaXhpci1kZXYueHl6MBMGA1UdIAQMMAowCAYGZ4EMAQIBMIIB BQYKKwYBBAHWeQIEAgSB9gSB8wDxAHcAouMK5EXvva2bfjjtR2d3U9eCW4SU1yte GyzEuVCkR+cAAAGUR2QAJQAABAMASDBGAiEAn9mZcu02HfM8dq6600xS9ui9Na22 7AxOrk01vjUpBnwCIQCdlNSMUgALHqI3HxFRi0oSnJFzpmAqXehFtS0n2pB1bQB2 AMz7D2qFcQll/pWbU87psnwi6YVcDZeNtql+VMD+TA2wAAABlEdkADcAAAQDAEcw RQIgfEBSwpFnzQ3tTDqYHsp9eW3LwAtKi2CWe40JAsoS8tYCIQDvdgXjgMNgL32C OHn9E9xNXQ1ySCRkzhB42D/08CVwcDAKBggqhkjOPQQDAwNoADBlAjBjdffmlfgz dxSvAwxO7HQx6vdIDVjvMwiZjgr/V+A3/NJ3PKSoa3x9hsgJST+NQZUCMQDS51JE q2YIbyVyJRcWQ+B1SGVlpE23CHIQX3bSV/v9z9wjicHIoEhyEpFDui1pPOs= -----END CERTIFICATE----- 1 s:C = US, O = Let's Encrypt, CN = E6 i:C = US, O = Internet Security Research Group, CN = ISRG Root X1 -----BEGIN CERTIFICATE----- MIIEVzCCAj+gAwIBAgIRALBXPpFzlydw27SHyzpFKzgwDQYJKoZIhvcNAQELBQAw TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjQwMzEzMDAwMDAw WhcNMjcwMzEyMjM1OTU5WjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg RW5jcnlwdDELMAkGA1UEAxMCRTYwdjAQBgcqhkjOPQIBBgUrgQQAIgNiAATZ8Z5G h/ghcWCoJuuj+rnq2h25EqfUJtlRFLFhfHWWvyILOR/VvtEKRqotPEoJhC6+QJVV 6RlAN2Z17TJOdwRJ+HB7wxjnzvdxEP6sdNgA1O1tHHMWMxCcOrLqbGL0vbijgfgw gfUwDgYDVR0PAQH/BAQDAgGGMB0GA1UdJQQWMBQGCCsGAQUFBwMCBggrBgEFBQcD ATASBgNVHRMBAf8ECDAGAQH/AgEAMB0GA1UdDgQWBBSTJ0aYA6lRaI6Y1sRCSNsj v1iU0jAfBgNVHSMEGDAWgBR5tFnme7bl5AFzgAiIyBpY9umbbjAyBggrBgEFBQcB AQQmMCQwIgYIKwYBBQUHMAKGFmh0dHA6Ly94MS5pLmxlbmNyLm9yZy8wEwYDVR0g BAwwCjAIBgZngQwBAgEwJwYDVR0fBCAwHjAcoBqgGIYWaHR0cDovL3gxLmMubGVu Y3Iub3JnLzANBgkqhkiG9w0BAQsFAAOCAgEAfYt7SiA1sgWGCIpunk46r4AExIRc MxkKgUhNlrrv1B21hOaXN/5miE+LOTbrcmU/M9yvC6MVY730GNFoL8IhJ8j8vrOL pMY22OP6baS1k9YMrtDTlwJHoGby04ThTUeBDksS9RiuHvicZqBedQdIF65pZuhp eDcGBcLiYasQr/EO5gxxtLyTmgsHSOVSBcFOn9lgv7LECPq9i7mfH3mpxgrRKSxH pOoZ0KXMcB+hHuvlklHntvcI0mMMQ0mhYj6qtMFStkF1RpCG3IPdIwpVCQqu8GV7 s8ubknRzs+3C/Bm19RFOoiPpDkwvyNfvmQ14XkyqqKK5oZ8zhD32kFRQkxa8uZSu h4aTImFxknu39waBxIRXE4jKxlAmQc4QjFZoq1KmQqQg0J/1JF8RlFvJas1VcjLv YlvUB2t6npO6oQjB3l+PNf0DpQH7iUx3Wz5AjQCi6L25FjyE06q6BZ/QlmtYdl/8 ZYao4SRqPEs/6cAiF+Qf5zg2UkaWtDphl1LKMuTNLotvsX99HP69V2faNyegodQ0 LyTApr/vT01YPE46vNsDLgK+4cL6TrzC/a4WcmF5SRJ938zrv/duJHLXQIku5v0+ EwOy59Hdm0PT/Er/84dDV0CSjdR/2XuZM3kpysSKLgD1cKiDA+IRguODCxfO9cyY Ig46v9mFmBvyH04= -----END CERTIFICATE----- --- Server certificate subject=CN = *.my-elixir-dev.xyz issuer=C = US, O = Let's Encrypt, CN = E6 --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: ECDSA Server Temp Key: X25519, 253 bits --- SSL handshake has read 2382 bytes and written 399 bytes Verification: OK --- New, TLSv1.3, Cipher is TLS_AES_128_GCM_SHA256 Server public key is 256 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 0 (ok) --- DONE --- Post-Handshake New Session Ticket arrived: SSL-Session: Protocol : TLSv1.3 Cipher : TLS_AES_128_GCM_SHA256 Session-ID: 5BA801BB15EADDDC3C1D9FC5A9AE457BBA7EF03B0802F9CF9EC2D8399D938DCF Session-ID-ctx: Resumption PSK: 02CE71060C8466547FAEC4DBD2D96F4A257E01B9517F95A0966AAD50104CBF3B PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 604800 (seconds) TLS session ticket: 0000 - 11 f1 6b a0 c7 34 0f 57-d9 5b 6e 56 de 12 a6 4c ..k..4.W.[nV...L 0010 - 24 09 79 ac 9d df cd 37-aa 36 88 e3 2b f2 d6 3f $.y....7.6..+..? 0020 - 38 c0 b9 0a 12 82 b1 00-85 e5 63 9f d6 6c 0e 4a 8.........c..l.J 0030 - 11 b0 48 47 52 40 3c c8-0f 7e e2 fd 57 7a 9b ae ..HGR@<..~..Wz.. 0040 - 64 71 c4 98 d8 b6 a8 09-5b 06 8d 4a 09 c6 fb 66 dq......[..J...f 0050 - 05 bc f6 d4 a6 d3 bb 06-67 41 ad d3 41 0e 2d 86 ........gA..A.-. 0060 - e0 ac e5 7c 68 b2 1b b4-ce ...|h.... Start Time: 1738738465 Timeout : 7200 (sec) Verify return code: 0 (ok) Extended master secret: no Max Early Data: 0 --- read R BLOCK