SSL Checker
Submit the Hostname and Port in the fields below. This checker supports SNI and STARTTLS.
Report
Hostname: | close Doesn't match Common Name or/and SANs |
Expired: | done No (2234 days till expiration) |
Public Key: | done We were unable to find any issues in the public key of end-entity certificate |
Trusted: | close The end-entity certificate is self-signed |
Self-Signed: | close Yes, the end-entity certificate is self-signed |
Chain Issues: | close The chain doesn't contain any intermediate certificates |
Weak signatures: | close End-entity or/and intermediate certificate(s) was signed utilizing a weak hash function |
DNS Information
Resolves To: | 34.168.225.46 |
Reverse IP lookup: | 46.225.168.34.bc.googleusercontent.com. |
Nameserver: | ns4.tabwpm.us. |
Nameserver: | ns3.tabwpm.us. |
Nameserver: | ns1.tabwpm.us. |
Nameserver: | ns2.tabwpm.us. |
General Information
Common Name: | *.malware.com |
SANs: | None |
Organization: | Internet Widgits Pty Ltd |
Signature Algorithm: | warning sha1WithRSAEncryption |
Key Type: | RSA |
Key size: | 2048 bits |
Serial Number: | 6f4f244f4be4eb69928088d4a1bb2980aff1f5cf |
Not Before: | May 13, 2020 12:56:16 GMT |
Not After: | May 11, 2030 12:56:16 GMT |
Number of certs: | 1 |
Revocation Status: | Certificate does not supply CA Issuers information |
OCSP Stapling: | Not Supported |
Server: | nginx |
HSTS: | Not Supported |
HPKP: | Not Supported |
Chain Information
Certificate # 1 - Common Name: *.malware.com
Decode this certificate for verbose information → launchSubject Common Name | *.malware.com |
Subject Organization | Internet Widgits Pty Ltd |
Issuer Common Name | *.malware.com |
Issuer Organization | Internet Widgits Pty Ltd |
Not Before: | May 13, 2020 12:56:16 GMT |
Not After: | May 11, 2030 12:56:16 GMT |
Signature Algorithm: | warning sha1WithRSAEncryption |
Serial Number: | 6f4f244f4be4eb69928088d4a1bb2980aff1f5cf |
SHA1 Fingerprint: | 15:36:92:AA:E0:27:C5:70:61:F7:A0:3E:9F:01:6C:EC:24:E9:F7:16 |
MD5 Fingerprint: | 44:6C:D2:10:8F:3E:62:8B:DE:D9:9D:77:FC:8F:7A:B3 |
OpenSSL Handshake
depth=0 C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com verify error:num=18:self signed certificate verify return:1 depth=0 C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com verify return:1 CONNECTED(00000003) OCSP response: no response sent --- Certificate chain 0 s:C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com i:C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com -----BEGIN CERTIFICATE----- MIIDmzCCAoOgAwIBAgIUb08kT0vk62mSgIjUobspgK/x9c8wDQYJKoZIhvcNAQEF BQAwXTELMAkGA1UEBhMCVVMxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEWMBQGA1UEAwwNKi5tYWx3YXJlLmNv bTAeFw0yMDA1MTMxMjU2MTZaFw0zMDA1MTExMjU2MTZaMF0xCzAJBgNVBAYTAlVT MRMwEQYDVQQIDApTb21lLVN0YXRlMSEwHwYDVQQKDBhJbnRlcm5ldCBXaWRnaXRz IFB0eSBMdGQxFjAUBgNVBAMMDSoubWFsd2FyZS5jb20wggEiMA0GCSqGSIb3DQEB AQUAA4IBDwAwggEKAoIBAQDIXhhe1ORc3OBmQnRRtJYQCVOKVy5MlZWQGyx9jfzD ef9ptgYWhLuqNczk4vcrzgrtrD+f81OYypfF+3LuKJXqFkN6B3THBjvbC9O1pExN y4NxE11IkyirNpRmqQttBZc6RaYDqlLbv3P+HFi1OlV6SPyxZHgIofxTVPi6gUFj SjZsx2sa/1g8DpDenk05Pk62Rq6zYSsavoT/mEDHONFIoaHH1Suw5NuvVIc7WwEE 1ObGdmECI74o9k5yhwR7+l5PSXHapYtCwOSp+BFR+wF1Zmf8vznrKCN0kKhLQ2XV lcNSFhWZCpSdihmhiMoJnwJiJlsWPMrQgojJRqyCWi2JAgMBAAGjUzBRMB0GA1Ud DgQWBBQDiIYZpnTru4WwHFGWJHE7Q5ma4TAfBgNVHSMEGDAWgBQDiIYZpnTru4Ww HFGWJHE7Q5ma4TAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBBQUAA4IBAQCY wmABSjj0mj+fA45O00K3RpiOIVgxTv5kUwEsVpSKGiipuiJUCfHJZ2+e52SoA+JC NeFrFtFFTEASYB2co96IxfbMNomXtlvNbzGsr6GD/tlD1pQaGqXC2tAM1yMdYfng 8dGKQBizSwMUUTb4WCkD8M08dsh7lxlUaELMftNXeyFPF+XZMwPijx781FkJUM/6 lh6Nu94agyi8vcTmSKv1wSUKMezjVpjhCIkK7CZnyfJIsItnmMS8OZraUxt6jpdJ 771C3cAWzIuKz8h/fe2SBPFtgdJDExgLPAM96F2bNhpVWgnlfHhgM6hoeVK7H3Wo hpEYEOQ7IodBBOsAhSP2 -----END CERTIFICATE----- --- Server certificate subject=C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com issuer=C = US, ST = Some-State, O = Internet Widgits Pty Ltd, CN = *.malware.com --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA-PSS Server Temp Key: X25519, 253 bits --- SSL handshake has read 1487 bytes and written 400 bytes Verification error: self signed certificate --- New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Server public key is 2048 bit Secure Renegotiation IS NOT supported Compression: NONE Expansion: NONE No ALPN negotiated Early data was not sent Verify return code: 18 (self signed certificate) --- DONE