A record via supplied IP "207.250.234.19"
rDNS (207.250.234.19): www.dotcom-tools.com. dotcom-tools.com.
Service detected: HTTP
SSL/TLS protocols
SSLv2 not offered (OK)
SSLv3 not offered (OK)
TLS 1 not offered
TLS 1.1 offered
TLS 1.2 offered (OK)
TLS 1.3 not offered -- downgraded
NPN/SPDY not offered
ALPN/HTTP2 not offered
SSL/TLS server implementation bugs
No bugs found.
Cipher categories
NULL ciphers (no encryption) not offered (OK) -- NULL:eNULL
Anonymous NULL Ciphers (no authentication) not offered (OK) -- aNULL:ADH
Export ciphers (w/o ADH+NULL) not offered (OK) -- EXPORT:!ADH:!NULL
LOW: 64 Bit + DES encryption (w/o export) not offered (OK) -- LOW:DES:!ADH:!EXP:!NULL
Weak 128 Bit ciphers (SEED, IDEA, RC[2,4]) not offered (OK) -- MEDIUM:!aNULL:!AES:!CAMELLIA:!ARIA:!CHACHA20:!3DES
Triple DES Ciphers (Medium) not offered (OK) -- 3DES:!aNULL:!ADH
High encryption (AES+Camellia, no AEAD) offered (OK) -- HIGH:!NULL:!aNULL:!DES:!3DES:!AESGCM:!CHACHA20:!AESGCM:!CamelliaGCM:!AESCCM8:!AESCCM
Strong encryption (AEAD ciphers) offered (OK) -- AESGCM:CHACHA20:AESGCM:CamelliaGCM:AESCCM8:AESCCM
Robust (perfect) forward secrecy, (P)FS -- omitting Null Authentication/Encryption, 3DES, RC4
PFS is offered (OK) ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA
Elliptic curves offered: prime256v1 secp384r1 secp521r1
Server preferences
Has server cipher order? yes (OK)
Negotiated protocol TLSv1.2
Negotiated cipher ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Cipher order
TLSv1.1: ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA AES256-SHA AES128-SHA
TLSv1.2: ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES128-SHA256
ECDHE-RSA-AES256-SHA ECDHE-RSA-AES128-SHA AES256-GCM-SHA384
AES128-GCM-SHA256 AES256-SHA256 AES128-SHA256 AES256-SHA
AES128-SHA
Server defaults (Server Hello)
TLS extensions (standard) "status request/#5" "renegotiation info/#65281"
"extended master secret/#23"
Session Ticket RFC 5077 hint (no lifetime advertised)
SSL Session ID support yes
Session Resumption Tickets no, ID: no
TLS clock skew +23 sec from localtime
Signature Algorithm SHA256 with RSA
Server key size RSA 2048 bits
Server key usage Digital Signature, Key Encipherment
Server extended key usage TLS Web Server Authentication, TLS Web Client Authentication
Serial / Fingerprints 94EAFDED6D3A1CA69020C1F25F311990 / SHA1 E1A83E077E9FDCBC97ABCBF1002F6ADB92B90145
SHA256 2D31AE37F42035AE222B0BEA45935B9A3ACD041A670722728DF78B58AF2E5F00
Common Name (CN) www.dotcom-tools.com
subjectAltName (SAN) www.dotcom-tools.com dotcom-tools.com
Issuer COMODO RSA Domain Validation Secure Server CA (COMODO CA Limited from GB)
Trust (hostname) Ok via SAN (same w/o SNI)
Chain of trust Ok
EV cert (experimental) no
Certificate Validity (UTC) 75 >= 60 days (2018-10-08 00:00 --> 2020-11-04 23:59)
# of certificates provided 2
Certificate Revocation List http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl
OCSP URI http://ocsp.comodoca.com
OCSP stapling offered
OCSP must staple extension --
DNS CAA RR (experimental) not offered
Certificate Transparency yes (certificate extension)
HTTP header response @ "/"
HTTP Status Code 301 Moved Permanently, redirecting to "http://www.dotcom-tools.com/" -- Redirect to insecure URL (NOT ok)
HTTP clock skew +27 sec from localtime
Strict Transport Security not offered
Public Key Pinning --
Server banner Microsoft-IIS/8.5
Application banner X-Powered-By: ASP.NET
Cookie(s) (none issued at "/") -- maybe better try target URL of 30x
Security headers X-Frame-Options SAMEORIGIN
Reverse Proxy banner --
SSL/TLS vulnerabilities
Heartbleed (CVE-2014-0160) not vulnerable (OK), no heartbeat extension
CCS (CVE-2014-0224) not vulnerable (OK)
Ticketbleed (CVE-2016-9244), experiment. not vulnerable (OK), no session ticket extension
ROBOT not vulnerable (OK)
Secure Renegotiation (CVE-2009-3555) not vulnerable (OK)
Secure Client-Initiated Renegotiation not vulnerable (OK)
CRIME, TLS (CVE-2012-4929) not vulnerable (OK)
BREACH (CVE-2013-3587) no HTTP compression (OK) - only supplied "/" tested
POODLE, SSL (CVE-2014-3566) not vulnerable (OK)
TLS_FALLBACK_SCSV (RFC 7507) Downgrade attack prevention NOT supported
SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK)
FREAK (CVE-2015-0204) not vulnerable (OK)
DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK)
make sure you don't use this certificate elsewhere with SSLv2 enabled services
https://censys.io/ipv4?q=2D31AE37F42035AE222B0BEA45935B9A3ACD041A670722728DF78B58AF2E5F00
could help you to find out
LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected
BEAST (CVE-2011-3389) no SSL3 or TLS1 (OK)
LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses cipher block chaining (CBC) ciphers with TLS. Check patches
RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK)
Tested 364 ciphers, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
-----------------------------------------------------------------------------------------------------------------------------
xc028 ECDHE-RSA-AES256-SHA384 ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014 ECDHE-RSA-AES256-SHA ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc027 ECDHE-RSA-AES128-SHA256 ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013 ECDHE-RSA-AES128-SHA ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
Ciphers per protocol, ordered by encryption strength
Hexcode Cipher Suite Name (OpenSSL) KeyExch. Encryption Bits Cipher Suite Name (RFC)
-----------------------------------------------------------------------------------------------------------------------------
TLS 1.3
TLS 1.2
xc028 ECDHE-RSA-AES256-SHA384 ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
xc014 ECDHE-RSA-AES256-SHA ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x9d AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
x3d AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc027 ECDHE-RSA-AES128-SHA256 ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
xc013 ECDHE-RSA-AES128-SHA ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x9c AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
x3c AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1.1
xc014 ECDHE-RSA-AES256-SHA ECDH 521 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
x35 AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
xc013 ECDHE-RSA-AES128-SHA ECDH 521 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
x2f AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
TLS 1
SSLv3
SSLv2
Client simulations
Android 2.3.7 No connection
Android 4.0.4 No connection
Android 4.1.1 No connection
Android 4.2.2 No connection
Android 4.3 No connection
Android 4.4.2 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Android 5.0.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Android 6.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Android 7.0 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 27 Win 7 TLSv1.1 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 28 Win 7 TLSv1.1 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 29 Win 7 TLSv1.1 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 30 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Chrome 31 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 32 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 33 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 34 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 35 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 36 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 37 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 39 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 40 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Chrome 42 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 43 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 45 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 47 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 48 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 49 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 49 XP SP3 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 50 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 51 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 57 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 65 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 69 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Chrome 70 Win 10 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Firefox 10.0.12 ESR Win 7 No connection
Firefox 17.0.7 ESR Win 7 No connection
Firefox 21 Fedora 19 No connection
Firefox 21 Win 7 No connection
Firefox 22 Win 7 No connection
Firefox 24.2.0 ESR Win 7 No connection
Firefox 24 Win 7 No connection
Firefox 26 Win 8 No connection
Firefox 27 Win 8 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 29 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 30 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 31.3.0 ESR Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 31 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 32 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 34 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 35 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 37 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 39 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 41 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 42 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 44 OS X TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 45 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 46 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 47 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 49 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 49 XP SP3 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 53 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 59 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Firefox 62 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
IE 6 XP No connection
IE 7 Vista No connection
IE 8-10 Win 7 No connection
IE 8 Win 7 No connection
IE 8 XP No connection
IE 9 Win 7 No connection
IE 10 Win Phone 8.0 No connection
IE 11 Win 7 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
IE 11 Win 8.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
IE 11 Win Phone 8.1 TLSv1.2 ECDHE-RSA-AES128-SHA256, 384 bit ECDH (P-384)
IE 11 Win Phone 8.1 Update TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
IE 11 Win 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
IE 11 Win 10 Preview TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Edge 12 Win 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Edge 13 Win 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Edge 13 Win Phone 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Edge 15 Win 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Opera 12.15 Win 7 No connection
Opera 15 Win 7 TLSv1.1 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Opera 16 Win 7 TLSv1.1 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Opera 17 Win 7 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Safari 5.1.9 OS X 10.6.8 No connection
Safari 5 iOS 5.1.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 6.0.4 OS X 10.8.4 No connection
Safari 6 iOS 6.0.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 7 iOS 7.1 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 7 OS X 10.9 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 8 iOS 8.0 Beta TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 8 iOS 8.4 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 8 OS X 10.10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 9 OS X 10.11 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 10 iOS 10 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Safari 10 OS X 10.12 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Tor 17.0.9 Win 7 No connection
Apple ATS 9 iOS 9 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Baidu Jan 2015 No connection
BingBot Dec 2013 No connection
BingPreview Dec 2013 No connection
BingPreview Jun 2014 No connection
BingPreview Jan 2015 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Googlebot Oct 2013 No connection
Googlebot Jun 2014 No connection
Googlebot Feb 2015 TLSv1.2 ECDHE-RSA-AES256-SHA, 521 bit ECDH (P-521)
Googlebot Feb 2018 TLSv1.2 ECDHE-RSA-AES256-SHA, 384 bit ECDH (P-384)
Yahoo Slurp Oct 2013 No connection
Yahoo Slurp Jun 2014 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
Yahoo Slurp Jan 2015 TLSv1.2 ECDHE-RSA-AES256-SHA384, 384 bit ECDH (P-384)
YandexBot 3.0 No connection
YandexBot May 2014 No connection
YandexBot Sep 2014 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
YandexBot Jan 2015 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Java 6u45 No connection
Java 7u25 No connection
Java 8b132 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Java 8u111 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Java 8u161 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
Java 8u31 TLSv1.2 ECDHE-RSA-AES128-SHA256, 521 bit ECDH (P-521)
Java 9.0.4 TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
OpenSSL 0.9.8y No connection
OpenSSL 1.0.1h TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
OpenSSL 1.0.1l TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)
OpenSSL 1.0.2e TLSv1.2 ECDHE-RSA-AES256-SHA384, 521 bit ECDH (P-521)