ambslot.center

Score 92/100

Web site information

Website image ambslot.center
Web Address
IP Address
CDN
CloudFlare
Font Scripts
Google Font API
CMS
WordPress
JavaScript Frameworks
jQuery
Programming Languages
PHP

SEO data

title
Ambslot สล็อต บาคาร่า คาสิโน เว็บอันดับ 1 แจกทุกวัน - AmbSlot.center
viewport
width=device-width, initial-scale=1.0, viewport-fit=cover
robots
index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1
description
Ambslot | AMBBET สล็อต บาคาร่า คาสิโน หวย | AMB เว็บเดิมพันออนไลน์ 2021 ว็บตรง ไม่ผ่านเอเย่นต์ ฝาก-ถอนด้วยระบบอัตโนมัติ รวดเร็ว 30 วินาที
twitter:card
summary_large_image
twitter:label1
Est. reading time
twitter:data1
9 นาที
msvalidate.01
21CA9468AB8DADDB3BE8D4FC56DD0C89
google-site-verification
vmR3B0lUVnNk3toOeuQvbssDKa1gAPzMikMINBUQVrU
generator
WordPress 5.8.3
msapplication-TileImage
https://i0.wp.com/ambslot.center/wp-content/uploads/2021/11/cropped-4-20-1.webp?fit=270%2C270&ssl=1

Lighthouse

Performance
53/100
Accessibility
95/100
Best Practices
85/100
SEO
98/100
PWA
40/100

Web site external calls

c0.wp.com
fonts.googleapis.com
i0.wp.com
stats.wp.com
fonts.gstatic.com
pixel.wp.com

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
offered (deprecated)
TLS 1.1
offered (deprecated)
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
OpenSSL handshake didn't succeed
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, br gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
supported
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
no RSA certificate, can't be used with SSLv2 elsewhere
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
winshock
not vulnerable
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HTTP headerTime
1642239509
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Expect-CT
max-age=604800, report-uri='https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct'

Server Defaults

TLS extensions
'server name/#0' 'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'status request/#5' 'next protocol/#13172' 'key share/#51' 'supported versions/#43' 'extended master secret/#23' 'application layer protocol negotiation/#16' 'compress_certificate/#27'
TLS session ticket
valid for 64800 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
off by 0 seconds from your localtime
certificate compression
0002/Brotli
clientAuth
none
cert numbers
1
Signature algorithm
ECDSA with SHA256
Key size
EC 256 bits (curve P-256)
Key usage
Digital Signature
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
0DB4113CEBA5A53D27753D0487F821F7
cert serialNumberLen
16
Fingerprint SHA1
CEF274A75DBACFCF8F0494085761DC733CD3A1C2
Fingerprint SHA256
E7EE9086EA4A18D4FC6AEB14E8E0930F4AE9097F949537CAA40292AFD8F06A3B
Certificate details
-----BEGIN CERTIFICATE----- MIIFPDCCBOGgAwIBAgIQDbQRPOulpT0ndT0Eh/gh9zAKBggqhkjOPQQDAjBKMQsw CQYDVQQGEwJVUzEZMBcGA1UEChMQQ2xvdWRmbGFyZSwgSW5jLjEgMB4GA1UEAxMX Q2xvdWRmbGFyZSBJbmMgRUNDIENBLTMwHhcNMjExMDI3MDAwMDAwWhcNMjIxMDI2 MjM1OTU5WjB1MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQG A1UEBxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQQ2xvdWRmbGFyZSwgSW5jLjEe MBwGA1UEAxMVc25pLmNsb3VkZmxhcmVzc2wuY29tMFkwEwYHKoZIzj0CAQYIKoZI zj0DAQcDQgAEIfNz0UEIjFjzFmfMR77RZhCWHOUq9nNUTGqu+i+lGb9cYSBBlkt9 6mhNVfKOCQbeTwi7tBTa8n86b99Rj0MpRqOCA3wwggN4MB8GA1UdIwQYMBaAFKXO N+rrsHUOlGeItEX62SQQh5YfMB0GA1UdDgQWBBR5xc4gxuZCdFNSoAMjYExAEpLU rjBCBgNVHREEOzA5ghVzbmkuY2xvdWRmbGFyZXNzbC5jb22CDmFtYnNsb3QuY2Vu dGVyghAqLmFtYnNsb3QuY2VudGVyMA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAU BggrBgEFBQcDAQYIKwYBBQUHAwIwewYDVR0fBHQwcjA3oDWgM4YxaHR0cDovL2Ny bDMuZGlnaWNlcnQuY29tL0Nsb3VkZmxhcmVJbmNFQ0NDQS0zLmNybDA3oDWgM4Yx aHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0Nsb3VkZmxhcmVJbmNFQ0NDQS0zLmNy bDA+BgNVHSAENzA1MDMGBmeBDAECAjApMCcGCCsGAQUFBwIBFhtodHRwOi8vd3d3 LmRpZ2ljZXJ0LmNvbS9DUFMwdgYIKwYBBQUHAQEEajBoMCQGCCsGAQUFBzABhhho dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wQAYIKwYBBQUHMAKGNGh0dHA6Ly9jYWNl cnRzLmRpZ2ljZXJ0LmNvbS9DbG91ZGZsYXJlSW5jRUNDQ0EtMy5jcnQwDAYDVR0T AQH/BAIwADCCAX4GCisGAQQB1nkCBAIEggFuBIIBagFoAHcAKXm+8J45OSHwVnOf Y6V35b5XfZxgCvj5TV0mXCVdx4QAAAF8wMswYAAABAMASDBGAiEAxSI269kkgQzD tuIGFsGlNftLL+7GxEPAupO5ypjISMsCIQCDZSs99DIqXUJ6t74syIdd1TZv4gVB yIta3PeujT6CrQB1AFGjsPX9AXmcVm24N3iPDKR6zBsny/eeiEKaDf7UiwXlAAAB fMDLMMcAAAQDAEYwRAIgQULCWZpaYqVtNFYNVkUZcy8HRQ5hOKnqpXc5R9J4IQUC IFx2p0wJEFAWDic7ptQggEkoRNtBoNzXSUQdXVmuZie2AHYAQcjKsd8iRkoQxqE6 CUKHXk4xixsD6+tLx2jwkGKWBvYAAAF8wMswjgAABAMARzBFAiBggp0+/eHD0qVD Sl7j1lRtGVU6e+pCgmeHb7jJgOD92gIhAPYgOx+KI6yesdBO7vPS6ReQjtpz6gNM IHPINgYLFOqoMAoGCCqGSM49BAMCA0kAMEYCIQCP1EnsmZ2GODBju2/pAT6CMJs0 WVS6Pv0l+9lvLHrUbwIhAJSPAFBog2J/n5qeuhTyqLC7ELrS3GmEHUaof8CNc4FL -----END CERTIFICATE-----
Common names
sni.cloudflaressl.com
Service Name Indication
request w/o SNI didn't succeed, usual for EC certificates
SubjectAlternative Name
sni.cloudflaressl.com ambslot.center *.ambslot.center
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert expirationStatus
284 >= 60 days
Valid from
2021-10-27 00:00
Valid until
2022-10-26 23:59
cert extlifeSpan
certificate has no extended life time according to browser forum
cert eTLS
not present
cert crlDistributionPoints
http://crl3.digicert.com/CloudflareIncECCCA-3.crl http://crl4.digicert.com/CloudflareIncECCCA-3.crl
Online Certificate Status Protocol URL
http://ocsp.digicert.com
OCSP stapling
offered
cert ocspRevoked
not revoked
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Chain
2
certs list ordering problem
no
Certificate authority issuers
Cloudflare Inc ECC CA-3 (Cloudflare, Inc. from US)
intermediate cert
-----BEGIN CERTIFICATE----- MIIDzTCCArWgAwIBAgIQCjeHZF5ftIwiTv0b7RQMPDANBgkqhkiG9w0BAQsFADBa MQswCQYDVQQGEwJJRTESMBAGA1UEChMJQmFsdGltb3JlMRMwEQYDVQQLEwpDeWJl clRydXN0MSIwIAYDVQQDExlCYWx0aW1vcmUgQ3liZXJUcnVzdCBSb290MB4XDTIw MDEyNzEyNDgwOFoXDTI0MTIzMTIzNTk1OVowSjELMAkGA1UEBhMCVVMxGTAXBgNV BAoTEENsb3VkZmxhcmUsIEluYy4xIDAeBgNVBAMTF0Nsb3VkZmxhcmUgSW5jIEVD QyBDQS0zMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEua1NZpkUC0bsH4HRKlAe nQMVLzQSfS2WuIg4m4Vfj7+7Te9hRsTJc9QkT+DuHM5ss1FxL2ruTAUJd9NyYqSb 16OCAWgwggFkMB0GA1UdDgQWBBSlzjfq67B1DpRniLRF+tkkEIeWHzAfBgNVHSME GDAWgBTlnVkwgkdYzKz6CFQ2hns6tQRN8DAOBgNVHQ8BAf8EBAMCAYYwHQYDVR0l BBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMBIGA1UdEwEB/wQIMAYBAf8CAQAwNAYI KwYBBQUHAQEEKDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5j b20wOgYDVR0fBDMwMTAvoC2gK4YpaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL09t bmlyb290MjAyNS5jcmwwbQYDVR0gBGYwZDA3BglghkgBhv1sAQEwKjAoBggrBgEF BQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzALBglghkgBhv1sAQIw CAYGZ4EMAQIBMAgGBmeBDAECAjAIBgZngQwBAgMwDQYJKoZIhvcNAQELBQADggEB AAUkHd0bsCrrmNaF4zlNXmtXnYJX/OvoMaJXkGUFvhZEOFp3ArnPEELG4ZKk40Un +ABHLGioVplTVI+tnkDB0A+21w0LOEhsUCxJkAZbZB2LzEgwLt4I4ptJIsCSDBFe lpKU1fwg3FZs5ZKTv3ocwDfjhUkV+ivhdDkYD7fa86JXWGBPzI6UAPxGezQxPk1H goE6y/SJXQ7vTQ1unBuCJN0yJV0ReFEQPaA1IwQvZW+cwdFD19Ae8zFnWSfda9J1 CZMRJCQUzym+5iPDuI9yP+kHyCREU3qzuWFloUwOxkgAyXVjBYdwRVKD05WdRerw 6DEdfgkfCv4+3ao8XnTSrLE= -----END CERTIFICATE-----
intermediate cert fingerprintSHA256
3ABBE63DAF756C5016B6B85F52015FD8E8ACBE277C5087B127A60563A841ED8A
intermediate cert notBefore
2020-01-27 12:48
intermediate cert notAfter
2024-12-31 23:59
intermediate cert expiration
ok > 40 days
intermediate cert chain
Cloudflare Inc ECC CA-3 <-- Baltimore CyberTrust Root
intermediate cert badOCSP
intermediate certificate(s) is/are ok

Server Preferences

order
server -- TLS 1.3 client determined
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
order TLSv1
ECDHE-ECDSA-AES128-SHA
order TLSv1 1
ECDHE-ECDSA-AES128-SHA
order TLSv1 2
ECDHE-ECDSA-AES128-GCM-SHA256

Ciphers

Browser Simulations

Android 2.3.7
No connection
Android 4.1.1
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Android 4.3
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Android 4.4.2
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD
Android 6.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD
Android 7.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305
Windows Chrome 51
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Opera 17
TLSv1.2 ECDHE-ECDSA-AES128-SHA
MacOSX 10.6.8 Safari 5.1.9
TLSv1.0 ECDHE-ECDSA-AES128-SHA
iOS 7 Safari 7
TLSv1.2 ECDHE-ECDSA-AES128-SHA
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Java 6 update 45
No connection
Java 7 update 25
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Java 8 update 31
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256