doxycyline.pl.tl
Score 85/100
Web site information
Web Address
IP Address
Advertising Networks
AdRiver
Widgets
Facebook
Ecommerce
IBM WebSphere Commerce
Web Servers
Nginx
Cache Tools
Varnish
Programming Languages
Java
Databases
MySQL
SEO data
title
Kup tanią doksycyklinę online - generic doxycycline
description
Gwarantowana dostawa, niskie ceny i gwarantowana satysfakcja przy zamawianiu taniego doksycyklinę z naszej apteki!
robots
index,follow
google-site-verification
laITYokrHDXV0GjIKFFiHe0JVFMEX8a2NzpIXPXbbBM
google-adsense-platform-account
ca-host-pub-1483906849246906
google-adsense-account
ca-pub-1069949370753761
Protocols
SSLv2
not offered
SSLv3
not offered
TLS 1.0
offered (deprecated)
TLS 1.1
offered (deprecated)
TLS 1.2
offered
TLS 1.3
not offered + downgraded to weaker protocol
ALPN
not offered
Vulnerabilities
heartbleed
not vulnerable , timed out
CCS
not vulnerable
ticketbleed
not vulnerable, returned potential memory fragments do not differ
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
supported
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=2B972D0FD1E6107E03659E5E79D52C36AD328D528E37332378CC81423E516E13
LOGJAM-common primes
nginx/1024-bit MODP group with safe prime modulus
LOGJAM
not vulnerable, no DH EXPORT ciphers,
BEAST
VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable
Header Responses
Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HTTP headerAge
0 seconds
ipv4 in header
X-wm-VIP: 193.238.27.32 (check if it's your IP address or e.g. a cluster IP)
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Server Defaults
TLS extensions
'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'heartbeat/#15' 'next protocol/#13172'
TLS session ticket
valid for 60 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
RSA 4096 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
03E51ACF5B47C17E3B57C30808DB5710651E
cert serialNumberLen
18
Fingerprint SHA1
F951A522084DB903DCC7F2131F92FC8D3D57A6FF
Fingerprint SHA256
2B972D0FD1E6107E03659E5E79D52C36AD328D528E37332378CC81423E516E13
Certificate details
-----BEGIN CERTIFICATE----- MIIF4DCCBMigAwIBAgISA+Uaz1tHwX47V8MICNtXEGUeMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMzEwMzAxMzQ3MzVaFw0yNDAxMjgxMzQ3MzRaMBAxDjAMBgNVBAMT BXBsLnRsMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA5QZGC+JkN9mA As7pYjA54Gv4w5+A/ETL2XMcJfau7Dv4hzJfGVF3UiFqdiaaYEsls/kLOfRgoRFh DfrngumfWATAO3KAA9wnsXJCQzWtLq9VGb7ULZNwhpMLTtAEJ8UMCPhwVRqlpVsJ T7bqbZjwzK6VF9eJL/b++N6u2pFMwJ37bn1rw3+tqk+Z7u4hbcPKeLoS9wQM3QdX d96IAOVxJ1rDYE+OI3p/HW2ozIxIaPlveEru1d2rav1khgofUuaDRsTp/CQvVmCx 7haHRtXQa/1OVZu1qo2jxHQ6xAFrBw4QWI9LIaLlCtKIEiYor0UHOaEJR9Y8x+aa Hpl9PZzazjjJsVlQMEKGdhGKBRNFGOOu7FPXb6QZon3RNQb388KEkgleG/LQjRdN 70bbG54zPIpJcKN1kbZ9QEJv6FIEF7ESf6n2BJ5qbBur4RQ712nqMxtVen1qB7Ka sdtdkuKSwzOVeJMBVhTXjE3YyttteVqHDGoD5wcWk11xvllEQlWsCeM3DQxyMg6H iXD62FR/szYCA9bcYCNNMVCKqMqgv+HJUspMNCKhExBEaPgKLB7JLcuMRJRyIflJ vAQxvyjXQH7WnEItcCMqrFcIY09F558EGZavr7NAmZBUwbogmbNL/ufBVmYN7s6z Cmw9RpfeIRca7Or8fedHEAq9N6wHSb8CAwEAAaOCAhAwggIMMA4GA1UdDwEB/wQE AwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDAYDVR0TAQH/BAIw ADAdBgNVHQ4EFgQUd/pdw9GzJLHPDe1ak9Qqod8cfY8wHwYDVR0jBBgwFoAUFC6z F7dYVsuuUAlA5h+vnYsUwsYwVQYIKwYBBQUHAQEESTBHMCEGCCsGAQUFBzABhhVo dHRwOi8vcjMuby5sZW5jci5vcmcwIgYIKwYBBQUHMAKGFmh0dHA6Ly9yMy5pLmxl bmNyLm9yZy8wGQYDVR0RBBIwEIIHKi5wbC50bIIFcGwudGwwEwYDVR0gBAwwCjAI BgZngQwBAgEwggEEBgorBgEEAdZ5AgQCBIH1BIHyAPAAdQDatr9rP7W2Ip+bwrtc a+hwkXFsu1GEhTS9pD0wSNf7qwAAAYuBDewbAAAEAwBGMEQCIBp/R6/rXgrZWxIT yY0XyhdpGqADkmNfsYePQ9Q+jv97AiAM2BqvN7JnwotjmqMWBIuBiz0QoaYp2Ypw dOX2GI0C5gB3AHb/iD8KtvuVUcJhzPWHujS0pM27KdxoQgqf5mdMWjp0AAABi4EN 7FoAAAQDAEgwRgIhALJqmq2CHeSmhh8Iq55cTjc2RqN41L6pZJgIYh3JmZT9AiEA 3KZ+Jm5O2+/RYcjd16gFwfXe5lOkH81XxEL1YjdTnkUwDQYJKoZIhvcNAQELBQAD ggEBAHhU68EUiZECEpFHNVVnurv+LQCBAgJqb4zNMDie9a7Q79gYbx+yF8ypUZB3 z+wk48rC1BTtSKRBhnqYyYc4Fgtw9TpqkVJrT/O3OgX3DnzcMNeVRDUDUo5kM+hS zxNK6oF54naU5tD2Yk9LaYGvZzVppC04wm7wzTqw2Zde7bzpVhdru5ZnH8IIDqGS YOf3BY8taxEyH1c21sMxt59xAd/3B6l9hOue8xrI9HYUslBEJ1X1wgCmUrn69mmk /a7A/pBQWnSYihc4RwB3x8KYiabZymH+icGTgfGG0hTDleTlOh4bwAk72x5r/Huu 8SKuHTEojT+IV09QDAaB2Da5UAk= -----END CERTIFICATE-----
Common names
pl.tl
Service Name Indication
pl.tl
SubjectAlternative Name
*.pl.tl pl.tl
Certificate authority issuers
R3 (Let's Encrypt from US)
Certificate trusted
Ok via SAN wildcard (same w/o SNI)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert eTLS
not present
cert expirationStatus
61 >= 30 days
Valid from
2023-10-30 13:47
Valid until
2024-01-28 13:47
cert validityPeriod
No finding
Chain
4
certs list ordering problem
yes
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Server Preferences
order
server
Which protocol negotiated
Default protocol TLS1.2
negotiated
ECDHE-RSA-AES256-GCM-SHA384, 384 bit ECDH (P-384)
order TLSv1
ECDHE-RSA-AES256-SHA
order TLSv1 1
ECDHE-RSA-AES256-SHA
order TLSv1 2
ECDHE-RSA-AES256-GCM-SHA384
Perfect Forward Secrecy
PFS
offered
PFS s
DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 DHE-RSA-AES256-SHA ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA
PFS ECDHE curves
secp384r1
Ciphers
ECDHE-RSA-AES256-GCM-SHA384 ECDH 384 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES256-SHA384 ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
(0xc028)
ECDHE-RSA-AES256-SHA ECDH 384 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
(0xc014)
DHE-RSA-AES256-GCM-SHA384 DH 1024 AESGCM 256 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
(0x9f)
DHE-RSA-AES256-SHA256 DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
(0x6b)
DHE-RSA-AES256-SHA DH 1024 AES 256 TLS_DHE_RSA_WITH_AES_256_CBC_SHA
(0x39)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 384 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)
DHE-RSA-AES128-GCM-SHA256 DH 1024 AESGCM 128 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
(0x9e)
Browser Simulations
Android 4.4.2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
No connection
clientsimulation-android 81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 90
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android X
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chrome 74 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chrome 79 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 66 win81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 71 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows XP Internet Explorer 6
No connection
Windows 7 Internet Explorer 8
TLSv1.0 ECDHE-RSA-AES256-SHA
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 DHE-RSA-AES256-GCM-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 DHE-RSA-AES256-GCM-SHA384
clientsimulation-ie 11 winphone81
TLSv1.2 ECDHE-RSA-AES256-SHA
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 15 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 17 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-opera 66 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 9 ios9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 121 ios 122
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 130 osx 10146
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6 update 45
No connection
Java 7 update 25
No connection
clientsimulation-java 8u161
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java1102
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java1201
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 110l
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 111d
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-thunderbird 68 3 1
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384