link-building-nederland.nl

Score 96/100

Web site information

IP Address
Web Servers
Apache
Font Scripts
Font Awesome
Programming Languages
PHP
CMS
WordPress
JavaScript Frameworks
jQuery

SEO data

title
Linkbuilding Nederland - Backlinks van High Quality websites
viewport
width=device-width,initial-scale=1
google-site-verification
QWuY5YqNuxD30Ahi3AXX68cVALnf2r62ZRsu1yFQgEY
description
Linkbuilding Nederland bied uw backlinks aan van websites met een hoge SEO waarde. DA 50+, DR 40+, TF 30 +. Check onze mogelijkheden
robots
follow, index, max-snippet:-1, max-video-preview:-1, max-image-preview:large
twitter:card
summary_large_image
twitter:title
Linkbuilding Nederland - Backlinks van High Quality websites
twitter:description
Linkbuilding Nederland bied uw backlinks aan van websites met een hoge SEO waarde. DA 50+, DR 40+, TF 30 +. Check onze mogelijkheden
twitter:label1
Written by
twitter:data1
admin
twitter:label2
Time to read
twitter:data2
14 minutes
generator
WordPress 6.0

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
not offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
no session ticket extension
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
not vulnerable, no HTTP compression - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=A734BF6C96A53F22F6035B24E04EF92AE20283623D8D13F36280D2B36823FC43
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable

Header Responses

Status code
301 Moved Permanently ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Upgrade
h2,h2c

Server Defaults

TLS extensions
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'supported versions/#43' 'key share/#51' 'supported_groups/#10' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'encrypt-then-mac/#22' 'extended master secret/#23'
TLS session ticket
no -- no lifetime advertised
SSL sessionID support
yes
Session Ticket Resumption
not supported
Session ID Resumption
supported
TLS timestamp
random
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
RSA 4096 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
03279B0918BD365425D5CC6B6D71523AB815
cert serialNumberLen
18
Fingerprint SHA1
06ED61A0ADC93DE5A2F81CE0E6327B3AFF14ADCF
Fingerprint SHA256
A734BF6C96A53F22F6035B24E04EF92AE20283623D8D13F36280D2B36823FC43
Certificate details
-----BEGIN CERTIFICATE----- MIIGfDCCBWSgAwIBAgISAyebCRi9NlQl1cxrbXFSOrgVMA0GCSqGSIb3DQEBCwUA MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD EwJSMzAeFw0yMjA2MDQxMTAwMjlaFw0yMjA5MDIxMTAwMjhaMCUxIzAhBgNVBAMT GmxpbmstYnVpbGRpbmctbmVkZXJsYW5kLm5sMIICIjANBgkqhkiG9w0BAQEFAAOC Ag8AMIICCgKCAgEAoPQltQYB0Cb+co0T3+x69WAVIgaEPr+4ZAgmOFOuaietjhWb BDXVWRhP8roTt8Uq2zwpRooARfwlYvrSXJCHqo39rjqBnSrLLwwPP6l7dJKS8OZ7 Q3HgMOgxfrrBPy2OjFKCctfpVNTlaghZj5BCuh67EeWRltKJzNvBXWw4DIubtbJc 19uGQEjCfOEoRJwMIa9w4q4LJFimqGHZG9DxdK1p4nkg+9xxGGiXCe+7MIt+K9Q1 yI2EuhWXHml8rP3F0CD4jJt5JropygYFmo5K38wiNKeHWcVo0PATwzHWyfU3u7rK xT4NC9w2S6+8iulNn+KQS67YBGWCtexzRSV2dHWRVmQtnS0uu/UIVYeTbvFNFCav vLJjCa3+a83IqPR+l7glDX4il2Nw4+kHM1pQ3jzqP6nJOTkJSdmORw631O3cfies AA1uK1ieXcH7t7uwVsz2lkCValiWkmCfpgQgPy3EmDcASRubzIDFuNwM0Oxf1e58 33eCYheaS6OC3sOGCLjlvmaK/g14FpEWGAv8TQd+X0XO02u3ajMl9GG9VBCuzKm7 UGY68DjXyw4GJsCNPxS4yd30Wb2BT85z7JlaMqcCLxQobRkXAQ+R/HCz8JPajbqy 7mDPMip+b1CQFxE7kFhuICZpSuGZw1pD031aBZgpXTFD4V3bcYgx9DeD7IECAwEA AaOCApcwggKTMA4GA1UdDwEB/wQEAwIFoDAdBgNVHSUEFjAUBggrBgEFBQcDAQYI KwYBBQUHAwIwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUAeY3zGGmzAep0DtVuU8d nEhygqowHwYDVR0jBBgwFoAUFC6zF7dYVsuuUAlA5h+vnYsUwsYwVQYIKwYBBQUH AQEESTBHMCEGCCsGAQUFBzABhhVodHRwOi8vcjMuby5sZW5jci5vcmcwIgYIKwYB BQUHMAKGFmh0dHA6Ly9yMy5pLmxlbmNyLm9yZy8wZgYDVR0RBF8wXYIabGluay1i dWlsZGluZy1uZWRlcmxhbmQubmyCH21haWwubGluay1idWlsZGluZy1uZWRlcmxh bmQubmyCHnd3dy5saW5rLWJ1aWxkaW5nLW5lZGVybGFuZC5ubDBMBgNVHSAERTBD MAgGBmeBDAECATA3BgsrBgEEAYLfEwEBATAoMCYGCCsGAQUFBwIBFhpodHRwOi8v Y3BzLmxldHNlbmNyeXB0Lm9yZzCCAQUGCisGAQQB1nkCBAIEgfYEgfMA8QB3AEal Vet1+pEgMLWiiWn0830RLEF0vv1JuIWr8vxw/m1HAAABgS6WlIwAAAQDAEgwRgIh APREiaP0ZvKqzlT7p7zac4X6dEoJ2eaO8bEex8M3tTktAiEAsL8eI6BZQWSvYNX+ 7ZE6SJCnuvRW1h8kkQRLehR5zXkAdgDfpV6raIJPH2yt7rhfTj5a6s2iEqRqXo47 EsAgRFwqcwAAAYEulpY3AAAEAwBHMEUCIF/j6bVgBKi+QXXti7emhsH/CrlS4UY4 CaSomdquhr27AiEA1n51P/39LqRzWbVjRts6c6XhObNoVoiZ8Gc4sJEWAeowDQYJ KoZIhvcNAQELBQADggEBABepKfkZ6u/lspioelTIhS9GXVG/3HFOl1O7dVk5vbUJ ioodiv4RmVqxJLXWo3cVpbv4Ot2CvYqCuj9hoqYy1TUPgjFvGkdKcMC9aCpVWpC2 y9bbQ5t0UtmVuz7uCxKRwIyONScXxyhKEZJyYFmjC1EjPLqbCY+SBUewpfqPlKu6 1LRKaoOWCZ+6oDtlIU2/WQqI+uCHW3agPeip+l2lJ2f2S3VH9GyLV6ozRO2es3Y3 54lJRyNrnYaIPaivYQE2y4S7sm8VUso/7vJpzBYWz1OtyUR3PCZr9HeIbwR1MQEI EvkibJN3T284d17HpD7qH946vJ6IIkkQmMpF/4Smg+k= -----END CERTIFICATE-----
Common names
link-building-nederland.nl
Service Name Indication
*.zxcs.nl
SubjectAlternative Name
link-building-nederland.nl mail.link-building-nederland.nl www.link-building-nederland.nl
Certificate authority issuers
R3 (Let's Encrypt from US)
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert eTLS
not present
cert expirationStatus
69 >= 30 days
Valid from
2022-06-04 11:00
Valid until
2022-09-02 11:00
cert validityPeriod
No finding
Chain
3
certs list ordering problem
no
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://r3.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)

Server Preferences

order
server
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS_AES_128_GCM_SHA256, 253 bit ECDH (X25519)
order TLSv1 2
ECDHE-RSA-AES256-GCM-SHA384

Perfect Forward Secrecy

PFS
offered
PFS s
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384
PFS ECDHE curves
prime256v1 secp384r1 secp521r1

Ciphers

ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
(0xc028)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)
ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
(0xc027)

Browser Simulations

Android 4.4.2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 90
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-android X
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-chrome 74 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-chrome 79 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-firefox 66 win81
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-firefox 71 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
Windows XP Internet Explorer 6
No connection
Windows 7 Internet Explorer 8
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
clientsimulation-ie 11 winphone81
TLSv1.2 ECDHE-RSA-AES128-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 15 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 17 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-opera 66 win10
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-safari 9 ios9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 121 ios 122
TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
clientsimulation-safari 130 osx 10146
TLSv1.3 TLS_CHACHA20_POLY1305_SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6 update 45
No connection
Java 7 update 25
No connection
clientsimulation-java 8u161
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java1102
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-java1201
TLSv1.3 TLS_AES_128_GCM_SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 110l
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 111d
TLSv1.3 TLS_AES_128_GCM_SHA256
clientsimulation-thunderbird 68 3 1
TLSv1.3 TLS_AES_128_GCM_SHA256