porno-videos-x.com

Score 87/100

Web site information

Website image porno-videos-x.com
IP Address
CDN
CloudFlare
Programming Languages
PHP

SEO data

title
مقاطع فيديو جنسية عربية ، سكس عرب ، اباحي عربية رائعة في Porno-videos-x.com بوابة أنبوب الإباحية
description
أصبحت أكثر الفاسقات العربيات سخونة وجاذبية هي مقاطع الفيديو الأنبوبية بمفردهن ، مع بعضهن البعض ومع أصدقائهن المنحرفين في Porno-videos-x.com
keywords
الجنس ، الهواة ، فيديو الجنس العربي ، أفلام الجنس العربي ، مقاطع ، فاتنة ، أنبوب الإباحية ، محلية الصنع ، الفتيات ، الاباحية ، فضيحة ، عربي
viewport
width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0
rating
RTA-5042-1996-1400-1577-RTA
twitter:card
summary_large_image
twitter:description
أصبحت أكثر الفاسقات العربيات سخونة وجاذبية هي مقاطع الفيديو الأنبوبية بمفردهن ، مع بعضهن البعض ومع أصدقائهن المنحرفين في Porno-videos-x.com
twitter:title
مقاطع فيديو جنسية عربية ، سكس عرب ، اباحي عربية رائعة في Porno-videos-x.com بوابة أنبوب الإباحية

Web site external calls

fonts.googleapis.com
cdn.jsdelivr.net
foto.porno-videos-x.com
xedo.me
counter.yadro.ru

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
offered
TLS 1.1
offered
TLS 1.2
offered
TLS 1.3
offered with final
ALPN HTTP2
h2
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
not vulnerable
ticketbleed
not vulnerable
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
not vulnerable
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, uses gzip HTTP compression - only supplied '/' tested
POODLE SSL
not vulnerable
fallback SCSV
supported
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable to DROWN on this host and port
DROWN
no RSA certificate, can't be used with SSLv2 elsewhere
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key
BEAST
VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Expect-CT
max-age=604800, report-uri='https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct'

Server Defaults

TLS extensions
'server name/#0' 'renegotiation info/#65281' 'EC point formats/#11' 'session ticket/#35' 'status request/#5' 'next protocol/#13172' 'key share/#51' 'supported versions/#43' 'extended master secret/#23' 'application layer protocol negotiation/#16'
TLS session ticket
valid for 64800 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
off by 0 seconds from your localtime
Signature algorithm
ECDSA with SHA256
Key size
256 EC bits
Key usage
Digital Signature
Extended key usage
cert_ext_keyusage
Serial number
0FB29E4ACB1D209408F6500D39CDD393
Fingerprint SHA1
EF6F93F0ECD37140E977F02D31980196586F4AE2
Fingerprint SHA256
3DAD753813622FEE950D5302CDB96832D29ABB5BB384E618DB6EE324B9F49D03
Certificate details
-----BEGIN CERTIFICATE----- MIIE0DCCBHWgAwIBAgIQD7KeSssdIJQI9lANOc3TkzAKBggqhkjOPQQDAjBKMQsw CQYDVQQGEwJVUzEZMBcGA1UEChMQQ2xvdWRmbGFyZSwgSW5jLjEgMB4GA1UEAxMX Q2xvdWRmbGFyZSBJbmMgRUNDIENBLTMwHhcNMjAwOTAxMDAwMDAwWhcNMjEwOTAx MTIwMDAwWjBtMQswCQYDVQQGEwJVUzELMAkGA1UECBMCQ0ExFjAUBgNVBAcTDVNh biBGcmFuY2lzY28xGTAXBgNVBAoTEENsb3VkZmxhcmUsIEluYy4xHjAcBgNVBAMT FXNuaS5jbG91ZGZsYXJlc3NsLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IA BMyzIayZ74Eo5F7f/supqfv34wg+tl+N6MhUJ6TCEkqa8jyoXAMkCVHbFCWSt3v5 T1vE0tZyoith9KyIkq9kcyqjggMYMIIDFDAfBgNVHSMEGDAWgBSlzjfq67B1DpRn iLRF+tkkEIeWHzAdBgNVHQ4EFgQUMyomXn7itdruPFUtS6ZuXRNnp9cwSgYDVR0R BEMwQYIVc25pLmNsb3VkZmxhcmVzc2wuY29tghQqLnBvcm5vLXZpZGVvcy14LmNv bYIScG9ybm8tdmlkZW9zLXguY29tMA4GA1UdDwEB/wQEAwIHgDAdBgNVHSUEFjAU BggrBgEFBQcDAQYIKwYBBQUHAwIwewYDVR0fBHQwcjA3oDWgM4YxaHR0cDovL2Ny bDMuZGlnaWNlcnQuY29tL0Nsb3VkZmxhcmVJbmNFQ0NDQS0zLmNybDA3oDWgM4Yx aHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0Nsb3VkZmxhcmVJbmNFQ0NDQS0zLmNy bDBMBgNVHSAERTBDMDcGCWCGSAGG/WwBATAqMCgGCCsGAQUFBwIBFhxodHRwczov L3d3dy5kaWdpY2VydC5jb20vQ1BTMAgGBmeBDAECAjB2BggrBgEFBQcBAQRqMGgw JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBABggrBgEFBQcw AoY0aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0Nsb3VkZmxhcmVJbmNFQ0ND QS0zLmNydDAMBgNVHRMBAf8EAjAAMIIBBAYKKwYBBAHWeQIEAgSB9QSB8gDwAHUA 9lyUL9F3MCIUVBgIMJRWjuNNExkzv98MLyALzE7xZOMAAAF0S7T6iAAABAMARjBE AiB6TTbs/D3OV3N3hvMThilajm381RuSJn+/VfnBKgrluAIgIZyJCIb39ApJA26B 5s/ZtTbvnxnz9fDXHV7i1KOQeKMAdwBc3EOS/uarRUSxXprUVuYQN/vV+kfcoXOU sl7m9scOygAAAXRLtPqEAAAEAwBIMEYCIQD6qrNBGkBUioY/OeuEq5o+z0ZiB63v GmqMmp+rFhTjMQIhAMG78TRuXRWhjuwnomgtTTjEaRHLY0JVInCUvKwwb/BxMAoG CCqGSM49BAMCA0kAMEYCIQDPFVITXD4xgdcbuTjaG2P3YDfoG6G7arIdds+XZwzO lgIhAMNbS7GLVmYs97Zej3DLWN/ZTMX2MxYsGDeWOdRwOIut -----END CERTIFICATE-----
Common names
sni.cloudflaressl.com
Service Name Indication
request w/o SNI didn't succeed, usual for EC certificates
SubjectAlternative Name
sni.cloudflaressl.com *.porno-videos-x.com porno-videos-x.com
Certificate authority issuers
Cloudflare Inc ECC CA-3 (Cloudflare, Inc. from US)
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
Days before expiry
expires < 60 days (41)
Valid from
2020-09-01 02:00
Valid until
2021-09-01 14:00
Chain
2
CRL distribution points
http://crl3.digicert.com/CloudflareIncECCCA-3.crl http://crl4.digicert.com/CloudflareIncECCCA-3.crl
Online Certificate Status Protocol URL
http://ocsp.digicert.com
OCSP stapling
offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)

Server Preferences

order
server
Which protocol negotiated
Default protocol TLS1.3
negotiated
TLS13-AES-256-GCM-SHA384, 253 bit ECDH (X25519)
order TLSv1
ECDHE-ECDSA-AES128-SHA
order TLSv1 1
ECDHE-ECDSA-AES128-SHA
order TLSv1 2
ECDHE-ECDSA-CHACHA20-POLY1305-OLD

Perfect Forward Secrecy

PFS
offered
PFS s
ECDHE-ECDSA-AES128-GCM-SHA256 ECDHE-ECDSA-AES128-SHA256 ECDHE-ECDSA-AES128-SHA ECDHE-ECDSA-AES256-GCM-SHA384 ECDHE-ECDSA-AES256-SHA384 ECDHE-ECDSA-AES256-SHA ECDHE-ECDSA-CHACHA20-POLY1305-OLD
ECDHE curves
prime256v1

Ciphers

ECDHE-ECDSA-CHACHA20-POLY1305-OLD ECDH 256 ChaCha20 256 TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256_OLD
(0xcc14)
ECDHE-ECDSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384
(0xc02c)
ECDHE-ECDSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384
(0xc024)
ECDHE-ECDSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
(0xc00a)
ECDHE-ECDSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
(0xc02b)
ECDHE-ECDSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
(0xc023)
ECDHE-ECDSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
(0xc009)

Browser Simulations

Android 2.3.7
No connection
Android 4.1.1
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Android 4.3
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Android 4.4.2
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Android 5.0.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD
Android 6.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305-OLD
Android 7.0
TLSv1.2 ECDHE-ECDSA-CHACHA20-POLY1305
Windows Chrome 51
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Chrome 57
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 47
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Firefox 53
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows XP Internet Explorer 6
No connection
Windows Vista Internet Explorer 7
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 8
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 8.1 update Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows Phone 10 Edge 13
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Opera 17
TLSv1.2 ECDHE-ECDSA-AES128-SHA
MacOSX 10.6.8 Safari 5.1.9
TLSv1.0 ECDHE-ECDSA-AES128-SHA
iOS 7 Safari 7
TLSv1.2 ECDHE-ECDSA-AES128-SHA
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
Windows 7 Tor 7.0.9
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Java 6 update 45
No connection
Java 7 update 25
TLSv1.0 ECDHE-ECDSA-AES128-SHA
Java 8 update 31
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.1.1
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256
OpenSSL 1.0.2e
TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256