viagro.it.gg

Score 79/100

Web site information

Website image viagro.it.gg
Web Address
IP Address
Advertising Networks
AdRiver
Widgets
Facebook
Ecommerce
IBM WebSphere Commerce
Web Servers
Nginx
Cache Tools
Varnish
Programming Languages
Java
Databases
MySQL

SEO data

title
Acquistare Viagra (Sildenafil Citrate) - comprare viagra senza ricetta
viewport
width=device-width, width=960
description
Potete acquistare il Viagra online a basso costo. Acquistate il Viagra 100mg a buon mercato e risparmiate un sacco di soldi!
robots
index,follow
google-site-verification
WwA1KWUdQDxRyQ2xQreS90SiYGLxgx3bv9Sq2Rcuo1c

Lighthouse

Performance
25/100
Accessibility
0/100
Best Practices
77/100
SEO
0/100
PWA
40/100

Security Rating

Rating spec
SSL Labs's 'SSL Server Rating Guide' (version 2009q from 2020-01-30)
Protocol support score
95
Protocol support score weighted
28
Key exchange score
100
Key exchange score weighted
30
Strength score
90
Strength score weighted
36
Final score
94
Overall grade
B
Grade cap reason 1
Grade capped to B. TLS 1.1 offered
Grade cap reason 2
Grade capped to B. TLS 1.0 offered
Grade cap reason 3
Grade capped to A. HSTS is not offered

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
offered (deprecated)
TLS 1.1
offered (deprecated)
TLS 1.2
offered
TLS 1.3
not offered + downgraded to weaker protocol
ALPN
not offered

Vulnerabilities

heartbleed
not vulnerable , timed out
CCS
not vulnerable
ticketbleed
not vulnerable, returned potential memory fragments do not differ
ROBOT
not vulnerable, no RSA key transport cipher
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, gzip HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
supported
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://search.censys.io/search?resource=hosts&virtual_hosts=INCLUDE&q=25F747405334B60997E63465796A02EC45C7D8F48E40A50EA3C2E4D084CAFF56
LOGJAM-common primes
nginx/1024-bit MODP group with safe prime modulus
LOGJAM
not vulnerable, no DH EXPORT ciphers,
BEAST
VULNERABLE -- but also supports higher protocols TLSv1.1 TLSv1.2 (likely mitigated)
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
winshock
not vulnerable
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
-1 seconds from localtime
HTTP headerTime
1764546325
HTTP headerAge
0 seconds
ipv4 in header
X-wm-VIP: 193.238.27.30 (check if it's your IP address or e.g. a cluster IP)
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
X-Frame-Options
DENY
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache

Server Defaults

TLS extensions
'EC point formats/#11' 'heartbeat/#15' 'session ticket/#35' 'next protocol/#13172' 'renegotiation info/#65281'
TLS session ticket
valid for 60 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
random
cert compression
N/A
clientAuth
none
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
RSA 4096 bits (exponent is 65537)
Key usage
Digital Signature, Key Encipherment
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
058218A41E0193AA20543BC83CDA3B2AA724
cert serialNumberLen
18
Fingerprint SHA1
7B2A00D0CB2B59D0638E28A50A56B53222F460B5
Fingerprint SHA256
25F747405334B60997E63465796A02EC45C7D8F48E40A50EA3C2E4D084CAFF56
Certificate details
-----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----
Common names
it.gg
Service Name Indication
it.gg
SubjectAlternative Name
*.it.gg it.gg
Certificate trusted
Ok via SAN wildcard (same w/o SNI)
cert trust wildcard
trust is via wildcard
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert expirationStatus
expires < 30 days (28)
Valid from
2025-09-30 13:13
Valid until
2025-12-29 13:13
cert extlifeSpan
certificate has no extended life time according to browser forum
cert eTLS
not present
cert crlDistributionPoints
http://r13.c.lencr.org/37.crl
Online Certificate Status Protocol URL
--
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)
Chain
3
certs list ordering problem
yes
Certificate authority issuers
R13 (Let's Encrypt from US)
intermediate cert
-----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----
intermediate cert fingerprintSHA256
D3B128216A843F8EF1321501F5DF52A5DF52939EE2C19297712CD3DE4D419354
intermediate cert notBefore
2024-03-13 00:00
intermediate cert notAfter
2027-03-12 23:59
intermediate cert expiration
ok > 40 days
intermediate cert chain
R13 <-- ISRG Root X1
intermediate cert
-----BEGIN CERTIFICATE----- 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 -----END CERTIFICATE-----
intermediate cert fingerprintSHA256
D3B128216A843F8EF1321501F5DF52A5DF52939EE2C19297712CD3DE4D419354
intermediate cert notBefore
2024-03-13 00:00
intermediate cert notAfter
2027-03-12 23:59
intermediate cert expiration
ok > 40 days
intermediate cert chain
R13 <-- ISRG Root X1
intermediate cert badOCSP
intermediate certificate(s) is/are ok

Server Preferences

order-tls1
server
order TLSv1
ECDHE-RSA-AES256-SHA
order-tls1 1
server
order TLSv1 1
ECDHE-RSA-AES256-SHA
order-tls1 2
server
order TLSv1 2
ECDHE-RSA-AES256-GCM-SHA384
order
server

Ciphers

Browser Simulations

Android 7.0
No connection
clientsimulation-android 81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 90
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android X
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 11 12
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 13 14
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chrome 101 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chromium 137 win11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 100 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 137 win11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows 7 Internet Explorer 8
TLSv1.0 ECDHE-RSA-AES256-SHA
Windows 7 Internet Explorer 11
TLSv1.2 DHE-RSA-AES256-GCM-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 DHE-RSA-AES256-GCM-SHA384
clientsimulation-ie 11 winphone81
TLSv1.2 ECDHE-RSA-AES256-SHA
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 15 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 101 win10 21h2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 133 win11 23h2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 184 ios 184
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 154 osx 1231
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 184 osx 154
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 7 update 25
No connection
clientsimulation-java 80442
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java 1102
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java 1703
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java 2106
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-go 1178
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-libressl 336
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 111d
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 315
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 350
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-apple mail 16 0
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-thunderbird 91 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384