- TLS / STARTTLS Test - SSL-Tools

Summary

JSON Refresh

Report created Wed, 04 Mar 2026 08:14:25 +0000

  • Certificates Trustworthy
  • Protocol Not checked
  • DANE Valid
  • Bullshit made in Germany Logo: CC-BY-SA MathiasM

No connection to the mailservers of gmx.de could be established.

Servers

Incoming Mails

These servers are responsible for incoming mails to @gmx.de addresses.

Hostname / IP address Priority STARTTLS Certificates Protocol
mx01.emig.gmx.net 212.227.17.5 Results incomplete 10 supported mx.gmx.net DANE valid PFS supported Heartbleed not vulnerable Weak ciphers not found
  • TLSv1.2
  • SSLv3
2026-03-04 1 s
mx00.emig.gmx.net 212.227.15.9 Results incomplete 10 supported mx.gmx.net DANE valid PFS supported Heartbleed not vulnerable Weak ciphers not found
  • TLSv1.2
  • SSLv3
2026-03-04 1 s

Outgoing Mails

We have received emails from these servers with @gmx.de sender addresses. Test mail delivery

Host TLS Version & Cipher
mo4-p05-ob.smtp.rzone.de (81.169.146.183) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-07-17
mout-xforward.gmx.net (82.165.159.40) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-07-05
o134.p8.mailjet.com (87.253.233.134) TLSv1.3 TLS_AES_128_GCM_SHA256 2021-05-27
mout.gmx.net (212.227.17.20) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-08-30
mout.gmx.net (212.227.17.21) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-08-25
mout.gmx.net (212.227.17.22) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-08-20
mout.gmx.net (212.227.15.19) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-08-01
mout.gmx.net (212.227.15.18) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-07-31
mout.gmx.net (212.227.15.15) TLSv1.3 TLS_AES_256_GCM_SHA384 2021-06-20

Certificates

First seen at: 2026-02-22

CN=mx.gmx.net,O=1&1 Mail & Media GmbH,L=Montabaur,ST=Rheinland-Pfalz,C=DE

Certificate chain
  • mx.gmx.net
    • 2027-01-12 remaining
    • 3072 bit
    • sha256WithRSAEncryption
      • Telekom Security ServerID OV Class 2 CA
        • 2027-08-02 remaining
        • 3072 bit
        • sha256WithRSAEncryption
          • T-TeleSec GlobalRoot Class 2 (Certificate is self-signed.)
            • 2033-10-01 remaining
            • 2048 bit
            • sha256WithRSAEncryption
Subject Country (C)
  • DE
State (ST)
  • Rheinland-Pfalz
Locality (L)
  • Montabaur
Organization (O)
  • 1&1 Mail & Media GmbH
Common Name (CN)
  • mx.gmx.net
Alternative Names
  • mx.gmx.net
  • mx00.gmx.net
  • mx01.gmx.net
  • mx00.emig.gmx.net
  • mx01.emig.gmx.net
  • dhmx01.emig.gmx.net
  • dhmx02.emig.gmx.net
Issuer Country (C)
  • DE
Organization (O)
  • Deutsche Telekom Security GmbH
Common Name (CN)
  • Telekom Security ServerID OV Class 2 CA
validity period Not valid before 2026-01-08 Not valid after 2027-01-12 This certifcate has been verified for the following usages:
  • Digital Signature
  • Key Encipherment
  • TLS Web Client Authentication
  • TLS Web Server Authentication
Fingerprints SHA256 79:22:C1:30:28:1B:72:13:A9:8C:5A:68:D6:65:AD:CB:7A:18:8B:AE:E9:46:29:52:11:06:5A:A7:80:70:DD:23 SHA1 09:1B:3C:49:BB:0B:B6:5F:42:97:EC:19:04:24:F7:F0:63:48:38:00 X509v3 extensions authorityKeyIdentifier
  • keyid:1C:05:93:B1:7F:A8:34:30:8C:52:E0:96:40:A0:72:A3:10:5D:E0:FF
subjectKeyIdentifier
  • E0:7B:30:C2:9C:54:B0:A8:CF:26:9B:B1:AC:EF:33:7F:2D:F3:3C:90
certificatePolicies
  • Policy: 2.23.140.1.2.2
  • CPS: http://docs.serverid.telesec.de/cps/serverid.htm
crlDistributionPoints
  • Full Name:
  • URI:http://crl.serverid.telesec.de/rl/Telekom_Security_ServerID_OV_Class_2_CA.crl
authorityInfoAccess
  • OCSP - URI:http://ocsp.serverid.telesec.de/ocspr
  • CA Issuers - URI:http://crt.serverid.telesec.de/crt/Telekom_Security_ServerID_OV_Class_2_CA.crt
ct_precert_scts
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : A2:81:00:18:73:4E:17:6E:1D:47:E0:95:40:F3:81:BA:
  • 54:66:97:CD:63:A8:43:50:71:6E:B8:09:4E:DA:F1:0D
  • Timestamp : Jan 8 07:36:14.551 2026 GMT
  • Extensions: 00:00:05:00:01:24:56:91
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:04:EF:B3:13:FB:4E:AD:53:1B:8B:15:5D:
  • 55:45:BE:FE:6B:7D:E0:C7:B4:FE:79:41:3F:E2:83:7F:
  • D9:AF:A3:90:02:20:65:B8:16:0B:45:0A:67:66:25:E3:
  • AA:BD:DC:B5:C1:93:18:71:7C:BD:A8:E1:6C:5E:B8:C6:
  • BB:D8:FB:3C:8C:97
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 1C:9F:68:2C:E9:FA:F0:45:69:50:F8:1B:96:8A:87:DD:
  • DB:32:10:D8:4C:E6:C8:B2:E3:82:52:4A:C4:CF:59:9F
  • Timestamp : Jan 8 07:36:14.086 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:BB:DA:45:91:33:BE:C8:50:1F:72:9B:
  • 26:F7:85:D9:4C:C8:41:6C:96:A7:88:8B:85:B4:A2:7D:
  • C7:54:05:D7:0F:02:20:49:5F:3B:0D:2F:4D:23:C9:4F:
  • A5:9D:D0:88:34:CA:B2:96:48:EF:8E:E7:1B:08:AB:46:
  • 4C:F3:D5:59:0D:04:AD
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 8E:CA:47:0B:AC:DE:6A:F3:A2:06:B0:A4:7A:84:B7:46:
  • FE:1F:C6:BF:95:3E:25:E6:9B:4E:E4:02:48:F3:C6:E8
  • Timestamp : Jan 8 07:36:14.186 2026 GMT
  • Extensions: 00:00:05:00:01:30:85:55
  • Signature : ecdsa-with-SHA256
  • 30:44:02:20:00:A9:BA:C9:B6:BB:0B:84:46:F4:B5:B6:
  • 97:46:74:9D:1C:59:B5:23:13:34:B9:4E:4E:30:FF:CB:
  • 4B:24:AE:1B:02:20:23:20:EE:60:46:01:4A:D5:B0:C7:
  • 05:43:B0:F8:B3:F2:BA:8D:6B:83:B8:FF:2D:A0:12:A9:
  • 04:DC:FD:04:4F:B0
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 59:6E:6C:33:86:94:B2:59:72:A2:56:C8:A0:E8:DD:90:
  • 4A:76:E8:08:3D:DA:87:3B:01:08:38:28:14:3C:EE:59
  • Timestamp : Jan 8 07:36:14.050 2026 GMT
  • Extensions: 00:00:05:00:00:09:F7:7E
  • Signature : ecdsa-with-SHA256
  • 30:46:02:21:00:AA:2E:71:8F:9A:B3:AE:03:B8:C9:C0:
  • F1:AD:E3:F1:ED:36:F1:64:57:45:B5:CC:FB:31:46:70:
  • 61:B3:55:58:24:02:21:00:DE:DC:60:04:1B:B0:2E:8E:
  • D3:22:11:82:A1:51:69:D1:36:29:B0:BB:F8:AF:D0:61:
  • 37:86:78:76:31:7A:3C:4E
  • Signed Certificate Timestamp:
  • Version : v1 (0x0)
  • Log ID : 60:4C:9A:AF:7A:7F:77:5F:01:D4:06:FC:92:0D:C8:99:
  • EB:0B:1C:7D:F8:C9:52:1B:FA:FA:17:77:3B:97:8B:C9
  • Timestamp : Jan 8 07:36:13.909 2026 GMT
  • Extensions: none
  • Signature : ecdsa-with-SHA256
  • 30:45:02:21:00:D7:E3:14:A4:46:33:4A:3F:A7:46:10:
  • C5:BE:84:AC:56:72:BE:F2:F7:4A:A7:BE:2E:D9:9C:30:
  • 82:78:63:32:1B:02:20:15:46:21:DD:BF:0C:E1:C5:5C:
  • 2F:C0:E3:66:5E:BB:90:5E:9E:F6:A0:08:0C:6F:74:99:
  • F8:15:FB:9E:92:6B:98
more details less details

DANE

DNS-based Authentication of Named Entities (DANE) is a protocol to allow X.509 certificates to be bound to DNS using TLSA records and DNSSEC.

Name Options DNSSEC Matches
_25._tcp.mx01.emig.gmx.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid valid
_25._tcp.mx01.emig.gmx.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid
_25._tcp.mx00.emig.gmx.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid valid
_25._tcp.mx00.emig.gmx.net
  • DANE-EE: Domain Issued Certificate
  • Use subject public key
  • SHA-256 Hash
valid

Từ khóa » Gmx Check