SSL Report:
hit-phish.opendns.com
(146.112.61.108)
Assessed on: Tue, 27 Jan 2026 12:00:50 UTC
|
Clear cache
Due to a recently discovered bug in Apple's code, your browser is exposed to MITM attacks. Click here for more information.
Summary
Overall Rating
T
If trust issues are ignored: B
Visit our
documentation page
for more information, configuration guides, and books. Known issues are documented
here .
This server's certificate is not trusted, see
below for details.
This server does not support Forward Secrecy with the reference browsers.
Grade capped to B.
MORE INFO »
DNS Certification Authority Authorization (CAA) Policy found for this domain.
MORE INFO »
Certificate #1: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Common names
hit-phish.opendns.com
Alternative names
hit-phish.opendns.com
Serial Number
69786118
Valid from
Sun, 25 Jan 2026 11:59:40 UTC
Valid until
Fri, 30 Jan 2026 11:59:40 UTC (expires in 2 days, 22 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
DNS CAA
Yes
policy host: opendns.com
issue: amazontrust.com flags:0
issue: awstrust.com flags:0
issue: letsencrypt.org flags:0
issue: quovadisglobal.com flags:0
issue: amazonaws.com flags:0
issue: digicert.com flags:0
issue: amazon.com flags:0
issue: identrust.com flags:0
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3152 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Valid until
Thu, 05 Feb 2026 06:25:38 UTC (expires in 8 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: e29ab7b17624124762e1ab3352d5f4c5dd8a40ee3bbfdebb90199f2b64f0dbe8
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Certificate #2: RSA 2048 bits (SHA256withRSA)
No SNI
Server Key and Certificate #1
Subject
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Common names
*.opendns.com
Alternative names
*.opendns.com
Serial Number
69789d24
Valid from
Sun, 25 Jan 2026 11:10:34 UTC
Valid until
Fri, 30 Jan 2026 11:10:34 UTC (expires in 2 days, 21 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3136 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Valid until
Thu, 05 Feb 2026 06:25:38 UTC (expires in 8 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
*.opendns.com
Fingerprint SHA256: bbf9aa6d217c139d63ed058dee8feb9dc23e46c31991aaed1dad2b0e742d4b80
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Click here to expand
Certificate #3: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Common names
hit-phish.opendns.com
Alternative names
hit-phish.opendns.com
Serial Number
69789d6f
Valid from
Sun, 25 Jan 2026 11:59:36 UTC
Valid until
Fri, 30 Jan 2026 11:59:36 UTC (expires in 2 days, 22 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
DNS CAA
Yes
policy host: opendns.com
issue: amazontrust.com flags:0
issue: awstrust.com flags:0
issue: letsencrypt.org flags:0
issue: quovadisglobal.com flags:0
issue: amazonaws.com flags:0
issue: digicert.com flags:0
issue: amazon.com flags:0
issue: identrust.com flags:0
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3152 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Valid until
Thu, 05 Feb 2026 06:25:38 UTC (expires in 8 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 34eb75ceae5fdf874b1f0e710dd2d40bedd84735206e463c8c387aa5f54ecf74
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Certificate #4: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
Common names
hit-phish.opendns.com
Alternative names
hit-phish.opendns.com
Serial Number
69789d69
Valid from
Sun, 25 Jan 2026 11:59:36 UTC
Valid until
Fri, 30 Jan 2026 11:59:36 UTC (expires in 2 days, 22 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
DNS CAA
Yes
policy host: opendns.com
issue: amazontrust.com flags:0
issue: awstrust.com flags:0
issue: letsencrypt.org flags:0
issue: quovadisglobal.com flags:0
issue: amazonaws.com flags:0
issue: digicert.com flags:0
issue: amazon.com flags:0
issue: identrust.com flags:0
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3152 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
Valid until
Fri, 06 Feb 2026 06:32:04 UTC (expires in 9 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 6fafc731820238b903da2440b4a620dfdc121bfb1e57d8865cb606eeda8b2750
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Certificate #5: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
Common names
hit-phish.opendns.com
Alternative names
hit-phish.opendns.com
Serial Number
69785a49
Valid from
Sun, 25 Jan 2026 11:59:38 UTC
Valid until
Fri, 30 Jan 2026 11:59:38 UTC (expires in 2 days, 22 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
DNS CAA
Yes
policy host: opendns.com
issue: amazontrust.com flags:0
issue: awstrust.com flags:0
issue: letsencrypt.org flags:0
issue: quovadisglobal.com flags:0
issue: amazonaws.com flags:0
issue: digicert.com flags:0
issue: amazon.com flags:0
issue: identrust.com flags:0
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3152 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
Valid until
Fri, 06 Feb 2026 06:32:04 UTC (expires in 9 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: 8edb00383924346ae6eba570bf50577061e67471a730c4fe0c86d8f780add882
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 9053a1a4318d0ceb3aa69cf9fb8c3b37e1def84f2e0cc53b210c0390078d64c2
Pin SHA256: CSV8MEyRNZzwNfyPSbu1TauWu5qOkXhnAEB45PNz2Wg=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Certificate #6: RSA 2048 bits (SHA256withRSA)
Server Key and Certificate #1
Subject
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Common names
hit-phish.opendns.com
Alternative names
hit-phish.opendns.com
Serial Number
69785935
Valid from
Sun, 25 Jan 2026 06:42:07 UTC
Valid until
Fri, 30 Jan 2026 06:42:07 UTC (expires in 2 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Weak key (Debian)
No
Issuer
Cisco Umbrella Secondary SubCA lax-SG
Signature algorithm
SHA256withRSA
Extended Validation
No
Certificate Transparency
No
OCSP Must Staple
No
Revocation information
None
DNS CAA
Yes
policy host: opendns.com
issue: amazontrust.com flags:0
issue: awstrust.com flags:0
issue: letsencrypt.org flags:0
issue: quovadisglobal.com flags:0
issue: amazonaws.com flags:0
issue: digicert.com flags:0
issue: amazon.com flags:0
issue: identrust.com flags:0
Trusted
No NOT TRUSTED
(Why? )
Mozilla
Apple
Android
Java
Windows
Additional Certificates (if supplied)
Certificates provided
3 (3152 bytes)
Chain issues
None
#2
Subject
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
Valid until
Thu, 05 Feb 2026 06:25:38 UTC (expires in 8 days, 16 hours)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Primary SubCA
Signature algorithm
SHA256withRSA
#3
Subject
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
Valid until
Mon, 14 May 2029 18:21:48 UTC (expires in 3 years and 3 months)
Key
RSA 2048 bits
(e 65537)
Issuer
Cisco Umbrella Root CA
Signature algorithm
SHA256withRSA
Certification Paths
Mozilla
Apple
Android
Java
Windows
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Path #1: Not trusted (path does not chain to a trusted anchor)
1
Sent by server
hit-phish.opendns.com
Fingerprint SHA256: cdc8819a110ddfa3104c3f5abc57417154add88d84a094ba967cea0231b49b9d
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
2
Sent by server
Cisco Umbrella Secondary SubCA lax-SG
Fingerprint SHA256: 238534970d2db4f64f2bcc46d73e424e7c862bfa75e669d7a647c93e4c44fd58
Pin SHA256: 8IWjQxJ+46LezffzRsYkjX8S+TKRXks04gPLGQUcgio=
RSA 2048 bits
(e 65537) /
SHA256withRSA
3
Sent by server
Cisco Umbrella Primary SubCA
Fingerprint SHA256: 29156bbafb427dfac6b656fbc56df9e05b85402f53c6835cd5aa5844b0f29eac
Pin SHA256: hmRLYLC1u97n0dsto1+IlzQA9fptzRRcrLi3iOqlCVE=
RSA 2048 bits
(e 65537) /
SHA256withRSA
4
Extra download
Not in trust store
Cisco Umbrella Root CA
Self-signed
Fingerprint SHA256: 20337c06f749287d526d0752c429483421ce830ac28b322b84b118be5af5787d
Pin SHA256: tdxCl9nTUu45Q7PCD+B4fNi9eiIkHbv3ATKK34i/qhM=
RSA 2048 bits
(e 65537) /
SHA256withRSA
Click here to expand
Why is my certificate not trusted?
There are many reasons why a certificate may not be trusted. The
exact problem is indicated on the report card in bright red.
The problems fall into three categories:
Invalid certificate
Invalid configuration
Unknown Certificate Authority
1. Invalid certificate
A certificate is invalid if:
It is used before its activation date
It is used after its expiry date
Certificate hostnames don't match the site hostname
It has been revoked
It has insecure signature
It has been blacklisted
2. Invalid configuration
In some cases, the certificate chain does not
contain all the necessary certificates to connect the web
server certificate to one of the root certificates in our trust store.
Less commonly, one of the certificates in the chain (other than the
web server certificate) will have expired, and that invalidates the
entire chain.
3. Unknown Certificate Authority
In order for trust to be established, we must have the root certificate
of the signing Certificate Authority in our trust store. SSL Labs does not
maintain its own trust store; instead we use the store maintained by Mozilla.
If we mark a web site as not trusted, that means that the average web user's
browser will not trust it either. For certain special groups of users, such
web sites can still be secure. For example, if you can securely verify that
a self-signed web site is operated by a person you trust, then you can trust
that self-signed web site too. Or, if you work for an organisation that manages
its own trust, and you have their own root certificate already embedded in
your browser. Such special cases do not work for the general public, however,
and this is what we indicate on our report card.
4. Interoperability issues
In some rare cases trust cannot be established because of interoperability
issues between our code and the code or configuration running on the server.
We manually review such cases, but if you encounter such an issue please feel
free to contact us. Such problems are very difficult to troubleshoot and you
may be able to provide us with information that might help us determine the
root cause.
SSL Report v2.4.1