SSL Report:
sm054.vip
(104.143.33.75)
Assessed on: Tue, 25 Nov 2025 05:56:02 UTC
| Clear cache
Summary
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page
for more information, configuration guides, and books. Known issues are documented
here.
This server supports TLS 1.0 and TLS 1.1.
Grade capped to B. MORE INFO »
This server does not support TLS 1.3. MORE INFO »
This site works only in browsers with SNI support.
Certificate #1: EC 256 bits (SHA384withECDSA)
|
Server Key and Certificate #1
|
|
| Subject |
sm099.vip
Fingerprint SHA256: 6cf6806d31e863f20ba5be7027609023475ad52b0e6981d0ba7d0c1dcbc1470b Pin SHA256: wOVO5/2qjoY/NgtE98B8bhS7Q2vhzPopI78zTWhvhac= |
| Common names | sm099.vip |
| Alternative names | sm001.vip sm002.vip sm003.vip sm004.vip sm005.vip sm006.vip sm007.vip sm008.vip sm009.vip sm010.vip sm011.vip sm012.vip sm013.vip sm014.vip sm015.vip sm016.vip sm017.vip sm018.vip sm019.vip sm020.vip sm021.vip sm022.vip sm023.vip sm024.vip sm025.vip sm026.vip sm027.vip sm028.vip sm029.vip sm030.vip sm031.vip sm032.vip sm033.vip sm034.vip sm035.vip sm036.vip sm037.vip sm038.vip sm039.vip sm040.vip sm041.vip sm042.vip sm043.vip sm044.vip sm045.vip sm046.vip sm047.vip sm048.vip sm049.vip sm050.vip sm051.vip sm052.vip sm053.vip sm054.vip sm055.vip sm056.vip sm057.vip sm058.vip sm059.vip sm060.vip sm061.vip sm062.vip sm063.vip sm064.vip sm065.vip sm066.vip sm067.vip sm068.vip sm069.vip sm070.vip sm071.vip sm072.vip sm073.vip sm074.vip sm075.vip sm076.vip sm077.vip sm078.vip sm079.vip sm080.vip sm081.vip sm082.vip sm083.vip sm084.vip sm085.vip sm086.vip sm087.vip sm088.vip sm089.vip sm090.vip sm091.vip sm092.vip sm093.vip sm094.vip sm095.vip sm096.vip sm097.vip sm098.vip sm099.vip |
| Serial Number | 05a9ab1faeb836b7703f28a4fdc98427df69 |
| Valid from | Tue, 21 Oct 2025 01:02:27 UTC |
| Valid until | Mon, 19 Jan 2026 01:02:26 UTC (expires in 1 month and 24 days) |
| Key | EC 256 bits |
| Weak key (Debian) | No |
| Issuer | E7
AIA: http://e7.i.lencr.org/ |
| Signature algorithm | SHA384withECDSA |
| Extended Validation | No |
| Certificate Transparency | Yes (certificate) |
| OCSP Must Staple | No |
| Revocation information |
CRL CRL: http://e7.c.lencr.org/106.crl |
| Revocation status | Validation error
CRL ERROR: IOException occurred |
| DNS CAA | No (more info) |
| Trusted | Yes
Mozilla Apple Android Java Windows |
|
|
Configuration
| Protocols | |
| TLS 1.3 | No |
| TLS 1.2 | Yes |
| TLS 1.1 | Yes |
| TLS 1.0 | Yes |
| SSL 3 | No |
| SSL 2 | No |
| Cipher Suites | ||
|
# TLS 1.2 (suites in server-preferred order)
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (0xc02b)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
128 | |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (0xc023)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (0xc02c)
ECDH secp256r1 (eq. 3072 bits RSA) FS
|
256 | |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (0xc024)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
112 | |
|
# TLS 1.1 (suites in server-preferred order)
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
112 | |
|
# TLS 1.0 (suites in server-preferred order)
|
||
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (0xc009)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
128 | |
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
256 | |
TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA (0xc008)
ECDH secp256r1 (eq. 3072 bits RSA) FS
WEAK
|
112 | |
| Handshake Simulation | |||
| Android 2.3.7 No SNI 2 |
Server sent fatal alert: handshake_failure |
||
| Android 4.0.4 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.1.1 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.2.2 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.3 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Android 4.4.2 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 5.0.0 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 6.0 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 7.0 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 8.0 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 8.1 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Android 9.0 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Baidu Jan 2015 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| BingPreview Jan 2015 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Chrome 49 / XP SP3 |
Server sent fatal alert: handshake_failure |
||
| Chrome 69 / Win 7 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Chrome 70 / Win 10 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Chrome 80 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 31.3.0 ESR / Win 7 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 47 / Win 7 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 49 / XP SP3 | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 62 / Win 7 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Firefox 73 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Googlebot Feb 2018 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 7 / Vista | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 8 / XP No FS 1 No SNI 2 |
Server sent fatal alert: handshake_failure |
||
| IE 8-10 / Win 7 R | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 11 / Win 7 R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 11 / Win 8.1 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 10 / Win Phone 8.0 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| IE 11 / Win Phone 8.1 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 11 / Win Phone 8.1 Update R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| IE 11 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 15 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 16 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 18 / Win 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Edge 13 / Win Phone 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Java 6u45 No SNI 2 |
Server sent fatal alert: handshake_failure |
||
| Java 7u25 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Java 8u161 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Java 11.0.3 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Java 12.0.1 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 0.9.8y |
Server sent fatal alert: handshake_failure |
||
| OpenSSL 1.0.1l R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 1.0.2s R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 1.1.0k R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| OpenSSL 1.1.1c R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 5.1.9 / OS X 10.6.8 | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Safari 6 / iOS 6.0.1 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 6.0.4 / OS X 10.8.4 R | EC 256 (SHA384) | TLS 1.0 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ECDH secp256r1 FS |
| Safari 7 / iOS 7.1 R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 7 / OS X 10.9 R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 8 / iOS 8.4 R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 8 / OS X 10.10 R | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ECDH secp256r1 FS |
| Safari 9 / iOS 9 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 9 / OS X 10.11 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 10 / iOS 10 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 10 / OS X 10.12 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 12.1.2 / MacOS 10.14.6 Beta R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Safari 12.1.1 / iOS 12.3.1 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Apple ATS 9 / iOS 9 R | EC 256 (SHA384) | TLS 1.2 > http/1.1 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| Yahoo Slurp Jan 2015 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
| YandexBot Jan 2015 | EC 256 (SHA384) | TLS 1.2 | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ECDH secp256r1 FS |
|
# Not simulated clients (Protocol mismatch)
|
|||
| IE 6 / XP No FS 1 No SNI 2 |
Protocol mismatch (not simulated) |
||
| (1) Clients that do not support Forward Secrecy (FS) are excluded when determining support for it. | |||
| (2) No support for virtual SSL hosting (SNI). Connects to the default site if the server uses SNI. | |||
| (3) Only first connection attempt simulated. Browsers sometimes retry with a lower protocol version. | |||
| (R) Denotes a reference browser or client, with which we expect better effective security. | |||
| (All) We use defaults, but some platforms do not use their best protocols and features (e.g., Java 6 & 7, older IE). | |||
| (All) Certificate trust is not checked in handshake simulation, we only perform TLS handshake. | |||
| Protocol Details | |
| Secure Renegotiation | Supported |
| Secure Client-Initiated Renegotiation | No |
| Insecure Client-Initiated Renegotiation | No |
| BEAST attack |
Not mitigated server-side (more info)
TLS 1.0: 0xc009
|
| POODLE (SSLv3) | No, SSL 3 not supported (more info) |
| POODLE (TLS) | No (more info) |
| Zombie POODLE | No (more info)
TLS 1.2 : 0xc023
|
| GOLDENDOODLE | No (more info)
TLS 1.2 : 0xc023
|
| OpenSSL 0-Length | No (more info)
TLS 1.2 : 0xc023
|
| Sleeping POODLE | No (more info)
TLS 1.2 : 0xc023
|
| Downgrade attack prevention | Yes, TLS_FALLBACK_SCSV supported (more info) |
| SSL/TLS compression | No |
| RC4 | No |
| Heartbeat (extension) | Yes |
| Heartbleed (vulnerability) | No (more info) |
| Ticketbleed (vulnerability) | No (more info) |
| OpenSSL CCS vuln. (CVE-2014-0224) | No (more info) |
| OpenSSL Padding Oracle vuln. (CVE-2016-2107) |
No (more info) |
| ROBOT (vulnerability) | No (more info) |
| Forward Secrecy | Yes (with most browsers) ROBUST (more info) |
| ALPN | Yes http/1.1 |
| NPN | Yes http/1.1 |
| Session resumption (caching) | Yes |
| Session resumption (tickets) | Yes |
| OCSP stapling | No |
| Strict Transport Security (HSTS) | No |
| HSTS Preloading | Not in: Chrome Edge Firefox IE |
| Public Key Pinning (HPKP) | No (more info) |
| Public Key Pinning Report-Only | No |
| Public Key Pinning (Static) | No (more info) |
| Long handshake intolerance | No |
| TLS extension intolerance | No |
| TLS version intolerance | No |
| Incorrect SNI alerts | No |
| Uses common DH primes | No, DHE suites not supported |
| DH public server param (Ys) reuse | No, DHE suites not supported |
| ECDH public server param reuse | No |
| Supported Named Groups | secp256r1 |
| SSL 2 handshake compatibility | No |
|
|
|
1 https://sm054.vip/
(HTTP/1.1 200 OK)
| 1 | |
| Server | openresty | |
| Date | Tue, 25 Nov 2025 05:54:18 GMT | |
| Content-Type | text/html | |
| Content-Length | 1359 | |
| Last-Modified | Sun, 02 Nov 2025 06:39:33 GMT | |
| Connection | close | |
| Vary | Accept-Encoding | |
| ETag | "6906fca5-54f" | |
| Accept-Ranges | bytes | |
| X-Cache | MISS | |
| Miscellaneous | |
| Test date | Tue, 25 Nov 2025 05:54:02 UTC |
| Test duration | 119.791 seconds |
| HTTP status code | 200 |
| HTTP server signature | openresty |
| Server hostname | - |
SSL Report v2.4.1
