[HTTPS] hom.ph
(27/04/2024 17:49:53 +00:00)
A+
2600:1f18:625f:e900:96:5343:f4e9:b562 : 443
(hom.ph)
Nom |
Échange de clef |
Authentification |
Chiffrement |
MAC |
PFS |
Type |
Taille de clef |
Taille de bloc |
Mode |
Type |
Taille |
TLSv1_2 |
ECDHE-RSA-AES128-GCM-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
GCM |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-GCM-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
GCM |
SHA384 |
384 |
PFS |
ECDHE-RSA-AES128-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
CBC |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
CBC |
SHA384 |
384 |
PFS |
X
2600:1f18:625f:e901:27d2:dd99:68c1:f581 : 443
(hom.ph)
Erreur durant l’analyse :
TLS seems not supported on this server
A+
54.161.98.243 : 443
(hom.ph)
Nom |
Échange de clef |
Authentification |
Chiffrement |
MAC |
PFS |
Type |
Taille de clef |
Taille de bloc |
Mode |
Type |
Taille |
TLSv1_2 |
ECDHE-RSA-AES128-GCM-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
GCM |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-GCM-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
GCM |
SHA384 |
384 |
PFS |
ECDHE-RSA-AES128-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
CBC |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
CBC |
SHA384 |
384 |
PFS |
A+
35.170.91.40 : 443
(hom.ph)
Nom |
Échange de clef |
Authentification |
Chiffrement |
MAC |
PFS |
Type |
Taille de clef |
Taille de bloc |
Mode |
Type |
Taille |
TLSv1_2 |
ECDHE-RSA-AES128-GCM-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
GCM |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-GCM-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
GCM |
SHA384 |
384 |
PFS |
ECDHE-RSA-AES128-SHA256 |
ECDH |
RSA |
AES |
128 |
128 |
CBC |
SHA256 |
256 |
PFS |
ECDHE-RSA-AES256-SHA384 |
ECDH |
RSA |
AES |
256 |
128 |
CBC |
SHA384 |
384 |
PFS |