ricebowlchineserestaurant.com

Score 94/100

Web site information

IP Address
Web Servers
OpenResty
Programming Languages
Lua

SEO data

title
HKTOTO:Bandar Togel Slot Gacor 5000 Terpercaya 2024
theme-color
#161616
robots
index, follow
viewport
width=device-width,initial-scale=1,minimum-scale=1
google-site-verification
ayGzMod2A6YNlKmKHfQ3nInfowZ70ud5nXr3htNpK48
googlebot
index,follow
Googlebot-Image
follow, all
Scooter
follow, all
msnbot
follow, all
alexabot
follow, all
Slurp
follow, all
ZyBorg
follow, all
yahoobot
follow, all
bingbot
follow, all
MSSmartTagsPreventParsing
true
audience
all
page-locale
id,en
HandheldFriendly
true
MobileOptimized
width
description
HKTOTO Bandar Togel deposit 5000 Terpercaya dan Amanah Serta Situs Slot Gacor RTP tertinggi.
keywords
hktoto, hktoto link alternatif, situ togel, situ togel hktoto, hktoto, togel terpercaya, bandar togel hktoto, link hktoto.
categories
website
language
id-ID
author
HKTOTO
distribution
global
publisher
HKTOTO
geo.region
ID-SL
geo.country
ID
tgn.nation
Indonesia
geo.placename
Jakarta
twitter:card
summary
twitter:site
@HKTOTO
twitter:creator
@HKTOTO
twitter:title
HKTOTO: Situs Terpercaya Slot Gacor Hari Ini Dan Situs Togel Online Terpercaya Pasti Bayar
twitter:description
HKTOTO Bandar Togel deposit 5000 Terpercaya dan Amanah Serta Situs Slot Gacor RTP tertinggi.
twitter:image
https://i.ibb.co/0DwybzY/IMG-20240601-WA0018-1.jpg

Protocols

SSLv2
not offered
SSLv3
not offered
TLS 1.0
not offered
TLS 1.1
not offered
TLS 1.2
offered
TLS 1.3
not offered + downgraded to weaker protocol
ALPN HTTP2
h2
ALPN
http/1.1

Vulnerabilities

heartbleed
not vulnerable, no heartbeat extension
CCS
ticketbleed
ROBOT
not vulnerable
SSL renegotiation
supported
SSL client renegotiation
not vulnerable
CRIME TLS
not vulnerable
BREACH
potentially VULNERABLE, br HTTP compression detected - only supplied '/' tested
POODLE SSL
not vulnerable, no SSLv3
fallback SCSV
no protocol below TLS 1.2 offered
SWEET32
not vulnerable
FREAK
not vulnerable
DROWN
not vulnerable on this host and port
DROWN hint
Make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://censys.io/ipv4?q=FDC5A2BBB210C72318576B761B40413D2AC2B771E27F3370485AAAE8418E0792
LOGJAM
not vulnerable, no DH EXPORT ciphers,
LOGJAM-common primes
no DH key with <= TLS 1.2
BEAST
not vulnerable, no SSL3 or TLS1
LUCKY13
potentially vulnerable, uses TLS CBC ciphers
RC4
not vulnerable

Header Responses

Status code
200 OK ('/')
Clock skew
0 seconds from localtime
HSTS
not offered
HPKP
No support for HTTP Public Key Pinning
Upgrade
h2,h2c

Server Defaults

TLS extensions
'renegotiation info/#65281' 'server name/#0' 'EC point formats/#11' 'session ticket/#35' 'max fragment length/#1' 'application layer protocol negotiation/#16' 'encrypt-then-mac/#22' 'extended master secret/#23'
TLS session ticket
valid for 300 seconds only (<daily)
SSL sessionID support
yes
Session Ticket Resumption
supported
Session ID Resumption
supported
TLS timestamp
random
cert numbers
1
Signature algorithm
SHA256 with RSA
Key size
RSA 2048 bits
Key usage
Digital Signature, Key Encipherment
Extended key usage
TLS Web Server Authentication, TLS Web Client Authentication
Serial number
046ED87C90F39E5607080DD7760E48160730
cert serialNumberLen
18
Fingerprint SHA1
392B230E3A720EC14203452B7E2C030EA6C21A4A
Fingerprint SHA256
FDC5A2BBB210C72318576B761B40413D2AC2B771E27F3370485AAAE8418E0792
Certificate details
-----BEGIN CERTIFICATE----- MIIFpTCCBI2gAwIBAgISBG7YfJDznlYHCA3Xdg5IFgcwMA0GCSqGSIb3DQEBCwUA MDMxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQwwCgYDVQQD EwNSMTAwHhcNMjQwNjE3MDA1MDMwWhcNMjQwOTE1MDA1MDI5WjAsMSowKAYDVQQD EyF3d3cucmljZWJvd2xjaGluZXNlcmVzdGF1cmFudC5jb20wggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQDMjis46IwXnAXUYJj4IG4EN0vzGjMupGqV/w8B wZsbSlSdHeeKYoBeFPUkW6prvbahkq5+Ke9oqZUPoDABV9BD7+qL9lFaKYsX/vrG 47hXMGqPsG4nbvfbD2/PPCGxK+sGisdRtvbUEuEZfvWd+dmJNlUUGYfMenDId5kF ZO0DVmItyIe1Go+JYCzo5wvP3dmrESofq2TnCiLSiOtPtkcuE1VCqf7BiXckUqEG YaWKczHnhztabImETqK7vOSZZWM0UGSwdKqaVlrIJT4hE+3uTLBVATOjxRCh35jB +VochF4pVfrd46OXDcScu2zPAeTXtZIBZiBsJ/ghrViqyBIVAgMBAAGjggK4MIIC tDAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMC MAwGA1UdEwEB/wQCMAAwHQYDVR0OBBYEFJyNNR74OD/uNe7HjbxXAnjoE/5eMB8G A1UdIwQYMBaAFLu8w0el5LypxsOkcgwQjaI14cjoMFcGCCsGAQUFBwEBBEswSTAi BggrBgEFBQcwAYYWaHR0cDovL3IxMC5vLmxlbmNyLm9yZzAjBggrBgEFBQcwAoYX aHR0cDovL3IxMC5pLmxlbmNyLm9yZy8wgb4GA1UdEQSBtjCBs4IkY3BhbmVsLnJp Y2Vib3dsY2hpbmVzZXJlc3RhdXJhbnQuY29tgiJtYWlsLnJpY2Vib3dsY2hpbmVz ZXJlc3RhdXJhbnQuY29tgh1yaWNlYm93bGNoaW5lc2VyZXN0YXVyYW50LmNvbYIl d2ViZGlzay5yaWNlYm93bGNoaW5lc2VyZXN0YXVyYW50LmNvbYIhd3d3LnJpY2Vi b3dsY2hpbmVzZXJlc3RhdXJhbnQuY29tMBMGA1UdIAQMMAowCAYGZ4EMAQIBMIIB BAYKKwYBBAHWeQIEAgSB9QSB8gDwAHYAGZgQcQnw1lIuMIDSnj9ku4NuKMz5D1KO 7t/OSj8WtMoAAAGQI+OAUAAABAMARzBFAiEAh6Mi+OrKXS3/RTPI2RnPNnPikgzn aUvQj8q05eiN8O0CICVK9FCVuLBq2N1z/BsGWnf1VqTLZpf66isGgkG5tFtHAHYA dv+IPwq2+5VRwmHM9Ye6NLSkzbsp3GhCCp/mZ0xaOnQAAAGQI+OAeQAABAMARzBF AiARxe0TwBBgZXCGRjvZ8P6yuifw7qwLzGp85CewS8ncVgIhAPBSdFmHuMfaH7mL F77Ypu5DO2jnXtjqLWKch/wOMoNcMA0GCSqGSIb3DQEBCwUAA4IBAQAx6UAJjkHn KpKVFX7nRjniVUPbTsClzK/OdqvL0NH98oe3QVL4Fyf/VPmRHuQSydiCc7EOxmTc 4Y+cGpnL8WBa/JfOClk8vLB3zrVHAZ6okFDChHPIleEvXmHyoBBq8MfGr7YHBvjP fo6Fqpjs1UHUtf2bay+Cejw8BV0hPWmiAH89zkFjSpOrOnzJw7Wp1dYGmGeg/0xK sMUjHTB8jDIJxhmw1UPETut52KYoJ+sG1nLfoHQjayQP5WquS1BK5RmOZIIydoXm 4hNOQC5gHHcykGNwGaEtIAtwcZnOlHEJ4WW/9obiczEzsbqsOkezbp09osRXF0yU 6W9Sn6V/xUDV -----END CERTIFICATE-----
Common names
www.ricebowlchineserestaurant.com
Service Name Indication
*.prod.sin2.secureserver.net
SubjectAlternative Name
cpanel.ricebowlchineserestaurant.com mail.ricebowlchineserestaurant.com ricebowlchineserestaurant.com webdisk.ricebowlchineserestaurant.com www.ricebowlchineserestaurant.com
Certificate authority issuers
R10 (Let's Encrypt from US)
Certificate trusted
Ok via SAN (SNI mandatory)
Certificate chain trusted
passed.
Is certificate Extended Validation
no
cert eTLS
not present
cert expirationStatus
86 >= 30 days
Valid from
2024-06-17 00:50
Valid until
2024-09-15 00:50
cert validityPeriod
No finding
Chain
2
certs list ordering problem
no
cert crlDistributionPoints
--
Online Certificate Status Protocol URL
http://r10.o.lencr.org
OCSP stapling
not offered
cert mustStapleExtension
--
DNS CAArecord
--
certificate transparency
yes (certificate extension)

Server Preferences

order
server
Which protocol negotiated
Default protocol TLS1.2
negotiated
ECDHE-RSA-AES256-GCM-SHA384, 256 bit ECDH (P-256)
order TLSv1 2
ECDHE-RSA-AES256-GCM-SHA384

Perfect Forward Secrecy

PFS
offered
PFS s
ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES128-SHA ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384 ECDHE-RSA-AES256-SHA ECDHE-RSA-CAMELLIA128-SHA256 ECDHE-RSA-CAMELLIA256-SHA384
PFS ECDHE curves
prime256v1 secp384r1 secp521r1

Ciphers

ECDHE-RSA-AES256-GCM-SHA384 ECDH 256 AESGCM 256 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
(0xc030)
ECDHE-RSA-AES256-SHA384 ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
(0xc028)
ECDHE-RSA-AES256-SHA ECDH 256 AES 256 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
(0xc014)
ECDHE-RSA-CAMELLIA256-SHA384 ECDH 256 Camellia 256 TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384
(0xc077)
AES256-GCM-SHA384 RSA AESGCM 256 TLS_RSA_WITH_AES_256_GCM_SHA384
(0x9d)
AES256-SHA256 RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA256
(0x3d)
AES256-SHA RSA AES 256 TLS_RSA_WITH_AES_256_CBC_SHA
(0x35)
CAMELLIA256-SHA256 RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256
(0xc0)
CAMELLIA256-SHA RSA Camellia 256 TLS_RSA_WITH_CAMELLIA_256_CBC_SHA
(0x84)
ECDHE-RSA-AES128-GCM-SHA256 ECDH 256 AESGCM 128 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
(0xc02f)
ECDHE-RSA-AES128-SHA256 ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
(0xc027)
ECDHE-RSA-AES128-SHA ECDH 256 AES 128 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
(0xc013)
ECDHE-RSA-CAMELLIA128-SHA256 ECDH 256 Camellia 128 TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256
(0xc076)
AES128-GCM-SHA256 RSA AESGCM 128 TLS_RSA_WITH_AES_128_GCM_SHA256
(0x9c)
AES128-SHA256 RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA256
(0x3c)
AES128-SHA RSA AES 128 TLS_RSA_WITH_AES_128_CBC_SHA
(0x2f)
CAMELLIA128-SHA256 RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256
(0xba)
CAMELLIA128-SHA RSA Camellia 128 TLS_RSA_WITH_CAMELLIA_128_CBC_SHA
(0x41)

Browser Simulations

Android 4.4.2
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Android 5.0.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 6.0
TLSv1.2 ECDHE-RSA-AES128-GCM-SHA256
Android 7.0
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android 90
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-android X
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chrome 74 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-chrome 79 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 66 win81
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-firefox 71 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Windows XP Internet Explorer 6
No connection
Windows 7 Internet Explorer 8
No connection
Windows XP Internet Explorer 8
No connection
Windows 7 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
Windows 8.1 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-SHA384
clientsimulation-ie 11 winphone81
TLSv1.2 ECDHE-RSA-AES128-SHA256
Windows 10 Internet Explorer 11
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 15 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-edge 17 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-opera 66 win10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 9 ios9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.11 Safari 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
MacOSX 10.12 Safari 10
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 121 ios 122
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-safari 130 osx 10146
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
iOS 9 App Transport Security 9
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
Java 6 update 45
No connection
Java 7 update 25
No connection
clientsimulation-java 8u161
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java1102
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-java1201
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
OpenSSL 1.0.2e
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 110l
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-openssl 111d
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384
clientsimulation-thunderbird 68 3 1
TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384