Ministry of ICT
Iran Information Technology Organization
| Domain, IP Address & Port Number |
|---|
| beta-api-connect.techzone.ir (185.143.234.41:443) |
| Assessment Time & Date |
| Jan. 28, 2026, 11:20 a.m. |
| Assessment Duration |
| Seconds 56 |
| Is the certificate still valid? | YES | |
| Certificate Issue Date | passed. | |
| Certificate Expiration Date | no | |
| Trust Chain Health | Healthy | |
| Certificate Issuer | E7 (Let's Encrypt from US) | |
| Is the certificate valid for beta-api-connect.techzone.ir? | YES | |
|
||
| HTTP Status Code | 200 OK ('/') |
| Strict Transport Security (HSTS) | 1769586664 |
| Public Key Pinning (HPKP) | not offered |
| Server Banner | No support for HTTP Public Key Pinning |
| Banner Application | ArvanCloud |
| SSLv2 | Your server does not support SSLv2 which is good since it is an insecure protocol. | |
|
||
| SSLv3 | Your server does not support SSLv3 which is good since it is an insecure protocol. | |
|
||
| TLS1 | Your server supports TLSv1.0. This protocol is now considered as a weak protocol. You are advised to disable support for this protocol. | |
|
||
| TLS1.1 | Your server supports TLSv1.1. This protocol is now considered a weak protocol. You are advised to start supporting more advanced protocols. | |
|
||
| TLS1.2 | Your server supports TLSv1.2. Currently, this protocol is considered stable. But you'd better consider supporting TLS v1.3. | |
|
||
| TLS1.3 | Your server supports TLS v1.3. Currently, this protocol is considered the most robust protocol available. | |
|
||
| NULL | Your server does not support NULL ciphers. | |
|
||
| aNULL | Your server does not support aNULL ciphers. | |
|
||
| EXPORT | Your server does not support EXPORT ciphers. | |
|
||
| LOW | Your server does not support LOW ciphers. | |
|
||
| 3DES_IDEA | Your server does not support 3DES ciphers. | |
|
||
| Analyzing Heartbleed Vulnerability | Your connection is immune against heartbleed attack. | |
|
||
| Analyzing CCS Vulnerability | Your connection is immune against CCS attack. | |
|
||
| Analyzing Ticketbleed Vulnerability | Your connection is immune against ticketbleed attack. | |
|
||
| Analyzing ROBOT vulnerability | Your connection is immune to ROBOT attack. | |
|
||
| Analyzing Secure Renegotiation | Your connection is immune against secure_renego attack. | ||
|
|||
| Analyzing Client-initiated Secure Connection | Your server is properly configured to support Secure Client Renegotiation. | |
|
||
| Analyzing protection against CRIME Attack | Your connection is immune against CRIME_TLS attack. | |
|
||
| Analyzing protection against poodle attacks | Your connection is immune against poodle_ssl attack. | |
|
||
| Analyzing fallback_SCSV vulnerability | Your connection is immune against fallback_SCSV attack. | |
|
||
| Analyzing SWEET32 Attack | Your connection is immune against SWEET32 attack. | |
|
||
| Analyzing Protection Against Freak Attack | Your connection is immune against FREAK attack. | |
|
||
| Analyzing protection against DROWN Attacks. | Your connection is immune against DROWN attack. | |
|
||
| Analyzing protection against LOGJAM Attack | Your connection is immune against LOGJAM attack. | |
|
||
| Analyzing existence of common primes in public/private encryption key pairs. | Your connection is immune to LOGJAM-Common_Primes attack. | |
|
||
| Analyzing CVE-2011-3389 vulnerability | Your connection is vulnerable to BEAST_CBC_TLS1 attack. | ||
|
|||
| Analyzing BEAST vulnerability | Your connection is vulnerable to BEAST attack. | ||
|
|||
| Analyzing luck13 vulnerability | Your connection is vulnerable to LUCKY13 attack. | ||
|
|||
| Analyzing RC4 vulnerability | Your connection is immune against RC4 attack. | |
|
||
| TLSv1 |
|
|
| TLSv1.1 |
|
|
| TLSv1.2 |
|
|
| Client | Cipher Suite | Protocol |
|---|---|---|
| ANDROID-70 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | ANDROID-81 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | ANDROID-90 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-X | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-11-12 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-13-14 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | ANDROID-15 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROME-101-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | CHROMIUM-137-WIN11 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-100-WIN10 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | FIREFOX-137-WIN11 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | IE-8-WIN7 | TLSv1.0 | ECDHE-ECDSA-AES128-SHA | IE-11-WIN7 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | IE-11-WIN81 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | IE-11-WINPHONE81 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | IE-11-WIN10 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | EDGE-15-WIN10 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | EDGE-101-WIN10-21H2 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | EDGE-133-WIN11-23H2 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-184-IOS-184 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-154-OSX-1231 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | SAFARI-184-OSX-154 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | JAVA-7U25 | TLSv1.0 | ECDHE-ECDSA-AES128-SHA | JAVA-80442 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | JAVA-1102 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | JAVA-1703 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | JAVA-2106 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | GO-1178 | TLSv1.3 | TLS_AES_128_GCM_SHA256 | LIBRESSL-336 | TLSv1.3 | TLS_CHACHA20_POLY1305_SHA256 | OPENSSL-102E | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | OPENSSL-111D | TLSv1.3 | TLS_AES_256_GCM_SHA384 | OPENSSL-315 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | OPENSSL-350 | TLSv1.3 | TLS_AES_256_GCM_SHA384 | APPLE-MAIL-16-0 | TLSv1.2 | ECDHE-ECDSA-AES128-GCM-SHA256 | THUNDERBIRD-91-9 | TLSv1.3 | TLS_AES_128_GCM_SHA256 |
|
|
||