Real-time Status

I have a problem with...
User Reports (Last 24h)
Check: 13:12:23

Possible problems at self-signed.local

HTTP Code: 0

Real-time Status
  • HTTP Status 0
  • Response Time 5 ms
  • Server Unknown
Tech Stack
No specific technologies detected.
SSL/TLS Certificate
Invalid / Expired
DNS Summary
A
0
MX
0
NS
0
TXT
0
Infrastructure Health
21 FTP
CLOSED
22 SSH
CLOSED
80 HTTP
CLOSED
443 HTTPS
CLOSED
3306 MySQL
CLOSED
Global Latency
LocationPing
🇺🇸 New York 4 ms
🇬🇧 London 6 ms
🇩🇪 Frankfurt 6 ms
🇸🇬 Singapore 17 ms
🇯🇵 Tokyo 19 ms
🇦🇺 Sydney 23 ms
Domain Identity
  • Registrar
    Hidden/Proxy
  • Creation Date
    Unknown
  • Contact Email
    Redacted
  • btn_view_whois
Corporate Intelligence (OSINT)
Public Contacts (Emails)
No public contact info found on homepage.
Social Footprint
No public contact info found on homepage.
Email Security & Spoofing
SPF Record
Missing
DMARC Policy
Missing
High Risk: Missing SPF or DMARC allows spoofing.
Subdomain Reconnaissance
No common subdomains found.

No security headers detected or site unreachable.

  • 1. http://self-signed.local
  • 2. Final Status: 0
Publicité (Header Leaderboard)

Reputation Analysis

Instantly verify if an IP is involved in DDoS, spam, or hacking attempts using our community database.

CIDR Navigation

Easily browse the entire IPv4 space. Our drill-down structure (/8, /16, /24) allows intuitive network exploration.

Whois & Reverse DNS

Get official registration info (ASN, ISP, Location) and PTR records in real-time.

ads_placeholder
Historique
No recent search.

Cybersecurity Knowledge Base

Understanding the threats detected by our systems.

SSH Brute Force

An automated attack where a script attempts to guess the password of a Secure Shell (SSH) server by trying thousands of combinations. This is a common method used by botnets to gain unauthorized access to servers.

Port Scanning

The practice of sending packets to specific ports on a host to identify open services. While used by administrators for auditing, it is often the first step in an attack to find vulnerabilities.

Botnet Activity

A network of compromised computers (bots) controlled by a third party. They are often used to coordinate DDoS attacks, send spam, or perform distributed brute-force attacks.