Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/repo-monitor

https://f-droid.org/repo
ip37.218.247.73
VerificationExceptionJAR signature failed to verify: /tmp/tmp7uf_6gy9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437532
duration2.1712629795074463
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:12:12 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
ETag"aeaeb7-64a2f999c9911"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip37.218.247.73
addressf-droid.org:443
connectionTLS
count10
min0.229989675
max0.232631675
average0.2313458883
stddev0.0009101382817986568
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip91.224.148.45
VerificationExceptionJAR signature failed to verify: /tmp/tmp4fhrdcmv The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437197
duration2.536267042160034
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:06:37 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip91.224.148.45
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.236265335
max0.238967726
average0.23753927559999996
stddev0.0008773879172729946
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmpp97q_v2l The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770436991
duration2.664047956466675
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateSat, 07 Feb 2026 04:03:11 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.256342961
max0.258928782
average0.25760569959999996
stddev0.0008653095877850032
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmp2s5aspn4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437226
duration2.4953229427337646
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:07:06 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
ETag"aeaeb7-64a2f99971e40"
Accept-Rangesbytes
Content-Length11447991
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.452832371
max0.565279641
average0.52401523
stddev0.04485075299224695
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.gwdg.de/pub/android/fdroid/repo
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmphrppld4h The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437007
duration3.079746961593628
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 07 Feb 2026 04:03:28 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.392167362
max0.431090267
average0.4116431065
stddev0.012382840303197315
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpd8lps06g The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437016
duration2.779270887374878
status200
TLSTLSv1.3
headers
servernginx
dateSat, 07 Feb 2026 04:03:37 GMT
content-typeapplication/java-archive
content-length11447991
last-modifiedFri, 06 Feb 2026 22:49:21 GMT
etag"69866ff1-aeaeb7"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.251
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.26142925
max0.26376793
average0.2626540245
stddev0.0007987109037556975
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip51.159.104.35
VerificationExceptionJAR signature failed to verify: /tmp/tmp7z_v9nw1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437214
duration2.2695729732513428
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11447991
Content-Typeapplication/java-archive
Etag"dg88uz612tc06tdbr"
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Referrer-Policystrict-origin-when-cross-origin
ServerCaddy
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
DateSat, 07 Feb 2026 04:06:54 GMT
tlsping
hostmirror.cyberbits.eu
ip51.159.104.35
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.270154987
max0.302771406
average0.2895902347
stddev0.013553997502618096
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.eu.ossplanet.net/fdroid/repo
ip65.21.121.21
VerificationExceptionJAR signature failed to verify: /tmp/tmpcncibnqq The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437037
duration2.420442819595337
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateSat, 07 Feb 2026 04:03:57 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostmirror.eu.ossplanet.net
ip65.21.121.21
addressmirror.eu.ossplanet.net:443
connectionTLS
count10
min0.307248228
max0.343040989
average0.3300374532
stddev0.012292559967464258
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmpbjbfoynd The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437044
duration1.8790950775146484
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateSat, 07 Feb 2026 04:04:04 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
ExpiresSat, 07 Feb 2026 04:09:04 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.171785844
max0.174322614
average0.173025319
stddev0.0008648788326031566
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip86.106.182.45
VerificationExceptionJAR signature failed to verify: /tmp/tmpfvwywwg7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437048
duration3.4429919719696045
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11447991
Content-Typeapplication/java-archive
Etag"dg88uz612tc06tdbr"
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
ServerCaddy
VaryAccept-Encoding
DateSat, 07 Feb 2026 04:04:09 GMT
tlsping
hostmirror.kumi.systems
ip86.106.182.45
addressmirror.kumi.systems:443
connectionTLS
count10
min0.360572863
max0.391568183
average0.37666461100000004
stddev0.010705217237221103
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.level66.network/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmpwt7kc68k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437057
duration2.7935709953308105
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:04:18 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.network
ip141.98.136.67
addressmirror.level66.network:443
connectionTLS
count10
min0.232208162
max0.234575662
average0.233353278
stddev0.0007976627870121576
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmp_yqg52ky The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437068
duration24.150791883468628
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateSat, 07 Feb 2026 04:04:48 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirrors.dotsrc.org/fdroid/repo
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmpi81ihxr4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437135
duration2.746289014816284
status200
TLSTLSv1.3
headers
Servernginx/1.28.0
DateSat, 07 Feb 2026 04:05:36 GMT
Content-Typeapplication/java-archive
Content-Length11447081
Last-ModifiedFri, 06 Feb 2026 07:39:21 GMT
Connectionkeep-alive
ETag"69859aa9-aeab29"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.276339719
max0.278794199
average0.27758331
stddev0.0008169642803017838
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo
ip50.117.120.66
VerificationExceptionJAR signature failed to verify: /tmp/tmp1h_kbe6n The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437151
duration2.472989082336426
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateSat, 07 Feb 2026 04:05:51 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip50.117.120.66
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.202909356
max0.244198856
average0.225936638
stddev0.015191023053071046
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpz8eg906x The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437247
duration1.3552849292755127
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:07:28 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.251
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.14570424
max0.16886598
average0.15839882200000002
stddev0.0093836907206054
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.init7.net/fdroid/repo
ip109.202.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmp9fvmj34u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437159
duration2.351979970932007
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateSat, 07 Feb 2026 04:06:00 GMT
Content-Typeapplication/java-archive
Content-Length11447991
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
Connectionkeep-alive
ETag"69866ff1-aeaeb7"
Accept-Rangesbytes
tlsping
hostmirror.init7.net
ip109.202.202.202
addressmirror.init7.net:443
connectionTLS
count10
min0.249157559
max0.251790478
average0.2505281043
stddev0.0008577306227590377
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.freedif.org/fdroid/repo
ip132.147.107.5
VerificationExceptionJAR signature failed to verify: /tmp/tmpait66k7k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437184
duration3.9753551483154297
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:06:25 GMT
Content-Typeapplication/java-archive
Content-Length11447081
Last-ModifiedFri, 06 Feb 2026 07:39:21 GMT
Connectionkeep-alive
ETag"69859aa9-aeab29"
Accept-Rangesbytes
tlsping
hostmirror.freedif.org
ip132.147.107.5
addressmirror.freedif.org:443
connectionTLS
count10
min0.53259061
max0.5482658
average0.5385088530000001
stddev0.005857314921892197
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
starttime1770437220
duration0.575275182723999
status404
TLSTLSv1.3
headers
Servernginx/1.29.3
DateSat, 07 Feb 2026 04:07:01 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.255391842
max0.258599712
average0.25701977400000003
stddev0.0011170389801148342
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e919040d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437225
duration0.14916396141052246
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.29.3
DateSat, 07 Feb 2026 04:07:01 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.jarsilio.com/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91907110>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437235
duration0.13779091835021973
status200
TLS[Errno -2] Name or service not known
headers
DateSat, 07 Feb 2026 04:07:06 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedFri, 06 Feb 2026 22:49:21 GMT
ETag"aeaeb7-64a2f99971e40"
Accept-Rangesbytes
Content-Length11447991
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip64.50.236.52
starttime1770437236
duration0.1723940372467041
status404
TLSTLSv1.2
headers
DateSat, 07 Feb 2026 04:07:16 GMT
ServerApache
Content-Length261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip64.50.236.52
addressftp.osuosl.org:443
connectionTLS
count10
min0.119335038
max0.124087648
average0.12173882600000001
stddev0.001632951529175314
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip205.209.125.10
starttime1770437239
duration0.1581881046295166
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:07:19 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip205.209.125.10
addressmirror.scd31.com:443
connectionTLS
count10
min0.092499381
max0.101136781
average0.09683041880000001
stddev0.0037306040913735864
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91905b10>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437247
duration0.16840410232543945
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:07:19 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://android.izzysoft.de/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmp7k7pqk72 jarsigner: java.util.zip.ZipException: zip END header not found
starttime1770437250
duration0.8408839702606201
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:07:31 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresMon, 09 Mar 2026 04:07:31 GMT
VaryAccept-Encoding
Content-Encodinggzip
Content-Length1964
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlsping
hostandroid.izzysoft.de
ip144.76.109.58
addressandroid.izzysoft.de:443
connectionTLS
count10
min0.2438475
max0.246300111
average0.24504828559999997
stddev0.0008067719598952636
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmpyzomqhxy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437255
duration1.271122932434082
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateSat, 07 Feb 2026 04:07:36 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostanonymousmessenger.ly
ip185.176.41.167
addressanonymousmessenger.ly:443
connectionTLS
count10
min0.328221151
max0.361219831
average0.349156428
stddev0.009754403453444043
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://app.futo.org/fdroid/repo
ip159.65.228.96
VerificationExceptionJAR signature failed to verify: /tmp/tmpq4nniz3v The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437265
duration0.4894571304321289
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:07:45 GMT
Content-Typeapplication/java-archive
Content-Length4750
Last-ModifiedWed, 04 Feb 2026 20:09:29 GMT
Connectionkeep-alive
ETag"6983a779-128e"
Accept-Rangesbytes
tlsping
hostapp.futo.org
ip159.65.228.96
addressapp.futo.org:443
connectionTLS
count10
min0.112555879
max0.159103978
average0.13661986750000002
stddev0.01609833144413844
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://app.usb0.net/repo
ip172.67.154.154
starttime1770437268
duration0.2673218250274658
status404
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:07:48 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Servercloudflare
Cache-Controlmax-age=14400
cf-cache-statusEXPIRED
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=kxvyCY1pk34EOxzrvlzz4pxzKKqUfbEc0oCwz%2B8HvS5VfQAcnyFSm0fgzo0OYoS0wbfIyqFdYVNSj5vMnN6tNLkZsL%2F5uqxHSJWHQA%3D%3D"}]}
Content-Encodingbr
CF-RAY9ca005c008143881-ATL
alt-svch3=":443"; ma=86400
tlsping
hostapp.usb0.net
ip172.67.154.154
addressapp.usb0.net:443
connectionTLS
count10
min0.151379249
max0.206023708
average0.1784787925
stddev0.018928086531568276
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://apt.izzysoft.de/fdroid/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmp18va2avk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437269
duration1.7865960597991943
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:07:50 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Last-ModifiedFri, 06 Feb 2026 18:58:20 GMT
ETag"30ec57-64a2c5f6dc57a"
Accept-Rangesbytes
Content-Length3206231
Cache-Controlmax-age=86400
ExpiresSun, 08 Feb 2026 04:07:50 GMT
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostapt.izzysoft.de
ip144.76.109.58
addressapt.izzysoft.de:443
connectionTLS
count10
min0.243522279
max0.246038919
average0.24464508100000004
stddev0.0008311192052744269
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://archive.newpipe.net/fdroid/repo
ip159.69.138.33
VerificationExceptionJAR signature failed to verify: /tmp/tmp8930il34 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437275
duration0.7891290187835693
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:07:56 GMT
Content-Typeapplication/java-archive
Content-Length24433
Last-ModifiedThu, 05 Feb 2026 22:34:30 GMT
Connectionkeep-alive
ETag"69851af6-5f71"
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin
Permissions-Policyinterest-cohort=()
Content-Security-Policydefault-src 'self'; object-src 'none'; block-all-mixed-content
Accept-Rangesbytes
tlsping
hostarchive.newpipe.net
ip159.69.138.33
addressarchive.newpipe.net:443
connectionTLS
count10
min0.245362651
max0.248018221
average0.24662102800000002
stddev0.0008227674395605393
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo
ip3.166.160.76
VerificationExceptionThe repository's fingerprint does not match.
starttime1770437298
duration1.0940649509429932
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length147262
Connectionkeep-alive
DateSat, 07 Feb 2026 04:08:19 GMT
Last-ModifiedThu, 05 Feb 2026 14:47:56 GMT
ETag"a06f4ac41bccd0b9a1380472e59de942"
x-amz-server-side-encryptionAES256
x-amz-version-id4TiYYCQtLqeLuhIZIuA6ngnmWP1uXZ4z
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 1b18517cf1d6db052e5c43a787c0c5a8.cloudfront.net (CloudFront)
X-Amz-Cf-PopMIA50-P3
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-IdxGQDV8r49VdIO2butT9K0kt0qr6iaQEVNVUh83tpZk9L-ytOV0R3SQ==
tlsping
hostbrave-browser-apk-nightly.s3.brave.com
ip3.166.160.76
addressbrave-browser-apk-nightly.s3.brave.com:443
connectionTLS
count10
min0.063391249
max0.065898719
average0.06467192499999999
stddev0.0008677874198350651
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-release.s3.brave.com/fdroid/repo
ip54.230.79.11
VerificationExceptionThe repository's fingerprint does not match.
starttime1770437300
duration0.9557688236236572
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length41674
Connectionkeep-alive
DateSat, 07 Feb 2026 04:08:22 GMT
Last-ModifiedThu, 05 Feb 2026 23:22:57 GMT
ETag"5ca1ee7ca21f482d340e204d24c353f3"
x-amz-server-side-encryptionAES256
x-amz-version-idYvfj7RfXQIJe.P5jnynygS0EX1LQHZ92
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 a00b4d9996b86af2fc0235a1e5eb9162.cloudfront.net (CloudFront)
X-Amz-Cf-PopATL59-P18
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-IdYjpbStlciYOSjxp7Yxqpzs3SQMaPRzHuROF3FXdSy8wx2P1-aObgGQ==
tlsping
hostbrave-browser-apk-release.s3.brave.com
ip54.230.79.11
addressbrave-browser-apk-release.s3.brave.com:443
connectionTLS
count10
min0.062629829
max0.065623429
average0.0643086252
stddev0.0009615988331688847
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://breezy-weather.github.io/fdroid-repo/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpbizjt4ck The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437302
duration0.4069337844848633
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length18979
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedSat, 07 Feb 2026 02:24:59 GMT
Access-Control-Allow-Origin*
Strict-Transport-Securitymax-age=31556952
ETag"6986a27b-4a23"
expiresSat, 07 Feb 2026 02:42:31 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id95FC:81C25:3924C9:4123E3:6986A43F
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:08:22 GMT
Via1.1 varnish
Age37
X-Served-Bycache-pdk-kfty8610040-PDK
X-CacheHIT
X-Cache-Hits1
X-TimerS1770437303.978393,VS0,VE2
VaryAccept-Encoding
X-Fastly-Request-ID07e4900e772fa10cb7d5d264c53d8423f6efd290
tlsping
hostbreezy-weather.github.io
ip185.199.108.153
addressbreezy-weather.github.io:443
connectionTLS
count10
min0.061148059
max0.064955029
average0.0630717577
stddev0.0013015549596251444
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://briarproject.org/fdroid/repo
ip157.90.23.135
VerificationExceptionJAR signature failed to verify: /tmp/tmpn11a_ia9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437304
duration0.703822135925293
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 07 Feb 2026 04:06:27 GMT
Content-Typeapplication/java-archive
Content-Length4274
Last-ModifiedThu, 11 Dec 2025 10:35:57 GMT
Connectionkeep-alive
ETag"693a9e8d-10b2"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostbriarproject.org
ip157.90.23.135
addressbriarproject.org:443
connectionTLS
count10
min0.240326319
max0.242926889
average0.24165069300000003
stddev0.0008747052272302918
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroidclassic/fdroid/repo
ip176.9.145.28
VerificationExceptionThe repository's fingerprint does not match.
starttime1770437309
duration0.9025468826293945
status200
TLSTLSv1.3
headers
Servernginx/1.29.3
DateSat, 07 Feb 2026 04:08:29 GMT
Content-Typeapplication/java-archive
Content-Length9793
Last-ModifiedWed, 08 Mar 2023 23:22:24 GMT
Connectionkeep-alive
ETag"640918b0-2641"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.252537684
max0.261002334
average0.254547837
stddev0.002324724843395668
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmprcqv59_5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437314
duration0.4115169048309326
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length6899
Content-Typeapplication/java-archive
Etag"8c2cb86acd942981c0fcf0af8db77539cde88c052fa75b0d8e5b5597eceba246"
ExpiresSat, 07 Feb 2026 04:18:34 UTC
Last-ModifiedSat, 07 Feb 2026 04:01:29 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KGV4K2A0BA7MP538ZZ2AE55E
DateSat, 07 Feb 2026 04:08:34 GMT
tlsping
hostcalyxos.gitlab.io
ip35.185.44.232
addresscalyxos.gitlab.io:443
connectionTLS
count10
min0.04172619
max0.108075759
average0.05555147380000001
stddev0.024807635003557104
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/fdroid/repo
ip109.61.91.198
VerificationExceptionJAR signature failed to verify: /tmp/tmpgsae4ofg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437315
duration0.9833660125732422
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:08:36 GMT
Content-Typeapplication/java-archive
Content-Length169009
Connectionkeep-alive
Last-ModifiedFri, 06 Feb 2026 16:40:48 GMT
Cache-Controlmax-age=0
ExpiresSat, 07 Feb 2026 04:08:36 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkrydxFv2Er/MIMDbV0Z9T6hScMAoMoxf1L9Mn4wbUInJ
X-77-NZT-Raybff7651dd8d39fddc3ba86694a0a4731
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPashburnUSVA
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip109.61.91.198
addresscdn.kde.org:443
connectionTLS
count10
min0.107829706
max0.135739565
average0.12169825139999998
stddev0.010288842076108152
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/stable-releases/fdroid/repo
ip109.61.91.198
VerificationExceptionJAR signature failed to verify: /tmp/tmpaudhqrm8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437318
duration0.8578531742095947
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:08:38 GMT
Content-Typeapplication/java-archive
Content-Length79128
Connectionkeep-alive
Last-ModifiedWed, 04 Feb 2026 17:33:06 GMT
Cache-Controlmax-age=0
ExpiresSat, 07 Feb 2026 04:08:38 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg
X-77-NZT-Raybff7651d5104cd8fc6ba8669443f5604
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPashburnUSVA
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip109.61.91.198
addresscdn.kde.org:443
connectionTLS
count10
min0.117330089
max0.134789219
average0.127608513
stddev0.006113326669750603
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/experimental/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1770437320
duration0.35599398612976074
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateSat, 07 Feb 2026 04:08:38 GMT
Content-Typeapplication/java-archive
Content-Length79128
Connectionkeep-alive
Last-ModifiedWed, 04 Feb 2026 17:33:06 GMT
Cache-Controlmax-age=0
ExpiresSat, 07 Feb 2026 04:08:38 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg
X-77-NZT-Raybff7651d5104cd8fc6ba8669443f5604
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPashburnUSVA
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://eutopia.cz/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1770437325
duration0.2492969036102295
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateSat, 07 Feb 2026 04:08:38 GMT
Content-Typeapplication/java-archive
Content-Length79128
Connectionkeep-alive
Last-ModifiedWed, 04 Feb 2026 17:33:06 GMT
Cache-Controlmax-age=0
ExpiresSat, 07 Feb 2026 04:08:38 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg
X-77-NZT-Raybff7651d5104cd8fc6ba8669443f5604
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPashburnUSVA
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.i2p.io/repo
ConnectTimeoutHTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7f7e91938d50>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)'))
starttime1770437329
duration60.22611999511719
status200
TLS[Errno 110] Connection timed out
headers
DateSat, 07 Feb 2026 04:08:38 GMT
Content-Typeapplication/java-archive
Content-Length79128
Connectionkeep-alive
Last-ModifiedWed, 04 Feb 2026 17:33:06 GMT
Cache-Controlmax-age=0
ExpiresSat, 07 Feb 2026 04:08:38 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTku15Uut/ZMMb5ajP/IvDLtDa2AIEuXhxd1urxk5syFDg
X-77-NZT-Raybff7651d5104cd8fc6ba8669443f5604
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPashburnUSVA
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.monerujo.io/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpqhjbyotp The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437530
duration0.525148868560791
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length7600
Content-Typeapplication/java-archive
Etag"affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732"
ExpiresSat, 07 Feb 2026 04:22:11 UTC
Last-ModifiedTue, 17 Jun 2025 17:27:43 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KGV4SNB86C6W9J7F22MJACFY
DateSat, 07 Feb 2026 04:12:11 GMT
tlsping
hostf-droid.monerujo.io
ip35.185.44.232
addressf-droid.monerujo.io:443
connectionTLS
count10
min0.045567918
max0.048876278
average0.047157095
stddev0.001079810626286388
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.a3.pm/seabear/repo
ip172.67.220.96
starttime1770437542
duration3.5823309421539307
status523
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:12:26 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9ca00c70ffbd157d-ATL
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.a3.pm
ip172.67.220.96
addressfdroid.a3.pm:443
connectionTLS
count10
min0.123370338
max0.208994688
average0.1801887678
stddev0.024325958558793492
error
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.beocode.eu/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e9194bd10>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437547
duration0.14364385604858398
status523
TLS[Errno -2] Name or service not known
headers
DateSat, 07 Feb 2026 04:12:26 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9ca00c70ffbd157d-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.bromite.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.bromite.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1770437547
duration0.32668495178222656
status523
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
DateSat, 07 Feb 2026 04:12:26 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9ca00c70ffbd157d-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.cgeo.org/fdroid/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmp5cg6dggg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437551
duration0.9981229305267334
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateSat, 07 Feb 2026 04:12:32 GMT
etag"6957af4b-17ff"
last-modifiedFri, 02 Jan 2026 11:43:07 GMT
servernginx/1.27.5
content-length6143
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.25351283
max0.277572789
average0.25833552930000003
stddev0.007335404749084681
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.cgeo.org/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmpj7fzozcc The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437557
duration0.7301571369171143
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateSat, 07 Feb 2026 04:12:37 GMT
etag"6957af4b-17ff"
last-modifiedFri, 02 Jan 2026 11:43:07 GMT
servernginx/1.27.5
content-length6143
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.25404244
max0.25693332
average0.255469029
stddev0.0010245043912980591
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.fedilab.app/repo
ip54.38.93.15
VerificationExceptionJAR signature failed to verify: /tmp/tmp7_0h7eqb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437562
duration1.0006020069122314
status200
TLSTLSv1.3
headers
dateSat, 07 Feb 2026 04:12:43 GMT
content-typeapplication/java-archive
content-length41522
last-modifiedSat, 31 Jan 2026 17:27:52 GMT
etag"697e3b98-a232"
accept-rangesbytes
permissions-policymicrophone=(), camera=(), geolocation=(), interest-cohort=()
x-frame-optionsdeny
x-content-type-optionsnosniff
tlsping
hostfdroid.fedilab.app
ip54.38.93.15
addressfdroid.fedilab.app:443
connectionTLS
count10
min0.284104183
max0.315730042
average0.2957466446
stddev0.011675296005378791
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.frostnerd.com/fdroid/repo
ip152.53.101.189
starttime1770437568
duration0.4788050651550293
status404
TLSTLSv1.3
headers
Alt-Svch3=":443"; ma=2592000
Expect-Ctmax-age=86400, enforce
Feature-Policymicrophone 'none'; camera 'none'
Permissions-Policycamera=(), geolocation=(), microphone=(), interest-cohort=()
Referrer-Policysame-origin
ServerCaddy
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection0
DateSat, 07 Feb 2026 04:12:48 GMT
Content-Length0
tlsping
hostfdroid.frostnerd.com
ip152.53.101.189
addressfdroid.frostnerd.com:443
connectionTLS
count10
min0.308228194
max0.333916503
average0.3159403524999999
stddev0.008912027266252513
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.i2pd.xyz/fdroid/repo
ip62.210.85.80
VerificationExceptionJAR signature failed to verify: /tmp/tmp40y7m_u2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437573
duration0.9300699234008789
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:12:53 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.i2pd.xyz
ip62.210.85.80
addressfdroid.i2pd.xyz:443
connectionTLS
count10
min0.374979148
max0.397611568
average0.382270658
stddev0.008288368659380456
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
cipher preferenceclient
least strengthA
https://fdroid.koyu.space/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)')))
starttime1770437582
duration0.26867103576660156
status200
TLS[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)
headers
Servernginx
DateSat, 07 Feb 2026 04:12:53 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-dev-fdroid/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1770437585
duration0.3299248218536377
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateSat, 07 Feb 2026 04:12:53 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.krombel.de/riot-stable/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-stable/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1770437590
duration0.2404038906097412
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateSat, 07 Feb 2026 04:12:53 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.libretro.com/repo
ip5.9.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpzku4rmhd The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437595
duration0.8528339862823486
status200
TLSTLSv1.2
headers
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"1711916461"
Last-ModifiedWed, 18 Nov 2020 10:48:50 GMT
Content-Length5595
DateSat, 07 Feb 2026 04:13:15 GMT
Serverlighttpd/1.4.35
tlsping
hostfdroid.libretro.com
ip5.9.202.202
addressfdroid.libretro.com:443
connectionTLS
count10
min0.354464349
max0.356504929
average0.355491718
stddev0.0007099916373373758
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthD
https://fdroid.metatransapps.com/fdroid/repo
ip49.12.195.92
VerificationExceptionJAR signature failed to verify: /tmp/tmpsivyza8o The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437610
duration1.1509709358215332
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:13:30 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostfdroid.metatransapps.com
ip49.12.195.92
addressfdroid.metatransapps.com:443
connectionTLS
count10
min0.252175547
max0.254651417
average0.253478945
stddev0.0008521582528004981
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91967d90>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1770437618
duration0.2166128158569336
status200
TLS[Errno -5] No address associated with hostname
headers
DateSat, 07 Feb 2026 04:13:30 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.partidopirata.com.ar/fdroid/repo
ip151.236.30.90
VerificationExceptionJAR signature failed to verify: /tmp/tmpzbfflygk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437618
duration0.7377219200134277
status200
TLSTLSv1.3
headers
Servernginx/1.26.1
DateSat, 07 Feb 2026 04:13:38 GMT
Content-Typeapplication/java-archive
Content-Length5211
Last-ModifiedTue, 07 Jun 2022 01:05:55 GMT
Connectionkeep-alive
ETag"629ea473-145b"
Cache-Controlno-cache
Access-Control-Allow-Origin*.partidopirata.com.ar
Strict-Transport-Securitymax-age=15552000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostfdroid.partidopirata.com.ar
ip151.236.30.90
addressfdroid.partidopirata.com.ar:443
connectionTLS
count10
min0.269963811
max0.281068009
average0.2728009697
stddev0.00354958877672257
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.pixelfed.net/fdroid/repo
ip165.227.195.166
VerificationExceptionJAR signature failed to verify: /tmp/tmp9mbcm8uf The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437628
duration0.4614408016204834
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:13:48 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.pixelfed.net
ip165.227.195.166
addressfdroid.pixelfed.net:443
connectionTLS
count10
min0.129832138
max0.214469843
average0.1846277365
stddev0.025600687850613563
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rakshazi.me/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e919659d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1770437630
duration0.034691810607910156
status200
TLS[Errno -5] No address associated with hostname
headers
Servernginx
DateSat, 07 Feb 2026 04:13:48 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rami.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91964610>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437631
duration0.21741795539855957
status200
TLS[Errno -2] Name or service not known
headers
Servernginx
DateSat, 07 Feb 2026 04:13:48 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.tagesschau.de/repo
ip34.160.251.4
VerificationExceptionJAR signature failed to verify: /tmp/tmphgmcwbxc The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437631
duration0.6185429096221924
status200
TLSTLSv1.3
headers
X-GUploader-UploadIDAJRbA5Uk5Ew8TRpBxbsbuhDTdjSzrJbM6vbvgVj4yC28rYzY11QD8QuEB0k0I4gRJehcVIJ4GtbQ-5A
x-goog-generation1769608056089937
x-goog-metageneration1
x-goog-stored-content-encodingidentity
x-goog-stored-content-length5407
x-goog-meta-goog-reserved-file-mtime1769608024
x-goog-hashcrc32c=eBN6hw==, md5=THew2eEYstxgofs+dnkW1w==
x-goog-storage-classSTANDARD
Accept-Rangesbytes
Content-Length5407
ServerUploadServer
DateSat, 07 Feb 2026 04:13:51 GMT
ExpiresSat, 07 Feb 2026 05:13:51 GMT
Cache-Controlpublic, max-age=3600
Last-ModifiedWed, 28 Jan 2026 13:47:36 GMT
ETag"4c77b0d9e118b2dc60a1fb3e767916d7"
Content-Typeapplication/octet-stream
Age0
Alt-Svch3=":443"; ma=2592000,h3-29=":443"; ma=2592000
tlsping
hostfdroid.tagesschau.de
ip34.160.251.4
addressfdroid.tagesschau.de:443
connectionTLS
count10
min0.041395183
max0.045550272
average0.043187020300000004
stddev0.0014087959766983327
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://fdroid.videlibri.de/repo
ip95.143.172.218
VerificationExceptionJAR signature failed to verify: /tmp/tmp0mjkfx21 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437632
duration0.9248709678649902
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:13:53 GMT
Content-Typeapplication/x-java-archive
Content-Length6633
Connectionkeep-alive
Servernginx
Last-ModifiedSat, 29 Nov 2025 17:10:00 GMT
ETag"19e9-644bed0f37273"
Accept-Rangesbytes
X-Xss-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
tlsping
hostfdroid.videlibri.de
ip95.143.172.218
addressfdroid.videlibri.de:443
connectionTLS
count10
min0.383320563
max0.427818634
average0.39175911839999994
stddev0.013590445923494471
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroidfamily.codeberg.page/repo
ip217.197.84.141
starttime1770437638
duration0.818976879119873
status404
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Typetext/html; charset=utf-8
DateSat, 07 Feb 2026 04:13:59 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
Transfer-Encodingchunked
tlsping
hostfdroidfamily.codeberg.page
ip217.197.84.141
addressfdroidfamily.codeberg.page:443
connectionTLS
count10
min0.312603032
max0.335684518
average0.3220177024
stddev0.008545103509125736
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://freeyourgadget.codeberg.page/fdroid/repo
ip217.197.84.141
VerificationExceptionJAR signature failed to verify: /tmp/tmpoz204w7m The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437644
duration0.8947339057922363
status200
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Length5678
Content-Typeapplication/java-archive
DateSat, 07 Feb 2026 04:14:04 GMT
Etag"d495f45ff38b16fdca3b94d32a8b682a78712547"
Last-ModifiedFri, 06 Feb 2026 22:29:53 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
tlsping
hostfreeyourgadget.codeberg.page
ip217.197.84.141
addressfreeyourgadget.codeberg.page:443
connectionTLS
count10
min0.299482408
max0.332694182
average0.31652644700000004
stddev0.012241502133562069
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpyraxfon8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437649
duration0.5920658111572266
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3658
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id3070:1E7D07:2A99BA:354A6A:6986B7C9
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:14:09 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610094-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1770437649.493768,VS0,VE39
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID01cbd7eeb63e9951ca68bb296bc21d0821f6a266
ExpiresSat, 07 Feb 2026 04:19:09 GMT
Source-Age0
tlsping
hostgithub.com
ip140.82.113.3
addressgithub.com:443
connectionTLS
count10
min0.171476906
max0.269135734
average0.22507900409999998
stddev0.032923784943308165
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo
ip172.65.251.78
VerificationExceptionJAR signature failed to verify: /tmp/tmpzjmtielw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437651
duration0.5192160606384277
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:14:11 GMT
Content-Typeapplication/octet-stream
Content-Length6602
Connectionkeep-alive
Servercloudflare
CF-Ray9ca00f191a44dffe-ATL
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Cache-Controlmax-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60
Content-Dispositionattachment
ETag"c60145727bc345438f413d578f7e5688"
Strict-Transport-Securitymax-age=31536000
VaryAccept-Encoding
content-security-policybase-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-Z9NT9q9lcLRxz+SotRtc7g=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
gitlab-lbhaproxy-main-56-lb-gprd
gitlab-svweb-gke-us-east1-c
nel{"max_age": 0}
permissions-policyinterest-cohort=()
ratelimit-limit500
ratelimit-namethrottle_unauthenticated_web
ratelimit-observed1
ratelimit-remaining499
ratelimit-reset1769520840
referrer-policystrict-origin-when-cross-origin
x-content-type-optionsnosniff
x-download-optionsnoopen
x-frame-optionsSAMEORIGIN
x-gitlab-meta{"correlation_id":"9c489f8275b492b3-ATL","version":"1"}
x-permitted-cross-domain-policiesnone
x-request-id9c489f8275b492b3-ATL
x-runtime0.144457
x-ua-compatibleIE=edge
x-xss-protection1; mode=block
Set-Cookie__cf_bm=IduvpUZHGggmLBkEjd9vIQkxNi6k7d2H8YXIjVdVuRc-1770437651-1.0.1.1-84qwltkL2Zsd5TJqYflk4qQzuIJsj8rvGNpRiCXhN.7JZZTpQdfAXcAe5jQpA1kQaBakoz1lgfvuPOeDScQPL1ba2i4Yb.H0_HVOaeMh7hQ; path=/; expires=Sat, 07-Feb-26 04:44:11 GMT; domain=.gitlab.com; HttpOnly; Secure; SameSite=None, _cfuvid=S.YfXX4D6WUS6YZGVXtd7YuyadkzDfizn4Dtans14Zk-1770437651523-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None
tlsping
hostgitlab.com
ip172.65.251.78
addressgitlab.com:443
connectionTLS
count10
min0.060875968
max0.064670208
average0.06278539
stddev0.0011716345192746762
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://grobox.de/fdroid/repo
ip217.197.86.172
VerificationExceptionJAR signature failed to verify: /tmp/tmpviywgv5f The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437653
duration0.9542849063873291
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:14:13 GMT
ServerApache
Upgradeh2,h2c
ConnectionUpgrade, Keep-Alive
Last-ModifiedFri, 12 Dec 2025 12:46:08 GMT
ETag"2965-645c0a543a8d3"
Accept-Rangesbytes
Content-Length10597
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostgrobox.de
ip217.197.86.172
addressgrobox.de:443
connectionTLS
count10
min0.463390248
max0.467476938
average0.4655798717
stddev0.001308642521347448
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo
ip52.217.132.65
VerificationExceptionJAR signature failed to verify: /tmp/tmprd783wh5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437665
duration0.6455349922180176
status200
TLSTLSv1.3
headers
x-amz-id-26GPjBrPzVUI5NrURFjW8LILCaylxkA1kTJzW6Vgc50A2n6/YtU9FQNMZD4PRcoCLxtKIwP2OX/g=
x-amz-request-idSGHGQA4F0E0Z7G72
DateSat, 07 Feb 2026 04:14:26 GMT
Last-ModifiedFri, 31 Jan 2025 07:13:53 GMT
ETag"e3e79c0ad41eb80a8f3bd87727c953d5"
x-amz-server-side-encryptionAES256
x-amz-meta-s3cmd-attrsatime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis
Accept-Rangesbytes
Content-Typeapplication/zip
Content-Length507773
ServerAmazonS3
tlsping
hostguardianproject-wind.s3.amazonaws.com
ip52.217.132.65
addressguardianproject-wind.s3.amazonaws.com:443
connectionTLS
count10
min0.074817628
max0.077618348
average0.07617463270000001
stddev0.0009833890608341178
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://guardianproject.info/fdroid/repo
ip204.19.241.151
VerificationExceptionJAR signature failed to verify: /tmp/tmphp0_in0b The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437668
duration0.7194111347198486
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:14:28 GMT
ServerApache/2.4.59 (Debian)
Permissions-Policyinterest-cohort=()
Feature-Policyambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none';
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
Strict-Transport-Securitymax-age=31536000
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
VaryUser-Agent
Last-ModifiedFri, 06 Feb 2026 06:47:59 GMT
ETag"31849-64a222b84fe3b"
Accept-Rangesbytes
Content-Length202825
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostguardianproject.info
ip204.19.241.151
addressguardianproject.info:443
connectionTLS
count10
min0.078084017
max0.081035487
average0.0795897011
stddev0.0009359262733033454
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://haagch.frickel.club/files/fdroid/repo
ip159.195.50.59
VerificationExceptionJAR signature failed to verify: /tmp/tmpcfob6w0k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437671
duration0.9209151268005371
status200
TLSTLSv1.3
headers
Servernginx/1.28.0
DateSat, 07 Feb 2026 04:14:31 GMT
Content-Typeapplication/java-archive
Content-Length7603
Last-ModifiedThu, 06 Jan 2022 03:00:10 GMT
Connectionkeep-alive
ETag"61d65b3a-1db3"
Accept-Rangesbytes
tlsping
hosthaagch.frickel.club
ip159.195.50.59
addresshaagch.frickel.club:443
connectionTLS
count10
min0.246696587
max0.248945386
average0.24774311079999997
stddev0.0007854849034753993
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jak-linux.org/fdroid/repo
ip195.201.138.240
VerificationExceptionJAR signature failed to verify: /tmp/tmp1akkc5yw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437677
duration0.7394740581512451
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateSat, 07 Feb 2026 04:14:38 GMT
Content-Typeapplication/java-archive
Content-Length4052
Last-ModifiedTue, 23 Mar 2021 17:51:53 GMT
Connectionkeep-alive
ETag"605a2ab9-fd4"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostjak-linux.org
ip195.201.138.240
addressjak-linux.org:443
connectionTLS
count10
min0.241231023
max0.244039034
average0.24257522250000002
stddev0.0009062767533189026
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jhass.github.io/insporation/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpy6rlrbry The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437684
duration0.44666409492492676
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length2948
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedThu, 22 Feb 2024 04:10:47 GMT
Access-Control-Allow-Origin*
ETag"65d6c947-b84"
expiresSat, 07 Feb 2026 03:01:18 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id575D:1ACE62:376A5A:3DDD9C:6986A8A6
Accept-Rangesbytes
Age0
DateSat, 07 Feb 2026 04:14:44 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610046-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1770437684.171371,VS0,VE26
VaryAccept-Encoding
X-Fastly-Request-ID37d0f075572af315510087c11b7cb3cb41125feb
tlsping
hostjhass.github.io
ip185.199.108.153
addressjhass.github.io:443
connectionTLS
count10
min0.061564538
max0.065351588
average0.06349335599999999
stddev0.0013041712134900078
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo
starttime1770437685
duration0.42048001289367676
status403
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:14:45 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9ca00ff0ca8ebd58"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=r1G6OFD3tYgOEL4mNeXoAbspGadWmkgV3FOcbnmjQFh48h5mFSkWFbM%2FMvNN09NtJRryD%2BgYQTFoeIJRSIcgNx1xBSLlu2BebgalKdVLkTXnzJDlx4KreKPFkrc%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9ca00ff0ca8ebd58-ATL
Content-Encodingbr
tlsping
hostjulianfairfax.gitlab.io
ip35.185.44.232
addressjulianfairfax.gitlab.io:443
connectionTLS
count10
min0.096891077
max0.100796937
average0.09881725570000001
stddev0.0013487249111907912
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://kaffeemitkoffein.de/fdroid/repo
ip77.0.189.99
VerificationExceptionJAR signature failed to verify: /tmp/tmplliyvs15 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437686
duration1.0056309700012207
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:14:47 GMT
ServerApache/2.4.65 (Raspbian)
Last-ModifiedSun, 04 Jan 2026 14:34:12 GMT
ETag"21d3-64790d60a3b6d"
Accept-Rangesbytes
Content-Length8659
Strict-Transport-Securitymax-age=15768000
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostkaffeemitkoffein.de
ip77.0.189.99
addresskaffeemitkoffein.de:443
connectionTLS
count10
min0.485039456
max0.718399523
average0.5509430494
stddev0.06203439825889093
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 3072) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 3072) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://microg.org/fdroid/repo
ip109.230.233.153
VerificationExceptionJAR signature failed to verify: /tmp/tmptxr9978n The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437725
duration0.9139671325683594
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length8200
Content-Typeapplication/java-archive
Etag"dg7rpg9q1k246bs"
Last-ModifiedFri, 06 Feb 2026 09:22:49 GMT
ServerCaddy
VaryAccept-Encoding
DateSat, 07 Feb 2026 04:15:26 GMT
tlsping
hostmicrog.org
ip109.230.233.153
addressmicrog.org:443
connectionTLS
count10
min0.278224362
max0.304743482
average0.293428392
stddev0.010459746700749499
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mobileapp.bitwarden.com/fdroid/repo
ip151.101.1.91
VerificationExceptionJAR signature failed to verify: /tmp/tmp3h6_3zq_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437731
duration0.42000603675842285
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length6452
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedTue, 27 Jan 2026 14:01:08 GMT
Access-Control-Allow-Origin*
ETag"6978c524-1934"
expiresSat, 07 Feb 2026 04:20:14 GMT
x-proxy-cacheMISS
X-GitHub-Request-Id9CBC:28AC9D:42361B:47BCDF:6986BB25
Via1.1 varnish, 1.1 varnish
X-Fastly-Request-ID117fa9e304994548ee5a2110602a025574e55358
Fastly-Debug-StatesDELIVER
Cache-Controlpublic, max-age=0, must-revalidate
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:15:31 GMT
Age317
X-Served-Bycache-iad-kcgs7200116-IAD, cache-iad-kiad7000025-IAD
X-CacheMISS, HIT
X-Cache-Hits0, 1
X-TimerS1770437731.410695,VS0,VE1
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Service-Version33
Strict-Transport-Securitymax-age=31536000
tlsping
hostmobileapp.bitwarden.com
ip151.101.1.91
addressmobileapp.bitwarden.com:443
connectionTLS
count10
min0.063089208
max0.065650908
average0.06440339269999999
stddev0.0009017889256052162
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/repo
ip185.199.111.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpl0_oz3zp The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437732
duration0.6302671432495117
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5808
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedSat, 27 Dec 2025 13:09:33 GMT
Access-Control-Allow-Origin*
ETag"694fda8d-16b0"
expiresSat, 07 Feb 2026 03:00:01 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id442A:16AE7D:391298:3D668D:6986A858
Accept-Rangesbytes
Age0
DateSat, 07 Feb 2026 04:15:32 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610045-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1770437733.903584,VS0,VE23
VaryAccept-Encoding
X-Fastly-Request-IDe5303fadb9f95167407991cb6ee3d5955d09f17b
tlsping
hostmolly.im
ip185.199.111.153
addressmolly.im:443
connectionTLS
count10
min0.059148109
max0.062204189
average0.060784826
stddev0.0009161343079816411
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://nanolx.org/fdroid/repo
ip87.118.120.112
VerificationExceptionJAR signature failed to verify: /tmp/tmp8rj69_tt The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437734
duration0.9262030124664307
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 07 Feb 2026 04:15:34 GMT
Content-Typeapplication/java-archive
Content-Length4978
Last-ModifiedFri, 21 May 2021 19:39:16 GMT
Connectionkeep-alive
ETag"60a80c64-1372"
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-Powered-ByPleskLin
Accept-Rangesbytes
tlsping
hostnanolx.org
ip87.118.120.112
addressnanolx.org:443
connectionTLS
count10
min0.269498379
max0.271987619
average0.270756021
stddev0.0008225600152548132
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://onosendai.herokuapp.com/repo
ip23.22.144.165
starttime1770437740
duration0.13802003860473633
status404
TLSTLSv1.2
headers
Content-Length548
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2026-02-07 04:15:40.429716429 +0000 UTC
Serverheroku-router
tlsping
hostonosendai.herokuapp.com
ip23.22.144.165
addressonosendai.herokuapp.com:443
connectionTLS
count10
min0.101516167
max0.102987797
average0.102209551
stddev0.00048097024554955774
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://pili.qi0.de/fdroid/repo
ip89.244.198.119
VerificationExceptionJAR signature failed to verify: /tmp/tmp2di2gl6o The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437742
duration1.1744041442871094
status200
TLSTLSv1.3
headers
Servernginx/1.28.1
DateSat, 07 Feb 2026 04:15:43 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostpili.qi0.de
ip89.244.198.119
addresspili.qi0.de:443
connectionTLS
count10
min0.398849899
max0.401373518
average0.4001163313
stddev0.0008686850300180232
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://platschi.net/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e91803fd0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437756
duration0.027837038040161133
status200
TLS[Errno -2] Name or service not known
headers
Servernginx/1.28.1
DateSat, 07 Feb 2026 04:15:43 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp07ge8ywl The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437756
duration0.44896697998046875
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4999
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdB42E:214597:3C2F3:4AC6F:6986BC7C
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:15:56 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610087-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1770437757.778233,VS0,VE53
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDf7f34ec72985e7337480ffe2ea6ebe797d21d3bf
ExpiresSat, 07 Feb 2026 04:20:56 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.109.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.061761219
max0.065725388
average0.0637428135
stddev0.0013513987925857607
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo
ip185.199.108.133
starttime1770437758
duration0.09008312225341797
status404
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length14
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
Content-Typetext/plain; charset=utf-8
X-GitHub-Request-Id1310:1AFE32:31339:3F9DF:6986BC7C
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:15:58 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610022-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1770437758.181944,VS0,VE27
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID9a923b742b6743772efc1a52981f6d8e6ad5dad5
ExpiresSat, 07 Feb 2026 04:20:58 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.060185088
max0.064038437
average0.0620877418
stddev0.0012995760407878267
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpufqnt3l8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437759
duration0.4701271057128906
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length8579
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdB3B5:163F53:81662:A3A47:6986B06F
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:15:59 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610051-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1770437759.179346,VS0,VE39
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDd2f53e66f31b0124fe145519fbd81c318a0a0f28
ExpiresSat, 07 Feb 2026 04:20:59 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.062949318
max0.066344358
average0.0646826035
stddev0.0011802505923651345
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpbhrgsssa The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437760
duration0.4174928665161133
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length12648
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"532beef6ea36bf714bd587f06d693b07c3aaf9ca72cb812e91b67df4cff4b1b7"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id7806:569DA:22EFBA:2C05A5:6986AB56
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:16:00 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610023-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1770437761.572259,VS0,VE34
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID7aa57997eb1feaa744b762a8a7bfb1a2cb5492ab
ExpiresSat, 07 Feb 2026 04:21:00 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.061195899
max0.064951039
average0.062929863
stddev0.0012878189761546456
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpt9pp02hz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437761
duration0.4496798515319824
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length10072
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"24929d54f6bd34981d172429e273cbb35d3a0b4dce886939b481afba440f507e"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdA430:11A698:2B89F1:36D4D4:6986BC7D
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:16:01 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610052-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1770437762.897340,VS0,VE47
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID5239ec866c29142cec9192472e5ba525a95d13d3
ExpiresSat, 07 Feb 2026 04:21:01 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.061978529
max0.065715049
average0.06380725980000002
stddev0.0012884285835371547
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp941_ic2p The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437763
duration0.4693949222564697
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length7499
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"ef5e74f5e3b9034ea02adfc6bfc838591dd5eee4b09b8d4f296357a3e3e6bd16"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdB2DD:183E27:2B6EF4:36B769:6986BC82
Accept-Rangesbytes
DateSat, 07 Feb 2026 04:16:03 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610039-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1770437763.246248,VS0,VE44
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID48aaa6fabd80c7eff37f49e9969e2193612953b1
ExpiresSat, 07 Feb 2026 04:21:03 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.062082509
max0.066029428
average0.0639304348
stddev0.0013467982570365023
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://releases.nailyk.fr/repo
ip144.76.164.24
VerificationExceptionJAR signature failed to verify: /tmp/tmplcbdkx1f The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437764
duration0.8833279609680176
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:05 GMT
ServerApache
Last-ModifiedSat, 07 Feb 2026 03:41:15 GMT
ETag"1a03-64a33ad85b6b8"
Accept-Rangesbytes
Content-Length6659
Content-Typeapplication/java-archive
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
tlsping
hostreleases.nailyk.fr
ip144.76.164.24
addressreleases.nailyk.fr:443
connectionTLS
count10
min0.27145379
max0.378093936
average0.3452534462
stddev0.036616202994651695
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://releases.threema.ch/fdroid/repo
ip203.56.112.72
VerificationExceptionJAR signature failed to verify: /tmp/tmp1ogxltxk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437769
duration0.8115749359130859
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:09 GMT
ServerApache
Access-Control-Allow-Origin*
Last-ModifiedTue, 09 Dec 2025 13:40:21 GMT
ETag"18e2-645850d9f51a5"
Accept-Rangesbytes
Content-Length6370
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
hostreleases.threema.ch
ip203.56.112.72
addressreleases.threema.ch:443
connectionTLS
count10
min0.422722416
max0.527543964
average0.49291441990000007
stddev0.0335991969624961
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://repo.kuschku.de/repo
ip148.251.132.182
VerificationExceptionJAR signature failed to verify: /tmp/tmp0dhw5tbp The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437776
duration0.8832440376281738
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:17 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlsping
hostrepo.kuschku.de
ip148.251.132.182
addressrepo.kuschku.de:443
connectionTLS
count10
min0.399008454
max0.401631465
average0.40033370360000003
stddev0.0008906062308138426
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.mobilsicher.de/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7f7e9182a150>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1770437782
duration0.2187209129333496
status200
TLS[Errno -2] Name or service not known
headers
DateSat, 07 Feb 2026 04:16:17 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.netsyms.com/fdroid/repo
ip104.21.39.203
VerificationExceptionJAR signature failed to verify: /tmp/tmpcm10bdz9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437782
duration0.6790201663970947
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:23 GMT
Content-Typeapplication/java-archive
Content-Length11099
Connectionkeep-alive
Servercloudflare
VaryUser-Agent
cf-cache-statusREVALIDATED
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=b7V7NI5xyCUffPw7EPjDHl%2B2tCE%2Bkg%2BfbXb7JQynjWGZjK5g4Co2Sn65H7UgHGJvdnLTZQxdRMH9jlJ%2FfF48RtIRCh7maNEdG%2FNFLJjMU5c%3D"}]}
Last-ModifiedSat, 18 Nov 2023 06:40:11 GMT
etag"2b5b-60a67864e3f1c"
Accept-Rangesbytes
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Permissions-Policyinterest-cohort=()
X-Content-Type-Optionsnosniff
Cache-Controlmax-age=14400
CF-RAY9ca0124fdd704545-ATL
alt-svch3=":443"; ma=86400
tlsping
hostrepo.netsyms.com
ip104.21.39.203
addressrepo.netsyms.com:443
connectionTLS
count10
min0.150406118
max0.205907198
average0.182545556
stddev0.018703519367040955
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo
starttime1770437784
duration0.34667301177978516
status403
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:24 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9ca0125c0b966732"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MWxGdbkHhvkg5XJc0ez33SwDaawgx073OA5noULeHwUzE2f4i6TVoCfHglgjbAxhgfgLAtwPAcF8axg%2FAWEhq3qHHh77jg9Qql0A6RkO3E4fAS%2BAiGlJwxkyjMg%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9ca0125c0b966732-ATL
Content-Encodingbr
tlsping
hostrfc2822.gitlab.io
ip35.185.44.232
addressrfc2822.gitlab.io:443
connectionTLS
count10
min0.039386098
max0.043652838
average0.041471878
stddev0.0014185458195560686
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://s2.spiritcroc.de/fdroid/repo
ip23.88.107.207
VerificationExceptionJAR signature failed to verify: /tmp/tmpu4fe0lpj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437785
duration0.935615062713623
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 07 Feb 2026 04:16:26 GMT
Content-Typeapplication/java-archive
Content-Length11350
Last-ModifiedMon, 22 Dec 2025 11:07:53 GMT
Connectionkeep-alive
ETag"69492689-2c56"
Strict-Transport-Securitymax-age=15768000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hosts2.spiritcroc.de
ip23.88.107.207
addresss2.spiritcroc.de:443
connectionTLS
count10
min0.349472247
max0.353500936
average0.35179719360000006
stddev0.0013224437111782244
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://s3.amazonaws.com/storymaker/fdroid/repo
ip16.182.100.240
starttime1770437792
duration0.10567212104797363
status403
TLSTLSv1.3
headers
x-amz-request-idGA9PX9KF9ZQ48P1N
x-amz-id-2FwW14byKkJRQx79rEILLvw8sAjF9UZ8FeqlAbLLQwtsKTWClh3S0xeEGunidGsjyPKhh77VeLWE=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateSat, 07 Feb 2026 04:16:31 GMT
ServerAmazonS3
tlsping
hosts3.amazonaws.com
ip16.182.100.240
addresss3.amazonaws.com:443
connectionTLS
count10
min0.074654409
max0.077663019
average0.07614158
stddev0.0010010714647960938
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://secfirst.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1770437794
duration0.3973088264465332
status403
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
x-amz-request-idGA9PX9KF9ZQ48P1N
x-amz-id-2FwW14byKkJRQx79rEILLvw8sAjF9UZ8FeqlAbLLQwtsKTWClh3S0xeEGunidGsjyPKhh77VeLWE=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateSat, 07 Feb 2026 04:16:31 GMT
ServerAmazonS3
tlspingNone
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://static.cryptomator.org/android/fdroid/repo
ip172.67.132.219
VerificationExceptionJAR signature failed to verify: /tmp/tmpl94y8jsu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437806
duration0.9746170043945312
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:47 GMT
Content-Typeapplication/java-archive
Content-Length6188
Connectionkeep-alive
Accept-Rangesbytes
etag"342f5a8ebdf8a77587b0b8f9095c2075"
last-modifiedMon, 06 Oct 2025 16:58:07 GMT
x-amz-id-2txg708a7c8c9eef4fe8ba0d-006986bcaf
x-amz-request-idtxg708a7c8c9eef4fe8ba0d-006986bcaf
Cache-Controlmax-age=28800
cf-cache-statusMISS
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=8kGTWszmYesiAYuD%2F1LgwEr%2FnFpmQyyY0ebhrXNyvExiuGV8v5llSa35cLDDHMvsKvJLeHE7iCNx%2FK1dXZ24u9sCQ3FYKvCp9%2FBmEtCq3U5ikRQV1dQ%3D"}]}
Servercloudflare
CF-RAY9ca012e469e4fc15-ATL
alt-svch3=":443"; ma=86400
tlsping
hoststatic.cryptomator.org
ip172.67.132.219
addressstatic.cryptomator.org:443
connectionTLS
count10
min0.116822999
max0.211686628
average0.1804573111
stddev0.027098844331432267
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://store.nethunter.com/repo
ip45.33.83.228
VerificationExceptionJAR signature failed to verify: /tmp/tmprhwgmh7k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437808
duration0.514674186706543
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 07 Feb 2026 04:16:48 GMT
Content-Typeapplication/java-archive
Content-Length45628
Last-ModifiedThu, 08 Jan 2026 12:23:24 GMT
Connectionkeep-alive
ETag"695fa1bc-b23c"
Accept-Rangesbytes
tlsping
hoststore.nethunter.com
ip45.33.83.228
addressstore.nethunter.com:443
connectionTLS
count10
min0.136730209
max0.165865378
average0.1518010775
stddev0.011351673320892323
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://submarine.strangled.net/fdroid/repo
ip178.68.58.166
VerificationExceptionJAR signature failed to verify: /tmp/tmpksq5a4fd The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437810
duration0.8558349609375
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:16:50 GMT
ServerApache/2.4.29 (Ubuntu)
Last-ModifiedSun, 01 Dec 2024 22:35:25 GMT
ETag"1087-6283d0c58d7a9"
Accept-Rangesbytes
Content-Length4231
Access-Control-Allow-Origin*
Access-Control-Allow-Headersorigin, x-requested-with, content-type
Access-Control-Allow-MethodsPUT, GET, POST, DELETE, OPTIONS
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostsubmarine.strangled.net
ip178.68.58.166
addresssubmarine.strangled.net:443
connectionTLS
count10
min0.319371449
max0.475805273
average0.33601564279999996
stddev0.046601891549078595
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmptajt0blj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437828
duration1.2195558547973633
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateSat, 07 Feb 2026 04:17:09 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostwww.anonymousmessenger.ly
ip185.176.41.167
addresswww.anonymousmessenger.ly:443
connectionTLS
count10
min0.337833862
max0.369365241
average0.3555387516
stddev0.009943051886377757
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.collaboraoffice.com/downloads/fdroid/repo
ip157.90.115.48
VerificationExceptionJAR signature failed to verify: /tmp/tmp4732eorz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437837
duration0.6897509098052979
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:17:17 GMT
ServerApache/2.4.65 (Debian)
X-Content-Type-Optionsnosniff
Strict-Transport-Securitymax-age=31536000; includeSubdomains; preload
Referrer-Policystrict-origin-when-cross-origin
Last-ModifiedSun, 01 Feb 2026 03:22:47 GMT
ETag"1191-649bab8799b93"
Accept-Rangesbytes
Content-Length4497
x-robots-tagnoindex
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.collaboraoffice.com
ip157.90.115.48
addresswww.collaboraoffice.com:443
connectionTLS
count10
min0.266525527
max0.269645637
average0.268181666
stddev0.0010400932373345203
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.cromite.org/fdroid/repo
ip89.46.108.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpl9tawgbg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437842
duration0.8397128582000732
status200
TLSTLSv1.3
headers
Serveraruba-proxy
DateSat, 07 Feb 2026 04:17:23 GMT
Content-Typeapplication/java-archive
Content-Length4529
Connectionkeep-alive
Cache-Controlmax-age=60
Last-ModifiedMon, 26 Jan 2026 07:32:08 GMT
Accept-Rangesbytes
X-ServerNamewebx.aruba.it
Alt-Svch3=":443"; ma=86400
tlsping
hostwww.cromite.org
ip89.46.108.70
addresswww.cromite.org:443
connectionTLS
count10
min0.266765158
max0.270047338
average0.268319027
stddev0.0010911211879937978
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.droidware.info/fdroid/repo
ip104.18.25.83
starttime1770437848
duration0.3651878833770752
status403
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:17:28 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
X-Frame-OptionsSAMEORIGIN
Referrer-Policysame-origin
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
VaryAccept-Encoding
Servercloudflare
CF-RAY9ca013e8bbe39aff-ATL
Content-Encodinggzip
tlsping
hostwww.droidware.info
ip104.21.89.103
addresswww.droidware.info:443
connectionTLS
count10
min0.120880279
max0.210746989
average0.1897965887
stddev0.026751509550811896
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.ma-nic.de/fdroid/repo
ip109.250.136.217
VerificationExceptionJAR signature failed to verify: /tmp/tmp8o95s7k2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1770437849
duration0.7604269981384277
status200
TLSTLSv1.3
headers
DateSat, 07 Feb 2026 04:17:29 GMT
ServerApache/2.4.66 (Debian)
Last-ModifiedTue, 06 Jun 2023 16:06:08 GMT
ETag"1094-5fd7832786fe5"
Accept-Rangesbytes
Content-Length4244
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.ma-nic.de
ip109.250.136.217
addresswww.ma-nic.de:443
connectionTLS
count10
min0.362222176
max0.399504366
average0.3790302242
stddev0.013257870846783764
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA