Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/repo-monitor

https://f-droid.org/repo
ip37.218.243.72
VerificationExceptionJAR signature failed to verify: /tmp/tmpbs0w0yqo The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818849
duration2.396049976348877
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:20:49 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
ETag"ba6f8a-651c5ed321203"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip37.218.243.72
addressf-droid.org:443
connectionTLS
count10
min0.222996794
max0.225075317
average0.2240466408
stddev0.0007344838555717606
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip91.224.148.45
VerificationExceptionJAR signature failed to verify: /tmp/tmpfxf64tym The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818517
duration2.4553980827331543
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:15:17 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip91.224.148.45
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.236509203
max0.238764977
average0.23763159160000003
stddev0.0007440921238806626
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmp1x6x2gsz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818050
duration6.8379480838775635
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateFri, 15 May 2026 04:07:30 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.25441208
max0.256549795
average0.2555135203
stddev0.0007269185609167108
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmpw6zv_04d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818546
duration2.74025297164917
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:15:46 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
ETag"ba6f8a-651c5ed2fbd80"
Accept-Rangesbytes
Content-Length12218250
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.48528509
max0.570587044
average0.5335987178999999
stddev0.030670455839213944
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.gwdg.de/pub/android/fdroid/repo
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmpvsj0dtaq The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818071
duration2.7684810161590576
status200
TLSTLSv1.2
headers
Servernginx
DateFri, 15 May 2026 04:07:51 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.357432688
max0.487577297
average0.42629207320000007
stddev0.04066188787483181
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.253
VerificationExceptionJAR signature failed to verify: /tmp/tmpqslfl4qk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818079
duration2.855365037918091
status200
TLSTLSv1.3
headers
servernginx
dateFri, 15 May 2026 04:08:00 GMT
content-typeapplication/java-archive
content-length12218250
last-modifiedThu, 14 May 2026 12:06:30 GMT
etag"6a05bac6-ba6f8a"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.253
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.251830417
max0.254250584
average0.2529943614
stddev0.0008022245800693484
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip51.159.104.35
VerificationExceptionJAR signature failed to verify: /tmp/tmpmaaqjxjz The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818534
duration2.5150861740112305
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length12218250
Content-Typeapplication/java-archive
Etag"diidxm9hphxc79vnu"
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Referrer-Policystrict-origin-when-cross-origin
ServerCaddy
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
DateFri, 15 May 2026 04:15:34 GMT
tlsping
hostmirror.cyberbits.eu
ip51.159.104.35
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.268372526
max0.300807974
average0.2832499548
stddev0.011690043807228205
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.eu.ossplanet.net/fdroid/repo
ip65.21.121.21
VerificationExceptionJAR signature failed to verify: /tmp/tmpkgu9fa_7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818100
duration2.799083948135376
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateFri, 15 May 2026 04:08:20 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirror.eu.ossplanet.net
ip65.21.121.21
addressmirror.eu.ossplanet.net:443
connectionTLS
count10
min0.304489478
max0.335260204
average0.32078128529999994
stddev0.010354079078704349
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmpf1zcprpr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818107
duration2.1259899139404297
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateFri, 15 May 2026 04:08:27 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
ExpiresFri, 15 May 2026 04:13:27 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.172230575
max0.174490431
average0.17321636099999999
stddev0.0007420737908836279
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip83.138.55.214
VerificationExceptionJAR signature failed to verify: /tmp/tmprdkm8wjx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818112
duration63.72882699966431
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length12218250
Content-Typeapplication/java-archive
Etag"diidxm9hphxc79vnu"
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
ServerCaddy
VaryAccept-Encoding
DateFri, 15 May 2026 04:09:33 GMT
tlsping
hostmirror.kumi.systems
ip83.138.55.253
addressmirror.kumi.systems:443
connectionTLS
count10
min0.348683851
max0.389236025
average0.37082837389999995
stddev0.014241404122687755
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.level66.services/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmphyp2qgl5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818314
duration2.68664288520813
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:11:55 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.services
ip141.98.136.67
addressmirror.level66.services:443
connectionTLS
count10
min0.228234659
max0.230536878
average0.22937706240000005
stddev0.0007963926184728478
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpcrc4vf73 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818324
duration11.74878215789795
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateFri, 15 May 2026 04:12:09 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirror.ossplanet.net
ip163.22.17.70
addressmirror.ossplanet.net:443
connectionTLS
count10
min1.767396652
max4.276964189
average2.9895709548
stddev0.7255818641139159
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirrors.dotsrc.org/fdroid/repo
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmp11sr9lmg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818384
duration2.9463658332824707
status200
TLSTLSv1.3
headers
Servernginx/1.28.1
DateFri, 15 May 2026 04:13:05 GMT
Content-Typeapplication/java-archive
Content-Length12204921
Last-ModifiedWed, 13 May 2026 16:52:12 GMT
Connectionkeep-alive
ETag"6a04ac3c-ba3b79"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.266015787
max0.268257249
average0.267144242
stddev0.0007408338768375756
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo
ip50.117.120.66
VerificationExceptionJAR signature failed to verify: /tmp/tmp8xgme2jy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818400
duration1.9907360076904297
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateFri, 15 May 2026 04:13:20 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip50.117.120.66
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.219940559
max0.236484049
average0.2279433236
stddev0.005582021906352946
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.251
VerificationExceptionJAR signature failed to verify: /tmp/tmphqnkoy_z The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818563
duration1.4982810020446777
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:16:03 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.251
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.150531629
max0.160903781
average0.1532031464
stddev0.0037413572332053555
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.init7.net/fdroid/repo
ip109.202.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpf5k67es8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818408
duration2.5162830352783203
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateFri, 15 May 2026 04:13:28 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirror.init7.net
ip109.202.202.202
addressmirror.init7.net:443
connectionTLS
count10
min0.250236988
max0.252343966
average0.2512786878999999
stddev0.0007318386014851065
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.freedif.org/fdroid/repo
ip132.147.107.5
VerificationExceptionJAR signature failed to verify: /tmp/tmpui87dxle The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818433
duration4.2019641399383545
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:13:53 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirror.freedif.org
ip132.147.107.5
addressmirror.freedif.org:443
connectionTLS
count10
min0.490748584
max0.534556889
average0.5196794646
stddev0.015019737887329646
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirrors.hostico.ro/fdroid/repo
ip188.241.222.52
VerificationExceptionJAR signature failed to verify: /tmp/tmpepluqg0i The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818445
duration3.0220789909362793
status200
TLSTLSv1.2
headers
Servernginx/1.20.1
DateFri, 15 May 2026 04:14:06 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirrors.hostico.ro
ip188.241.222.52
addressmirrors.hostico.ro:443
connectionTLS
count10
min0.417279193
max0.421360489
average0.41892780910000005
stddev0.0011970724045244224
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://ftp.lug.ro/fdroid/repo
ip89.149.59.178
VerificationExceptionJAR signature failed to verify: /tmp/tmpf2ijli2b The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818459
duration11.100664854049683
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:14:20 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostftp.lug.ro
ip89.149.59.178
addressftp.lug.ro:443
connectionTLS
count10
min0.372272474
max0.42585614
average0.3830981646
stddev0.016176348975896353
error
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirrors.chroot.ro/fdroid/repo
ip86.105.155.178
VerificationExceptionJAR signature failed to verify: /tmp/tmpmoe98k3j The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818485
duration23.769951105117798
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:14:46 GMT
Content-Typeapplication/java-archive
Content-Length12218250
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
Connectionkeep-alive
ETag"6a05bac6-ba6f8a"
Accept-Rangesbytes
tlsping
hostmirrors.chroot.ro
ip86.105.155.178
addressmirrors.chroot.ro:443
connectionTLS
count10
min0.287195042
max0.289172776
average0.2881733186
stddev0.0006739433950675947
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
starttime1778818540
duration0.4759800434112549
status404
TLSTLSv1.3
headers
Servernginx/1.31.0
DateFri, 15 May 2026 04:15:41 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.252335226
max0.254834792
average0.2535402008
stddev0.0008823918687301796
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad4c450>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1778818545
duration0.12151503562927246
status404
TLS[Errno -5] No address associated with hostname
headers
Servernginx/1.31.0
DateFri, 15 May 2026 04:15:41 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.jarsilio.com/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad4fb90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778818555
duration0.13881397247314453
status200
TLS[Errno -2] Name or service not known
headers
DateFri, 15 May 2026 04:15:46 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedThu, 14 May 2026 12:06:30 GMT
ETag"ba6f8a-651c5ed2fbd80"
Accept-Rangesbytes
Content-Length12218250
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip64.50.236.52
starttime1778818556
duration0.17487788200378418
status404
TLSTLSv1.2
headers
DateFri, 15 May 2026 04:15:56 GMT
ServerApache
Content-Length261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip64.50.236.52
addressftp.osuosl.org:443
connectionTLS
count10
min0.114873386
max0.11914637
average0.11689850499999999
stddev0.001417759743417412
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip205.209.125.10
starttime1778818559
duration0.17816495895385742
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:15:59 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip205.209.125.10
addressmirror.scd31.com:443
connectionTLS
count10
min0.090270011
max0.093702582
average0.0921135859
stddev0.0010207112901729329
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad5cb50>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778818562
duration0.020913124084472656
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:15:59 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://android.izzysoft.de/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmphxp2921m jarsigner: java.util.zip.ZipException: zip END header not found
starttime1778818566
duration0.829448938369751
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:16:06 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresSun, 14 Jun 2026 04:16:06 GMT
VaryAccept-Encoding
Content-Encodingbr
Content-Length1873
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlsping
hostandroid.izzysoft.de
ip144.76.109.58
addressandroid.izzysoft.de:443
connectionTLS
count10
min0.239412993
max0.241495386
average0.2405080242
stddev0.0006885881653120132
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmp0a_iadqw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818571
duration0.7816331386566162
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateFri, 15 May 2026 04:16:11 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostanonymousmessenger.ly
ip185.176.41.167
addressanonymousmessenger.ly:443
connectionTLS
count10
min0.319205015
max0.348087492
average0.3352056274
stddev0.010496474970717044
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://app.futo.org/fdroid/repo
ip159.65.228.96
VerificationExceptionJAR signature failed to verify: /tmp/tmpwodbvsf8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818579
duration0.505944013595581
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:16:20 GMT
Content-Typeapplication/java-archive
Content-Length4852
Last-ModifiedMon, 04 May 2026 21:40:41 GMT
Connectionkeep-alive
ETag"69f91259-12f4"
Accept-Rangesbytes
tlsping
hostapp.futo.org
ip159.65.228.96
addressapp.futo.org:443
connectionTLS
count10
min0.137259284
max0.15375738
average0.14383895689999998
stddev0.005601471763547589
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://app.usb0.net/repo
ip104.21.6.28
starttime1778818583
duration0.27671217918395996
status404
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:16:23 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Servercloudflare
Cache-Controlmax-age=14400
cf-cache-statusEXPIRED
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=Gfwa%2Fxrd0fyijVh0b104emN%2FY0X%2BU81C9JjeZYJrN0lJlxRwS9FHaDKq3eQuvCnD7p%2FoUThCc4bViBAY4q45TygfOW6vKm0uey%2FakpIQWGb1%2FDg9hp1jv27grkYaYCM%3D"}]}
Content-Encodingbr
CF-RAY9fbf53b18db7c016-ATL
alt-svch3=":443"; ma=86400
tlsping
hostapp.usb0.net
ip104.21.6.28
addressapp.usb0.net:443
connectionTLS
count10
min0.131070112
max0.210835966
average0.18166084629999998
stddev0.024255293858848986
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://apt.izzysoft.de/fdroid/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpt6q2_qu0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818584
duration2.0622451305389404
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:16:25 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Last-ModifiedThu, 14 May 2026 17:54:58 GMT
ETag"35595b-651cacb706c82"
Accept-Rangesbytes
Content-Length3496283
Cache-Controlmax-age=86400
ExpiresSat, 16 May 2026 04:16:25 GMT
VaryAccept-Encoding
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostapt.izzysoft.de
ip144.76.109.58
addressapt.izzysoft.de:443
connectionTLS
count10
min0.239375032
max0.24153381
average0.2404787765
stddev0.000757388381965722
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://archive.newpipe.net/fdroid/repo
ip159.69.138.33
VerificationExceptionJAR signature failed to verify: /tmp/tmpd98ydl2k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818590
duration0.8221631050109863
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:16:31 GMT
Content-Typeapplication/java-archive
Content-Length24791
Last-ModifiedFri, 01 May 2026 16:58:54 GMT
Connectionkeep-alive
ETag"69f4dbce-60d7"
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin
Permissions-Policyinterest-cohort=()
Content-Security-Policydefault-src 'self'; object-src 'none'; block-all-mixed-content
Accept-Rangesbytes
tlsping
hostarchive.newpipe.net
ip159.69.138.33
addressarchive.newpipe.net:443
connectionTLS
count10
min0.243534044
max0.245778388
average0.2446810901
stddev0.0007133682207480807
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo
ip3.161.174.49
VerificationExceptionThe repository's fingerprint does not match.
starttime1778818613
duration1.0686421394348145
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length165682
Connectionkeep-alive
DateFri, 15 May 2026 04:16:55 GMT
Last-ModifiedThu, 14 May 2026 14:02:50 GMT
ETag"ef4c91135d80c95ff05017571525e223"
x-amz-server-side-encryptionAES256
x-amz-version-idkXw_yfVFL7kf_9NqBn9DwM8ZVV8x6uIV
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 17d480d3bd7f151759117c0805d90a7a.cloudfront.net (CloudFront)
X-Amz-Cf-PopATL59-P6
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-IdZd295KrJo1hv_xPQZCfO32IzfhezGUD8M-7YfztA9rLe-lhVJANiKA==
tlsping
hostbrave-browser-apk-nightly.s3.brave.com
ip3.161.174.49
addressbrave-browser-apk-nightly.s3.brave.com:443
connectionTLS
count10
min0.055659752
max0.057940872
average0.05676613829999999
stddev0.000745189295264773
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-release.s3.brave.com/fdroid/repo
ip54.230.79.11
VerificationExceptionThe repository's fingerprint does not match.
starttime1778818616
duration0.9291789531707764
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length49526
Connectionkeep-alive
DateFri, 15 May 2026 04:16:57 GMT
Last-ModifiedWed, 13 May 2026 21:05:26 GMT
ETag"c21f4ef5560e25a0a2ddeedef6172e12"
x-amz-server-side-encryptionAES256
x-amz-version-id4w__6yGxbVA4QPWWvYPNwvh9gckG99lR
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 f5210bf5792e453415046b21c18854d6.cloudfront.net (CloudFront)
X-Amz-Cf-PopATL59-P18
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-Id6JDla1aNdZNj2W8srfY9H7B0J6M6zpvS9k7GhSK-E2NZsIqxvLwbwA==
tlsping
hostbrave-browser-apk-release.s3.brave.com
ip54.230.79.11
addressbrave-browser-apk-release.s3.brave.com:443
connectionTLS
count10
min0.056110334
max0.058133134
average0.057086486099999986
stddev0.0007285095687827928
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://breezy-weather.github.io/fdroid-repo/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp3qv1lq9f The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818618
duration0.38541102409362793
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length19023
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedFri, 15 May 2026 03:49:27 GMT
Access-Control-Allow-Origin*
Strict-Transport-Securitymax-age=31556952
ETag"6a0697c7-4a4f"
expiresFri, 15 May 2026 04:05:07 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id6BC4:2E20EA:23A033:28057F:6A06991B
Accept-Rangesbytes
Age242
DateFri, 15 May 2026 04:16:58 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610089-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1778818618.224703,VS0,VE1
VaryAccept-Encoding
X-Fastly-Request-ID7162f07eaea8fc3998b267adba41946b4f6dcc6d
tlsping
hostbreezy-weather.github.io
ip185.199.108.153
addressbreezy-weather.github.io:443
connectionTLS
count10
min0.053047418
max0.055341772
average0.05422631419999999
stddev0.0007658659793201148
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://briarproject.org/fdroid/repo
ip157.90.23.135
VerificationExceptionJAR signature failed to verify: /tmp/tmpr7zwhkzb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818619
duration0.7092678546905518
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateFri, 15 May 2026 04:14:14 GMT
Content-Typeapplication/java-archive
Content-Length4280
Last-ModifiedThu, 12 Mar 2026 16:40:05 GMT
Connectionkeep-alive
ETag"69b2ec65-10b8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostbriarproject.org
ip157.90.23.135
addressbriarproject.org:443
connectionTLS
count10
min0.238918031
max0.240944267
average0.2399003389
stddev0.0007095865916545249
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroidclassic/fdroid/repo
ip176.9.145.28
VerificationExceptionThe repository's fingerprint does not match.
starttime1778818624
duration0.8590209484100342
status200
TLSTLSv1.3
headers
Servernginx/1.31.0
DateFri, 15 May 2026 04:17:04 GMT
Content-Typeapplication/java-archive
Content-Length9793
Last-ModifiedWed, 08 Mar 2023 23:22:24 GMT
Connectionkeep-alive
ETag"640918b0-2641"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.251660562
max0.268228342
average0.25491352759999997
stddev0.004987195533633073
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmppolsjheg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818630
duration0.39401793479919434
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length6938
Content-Typeapplication/java-archive
Etag"5276e131ce08acbb5ff4ee076bcfb3f81f320d7ddcc8dcfd5a1d0c8d834e9afd"
ExpiresFri, 15 May 2026 04:27:10 UTC
Last-ModifiedFri, 15 May 2026 04:01:20 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KRMXMGDY5NXG7JXPF0173HC7
DateFri, 15 May 2026 04:17:10 GMT
tlsping
hostcalyxos.gitlab.io
ip35.185.44.232
addresscalyxos.gitlab.io:443
connectionTLS
count10
min0.036204516
max0.039731005
average0.03799171
stddev0.0011395287701258796
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/fdroid/repo
ip89.222.120.8
VerificationExceptionJAR signature failed to verify: /tmp/tmp2k2w7zli The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818630
duration1.1767280101776123
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:17:11 GMT
Content-Typeapplication/java-archive
Content-Length173231
Connectionkeep-alive
Last-ModifiedWed, 13 May 2026 09:22:02 GMT
Cache-Controlmax-age=0
ExpiresFri, 15 May 2026 04:17:11 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk6X3PMXmhznVsTcva+zyAYri3bCshp23WyKVXYSmf3bCKPnlG0uR3eU
X-77-NZT-Ray4d07da1c59c4eacd479e066a950a470a
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip89.222.120.8
addresscdn.kde.org:443
connectionTLS
count10
min0.112479753
max0.130212673
average0.1201138974
stddev0.007396373542283262
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/stable-releases/fdroid/repo
ip89.222.120.8
VerificationExceptionJAR signature failed to verify: /tmp/tmpm3qhqbhw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818633
duration0.8629961013793945
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:17:13 GMT
Content-Typeapplication/java-archive
Content-Length79986
Connectionkeep-alive
Last-ModifiedSat, 09 May 2026 11:04:31 GMT
Cache-Controlmax-age=0
ExpiresFri, 15 May 2026 04:17:13 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkzeHUjy5TVpz63oMsmxsGUguFhpZ+Crj1z4+m7zJO13KilWyMRcI7l8
X-77-NZT-Ray4d07da1c0bca210e499e066a42ca701d
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip89.222.120.8
addresscdn.kde.org:443
connectionTLS
count10
min0.116158612
max0.131965981
average0.121033688
stddev0.005592140653673459
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/experimental/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1778818635
duration0.39574599266052246
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateFri, 15 May 2026 04:17:13 GMT
Content-Typeapplication/java-archive
Content-Length79986
Connectionkeep-alive
Last-ModifiedSat, 09 May 2026 11:04:31 GMT
Cache-Controlmax-age=0
ExpiresFri, 15 May 2026 04:17:13 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkzeHUjy5TVpz63oMsmxsGUguFhpZ+Crj1z4+m7zJO13KilWyMRcI7l8
X-77-NZT-Ray4d07da1c0bca210e499e066a42ca701d
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://eutopia.cz/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1778818640
duration0.25913190841674805
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateFri, 15 May 2026 04:17:13 GMT
Content-Typeapplication/java-archive
Content-Length79986
Connectionkeep-alive
Last-ModifiedSat, 09 May 2026 11:04:31 GMT
Cache-Controlmax-age=0
ExpiresFri, 15 May 2026 04:17:13 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkzeHUjy5TVpz63oMsmxsGUguFhpZ+Crj1z4+m7zJO13KilWyMRcI7l8
X-77-NZT-Ray4d07da1c0bca210e499e066a42ca701d
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.i2p.io/repo
ConnectTimeoutHTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x785d0ad6bb10>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)'))
starttime1778818645
duration60.18216395378113
status200
TLS[Errno 110] Connection timed out
headers
DateFri, 15 May 2026 04:17:13 GMT
Content-Typeapplication/java-archive
Content-Length79986
Connectionkeep-alive
Last-ModifiedSat, 09 May 2026 11:04:31 GMT
Cache-Controlmax-age=0
ExpiresFri, 15 May 2026 04:17:13 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkzeHUjy5TVpz63oMsmxsGUguFhpZ+Crj1z4+m7zJO13KilWyMRcI7l8
X-77-NZT-Ray4d07da1c0bca210e499e066a42ca701d
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.monerujo.io/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpg0lcct9t The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818848
duration0.6944148540496826
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length7600
Content-Typeapplication/java-archive
Etag"affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732"
ExpiresFri, 15 May 2026 04:30:48 UTC
Last-ModifiedTue, 17 Jun 2025 17:27:43 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KRMXV5Y3FK1C1E980E66HSX6
DateFri, 15 May 2026 04:20:48 GMT
tlsping
hostf-droid.monerujo.io
ip35.185.44.232
addressf-droid.monerujo.io:443
connectionTLS
count10
min0.040303563
max0.043195519
average0.0417522429
stddev0.0009718246484548994
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.a3.pm/seabear/repo
ip104.21.78.107
starttime1778818860
duration6.367739200592041
status523
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:21:06 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7167
Connectionkeep-alive
Retry-After120
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9fbf5a745a12c84c-ATL
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.a3.pm
ip104.21.78.107
addressfdroid.a3.pm:443
connectionTLS
count10
min0.130158387
max0.20117341
average0.1735294562
stddev0.023973148758688504
error
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.beocode.eu/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad8de90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778818867
duration0.0342710018157959
status523
TLS[Errno -2] Name or service not known
headers
DateFri, 15 May 2026 04:21:06 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7167
Connectionkeep-alive
Retry-After120
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9fbf5a745a12c84c-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.bromite.org/fdroid/repo
ip92.243.18.230
VerificationExceptionJAR signature failed to verify: /tmp/tmpz2xe9_rk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818867
duration0.8216550350189209
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:21:08 GMT
Content-Typeapplication/java-archive
Content-Length14302
Last-ModifiedMon, 19 Dec 2022 21:09:36 GMT
Connectionkeep-alive
ETag"63a0d310-37de"
ServerApache/2.4.9 (Unix)
Accept-Rangesbytes
tlsping
hostfdroid.bromite.org
ip92.243.18.230
addressfdroid.bromite.org:443
connectionTLS
count10
min0.225422094
max0.247486764
average0.22920832959999998
stddev0.006365363901485638
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.fedilab.app/repo
ip65.109.77.92
VerificationExceptionJAR signature failed to verify: /tmp/tmpwg5oht76 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818872
duration0.9890899658203125
status200
TLSTLSv1.3
headers
dateFri, 15 May 2026 04:21:12 GMT
content-typeapplication/java-archive
content-length46323
last-modifiedWed, 13 May 2026 16:48:16 GMT
etag"6a04ab50-b4f3"
accept-rangesbytes
permissions-policymicrophone=(), camera=(), geolocation=(), interest-cohort=()
x-frame-optionsdeny
x-content-type-optionsnosniff
tlsping
hostfdroid.fedilab.app
ip65.109.77.92
addressfdroid.fedilab.app:443
connectionTLS
count10
min0.305632497
max0.332144215
average0.3200019167
stddev0.010122468289598013
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.frostnerd.com/fdroid/repo
ip152.53.101.189
starttime1778818878
duration0.4772360324859619
status404
TLSTLSv1.3
headers
Alt-Svch3=":443"; ma=2592000
Expect-Ctmax-age=86400, enforce
Feature-Policymicrophone 'none'; camera 'none'
Permissions-Policycamera=(), geolocation=(), microphone=(), interest-cohort=()
Referrer-Policysame-origin
ServerCaddy
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection0
DateFri, 15 May 2026 04:21:19 GMT
Content-Length0
tlsping
hostfdroid.frostnerd.com
ip152.53.101.189
addressfdroid.frostnerd.com:443
connectionTLS
count10
min0.306341165
max0.322464713
average0.3128506064
stddev0.0055740390906395725
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.i2pd.xyz/fdroid/repo
ip62.210.85.80
VerificationExceptionJAR signature failed to verify: /tmp/tmp3fq3a3lb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818883
duration0.9753119945526123
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:21:23 GMT
Content-Typeapplication/java-archive
Content-Length38043
Last-ModifiedTue, 28 Apr 2026 18:32:35 GMT
Connectionkeep-alive
ETag"69f0fd43-949b"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.i2pd.xyz
ip62.210.85.80
addressfdroid.i2pd.xyz:443
connectionTLS
count10
min0.3842548
max0.386927496
average0.385750704
stddev0.0008095565263392071
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
cipher preferenceclient
least strengthA
https://fdroid.koyu.space/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)')))
starttime1778818892
duration0.2700519561767578
status200
TLS[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)
headers
Servernginx
DateFri, 15 May 2026 04:21:23 GMT
Content-Typeapplication/java-archive
Content-Length38043
Last-ModifiedTue, 28 Apr 2026 18:32:35 GMT
Connectionkeep-alive
ETag"69f0fd43-949b"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-dev-fdroid/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1778818895
duration0.2790050506591797
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateFri, 15 May 2026 04:21:23 GMT
Content-Typeapplication/java-archive
Content-Length38043
Last-ModifiedTue, 28 Apr 2026 18:32:35 GMT
Connectionkeep-alive
ETag"69f0fd43-949b"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.krombel.de/riot-stable/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-stable/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1778818900
duration0.23174595832824707
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateFri, 15 May 2026 04:21:23 GMT
Content-Typeapplication/java-archive
Content-Length38043
Last-ModifiedTue, 28 Apr 2026 18:32:35 GMT
Connectionkeep-alive
ETag"69f0fd43-949b"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.libretro.com/repo
ip5.9.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpiyi5d597 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818905
duration0.7975258827209473
status200
TLSTLSv1.2
headers
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"1711916461"
Last-ModifiedWed, 18 Nov 2020 10:48:50 GMT
Content-Length5595
DateFri, 15 May 2026 04:21:45 GMT
Serverlighttpd/1.4.35
tlsping
hostfdroid.libretro.com
ip5.9.202.202
addressfdroid.libretro.com:443
connectionTLS
count10
min0.350037236
max0.351744025
average0.3509710082
stddev0.0005393682379306031
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthD
https://fdroid.metatransapps.com/fdroid/repo
ip49.12.195.92
VerificationExceptionJAR signature failed to verify: /tmp/tmpos51sdkx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818920
duration1.0955967903137207
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:22:01 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostfdroid.metatransapps.com
ip49.12.195.92
addressfdroid.metatransapps.com:443
connectionTLS
count10
min0.255649287
max0.258099297
average0.2568400866
stddev0.0007781737002892279
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad9f6d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1778818928
duration0.14612984657287598
status200
TLS[Errno -5] No address associated with hostname
headers
DateFri, 15 May 2026 04:22:01 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.partidopirata.com.ar/fdroid/repo
ip151.236.30.90
VerificationExceptionJAR signature failed to verify: /tmp/tmpg7u7chze The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818929
duration0.824692964553833
status200
TLSTLSv1.3
headers
Servernginx/1.26.1
DateFri, 15 May 2026 04:22:45 GMT
Content-Typeapplication/java-archive
Content-Length5211
Last-ModifiedTue, 07 Jun 2022 01:05:55 GMT
Connectionkeep-alive
ETag"629ea473-145b"
Cache-Controlno-cache
Access-Control-Allow-Origin*.partidopirata.com.ar
Strict-Transport-Securitymax-age=15552000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostfdroid.partidopirata.com.ar
ip151.236.30.90
addressfdroid.partidopirata.com.ar:443
connectionTLS
count10
min0.260983278
max0.298537817
average0.272188931
stddev0.012715979830722125
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.pixelfed.net/fdroid/repo
ip165.227.195.166
VerificationExceptionJAR signature failed to verify: /tmp/tmpzyngu226 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818939
duration0.44226813316345215
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:22:19 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.pixelfed.net
ip165.227.195.166
addressfdroid.pixelfed.net:443
connectionTLS
count10
min0.164432656
max0.216834786
average0.1912055353
stddev0.019326865920733353
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rakshazi.me/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ad8dad0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1778818941
duration0.06030988693237305
status200
TLS[Errno -5] No address associated with hostname
headers
Servernginx
DateFri, 15 May 2026 04:22:19 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rami.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ada2fd0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778818941
duration0.1087028980255127
status200
TLS[Errno -2] Name or service not known
headers
Servernginx
DateFri, 15 May 2026 04:22:19 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.tagesschau.de/repo
ip34.160.251.4
VerificationExceptionJAR signature failed to verify: /tmp/tmp_kz0dz2b The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818941
duration0.5500378608703613
status200
TLSTLSv1.3
headers
Content-Typeapplication/octet-stream
X-GUploader-UploadIDAAVLpEjL9FlhlQWmRYvu3OInhJSiP2CyQhC5jUa2u9dQyxpslHSO_YgvTMBJxxMVGlXUXDIDsFTbjSI
ExpiresFri, 15 May 2026 05:22:22 GMT
DateFri, 15 May 2026 04:22:22 GMT
Cache-Controlpublic, max-age=3600
Last-ModifiedWed, 28 Jan 2026 13:47:36 GMT
ETag"4c77b0d9e118b2dc60a1fb3e767916d7"
x-goog-generation1769608056089937
x-goog-metageneration1
x-goog-stored-content-encodingidentity
x-goog-stored-content-length5407
x-goog-meta-goog-reserved-file-mtime1769608024
x-goog-hashcrc32c=eBN6hw==, md5=THew2eEYstxgofs+dnkW1w==
x-goog-storage-classSTANDARD
Accept-Rangesbytes
Content-Length5407
ServerUploadServer
Alt-Svch3=":443"; ma=2592000,h3-29=":443"; ma=2592000
tlsping
hostfdroid.tagesschau.de
ip34.160.251.4
addressfdroid.tagesschau.de:443
connectionTLS
count10
min0.036063984
max0.039572583
average0.0377612953
stddev0.0012113935558098416
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://fdroid.videlibri.de/repo
ip95.143.172.218
VerificationExceptionJAR signature failed to verify: /tmp/tmp7bxtkohs The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818942
duration0.9070680141448975
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:22:23 GMT
Content-Typeapplication/x-java-archive
Content-Length6633
Connectionkeep-alive
Servernginx
Last-ModifiedWed, 08 Apr 2026 17:58:07 GMT
ETag"19e9-64ef6a46f607d"
Accept-Rangesbytes
X-Xss-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
tlsping
hostfdroid.videlibri.de
ip95.143.172.218
addressfdroid.videlibri.de:443
connectionTLS
count10
min0.386250653
max0.395083007
average0.3903006391
stddev0.0020346418803347363
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroidfamily.codeberg.page/repo
ip217.197.84.141
starttime1778818949
duration0.5185959339141846
status404
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Typetext/html; charset=utf-8
DateFri, 15 May 2026 04:22:29 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
Transfer-Encodingchunked
tlsping
hostfdroidfamily.codeberg.page
ip217.197.84.141
addressfdroidfamily.codeberg.page:443
connectionTLS
count10
min0.324068694
max0.332460132
average0.3265935886
stddev0.0027443484975662397
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://freeyourgadget.codeberg.page/fdroid/repo
ip217.197.84.141
VerificationExceptionJAR signature failed to verify: /tmp/tmpyg05xzes The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818954
duration0.7945477962493896
status200
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Length5686
Content-Typeapplication/java-archive
DateFri, 15 May 2026 04:22:34 GMT
Etag"f380ca943f8eed0fd7a52cc54335b0643e766694"
Last-ModifiedThu, 14 May 2026 22:05:04 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
X-Pages-Cachetrue
tlsping
hostfreeyourgadget.codeberg.page
ip217.197.84.141
addressfreeyourgadget.codeberg.page:443
connectionTLS
count10
min0.311805687
max0.332130878
average0.31949001320000003
stddev0.008196233297047543
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp8_rmeg7d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818959
duration0.6523771286010742
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3658
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id58E2:153FD2:41E6A6:52968F:6A069F8E
Accept-Rangesbytes
DateFri, 15 May 2026 04:22:39 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610070-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778818960.579310,VS0,VE79
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID6f884a8c221c246e62fbf363b29b8dfb9d5721c6
ExpiresFri, 15 May 2026 04:27:39 GMT
Source-Age0
tlsping
hostgithub.com
ip140.82.114.4
addressgithub.com:443
connectionTLS
count10
min0.177245291
max0.263063154
average0.24313146249999998
stddev0.027288820213674802
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo
ip172.65.251.78
VerificationExceptionJAR signature failed to verify: /tmp/tmpalx5jrto The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818961
duration0.5505290031433105
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:22:41 GMT
Content-Typeapplication/octet-stream
Content-Length4082
Connectionkeep-alive
set-cookie_cfuvid=bYoiM0N.2fT6xSZZT865UbrP6dUnj8mFtESMMA.n2ec-1778818961.5036852-1.0.1.1-fvwNVp5dt9Ur4Tl0jZ1oi2iUZ17S.7j9xJo9E13Cafo; HttpOnly; SameSite=None; Secure; Path=/; Domain=gitlab.com
CF-Ray9fbf5ced688aa720-ATL
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Cache-Controlmax-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60
Content-Dispositionattachment
ETag"c9d531bcef16139af514e5e8ceb74ed8"
Servercloudflare
Strict-Transport-Securitymax-age=31536000
VaryAccept, Accept-Encoding
content-security-policybase-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-UtAXkh0SmRqDsJLMw9sHQQ=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
gitlab-lbhaproxy-main-50-lb-gprd
gitlab-svweb-gke-us-east1-c
nel{"max_age": 0}
permissions-policyinterest-cohort=()
ratelimit-limit500
ratelimit-namethrottle_unauthenticated_web
ratelimit-observed1
ratelimit-remaining499
ratelimit-reset1778700300
referrer-policystrict-origin-when-cross-origin
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-gitlab-meta{"correlation_id":"9fb40abacca5c614-FRA","version":"1"}
x-permitted-cross-domain-policiesnone
x-request-id9fb40abacca5c614-FRA
x-runtime0.175950
x-ua-compatibleIE=edge
x-xss-protection1; mode=block
tlsping
hostgitlab.com
ip172.65.251.78
addressgitlab.com:443
connectionTLS
count10
min0.058289648
max0.064737715
average0.06114737369999999
stddev0.0021589388638201903
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://grobox.de/fdroid/repo
ip217.197.86.172
VerificationExceptionJAR signature failed to verify: /tmp/tmpbyxdz9o4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818963
duration1.0574278831481934
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:22:43 GMT
ServerApache
Upgradeh2,h2c
ConnectionUpgrade, Keep-Alive
Last-ModifiedWed, 22 Apr 2026 18:11:34 GMT
ETag"2962-650107642186b"
Accept-Rangesbytes
Content-Length10594
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostgrobox.de
ip217.197.86.172
addressgrobox.de:443
connectionTLS
count10
min0.414282301
max0.430094096
average0.4195817782
stddev0.005421018032144654
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo
ip16.15.252.102
VerificationExceptionJAR signature failed to verify: /tmp/tmps8tf0aa4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818975
duration0.6151421070098877
status200
TLSTLSv1.3
headers
x-amz-id-286/+dCn64RHYSoVS0ThXm9BIrf/nyRSZ7CvjcddJbl6md009qB19DeNzohhvyiFCQG7+1mEJAiahiSHZn00iCLMVDyzG8aBo
x-amz-request-idAVRVDN5DT3MXDZC5
DateFri, 15 May 2026 04:22:56 GMT
Last-ModifiedFri, 31 Jan 2025 07:13:53 GMT
ETag"e3e79c0ad41eb80a8f3bd87727c953d5"
x-amz-server-side-encryptionAES256
x-amz-meta-s3cmd-attrsatime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis
Accept-Rangesbytes
Content-Typeapplication/zip
Content-Length507773
ServerAmazonS3
tlsping
hostguardianproject-wind.s3.amazonaws.com
ip16.15.252.102
addressguardianproject-wind.s3.amazonaws.com:443
connectionTLS
count10
min0.068301067
max0.070445176
average0.06941971829999999
stddev0.0007059161548820159
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
cipher preferenceserver
least strengthA
https://guardianproject.info/fdroid/repo
ip204.19.241.151
VerificationExceptionJAR signature failed to verify: /tmp/tmpn4j0ytuk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818978
duration0.5248439311981201
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:22:58 GMT
ServerApache/2.4.59 (Debian)
Permissions-Policyinterest-cohort=()
Feature-Policyambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none';
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
Strict-Transport-Securitymax-age=31536000
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
VaryUser-Agent
Last-ModifiedWed, 13 May 2026 07:38:20 GMT
ETag"31c75-651ae10551636"
Accept-Rangesbytes
Content-Length203893
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostguardianproject.info
ip204.19.241.151
addressguardianproject.info:443
connectionTLS
count10
min0.085051931
max0.087071161
average0.08601320209999999
stddev0.0006759644999439614
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://haagch.frickel.club/files/fdroid/repo
ip159.195.50.59
VerificationExceptionJAR signature failed to verify: /tmp/tmp8uq31df7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818980
duration0.8641419410705566
status200
TLSTLSv1.3
headers
Servernginx/1.30.0
DateFri, 15 May 2026 04:23:01 GMT
Content-Typeapplication/java-archive
Content-Length7603
Last-ModifiedThu, 06 Jan 2022 03:00:10 GMT
Connectionkeep-alive
ETag"61d65b3a-1db3"
Accept-Rangesbytes
tlsping
hosthaagch.frickel.club
ip159.195.50.59
addresshaagch.frickel.club:443
connectionTLS
count10
min0.239626822
max0.241872464
average0.24075373129999997
stddev0.0007234574431327804
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jak-linux.org/fdroid/repo
ip195.201.138.240
VerificationExceptionJAR signature failed to verify: /tmp/tmp_frqpspc The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818986
duration0.724066972732544
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateFri, 15 May 2026 04:23:07 GMT
Content-Typeapplication/java-archive
Content-Length4052
Last-ModifiedTue, 23 Mar 2021 17:51:53 GMT
Connectionkeep-alive
ETag"605a2ab9-fd4"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostjak-linux.org
ip195.201.138.240
addressjak-linux.org:443
connectionTLS
count10
min0.235441039
max0.23755694
average0.23654493650000002
stddev0.0007319367763916866
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jhass.github.io/insporation/fdroid/repo
ip185.199.110.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpq8b5ud9g The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818993
duration0.39315295219421387
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3006
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedWed, 13 May 2026 10:32:40 GMT
Access-Control-Allow-Origin*
ETag"6a045348-bbe"
expiresFri, 15 May 2026 03:11:19 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id8630:1AF89C:147A01:1613B5:6A068C7F
Accept-Rangesbytes
Age0
DateFri, 15 May 2026 04:23:13 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610042-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1778818993.331196,VS0,VE28
VaryAccept-Encoding
X-Fastly-Request-IDde39548f58aa94ac699b07e7c5822ee64636d7d8
tlsping
hostjhass.github.io
ip185.199.110.153
addressjhass.github.io:443
connectionTLS
count10
min0.056017085
max0.058116032
average0.057110801999999995
stddev0.0007284076427423036
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo
starttime1778818994
duration0.2492809295654297
status403
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:23:14 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
Accept-ChSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
Cf-Mitigatedchallenge
Content-Security-Policydefault-src 'none'; script-src 'nonce-2bTTJZuXPRtLXgBg7IEZfd' 'unsafe-eval' https://challenges.cloudflare.com; script-src-attr 'none'; style-src 'unsafe-inline'; img-src 'self' https://challenges.cloudflare.com; connect-src 'self' https://challenges.cloudflare.com; frame-src 'self' https://challenges.cloudflare.com blob:; child-src 'self' https://challenges.cloudflare.com blob:; worker-src blob:; form-action http: https:; base-uri 'self'
Servercloudflare
Critical-ChSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
Cross-Origin-Embedder-Policyrequire-corp
Nel{"report_to":"cf-nel","success_fraction":0.01,"max_age":604800}
Cross-Origin-Resource-Policysame-origin
Origin-Agent-Cluster?1
Permissions-Policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=(),xr-spatial-tracking=(self)
Referrer-Policysame-origin
Server-Timingchlray;desc="9fbf5dbd5abfc8b3"
X-Content-Type-Optionsnosniff
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=G5rRjMbqBfBpCyvnJnApbjrKQqiYV2sWc2O27c81QPSj5vuw2V33V5eRC8vANlJXH0r4NLmNkvLbItc9%2BV0xCueREindWhHWj%2F9nI2CED1Lu3Ebe9VJG2P1dd1w%3D"}]}
Content-Encodingbr
CF-RAY9fbf5dbd5abfc8b3-ATL
tlsping
hostjulianfairfax.gitlab.io
ip35.185.44.232
addressjulianfairfax.gitlab.io:443
connectionTLS
count10
min0.035918572
max0.069220669
average0.0559623438
stddev0.011726530931299696
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://kaffeemitkoffein.de/fdroid/repo
ip2.241.198.216
VerificationExceptionJAR signature failed to verify: /tmp/tmpm_5et1dy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778818995
duration0.8116350173950195
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:23:16 GMT
ServerApache/2.4.67 (Debian)
Last-ModifiedSun, 22 Mar 2026 18:29:54 GMT
ETag"21d1-64da11aca9690"
Accept-Rangesbytes
Content-Length8657
Strict-Transport-Securitymax-age=15552000
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostkaffeemitkoffein.de
ip2.241.198.216
addresskaffeemitkoffein.de:443
connectionTLS
count10
min0.29193915
max0.394020396
average0.36761521340000003
stddev0.02753776425308008
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://microg.org/fdroid/repo
ip109.230.233.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpqpebomc0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819021
duration0.8348400592803955
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length5938
Content-Typeapplication/java-archive
Etag"di1bri1hosv44ky"
Last-ModifiedFri, 24 Apr 2026 10:49:09 GMT
ServerCaddy
VaryAccept-Encoding
DateFri, 15 May 2026 04:23:42 GMT
tlsping
hostmicrog.org
ip109.230.233.153
addressmicrog.org:443
connectionTLS
count10
min0.260302789
max0.306109135
average0.2850806322
stddev0.015129633283696584
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mobileapp.bitwarden.com/fdroid/repo
ip151.101.1.91
VerificationExceptionJAR signature failed to verify: /tmp/tmps6d1290i The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819027
duration0.4604802131652832
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length6967
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedFri, 08 May 2026 23:49:13 GMT
Access-Control-Allow-Origin*
ETag"69fe7679-1b37"
expiresFri, 15 May 2026 04:22:54 GMT
x-proxy-cacheHIT
X-GitHub-Request-Id569C:15FDF6:F1F51:11A442:6A069D89
Via1.1 varnish, 1.1 varnish
X-Fastly-Request-IDdc9768e693fa0fcc8fea896cdb8933da557eb642
Fastly-Debug-StatesDELIVER
Cache-Controlpublic, max-age=0, must-revalidate
Accept-Rangesbytes
DateFri, 15 May 2026 04:23:47 GMT
Age585
X-Served-Bycache-iad-kcgs7200116-IAD, cache-iad-kiad7000094-IAD
X-CacheMISS, HIT
X-Cache-Hits0, 1
X-TimerS1778819027.133207,VS0,VE1
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Service-Version33
Strict-Transport-Securitymax-age=31536000
tlsping
hostmobileapp.bitwarden.com
ip151.101.1.91
addressmobileapp.bitwarden.com:443
connectionTLS
count10
min0.058180437
max0.060439924
average0.05934435020000001
stddev0.0007695051967373319
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/foss/fdroid/repo
ip185.199.111.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpacc111f6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819028
duration0.5886950492858887
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5822
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedThu, 30 Apr 2026 08:37:32 GMT
Access-Control-Allow-Origin*
ETag"69f314cc-16be"
expiresFri, 01 May 2026 07:19:47 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-IdE99E:7E08A:379FFA:3D0F2F:69F451BB
Accept-Rangesbytes
Age325
DateFri, 15 May 2026 04:23:48 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610065-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1778819029.604559,VS0,VE1
VaryAccept-Encoding
X-Fastly-Request-ID1f5c17b3e9f1b3a0a63ff0ef0d06ab217b288ef0
tlsping
hostmolly.im
ip185.199.111.153
addressmolly.im:443
connectionTLS
count10
min0.057096811
max0.059301415
average0.058191201000000005
stddev0.0007664154482630175
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/repo
ip185.199.111.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpqts4u0ax The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819030
duration0.40318799018859863
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5810
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedThu, 30 Apr 2026 08:37:32 GMT
Access-Control-Allow-Origin*
ETag"69f314cc-16b2"
expiresFri, 15 May 2026 04:33:50 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id1A1A:D78A8:26EC73:29E334:6A069FD4
Accept-Rangesbytes
Age0
DateFri, 15 May 2026 04:23:50 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610087-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819030.118393,VS0,VE23
VaryAccept-Encoding
X-Fastly-Request-ID2feaf382eeb32cace0ab4f6a2c049d542427a08e
tlsping
hostmolly.im
ip185.199.111.153
addressmolly.im:443
connectionTLS
count10
min0.054538754
max0.056655143
average0.05557579389999999
stddev0.0007195360400118185
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://nanolx.org/fdroid/repo
ip87.118.120.112
VerificationExceptionJAR signature failed to verify: /tmp/tmpbu8p4yl7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819031
duration0.8165750503540039
status200
TLSTLSv1.3
headers
Servernginx
DateFri, 15 May 2026 04:23:52 GMT
Content-Typeapplication/java-archive
Content-Length4978
Last-ModifiedFri, 21 May 2021 19:39:16 GMT
Connectionkeep-alive
ETag"60a80c64-1372"
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-Powered-ByPleskLin
Accept-Rangesbytes
tlsping
hostnanolx.org
ip87.118.120.112
addressnanolx.org:443
connectionTLS
count10
min0.245696221
max0.267634872
average0.2503124799
stddev0.007592221353034799
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://onosendai.herokuapp.com/repo
ip3.210.192.5
starttime1778819037
duration0.14516305923461914
status404
TLSTLSv1.2
headers
Content-Length548
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2026-05-15 04:23:57.23012251 +0000 UTC
Serverheroku-router
tlsping
hostonosendai.herokuapp.com
ip3.210.192.5
addressonosendai.herokuapp.com:443
connectionTLS
count10
min0.097783226
max0.099453415
average0.0989749151
stddev0.0004802902326911209
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://pili.qi0.de/fdroid/repo
ip89.244.196.111
VerificationExceptionJAR signature failed to verify: /tmp/tmpb895elik The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819039
duration1.2165019512176514
status200
TLSTLSv1.3
headers
Servernginx/1.30.0
DateFri, 15 May 2026 04:24:00 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostpili.qi0.de
ip89.244.196.111
addresspili.qi0.de:443
connectionTLS
count10
min0.38676239
max0.388926532
average0.3878435154
stddev0.000698559035238561
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://platschi.net/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ac34f90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778819053
duration0.02562999725341797
status200
TLS[Errno -2] Name or service not known
headers
Servernginx/1.30.0
DateFri, 15 May 2026 04:24:00 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo
ip185.199.111.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp06vjn4aa The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819054
duration0.42879700660705566
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4999
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdD070:2CF3F:3C8734:4D4955:6A069FED
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:14 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610055-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819054.218625,VS0,VE46
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID869f2975c15883f53d677bf23ee6ef777648a041
ExpiresFri, 15 May 2026 04:29:14 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.111.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.054261918
max0.056168099
average0.0551550081
stddev0.0006594754468159443
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo
ip185.199.111.133
starttime1778819055
duration0.1119699478149414
status404
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length14
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
Content-Typetext/plain; charset=utf-8
X-GitHub-Request-IdBE3A:3AFEF9:3F30E3:4FF154:6A069FE8
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:15 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610030-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819056.545916,VS0,VE39
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDc8f05093c4eaf16439e811a0e214352604bac461
ExpiresFri, 15 May 2026 04:29:15 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.054548318
max0.056582823
average0.055473330799999984
stddev0.0006998089941560917
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo
ip185.199.111.133
VerificationExceptionJAR signature failed to verify: /tmp/tmppo5b7e_c The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819056
duration0.42803502082824707
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length8579
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdFC50:27364C:4052E4:510D18:6A069FEF
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:16 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610086-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819057.530449,VS0,VE49
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID5c045563d82f695426ba8f3e26c23a435f10e78a
ExpiresFri, 15 May 2026 04:29:16 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.054489056
max0.056739537
average0.0556187301
stddev0.0007850373992301832
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo
ip185.199.109.133
VerificationExceptionJAR signature failed to verify: /tmp/tmplzhy4vii The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819057
duration0.4429798126220703
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length13065
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"77e09692129bf82b93d5ddfe627beed901523bb46b1f3129033682b5cc601288"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id5402:41E3E:3E4B7D:4D8B77:6A0696F9
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:17 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610086-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1778819058.838894,VS0,VE46
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID5a254ddd062344e1e54a936c4f6ff00c988d7ee2
ExpiresFri, 15 May 2026 04:29:17 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.054410574
max0.056665622
average0.0555555906
stddev0.000758609667200886
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpjgvhj70z The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819059
duration0.45110511779785156
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length10914
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"a879b3afcafe1168404bcaf75c9f873d8b623dfa8e3f6abbc317d0b7e430a811"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id6F18:18E6AE:416DFB:52368B:6A069FF2
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:19 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610029-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819059.169705,VS0,VE55
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID71c6df7a04bcbd149b743c9851d5f9cee194be15
ExpiresFri, 15 May 2026 04:29:19 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.054699843
max0.056979816
average0.05572506399999999
stddev0.0007378546809253176
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp0ivdu6n4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819060
duration0.41703081130981445
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length7486
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"f7c26f0c9cf0731b64f2003450f9e67d041ceb33f4dc41f704abae4f3a0ee534"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdC4D0:28AC08:3AAA7E:4B6817:6A069FF4
Accept-Rangesbytes
DateFri, 15 May 2026 04:24:20 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610054-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1778819061.505576,VS0,VE43
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID3f5db457162b184f89a08e68e898766f7c206258
ExpiresFri, 15 May 2026 04:29:20 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.111.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.055815357
max0.058051651
average0.0568465075
stddev0.0007289824550620194
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://releases.nailyk.fr/repo
ip144.76.164.24
VerificationExceptionJAR signature failed to verify: /tmp/tmprabydv_2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819061
duration0.8532469272613525
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:24:22 GMT
ServerApache
Last-ModifiedFri, 15 May 2026 02:41:31 GMT
ETag"1cc9-651d226867bdf"
Accept-Rangesbytes
Content-Length7369
Content-Typeapplication/java-archive
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
tlsping
hostreleases.nailyk.fr
ip144.76.164.24
addressreleases.nailyk.fr:443
connectionTLS
count10
min0.304290121
max0.370612334
average0.3511604542000001
stddev0.01791700465166436
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://releases.threema.ch/fdroid/repo
ip203.56.112.72
VerificationExceptionJAR signature failed to verify: /tmp/tmp4xap6heb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819066
duration0.7798061370849609
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:24:27 GMT
ServerApache
Access-Control-Allow-Origin*
Last-ModifiedMon, 27 Apr 2026 08:36:53 GMT
ETag"1870-6506d044b4f77"
Accept-Rangesbytes
Content-Length6256
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
hostreleases.threema.ch
ip203.56.112.72
addressreleases.threema.ch:443
connectionTLS
count10
min0.393281466
max0.512899658
average0.47994238870000006
stddev0.03595040815791064
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://repo.kuschku.de/repo
ip148.251.132.182
VerificationExceptionJAR signature failed to verify: /tmp/tmpvmp5rwcy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819073
duration1.0927791595458984
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:24:34 GMT
Content-Typeapplication/java-archive
Content-Length8975
Connectionkeep-alive
Last-ModifiedFri, 15 May 2026 04:16:58 GMT
ETag"6a069e3a-230f"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlsping
hostrepo.kuschku.de
ip148.251.132.182
addressrepo.kuschku.de:443
connectionTLS
count10
min0.386186294
max0.388185841
average0.3870929872
stddev0.000727280755123606
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.mobilsicher.de/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x785d0ac4fc90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1778819079
duration0.220534086227417
status200
TLS[Errno -2] Name or service not known
headers
DateFri, 15 May 2026 04:24:34 GMT
Content-Typeapplication/java-archive
Content-Length8975
Connectionkeep-alive
Last-ModifiedFri, 15 May 2026 04:16:58 GMT
ETag"6a069e3a-230f"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.netsyms.com/fdroid/repo
ip172.67.148.121
VerificationExceptionJAR signature failed to verify: /tmp/tmpr0n3f3ok The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819080
duration0.41022300720214844
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:24:40 GMT
Content-Typeapplication/java-archive
Content-Length11099
Connectionkeep-alive
Servercloudflare
VaryUser-Agent
cf-cache-statusHIT
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=7U9EbtVRfniFTd0%2F%2Brwfw%2FHQFCWk62MW3ndGcRuQFjKVZFplr%2Fl91%2FO0SxJpXIucBvzQluyEp%2B%2Bq3hex2ntTgrqXcFvYIAaoYQYraEb3HJDnsk7XDKt6Cr6VuP%2BwPVhH1U4V"}]}
Last-ModifiedSat, 18 Nov 2023 06:40:11 GMT
etag"2b5b-60a67864e3f1c"
Accept-Rangesbytes
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Permissions-Policyinterest-cohort=()
X-Content-Type-Optionsnosniff
Age1907
Cache-Controlmax-age=14400
CF-RAY9fbf5fd39e6853b1-ATL
alt-svch3=":443"; ma=86400
tlsping
hostrepo.netsyms.com
ip172.67.148.121
addressrepo.netsyms.com:443
connectionTLS
count10
min0.141529251
max0.203626162
average0.1802445777
stddev0.0241794390468232
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo
starttime1778819081
duration0.2534301280975342
status403
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:24:41 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
Accept-ChSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
Cf-Mitigatedchallenge
Content-Security-Policydefault-src 'none'; script-src 'nonce-oZcve7969qr3eYMRTbuzyj' 'unsafe-eval' https://challenges.cloudflare.com; script-src-attr 'none'; style-src 'unsafe-inline'; img-src 'self' https://challenges.cloudflare.com; connect-src 'self' https://challenges.cloudflare.com; frame-src 'self' https://challenges.cloudflare.com blob:; child-src 'self' https://challenges.cloudflare.com blob:; worker-src blob:; form-action http: https:; base-uri 'self'
Servercloudflare
Critical-ChSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
Cross-Origin-Embedder-Policyrequire-corp
Nel{"report_to":"cf-nel","success_fraction":0.01,"max_age":604800}
Cross-Origin-Resource-Policysame-origin
Origin-Agent-Cluster?1
Permissions-Policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=(),xr-spatial-tracking=(self)
Referrer-Policysame-origin
Server-Timingchlray;desc="9fbf5fddcc728bbb"
X-Content-Type-Optionsnosniff
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=vf15qtUq4Eo9QOArf4c6YExUjRBrBgQ1GhVR03eYNuV5byXCJthGaAlxnbQdn1Aui3LQIcX2TI8nSFeTTJ6XMtUYQbTLnDDAeE7tPuYqMrPRecvrBm%2B5cAlPBuI%3D"}]}
Content-Encodingbr
CF-RAY9fbf5fddcc728bbb-ATL
tlsping
hostrfc2822.gitlab.io
ip35.185.44.232
addressrfc2822.gitlab.io:443
connectionTLS
count10
min0.035816916
max0.042572796
average0.0379662985
stddev0.0019099246243683683
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://s2.spiritcroc.de/fdroid/repo
ip23.88.107.207
VerificationExceptionJAR signature failed to verify: /tmp/tmpzlc2ql0u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819082
duration0.8969731330871582
status200
TLSTLSv1.2
headers
Servernginx
DateFri, 15 May 2026 04:24:42 GMT
Content-Typeapplication/java-archive
Content-Length11450
Last-ModifiedSat, 02 May 2026 08:47:54 GMT
Connectionkeep-alive
ETag"69f5ba3a-2cba"
Strict-Transport-Securitymax-age=15768000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hosts2.spiritcroc.de
ip23.88.107.207
addresss2.spiritcroc.de:443
connectionTLS
count10
min0.350620052
max0.366805014
average0.35452283009999996
stddev0.005189245819301246
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://s3.amazonaws.com/storymaker/fdroid/repo
ip54.231.138.40
starttime1778819089
duration0.1293351650238037
status403
TLSTLSv1.3
headers
x-amz-request-idQ4KZN936YC9BCGJK
x-amz-id-2rkgrZubQkLyYjnlkGblZ+uIof/yRLstLLApp1D7tdF3gAfU0GUKB47HqOHvcAYPnB+JqTe4VPL8=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateFri, 15 May 2026 04:24:48 GMT
ServerAmazonS3
tlsping
hosts3.amazonaws.com
ip54.231.138.40
addresss3.amazonaws.com:443
connectionTLS
count10
min0.070308769
max0.072643947
average0.0713880412
stddev0.0007338530589138128
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://secfirst.org/fdroid/repo
ConnectTimeoutHTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x785d0ac11ad0>, 'Connection to secfirst.org timed out. (connect timeout=60)'))
starttime1778819091
duration60.16872787475586
status403
TLS[Errno 110] Connection timed out
headers
x-amz-request-idQ4KZN936YC9BCGJK
x-amz-id-2rkgrZubQkLyYjnlkGblZ+uIof/yRLstLLApp1D7tdF3gAfU0GUKB47HqOHvcAYPnB+JqTe4VPL8=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateFri, 15 May 2026 04:24:48 GMT
ServerAmazonS3
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://static.cryptomator.org/android/fdroid/repo
ip172.67.132.219
VerificationExceptionJAR signature failed to verify: /tmp/tmpkh5wyk1y The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819295
duration0.934114933013916
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:28:15 GMT
Content-Typeapplication/java-archive
Content-Length6214
Connectionkeep-alive
Accept-Rangesbytes
etag"bf37e5e0bcc305c36cc999a20a074f58"
last-modifiedThu, 12 Mar 2026 14:27:26 GMT
x-amz-id-2txg75eff0b4d14942fca222-006a06a0df
x-amz-request-idtxg75eff0b4d14942fca222-006a06a0df
Cache-Controlmax-age=28800
cf-cache-statusMISS
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=k683RvA5ZsEVCoJDD10dh4n0tGxTdsbb4DIj1rJGox%2F500u0TaEyv%2B3fGnmKJve%2Br7PBzuIshMvR5dYC7u8IJdXZ35cb9J4IlYAXZE7CgSjsqp%2FaHCfTCXp3On5%2B0tdRhjlaTVS5VTwz"}]}
Servercloudflare
CF-RAY9fbf65131e8b74ee-ATL
alt-svch3=":443"; ma=86400
tlsping
hoststatic.cryptomator.org
ip172.67.132.219
addressstatic.cryptomator.org:443
connectionTLS
count10
min0.130770033
max0.2022719
average0.17883968739999997
stddev0.02395491126586207
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://store.nethunter.com/repo
ip45.33.83.228
VerificationExceptionJAR signature failed to verify: /tmp/tmp4d8e5rpf The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819297
duration0.5017540454864502
status200
TLSTLSv1.2
headers
Servernginx
DateFri, 15 May 2026 04:28:17 GMT
Content-Typeapplication/java-archive
Content-Length45519
Last-ModifiedWed, 15 Apr 2026 13:01:41 GMT
Connectionkeep-alive
ETag"69df8c35-b1cf"
Accept-Rangesbytes
tlsping
hoststore.nethunter.com
ip45.33.83.228
addressstore.nethunter.com:443
connectionTLS
count10
min0.148047601
max0.156435831
average0.1513837582
stddev0.0024290958867798007
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://submarine.strangled.net/fdroid/repo
ip178.70.188.190
VerificationExceptionJAR signature failed to verify: /tmp/tmpr17ondzn The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819298
duration0.8458640575408936
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:28:19 GMT
ServerApache/2.4.29 (Ubuntu)
Last-ModifiedSun, 01 Dec 2024 22:35:25 GMT
ETag"1087-6283d0c58d7a9"
Accept-Rangesbytes
Content-Length4231
Access-Control-Allow-Origin*
Access-Control-Allow-Headersorigin, x-requested-with, content-type
Access-Control-Allow-MethodsPUT, GET, POST, DELETE, OPTIONS
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostsubmarine.strangled.net
ip178.70.188.190
addresssubmarine.strangled.net:443
connectionTLS
count10
min0.322198596
max0.324549441
average0.3234200859
stddev0.0007712454864410439
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmp87sn2c2h The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819316
duration0.9612269401550293
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateFri, 15 May 2026 04:28:36 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostwww.anonymousmessenger.ly
ip185.176.41.167
addresswww.anonymousmessenger.ly:443
connectionTLS
count10
min0.31573471
max0.346063368
average0.3346828298
stddev0.011554392003368483
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.collaboraoffice.com/downloads/fdroid/repo
ip157.90.115.48
VerificationExceptionJAR signature failed to verify: /tmp/tmp4mbjrf69 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819324
duration0.6941869258880615
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:28:45 GMT
ServerApache/2.4.67 (Debian)
X-Content-Type-Optionsnosniff
Strict-Transport-Securitymax-age=31536000; includeSubdomains; preload
Referrer-Policystrict-origin-when-cross-origin
Last-ModifiedThu, 26 Mar 2026 13:33:42 GMT
ETag"11a7-64ded6ed3dc30"
Accept-Rangesbytes
Content-Length4519
x-robots-tagnoindex
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.collaboraoffice.com
ip157.90.115.48
addresswww.collaboraoffice.com:443
connectionTLS
count10
min0.261426161
max0.264154896
average0.2628004636
stddev0.0009283739147564596
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.cromite.org/fdroid/repo
ip89.46.108.70
starttime1778819330
duration0.6224420070648193
status502
TLSTLSv1.3
headers
Serveraruba-proxy
DateFri, 15 May 2026 04:28:50 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
ETagW/"69b9631d-1bf25"
Alt-Svch3=":443"; ma=86400
tlsping
hostwww.cromite.org
ip89.46.108.70
addresswww.cromite.org:443
connectionTLS
count10
min0.261326974
max0.264343134
average0.26269655940000003
stddev0.0009865325566694885
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.droidware.info/fdroid/repo
ip104.18.10.107
starttime1778819335
duration0.27584195137023926
status403
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:28:55 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Varyaccept-encoding
Content-Encodinggzip
Servercloudflare
CF-RAY9fbf660f4df63110-ATL
tlsping
hostwww.droidware.info
ip172.67.157.223
addresswww.droidware.info:443
connectionTLS
count10
min0.136102499
max0.19955769
average0.17730442470000002
stddev0.01950462577117451
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.ma-nic.de/fdroid/repo
ip109.250.137.213
VerificationExceptionJAR signature failed to verify: /tmp/tmp6wgxv2wq The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1778819336
duration0.7726528644561768
status200
TLSTLSv1.3
headers
DateFri, 15 May 2026 04:28:57 GMT
ServerApache/2.4.66 (Debian)
Last-ModifiedTue, 06 Jun 2023 16:06:08 GMT
ETag"1094-5fd7832786fe5"
Accept-Rangesbytes
Content-Length4244
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.ma-nic.de
ip109.250.137.213
addresswww.ma-nic.de:443
connectionTLS
count10
min0.326886261
max0.393221299
average0.3686719934
stddev0.020128723250641373
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA