Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/repo-monitor

https://f-droid.org/repo
ip37.218.243.72
VerificationExceptionJAR signature failed to verify: /tmp/tmp50in1bvn The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066152
duration2.1844279766082764
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:09:12 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
ETag"b29904-64d6f7c25b1fe"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip37.218.243.72
addressf-droid.org:443
connectionTLS
count10
min0.229029802
max0.231632431
average0.23033764999999998
stddev0.0008774174331430858
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip91.224.148.45
VerificationExceptionJAR signature failed to verify: /tmp/tmpb5v2nztu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066006
duration2.5120530128479004
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:06:46 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip91.224.148.45
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.235251456
max0.237536116
average0.236412961
stddev0.0007711965475058879
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmpg202z901 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065787
duration2.7972829341888428
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateSat, 21 Mar 2026 04:03:07 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.257985134
max0.2605641
average0.2591536644
stddev0.0008441704210133413
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmpn69aipym The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066034
duration2.484013795852661
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:07:15 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
ETag"b29904-64d6f7c1937c0"
Accept-Rangesbytes
Content-Length11704580
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.491381965
max0.577318396
average0.535030147
stddev0.03227344668655271
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.gwdg.de/pub/android/fdroid/repo
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmp3sv0yxh4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065804
duration2.699068069458008
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 21 Mar 2026 04:03:24 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.381615537
max0.453102501
average0.41311984009999997
stddev0.025863984365881984
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.251
VerificationExceptionJAR signature failed to verify: /tmp/tmp0hwa1_nf The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065812
duration2.610476016998291
status200
TLSTLSv1.3
headers
servernginx
dateSat, 21 Mar 2026 04:03:32 GMT
content-typeapplication/java-archive
content-length11704580
last-modifiedFri, 20 Mar 2026 07:17:59 GMT
etag"69bcf4a7-b29904"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.251
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.259986403
max0.262678113
average0.261177404
stddev0.000917260091069591
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip51.159.104.35
VerificationExceptionJAR signature failed to verify: /tmp/tmphog2j9fj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066023
duration2.2501778602600098
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11704580
Content-Typeapplication/java-archive
Etag"dh7fcr1c9ou86yvb8"
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Referrer-Policystrict-origin-when-cross-origin
ServerCaddy
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
DateSat, 21 Mar 2026 04:07:03 GMT
tlsping
hostmirror.cyberbits.eu
ip51.159.104.35
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.271267465
max0.303745462
average0.2867155286
stddev0.01157409448811491
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.eu.ossplanet.net/fdroid/repo
ip65.21.121.21
VerificationExceptionJAR signature failed to verify: /tmp/tmpq6j64ew9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065833
duration2.4978299140930176
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateSat, 21 Mar 2026 04:03:53 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostmirror.eu.ossplanet.net
ip65.21.121.21
addressmirror.eu.ossplanet.net:443
connectionTLS
count10
min0.330577523
max0.338106103
average0.3335074581
stddev0.00262584851844014
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmpzo1pucny The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065839
duration1.832421064376831
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateSat, 21 Mar 2026 04:04:00 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
ExpiresSat, 21 Mar 2026 04:09:00 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.170910363
max0.173350922
average0.17204977049999998
stddev0.0008373184314967923
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip110.172.148.96
VerificationExceptionJAR signature failed to verify: /tmp/tmptbunf9jy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065844
duration4.7188050746917725
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11704580
Content-Typeapplication/java-archive
Etag"dh7fcr1c9ou86yvb8"
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
ServerCaddy
VaryAccept-Encoding
DateSat, 21 Mar 2026 04:04:06 GMT
tlsping
hostmirror.kumi.systems
ip110.172.148.96
addressmirror.kumi.systems:443
connectionTLS
count10
min0.397934873
max0.399223384
average0.3985756256
stddev0.00039441506964344434
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.level66.network/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmpq2fk3dpk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065854
duration2.8533480167388916
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:04:15 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.network
ip141.98.136.67
addressmirror.level66.network:443
connectionTLS
count10
min0.233183165
max0.235479554
average0.2343423314
stddev0.0008101427609005974
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpg3ndjkuy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065865
duration37.34693789482117
status200
TLS[Errno 104] Connection reset by peer
headers
Servernginx/1.18.0 (Ubuntu)
DateSat, 21 Mar 2026 04:04:57 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirrors.dotsrc.org/fdroid/repo
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmp757n5szd The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065943
duration4.103158950805664
status200
TLSTLSv1.3
headers
Servernginx/1.28.0
DateSat, 21 Mar 2026 04:05:44 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.259831063
max0.262359592
average0.2611093728
stddev0.0008698976280849202
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo
ip50.117.120.66
VerificationExceptionJAR signature failed to verify: /tmp/tmpav84jx16 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065959
duration1.8620750904083252
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateSat, 21 Mar 2026 04:06:00 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip50.117.120.66
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.208823602
max0.242048136
average0.22480027240000006
stddev0.012936868466457791
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpbhz8s715 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066052
duration1.3448941707611084
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:07:32 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.251
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.160610732
max0.168892311
average0.16381174459999998
stddev0.0030088684604315337
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.init7.net/fdroid/repo
ip109.202.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpjah5a88u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065967
duration2.3398630619049072
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateSat, 21 Mar 2026 04:06:08 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostmirror.init7.net
ip109.202.202.202
addressmirror.init7.net:443
connectionTLS
count10
min0.248767909
max0.251766209
average0.25021215999999996
stddev0.001015324057584079
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.freedif.org/fdroid/repo
ip132.147.107.5
VerificationExceptionJAR signature failed to verify: /tmp/tmppz9283re The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774065992
duration4.174931049346924
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:06:33 GMT
Content-Typeapplication/java-archive
Content-Length11704580
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
Connectionkeep-alive
ETag"69bcf4a7-b29904"
Accept-Rangesbytes
tlsping
hostmirror.freedif.org
ip132.147.107.5
addressmirror.freedif.org:443
connectionTLS
count10
min0.506675009
max0.544446427
average0.5265817713000001
stddev0.01406256667237416
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
starttime1774066029
duration0.4719719886779785
status404
TLSTLSv1.3
headers
Servernginx/1.29.5
DateSat, 21 Mar 2026 04:07:09 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.25595785
max0.26427138
average0.25809825599999997
stddev0.0022641076845468277
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf0aa750>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066034
duration0.1532580852508545
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.29.5
DateSat, 21 Mar 2026 04:07:09 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.jarsilio.com/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf0a86d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066043
duration0.1408238410949707
status200
TLS[Errno -2] Name or service not known
headers
DateSat, 21 Mar 2026 04:07:15 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedFri, 20 Mar 2026 07:17:59 GMT
ETag"b29904-64d6f7c1937c0"
Accept-Rangesbytes
Content-Length11704580
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip64.50.236.52
starttime1774066044
duration0.21648693084716797
status404
TLSTLSv1.2
headers
DateSat, 21 Mar 2026 04:07:24 GMT
ServerApache
Content-Length261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip64.50.236.52
addressftp.osuosl.org:443
connectionTLS
count10
min0.118614137
max0.123539636
average0.12106138120000001
stddev0.0016623729801049961
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip205.209.125.10
starttime1774066047
duration0.22261309623718262
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:07:28 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip205.209.125.10
addressmirror.scd31.com:443
connectionTLS
count10
min0.09239393
max0.095089559
average0.09370292910000001
stddev0.0008793059565248547
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf0ab790>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066051
duration0.10543608665466309
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:07:28 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://android.izzysoft.de/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpchfua_xt jarsigner: java.util.zip.ZipException: zip END header not found
starttime1774066055
duration0.8497109413146973
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:07:35 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresMon, 20 Apr 2026 04:07:35 GMT
VaryAccept-Encoding
Content-Encodingbr
Content-Length1873
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlsping
hostandroid.izzysoft.de
ip144.76.109.58
addressandroid.izzysoft.de:443
connectionTLS
count10
min0.956668461
max1.077670138
average1.0238382549999998
stddev0.054800991589755925
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmp3q92em4t The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066061
duration0.8436360359191895
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateSat, 21 Mar 2026 04:07:41 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostanonymousmessenger.ly
ip185.176.41.167
addressanonymousmessenger.ly:443
connectionTLS
count10
min0.329451538
max0.363441925
average0.35254565080000005
stddev0.01081397572014078
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://app.futo.org/fdroid/repo
ip159.65.228.96
VerificationExceptionJAR signature failed to verify: /tmp/tmpuso32_uo The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066069
duration0.5034148693084717
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:07:50 GMT
Content-Typeapplication/java-archive
Content-Length4753
Last-ModifiedMon, 16 Feb 2026 11:51:01 GMT
Connectionkeep-alive
ETag"699304a5-1291"
Accept-Rangesbytes
tlsping
hostapp.futo.org
ip159.65.228.96
addressapp.futo.org:443
connectionTLS
count10
min0.113510568
max0.147710704
average0.13585908740000002
stddev0.010220214517872007
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://app.usb0.net/repo
ip104.21.6.28
starttime1774066072
duration0.27573609352111816
status404
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:07:52 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Servercloudflare
Cache-Controlmax-age=14400
cf-cache-statusEXPIRED
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=j97uiMAjD6SDlvKArU4CYnSFFZPhPyQNnhLmBCrOIBtnPMhpYwmMwbs00cdvFQRnbiR4CW9IPf9QbDIkzUYRIdeHN8%2BtKKiI%2FvjVbA%3D%3D"}]}
Content-Encodingbr
CF-RAY9dfa179a4c5fafe7-ATL
alt-svch3=":443"; ma=86400
tlsping
hostapp.usb0.net
ip104.21.6.28
addressapp.usb0.net:443
connectionTLS
count10
min0.159846556
max0.21072897
average0.19273327899999998
stddev0.01713762186397469
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://apt.izzysoft.de/fdroid/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmppa5g832j The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066073
duration2.227105140686035
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:07:54 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Last-ModifiedFri, 20 Mar 2026 19:09:19 GMT
ETag"338258-64d796c0b375a"
Accept-Rangesbytes
Content-Length3375704
Cache-Controlmax-age=86400
ExpiresSun, 22 Mar 2026 04:07:54 GMT
VaryAccept-Encoding
Keep-Alivetimeout=3, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostapt.izzysoft.de
ip144.76.109.58
addressapt.izzysoft.de:443
connectionTLS
count10
min0.243167314
max0.245472974
average0.24434360100000005
stddev0.0007852856118260462
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://archive.newpipe.net/fdroid/repo
ip159.69.138.33
VerificationExceptionJAR signature failed to verify: /tmp/tmp_kt13ne5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066080
duration0.9443960189819336
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:08:00 GMT
Content-Typeapplication/java-archive
Content-Length27266
Last-ModifiedSun, 08 Mar 2026 20:04:19 GMT
Connectionkeep-alive
ETag"69add643-6a82"
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin
Permissions-Policyinterest-cohort=()
Content-Security-Policydefault-src 'self'; object-src 'none'; block-all-mixed-content
Accept-Rangesbytes
tlsping
hostarchive.newpipe.net
ip159.69.138.33
addressarchive.newpipe.net:443
connectionTLS
count10
min0.246419522
max0.249091402
average0.247751958
stddev0.000881515468306707
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo
ip3.166.160.76
VerificationExceptionThe repository's fingerprint does not match.
starttime1774066103
duration1.1357650756835938
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length156443
Connectionkeep-alive
DateSat, 21 Mar 2026 04:08:24 GMT
Last-ModifiedThu, 19 Mar 2026 14:55:58 GMT
ETag"b4c088f1996e9aee2650dd62bb7ce13a"
x-amz-server-side-encryptionAES256
x-amz-version-iddiN21eUv.QVHbupyJtVjLMTmJZZ0z.WW
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 f2b25186ddd6c6eba84de9b968deb3f0.cloudfront.net (CloudFront)
X-Amz-Cf-PopMIA50-P3
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-Idw9NIdV1_QlSkeGDVaVHHGT7iHizoyFIkZdyx4zFMZlkcu-n5o8SWkw==
tlsping
hostbrave-browser-apk-nightly.s3.brave.com
ip3.166.160.76
addressbrave-browser-apk-nightly.s3.brave.com:443
connectionTLS
count10
min0.064022417
max0.066676538
average0.0653276616
stddev0.0009039282034428603
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-release.s3.brave.com/fdroid/repo
ip54.230.79.35
VerificationExceptionThe repository's fingerprint does not match.
starttime1774066105
duration0.9149229526519775
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length45209
Connectionkeep-alive
DateSat, 21 Mar 2026 04:08:27 GMT
Last-ModifiedThu, 19 Mar 2026 20:27:35 GMT
ETag"93a23fad6518a250f78988e4c837d800"
x-amz-server-side-encryptionAES256
x-amz-version-idK33DSl70e4p4YdWQYXWHCmrJA1jizECz
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 1ca022f41313316c410ac09d970dc626.cloudfront.net (CloudFront)
X-Amz-Cf-PopATL59-P18
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-IdFHTx0gRfBa6iXNbiCenXvmBacsgSW6qNrbwVpVYX5IYkg7R50jy2AQ==
tlsping
hostbrave-browser-apk-release.s3.brave.com
ip54.230.79.35
addressbrave-browser-apk-release.s3.brave.com:443
connectionTLS
count10
min0.060695548
max0.063182188
average0.061942575499999986
stddev0.0008628253924950557
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://breezy-weather.github.io/fdroid-repo/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpadxtj5vg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066107
duration0.4992070198059082
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length18982
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedSat, 21 Mar 2026 02:24:25 GMT
Access-Control-Allow-Origin*
Strict-Transport-Securitymax-age=31556952
ETag"69be0159-4a26"
expiresSat, 21 Mar 2026 02:50:32 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-IdD52C:1B73:14C7DE:180BF7:69BE051F
Accept-Rangesbytes
Age310
DateSat, 21 Mar 2026 04:08:27 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610075-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1774066108.953690,VS0,VE1
VaryAccept-Encoding
X-Fastly-Request-ID69966831eb963a11e962fe384ac92ccae842fee6
tlsping
hostbreezy-weather.github.io
ip185.199.108.153
addressbreezy-weather.github.io:443
connectionTLS
count10
min0.058113468
max0.060511557
average0.05935071030000001
stddev0.0008165852659921132
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://briarproject.org/fdroid/repo
ip157.90.23.135
VerificationExceptionJAR signature failed to verify: /tmp/tmpu385nbxg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066109
duration0.734889030456543
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateSat, 21 Mar 2026 04:05:56 GMT
Content-Typeapplication/java-archive
Content-Length4280
Last-ModifiedThu, 12 Mar 2026 16:40:05 GMT
Connectionkeep-alive
ETag"69b2ec65-10b8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostbriarproject.org
ip157.90.23.135
addressbriarproject.org:443
connectionTLS
count10
min0.24019614
max0.242810131
average0.2414937235
stddev0.0008696759844920703
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroidclassic/fdroid/repo
ip176.9.145.28
VerificationExceptionThe repository's fingerprint does not match.
starttime1774066114
duration0.92551589012146
status200
TLSTLSv1.3
headers
Servernginx/1.29.5
DateSat, 21 Mar 2026 04:08:34 GMT
Content-Typeapplication/java-archive
Content-Length9793
Last-ModifiedWed, 08 Mar 2023 23:22:24 GMT
Connectionkeep-alive
ETag"640918b0-2641"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.25451825
max0.25799166
average0.256267769
stddev0.0012060300257161968
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpm5p0vsjq The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066119
duration0.4191410541534424
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length6922
Content-Typeapplication/java-archive
Etag"62b0d15e2e02aeed5da75f2160a9b3cef04234af5822d7ee9160393929eac29f"
ExpiresSat, 21 Mar 2026 04:18:39 UTC
Last-ModifiedSat, 21 Mar 2026 04:01:23 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KM799D5DRJVJ7D5FGKZHM285
DateSat, 21 Mar 2026 04:08:39 GMT
tlsping
hostcalyxos.gitlab.io
ip35.185.44.232
addresscalyxos.gitlab.io:443
connectionTLS
count10
min0.039767859
max0.044215528
average0.042197509499999994
stddev0.0013817049176304789
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/fdroid/repo
ip212.102.55.183
VerificationExceptionJAR signature failed to verify: /tmp/tmp9j5znlnm The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066120
duration1.1659250259399414
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:08:41 GMT
Content-Typeapplication/java-archive
Content-Length170083
Connectionkeep-alive
Last-ModifiedFri, 20 Mar 2026 23:17:11 GMT
Cache-Controlmax-age=0
ExpiresSat, 21 Mar 2026 04:08:41 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk+kXjPDD0tzcE4l4cjw05RORsif7UjY44k1fQiqHl+Uyr5qCVtl241o
X-77-NZT-Rayacb64906321bce01c919be6969d1d203
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmilanIT
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip212.102.55.183
addresscdn.kde.org:443
connectionTLS
count10
min0.302639438
max0.326875177
average0.3152170456
stddev0.007653659132779605
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/stable-releases/fdroid/repo
ip212.102.55.183
VerificationExceptionJAR signature failed to verify: /tmp/tmpnbl_xjta The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066129
duration1.0033838748931885
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:08:49 GMT
Content-Typeapplication/java-archive
Content-Length79844
Connectionkeep-alive
Last-ModifiedSun, 15 Mar 2026 10:37:40 GMT
Cache-Controlmax-age=0
ExpiresSat, 21 Mar 2026 04:08:49 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk1yxz96OD9PgBecVm4raxd12IIyCfpO1SghtVywClVCgTzEMTqIDmKA
X-77-NZT-Rayacb649068711474cd119be69a8a1411a
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmilanIT
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip212.102.55.183
addresscdn.kde.org:443
connectionTLS
count10
min0.27683749
max0.321419368
average0.3034024585
stddev0.016863727486188945
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/experimental/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1774066137
duration0.329456090927124
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateSat, 21 Mar 2026 04:08:49 GMT
Content-Typeapplication/java-archive
Content-Length79844
Connectionkeep-alive
Last-ModifiedSun, 15 Mar 2026 10:37:40 GMT
Cache-Controlmax-age=0
ExpiresSat, 21 Mar 2026 04:08:49 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk1yxz96OD9PgBecVm4raxd12IIyCfpO1SghtVywClVCgTzEMTqIDmKA
X-77-NZT-Rayacb649068711474cd119be69a8a1411a
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmilanIT
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://eutopia.cz/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1774066142
duration0.2520909309387207
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateSat, 21 Mar 2026 04:08:49 GMT
Content-Typeapplication/java-archive
Content-Length79844
Connectionkeep-alive
Last-ModifiedSun, 15 Mar 2026 10:37:40 GMT
Cache-Controlmax-age=0
ExpiresSat, 21 Mar 2026 04:08:49 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk1yxz96OD9PgBecVm4raxd12IIyCfpO1SghtVywClVCgTzEMTqIDmKA
X-77-NZT-Rayacb649068711474cd119be69a8a1411a
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmilanIT
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.i2p.io/repo
SSLErrorHTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by SSLError(SSLZeroReturnError(6, 'TLS/SSL connection has been closed (EOF) (_ssl.c:992)')))
starttime1774066147
duration0.4516639709472656
status200
TLSTLS/SSL connection has been closed (EOF) (_ssl.c:992)
headers
DateSat, 21 Mar 2026 04:08:49 GMT
Content-Typeapplication/java-archive
Content-Length79844
Connectionkeep-alive
Last-ModifiedSun, 15 Mar 2026 10:37:40 GMT
Cache-Controlmax-age=0
ExpiresSat, 21 Mar 2026 04:08:49 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk1yxz96OD9PgBecVm4raxd12IIyCfpO1SghtVywClVCgTzEMTqIDmKA
X-77-NZT-Rayacb649068711474cd119be69a8a1411a
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmilanIT
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://f-droid.monerujo.io/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpq2q6ohjk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066151
duration0.5388641357421875
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length7600
Content-Typeapplication/java-archive
Etag"affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732"
ExpiresSat, 21 Mar 2026 04:19:11 UTC
Last-ModifiedTue, 17 Jun 2025 17:27:43 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KM79ABZJEK8NMA4YSP3EP6W4
DateSat, 21 Mar 2026 04:09:11 GMT
tlsping
hostf-droid.monerujo.io
ip35.185.44.232
addressf-droid.monerujo.io:443
connectionTLS
count10
min0.042411178
max0.061499247
average0.047802110800000006
stddev0.0068136520264767235
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.a3.pm/seabear/repo
ip104.21.78.107
starttime1774066162
duration6.362987041473389
status523
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:09:28 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9dfa19ccdd4dae61-ATL
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.a3.pm
ip104.21.78.107
addressfdroid.a3.pm:443
connectionTLS
count10
min0.141026088
max0.201781712
average0.17163859190000003
stddev0.02273354351965603
error
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.beocode.eu/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf0ef2d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066170
duration0.036093950271606445
status523
TLS[Errno -2] Name or service not known
headers
DateSat, 21 Mar 2026 04:09:28 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9dfa19ccdd4dae61-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.bromite.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.bromite.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1774066170
duration0.35291004180908203
status523
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
DateSat, 21 Mar 2026 04:09:28 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7168
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9dfa19ccdd4dae61-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.cgeo.org/fdroid/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmpen8pqlc7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066174
duration0.9503071308135986
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateSat, 21 Mar 2026 04:09:35 GMT
etag"69b8828c-1802"
last-modifiedMon, 16 Mar 2026 22:22:04 GMT
servernginx/1.27.5
content-length6146
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.253877654
max0.256978715
average0.2553389009
stddev0.0010646679193782997
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.cgeo.org/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmp2ws6zkkl The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066180
duration0.7339880466461182
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateSat, 21 Mar 2026 04:09:40 GMT
etag"69b8828c-1802"
last-modifiedMon, 16 Mar 2026 22:22:04 GMT
servernginx/1.27.5
content-length6146
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.251055832
max0.254107502
average0.252549699
stddev0.001045656630783264
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.fedilab.app/repo
ip54.38.93.15
VerificationExceptionJAR signature failed to verify: /tmp/tmpfvh22bub The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066185
duration0.9928469657897949
status200
TLSTLSv1.3
headers
dateSat, 21 Mar 2026 04:09:45 GMT
content-typeapplication/java-archive
content-length43359
last-modifiedFri, 20 Mar 2026 17:13:33 GMT
etag"69bd803d-a95f"
accept-rangesbytes
permissions-policymicrophone=(), camera=(), geolocation=(), interest-cohort=()
x-frame-optionsdeny
x-content-type-optionsnosniff
tlsping
hostfdroid.fedilab.app
ip54.38.93.15
addressfdroid.fedilab.app:443
connectionTLS
count10
min0.273966694
max0.307517927
average0.2923318187
stddev0.00974579067788825
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.frostnerd.com/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.frostnerd.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1774066191
duration0.3551061153411865
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
dateSat, 21 Mar 2026 04:09:45 GMT
content-typeapplication/java-archive
content-length43359
last-modifiedFri, 20 Mar 2026 17:13:33 GMT
etag"69bd803d-a95f"
accept-rangesbytes
permissions-policymicrophone=(), camera=(), geolocation=(), interest-cohort=()
x-frame-optionsdeny
x-content-type-optionsnosniff
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.i2pd.xyz/fdroid/repo
ip62.210.85.80
VerificationExceptionJAR signature failed to verify: /tmp/tmp99h1bnl6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066195
duration0.875770092010498
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:09:56 GMT
Content-Typeapplication/java-archive
Content-Length37904
Last-ModifiedWed, 11 Feb 2026 08:53:37 GMT
Connectionkeep-alive
ETag"698c4391-9410"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.i2pd.xyz
ip62.210.85.80
addressfdroid.i2pd.xyz:443
connectionTLS
count10
min0.389330966
max0.396624177
average0.39226393880000004
stddev0.0022915374977758893
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
cipher preferenceclient
least strengthA
https://fdroid.koyu.space/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)')))
starttime1774066204
duration0.262347936630249
status200
TLS[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)
headers
Servernginx
DateSat, 21 Mar 2026 04:09:56 GMT
Content-Typeapplication/java-archive
Content-Length37904
Last-ModifiedWed, 11 Feb 2026 08:53:37 GMT
Connectionkeep-alive
ETag"698c4391-9410"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-dev-fdroid/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1774066207
duration0.34438490867614746
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateSat, 21 Mar 2026 04:09:56 GMT
Content-Typeapplication/java-archive
Content-Length37904
Last-ModifiedWed, 11 Feb 2026 08:53:37 GMT
Connectionkeep-alive
ETag"698c4391-9410"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.krombel.de/riot-stable/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.krombel.de', port=443): Max retries exceeded with url: /riot-stable/fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1774066212
duration0.2281191349029541
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
Servernginx
DateSat, 21 Mar 2026 04:09:56 GMT
Content-Typeapplication/java-archive
Content-Length37904
Last-ModifiedWed, 11 Feb 2026 08:53:37 GMT
Connectionkeep-alive
ETag"698c4391-9410"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.libretro.com/repo
ip5.9.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmp_1iwbmwl The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066217
duration0.8139030933380127
status200
TLSTLSv1.2
headers
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"1711916461"
Last-ModifiedWed, 18 Nov 2020 10:48:50 GMT
Content-Length5595
DateSat, 21 Mar 2026 04:10:18 GMT
Serverlighttpd/1.4.35
tlsping
hostfdroid.libretro.com
ip5.9.202.202
addressfdroid.libretro.com:443
connectionTLS
count10
min0.354193804
max0.356772034
average0.355403452
stddev0.000854736672265788
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthD
https://fdroid.metatransapps.com/fdroid/repo
ip49.12.195.92
VerificationExceptionJAR signature failed to verify: /tmp/tmp45yw62lu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066232
duration1.1463239192962646
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:10:33 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostfdroid.metatransapps.com
ip49.12.195.92
addressfdroid.metatransapps.com:443
connectionTLS
count10
min0.245633561
max0.247837691
average0.24667575309999998
stddev0.0007743692332716257
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf10a390>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1774066240
duration0.14767098426818848
status200
TLS[Errno -5] No address associated with hostname
headers
DateSat, 21 Mar 2026 04:10:33 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.partidopirata.com.ar/fdroid/repo
ip151.236.30.90
VerificationExceptionJAR signature failed to verify: /tmp/tmpfr88ztuw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066241
duration0.7235629558563232
status200
TLSTLSv1.3
headers
Servernginx/1.26.1
DateSat, 21 Mar 2026 04:10:41 GMT
Content-Typeapplication/java-archive
Content-Length5211
Last-ModifiedTue, 07 Jun 2022 01:05:55 GMT
Connectionkeep-alive
ETag"629ea473-145b"
Cache-Controlno-cache
Access-Control-Allow-Origin*.partidopirata.com.ar
Strict-Transport-Securitymax-age=15552000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostfdroid.partidopirata.com.ar
ip151.236.30.90
addressfdroid.partidopirata.com.ar:443
connectionTLS
count10
min0.265086666
max0.284281874
average0.26961687759999997
stddev0.006331868296553712
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.pixelfed.net/fdroid/repo
ip165.227.195.166
VerificationExceptionJAR signature failed to verify: /tmp/tmp88a8_wje The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066251
duration0.47640490531921387
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:10:51 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.pixelfed.net
ip165.227.195.166
addressfdroid.pixelfed.net:443
connectionTLS
count10
min0.174413915
max0.207080172
average0.1908647972
stddev0.011255534469120754
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rakshazi.me/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf109d10>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1774066252
duration0.03396487236022949
status200
TLS[Errno -5] No address associated with hostname
headers
Servernginx
DateSat, 21 Mar 2026 04:10:51 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rami.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daf10a3d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066252
duration0.2082829475402832
status200
TLS[Errno -2] Name or service not known
headers
Servernginx
DateSat, 21 Mar 2026 04:10:51 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.tagesschau.de/repo
ip34.160.251.4
VerificationExceptionJAR signature failed to verify: /tmp/tmpcgjk56a9 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066253
duration0.609062910079956
status200
TLSTLSv1.3
headers
X-GUploader-UploadIDAGQBYWyWwbxWQbpddS9gWKi7S3hg8Aul_s0mwDlsuQ4qvUVdqJ2oG0cFG5ZYa8TirZ8W8d7Wh2JOdg
x-goog-generation1769608056089937
x-goog-metageneration1
x-goog-stored-content-encodingidentity
x-goog-stored-content-length5407
x-goog-meta-goog-reserved-file-mtime1769608024
x-goog-hashcrc32c=eBN6hw==, md5=THew2eEYstxgofs+dnkW1w==
x-goog-storage-classSTANDARD
Accept-Rangesbytes
Content-Length5407
ServerUploadServer
DateSat, 21 Mar 2026 04:10:53 GMT
ExpiresSat, 21 Mar 2026 05:10:53 GMT
Cache-Controlpublic, max-age=3600
Last-ModifiedWed, 28 Jan 2026 13:47:36 GMT
ETag"4c77b0d9e118b2dc60a1fb3e767916d7"
Content-Typeapplication/octet-stream
Age0
Alt-Svch3=":443"; ma=2592000
tlsping
hostfdroid.tagesschau.de
ip34.160.251.4
addressfdroid.tagesschau.de:443
connectionTLS
count10
min0.039632346
max0.043485746
average0.041617403
stddev0.001321797179759815
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://fdroid.videlibri.de/repo
ip95.143.172.218
VerificationExceptionJAR signature failed to verify: /tmp/tmpbar67j81 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066254
duration0.8397388458251953
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:10:55 GMT
Content-Typeapplication/x-java-archive
Content-Length6633
Connectionkeep-alive
Servernginx
Last-ModifiedSat, 29 Nov 2025 17:10:00 GMT
ETag"19e9-644bed0f37273"
Accept-Rangesbytes
X-Xss-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
tlsping
hostfdroid.videlibri.de
ip95.143.172.218
addressfdroid.videlibri.de:443
connectionTLS
count10
min0.405392674
max0.409083554
average0.40712764290000003
stddev0.0012059818469425225
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroidfamily.codeberg.page/repo
ip217.197.84.141
starttime1774066260
duration0.9515829086303711
status404
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Typetext/html; charset=utf-8
DateSat, 21 Mar 2026 04:11:01 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
Transfer-Encodingchunked
tlsping
hostfdroidfamily.codeberg.page
ip217.197.84.141
addressfdroidfamily.codeberg.page:443
connectionTLS
count10
min0.309242621
max0.341898768
average0.3271630919
stddev0.011700033119315337
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://freeyourgadget.codeberg.page/fdroid/repo
ip217.197.84.141
VerificationExceptionJAR signature failed to verify: /tmp/tmplapko2tp The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066266
duration0.8378331661224365
status200
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Length5684
Content-Typeapplication/java-archive
DateSat, 21 Mar 2026 04:11:06 GMT
Etag"939a752ba8b16b1fae5e32e673983a715d2abc5d"
Last-ModifiedFri, 20 Mar 2026 22:02:11 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
X-Pages-Cachetrue
tlsping
hostfreeyourgadget.codeberg.page
ip217.197.84.141
addressfreeyourgadget.codeberg.page:443
connectionTLS
count10
min0.29841202
max0.334007767
average0.32066095619999996
stddev0.011762252539394478
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo
ip185.199.110.133
VerificationExceptionJAR signature failed to verify: /tmp/tmptn7_k0q0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066271
duration0.5676579475402832
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3658
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdA998:DFC4:144D64:1794B2:69BE1A5E
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:11:11 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610094-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066271.422351,VS0,VE38
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID22006e3b507edd627c5b2b979243a8768e63982f
ExpiresSat, 21 Mar 2026 04:16:11 GMT
Source-Age0
tlsping
hostgithub.com
ip140.82.112.4
addressgithub.com:443
connectionTLS
count10
min0.179615274
max0.268840136
average0.2338449008
stddev0.027538236537305145
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo
ip172.65.251.78
VerificationExceptionJAR signature failed to verify: /tmp/tmprng27w_2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066273
duration0.5481100082397461
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:11:13 GMT
Content-Typeapplication/octet-stream
Content-Length7975
Connectionkeep-alive
Servercloudflare
CF-Ray9dfa1c802c8aed83-ATL
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Cache-Controlmax-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60
Content-Dispositionattachment
ETag"79c1c46db7b65d72d15d500f0e5ae720"
Strict-Transport-Securitymax-age=31536000
VaryAccept, Accept-Encoding
content-security-policybase-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-mT/xlsEVIslPqObi5/8DoA=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
gitlab-lbhaproxy-main-06-lb-gprd
gitlab-svweb-gke-us-east1-d
nel{"max_age": 0}
permissions-policyinterest-cohort=()
ratelimit-limit500
ratelimit-namethrottle_unauthenticated_web
ratelimit-observed1
ratelimit-remaining499
ratelimit-reset1773800040
referrer-policystrict-origin-when-cross-origin
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
x-gitlab-meta{"correlation_id":"9de0b7915c2e9b1e-EZE","version":"1"}
x-permitted-cross-domain-policiesnone
x-request-id9de0b7915c2e9b1e-EZE
x-runtime0.116340
x-ua-compatibleIE=edge
x-xss-protection1; mode=block
Set-Cookie_cfuvid=tZammkeTz8K1wzImCcjjNMNFOTfJCHRqamSYArmwkwA-1774066273473-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None
tlsping
hostgitlab.com
ip172.65.251.78
addressgitlab.com:443
connectionTLS
count10
min0.060973295
max0.064473634
average0.06268542760000001
stddev0.001218097246585691
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://grobox.de/fdroid/repo
ip217.197.86.172
VerificationExceptionJAR signature failed to verify: /tmp/tmpw5q8k2ae The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066275
duration1.038912057876587
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:11:15 GMT
ServerApache
Upgradeh2,h2c
ConnectionUpgrade, Keep-Alive
Last-ModifiedFri, 12 Dec 2025 12:46:08 GMT
ETag"2965-645c0a543a8d3"
Accept-Rangesbytes
Content-Length10597
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostgrobox.de
ip217.197.86.172
addressgrobox.de:443
connectionTLS
count10
min0.460957716
max0.464807056
average0.46259980999999994
stddev0.0012730487771032194
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo
ip52.217.137.89
VerificationExceptionJAR signature failed to verify: /tmp/tmpg89aidty The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066287
duration0.6201939582824707
status200
TLSTLSv1.3
headers
x-amz-id-2K/awFXo/syFCE6oHYGV+WJDPyq0+ZM1sNDkOQdSEXx5V2xV0lQa/T33Y5EgKbe9olrCs/jAknkQ=
x-amz-request-id2RVYBKVNFSR13J0N
DateSat, 21 Mar 2026 04:11:28 GMT
Last-ModifiedFri, 31 Jan 2025 07:13:53 GMT
ETag"e3e79c0ad41eb80a8f3bd87727c953d5"
x-amz-server-side-encryptionAES256
x-amz-meta-s3cmd-attrsatime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis
Accept-Rangesbytes
Content-Typeapplication/zip
Content-Length507773
ServerAmazonS3
tlsping
hostguardianproject-wind.s3.amazonaws.com
ip52.217.137.89
addressguardianproject-wind.s3.amazonaws.com:443
connectionTLS
count10
min0.073241574
max0.075875774
average0.0745020175
stddev0.000841299090142293
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://guardianproject.info/fdroid/repo
ip204.19.241.151
VerificationExceptionJAR signature failed to verify: /tmp/tmp363al_eh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066290
duration0.6193399429321289
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:11:30 GMT
ServerApache/2.4.59 (Debian)
Permissions-Policyinterest-cohort=()
Feature-Policyambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none';
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
Strict-Transport-Securitymax-age=31536000
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
VaryUser-Agent
Last-ModifiedFri, 20 Mar 2026 08:38:42 GMT
ETag"31c8a-64d709cc6274e"
Accept-Rangesbytes
Content-Length203914
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostguardianproject.info
ip204.19.241.151
addressguardianproject.info:443
connectionTLS
count10
min0.079476113
max0.082401663
average0.080960377
stddev0.0010260692539999436
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://haagch.frickel.club/files/fdroid/repo
ip159.195.50.59
VerificationExceptionJAR signature failed to verify: /tmp/tmpuci8hsro The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066293
duration0.8942351341247559
status200
TLSTLSv1.3
headers
Servernginx/1.28.2
DateSat, 21 Mar 2026 04:11:33 GMT
Content-Typeapplication/java-archive
Content-Length7603
Last-ModifiedThu, 06 Jan 2022 03:00:10 GMT
Connectionkeep-alive
ETag"61d65b3a-1db3"
Accept-Rangesbytes
tlsping
hosthaagch.frickel.club
ip159.195.50.59
addresshaagch.frickel.club:443
connectionTLS
count10
min0.243420391
max0.246509411
average0.24506598400000001
stddev0.0010488332817092543
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jak-linux.org/fdroid/repo
ip195.201.138.240
VerificationExceptionJAR signature failed to verify: /tmp/tmpn3b5ffwq The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066299
duration0.8200609683990479
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateSat, 21 Mar 2026 04:11:39 GMT
Content-Typeapplication/java-archive
Content-Length4052
Last-ModifiedTue, 23 Mar 2021 17:51:53 GMT
Connectionkeep-alive
ETag"605a2ab9-fd4"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostjak-linux.org
ip195.201.138.240
addressjak-linux.org:443
connectionTLS
count10
min0.240324614
max0.242435284
average0.24132697000000003
stddev0.0007466301296920744
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jhass.github.io/insporation/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpjz1npv9s The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066305
duration0.4652738571166992
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length2948
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedThu, 22 Feb 2024 04:10:47 GMT
Access-Control-Allow-Origin*
ETag"65d6c947-b84"
expiresSat, 21 Mar 2026 03:13:01 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id38DE:16B633:AECC75:BA534E:69BE0A65
Accept-Rangesbytes
Age0
DateSat, 21 Mar 2026 04:11:45 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610074-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1774066306.555987,VS0,VE53
VaryAccept-Encoding
X-Fastly-Request-IDc677151e9905a88af2b17bd285e753e8b4d3f791
tlsping
hostjhass.github.io
ip185.199.108.153
addressjhass.github.io:443
connectionTLS
count10
min0.058061123
max0.060629043
average0.059339357000000016
stddev0.0008348868242486525
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo
starttime1774066306
duration0.34335994720458984
status403
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:11:47 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9dfa1d53ffeb53b7"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PdSQ5N3jJpmO2rFwBQghFiDahAVEBxkX44ivT03wNGywmFKtV3hoj0KFOd5m%2BPk60uwX3%2F2qngpOflEiRNAYVlYKwXmUP%2BVdXWs3iYSEVaSNXDNvwLe%2Fb7mZOaQ%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9dfa1d53ffeb53b7-ATL
Content-Encodingbr
tlsping
hostjulianfairfax.gitlab.io
ip35.185.44.232
addressjulianfairfax.gitlab.io:443
connectionTLS
count10
min0.037076765
max0.068631663
average0.056673942600000006
stddev0.00933026136504779
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://kaffeemitkoffein.de/fdroid/repo
ip2.241.12.100
VerificationExceptionJAR signature failed to verify: /tmp/tmpo7sxocn2 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066308
duration0.9693119525909424
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:11:48 GMT
ServerApache/2.4.66 (Raspbian)
Last-ModifiedSun, 15 Feb 2026 10:43:07 GMT
ETag"21c4-64ada80f872d2"
Accept-Rangesbytes
Content-Length8644
Strict-Transport-Securitymax-age=15768000
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostkaffeemitkoffein.de
ip2.241.12.100
addresskaffeemitkoffein.de:443
connectionTLS
count10
min0.378921568
max0.583647006
average0.5005859885999999
stddev0.06442384945426728
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://microg.org/fdroid/repo
ip109.230.233.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp7leau72t The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066340
duration0.9372248649597168
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length8438
Content-Typeapplication/java-archive
Etag"dgacqx0u6gk56ie"
Last-ModifiedMon, 09 Feb 2026 10:17:27 GMT
ServerCaddy
VaryAccept-Encoding
DateSat, 21 Mar 2026 04:12:20 GMT
tlsping
hostmicrog.org
ip109.230.233.153
addressmicrog.org:443
connectionTLS
count10
min0.301489474
max0.311900182
average0.3040723264
stddev0.0038582884712138003
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mobileapp.bitwarden.com/fdroid/repo
ip151.101.1.91
VerificationExceptionJAR signature failed to verify: /tmp/tmpp67lkqvk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066345
duration0.44972801208496094
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length6782
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedFri, 20 Mar 2026 14:26:16 GMT
Access-Control-Allow-Origin*
ETag"69bd5908-1a7e"
expiresSat, 21 Mar 2026 04:03:09 GMT
x-proxy-cacheHIT
X-GitHub-Request-IdEA2C:10B12A:BBBD1C:CE032A:69BE1708
Via1.1 varnish, 1.1 varnish
X-Fastly-Request-IDd28b53cad92cb627383cea20a7037d994377282d
Fastly-Debug-StatesDELIVER
Cache-Controlpublic, max-age=0, must-revalidate
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:26 GMT
Age312
X-Served-Bycache-iad-kcgs7200116-IAD, cache-iad-kiad7000092-IAD
X-CacheMISS, HIT
X-Cache-Hits0, 1
X-TimerS1774066346.016204,VS0,VE1
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Service-Version33
Strict-Transport-Securitymax-age=31536000
tlsping
hostmobileapp.bitwarden.com
ip151.101.1.91
addressmobileapp.bitwarden.com:443
connectionTLS
count10
min0.060991203
max0.063714643
average0.062259769
stddev0.0009175279976240499
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/repo
ip185.199.110.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp2dixinl4 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066347
duration0.5334339141845703
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5890
ServerGitHub.com
Content-Typeapplication/java-archive
x-origin-cacheHIT
Last-ModifiedWed, 11 Feb 2026 13:08:17 GMT
Access-Control-Allow-Origin*
ETag"698c7f41-1702"
expiresSat, 21 Mar 2026 03:02:41 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-Id09BB:E9D56:B2FD2D:BE58E9:69BE07F9
Accept-Rangesbytes
Age0
DateSat, 21 Mar 2026 04:12:27 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610078-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1774066347.406699,VS0,VE22
VaryAccept-Encoding
X-Fastly-Request-ID9c4cfce02684d093afc620f3a1bad27399028069
tlsping
hostmolly.im
ip185.199.110.153
addressmolly.im:443
connectionTLS
count10
min0.058873553
max0.061222384
average0.06012462439999999
stddev0.0007922697397859132
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://nanolx.org/fdroid/repo
ip87.118.120.112
VerificationExceptionJAR signature failed to verify: /tmp/tmpchzhm1b1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066348
duration0.9896340370178223
status200
TLSTLSv1.3
headers
Servernginx
DateSat, 21 Mar 2026 04:12:29 GMT
Content-Typeapplication/java-archive
Content-Length4978
Last-ModifiedFri, 21 May 2021 19:39:16 GMT
Connectionkeep-alive
ETag"60a80c64-1372"
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-Powered-ByPleskLin
Accept-Rangesbytes
tlsping
hostnanolx.org
ip87.118.120.112
addressnanolx.org:443
connectionTLS
count10
min0.255153421
max0.270091089
average0.2585564336
stddev0.005361533484668343
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://onosendai.herokuapp.com/repo
ip54.205.8.205
starttime1774066354
duration0.1454770565032959
status404
TLSTLSv1.2
headers
Content-Length548
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2026-03-21 04:12:34.625407642 +0000 UTC
Serverheroku-router
tlsping
hostonosendai.herokuapp.com
ip54.205.8.205
addressonosendai.herokuapp.com:443
connectionTLS
count10
min0.100165638
max0.102056878
average0.1013046839
stddev0.0006457232684945533
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://pili.qi0.de/fdroid/repo
ip89.244.198.155
VerificationExceptionJAR signature failed to verify: /tmp/tmpj95m9rnb The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066356
duration1.139240026473999
status200
TLSTLSv1.3
headers
Servernginx/1.28.2
DateSat, 21 Mar 2026 04:12:37 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostpili.qi0.de
ip89.244.198.155
addresspili.qi0.de:443
connectionTLS
count10
min0.403159705
max0.405677304
average0.4043575946000001
stddev0.000904835923290105
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://platschi.net/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daefb62d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066370
duration0.03855395317077637
status200
TLS[Errno -2] Name or service not known
headers
Servernginx/1.28.2
DateSat, 21 Mar 2026 04:12:37 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo
ip185.199.109.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpj5tzfp41 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066370
duration0.4226670265197754
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4999
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id4F2A:81D0F:8AA65F:9C6DA6:69BE1AC2
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:50 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610030-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066371.838098,VS0,VE38
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDc44fa3bc33e45cc4e5e360298d1b91f6f6d76c6d
ExpiresSat, 21 Mar 2026 04:17:50 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.057786831
max0.060517371
average0.0590940846
stddev0.0008970602787312788
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo
ip185.199.108.133
starttime1774066372
duration0.08631587028503418
status404
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length14
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
Content-Typetext/plain; charset=utf-8
X-GitHub-Request-IdE3A2:5B6E5:8292E3:945601:69BE1AC3
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:52 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610068-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066372.202968,VS0,VE25
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID2dec853c2148390c269886d2f4ed1f1ac5e75cb5
ExpiresSat, 21 Mar 2026 04:17:52 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.109.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.058867491
max0.06144722
average0.060145385600000004
stddev0.000830687450822051
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo
ip185.199.110.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpcbadsx3q The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066373
duration0.43880200386047363
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length8579
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id8D77:1B0D3D:18AB36:1C33FE:69BE1AC3
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:53 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610038-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066373.211854,VS0,VE34
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDf61335c0c885a20c7efcf28713b37ce5add8ee42
ExpiresSat, 21 Mar 2026 04:17:53 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.05824559
max0.060478201
average0.059330095799999996
stddev0.0008204499809197156
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp9gf9bbcu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066374
duration0.43982911109924316
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length13065
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"77e09692129bf82b93d5ddfe627beed901523bb46b1f3129033682b5cc601288"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id363C:21779:7D9B51:8E80B9:69BE02B8
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:54 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610086-PDK
X-CacheHIT
X-Cache-Hits0
X-TimerS1774066375.539370,VS0,VE25
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID02934e7cf9be009c81d81e13a3f79251ddebb320
ExpiresSat, 21 Mar 2026 04:17:54 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.061451171
max0.06389602
average0.06261854730000001
stddev0.0008024248262965259
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo
ip185.199.109.133
VerificationExceptionJAR signature failed to verify: /tmp/tmplw3v5n4q The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066375
duration0.463529109954834
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length10552
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"2ab4648158cabee9e12291dd0742d97ec4e92d6455a3bfb7025d00180b7050bb"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdBC86:A8DFD:9B8A55:AFBBAF:69BE1AC7
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:55 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610098-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066376.881687,VS0,VE58
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID636574d39ae244d2a57e7cfdb3dfa94a2908341b
ExpiresSat, 21 Mar 2026 04:17:55 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.060004391
max0.062440121
average0.0611308527
stddev0.0007992560803956469
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpe5_bv16y The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066377
duration0.47283315658569336
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length7500
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"3d6cb0be41c206571c4080bcc82bf5511752230f9bb00ba6fcc143825f373eab"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id3B20:1D892:1820A5:1BA69A:69BE1AC5
Accept-Rangesbytes
DateSat, 21 Mar 2026 04:12:57 GMT
Via1.1 varnish
X-Served-Bycache-pdk-kfty8610048-PDK
X-CacheMISS
X-Cache-Hits0
X-TimerS1774066377.241825,VS0,VE45
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDe06c2b0166d1005fdc0f17af1f7e8ed402abfb80
ExpiresSat, 21 Mar 2026 04:17:57 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.110.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.06016242
max0.06241724
average0.06131186400000001
stddev0.0007760010874116088
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://releases.nailyk.fr/repo
ip144.76.164.24
VerificationExceptionJAR signature failed to verify: /tmp/tmpq3sdj38d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066378
duration0.8962240219116211
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:12:59 GMT
ServerApache
Last-ModifiedSat, 21 Mar 2026 03:41:55 GMT
ETag"1a38-64d809545acaf"
Accept-Rangesbytes
Content-Length6712
Content-Typeapplication/java-archive
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
tlsping
hostreleases.nailyk.fr
ip144.76.164.24
addressreleases.nailyk.fr:443
connectionTLS
count10
min0.326417519
max0.37761684
average0.3578108304
stddev0.020078809970900748
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://releases.threema.ch/fdroid/repo
ip203.56.112.72
VerificationExceptionJAR signature failed to verify: /tmp/tmpbacrff1r The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066383
duration0.7987148761749268
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:03 GMT
ServerApache
Access-Control-Allow-Origin*
Last-ModifiedMon, 09 Mar 2026 08:41:30 GMT
ETag"18ee-64c935e92e5bc"
Accept-Rangesbytes
Content-Length6382
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
hostreleases.threema.ch
ip203.56.112.72
addressreleases.threema.ch:443
connectionTLS
count10
min0.371320601
max0.526008876
average0.48219970749999996
stddev0.04701740806147426
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://repo.kuschku.de/repo
ip148.251.132.182
VerificationExceptionJAR signature failed to verify: /tmp/tmpvdj22s73 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066391
duration0.9723250865936279
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:11 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlsping
hostrepo.kuschku.de
ip148.251.132.182
addressrepo.kuschku.de:443
connectionTLS
count10
min0.387132337
max0.390007776
average0.3886487535
stddev0.001115685856633598
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.mobilsicher.de/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7c7daefdc2d0>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1774066396
duration0.12468910217285156
status200
TLS[Errno -2] Name or service not known
headers
DateSat, 21 Mar 2026 04:13:11 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.netsyms.com/fdroid/repo
ip104.21.39.203
VerificationExceptionJAR signature failed to verify: /tmp/tmp0c68ltn1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066397
duration0.44440507888793945
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:17 GMT
Content-Typeapplication/java-archive
Content-Length11099
Connectionkeep-alive
Servercloudflare
VaryUser-Agent
cf-cache-statusHIT
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=gSKIf%2FRY7%2B1CY2uPLw2UdqC00IdoKBOUCrU%2FNg7WopsNBwwmn1U257xamQtflI5yvQepvsx%2Fz%2FbwGVgp4T6Diek9L3YX77HRpY2hXK7kU9s%3D"}]}
Last-ModifiedSat, 18 Nov 2023 06:40:11 GMT
etag"2b5b-60a67864e3f1c"
Accept-Rangesbytes
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Permissions-Policyinterest-cohort=()
X-Content-Type-Optionsnosniff
Age3160
Cache-Controlmax-age=14400
CF-RAY9dfa1f87798df142-ATL
alt-svch3=":443"; ma=86400
tlsping
hostrepo.netsyms.com
ip104.21.39.203
addressrepo.netsyms.com:443
connectionTLS
count10
min0.147902217
max0.208261897
average0.1842528991
stddev0.019788246390946087
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo
starttime1774066398
duration0.23587989807128906
status403
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:18 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9dfa1f91ab3f1c63"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vOfFyvM5nXTg7NqhWcRJlkfGf5L4OEgHgmxDe81XJ01157pJuw7S51IJPeznx9y1yMivM81jsKCLn%2BAU%2Fg82pG5NIDrFFPObPUWj07e23Gb%2FCjY%2B49nUmK%2FdRgA%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9dfa1f91ab3f1c63-ATL
Content-Encodingbr
tlsping
hostrfc2822.gitlab.io
ip35.185.44.232
addressrfc2822.gitlab.io:443
connectionTLS
count10
min0.045428613
max0.06469419
average0.050551922400000004
stddev0.007070099321557756
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://s2.spiritcroc.de/fdroid/repo
ip23.88.107.207
VerificationExceptionJAR signature failed to verify: /tmp/tmpwt2wnex6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066399
duration0.9618921279907227
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 21 Mar 2026 04:13:20 GMT
Content-Typeapplication/java-archive
Content-Length11378
Last-ModifiedSat, 14 Mar 2026 11:37:30 GMT
Connectionkeep-alive
ETag"69b5487a-2c72"
Strict-Transport-Securitymax-age=15768000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hosts2.spiritcroc.de
ip23.88.107.207
addresss2.spiritcroc.de:443
connectionTLS
count10
min0.351082742
max0.364204671
average0.3541478969
stddev0.0037507041716096485
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://s3.amazonaws.com/storymaker/fdroid/repo
ip16.15.184.191
starttime1774066406
duration0.10415911674499512
status403
TLSTLSv1.3
headers
x-amz-request-idB3XQ5V6ZZX4A49H0
x-amz-id-2/8ttALrjhju+w80WxgaLFAGe4bFeMRRFbo6WAT+5TyOm1qENkQkmYgFE5KRS70bsl4fCA95y7frS876RnF8xvdDHNpq7cLLN
Content-Typeapplication/xml
Transfer-Encodingchunked
DateSat, 21 Mar 2026 04:13:26 GMT
ServerAmazonS3
tlsping
hosts3.amazonaws.com
ip16.15.184.191
addresss3.amazonaws.com:443
connectionTLS
count10
min0.072079709
max0.074364409
average0.0731738794
stddev0.0008153730738307707
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://secfirst.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1774066408
duration0.3563990592956543
status403
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
x-amz-request-idB3XQ5V6ZZX4A49H0
x-amz-id-2/8ttALrjhju+w80WxgaLFAGe4bFeMRRFbo6WAT+5TyOm1qENkQkmYgFE5KRS70bsl4fCA95y7frS876RnF8xvdDHNpq7cLLN
Content-Typeapplication/xml
Transfer-Encodingchunked
DateSat, 21 Mar 2026 04:13:26 GMT
ServerAmazonS3
tlspingNone
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://static.cryptomator.org/android/fdroid/repo
ip104.21.5.32
VerificationExceptionJAR signature failed to verify: /tmp/tmp_g7rwuoi The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066421
duration1.0773489475250244
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:41 GMT
Content-Typeapplication/java-archive
Content-Length6214
Connectionkeep-alive
Accept-Rangesbytes
etag"bf37e5e0bcc305c36cc999a20a074f58"
last-modifiedThu, 12 Mar 2026 14:27:26 GMT
x-amz-id-2txgece6fc51f5364f4fbdbe-0069be1af5
x-amz-request-idtxgece6fc51f5364f4fbdbe-0069be1af5
Cache-Controlmax-age=28800
cf-cache-statusMISS
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=Yxg9SBGx76ZDMjdihOquseK9KjTKji2avGaC82cXn5YpnP7Nq8gzZGLKivhecnwElSJJ53Msd0Hi3BAqI941es9M2d6980UZZdTnlxrAgcLwLo3fdx0%3D"}]}
Servercloudflare
CF-RAY9dfa201d4d1a7da3-ATL
alt-svch3=":443"; ma=86400
tlsping
hoststatic.cryptomator.org
ip104.21.5.32
addressstatic.cryptomator.org:443
connectionTLS
count10
min0.123623067
max0.210869751
average0.1798101278
stddev0.029334107451267515
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://store.nethunter.com/repo
ip45.33.83.228
VerificationExceptionJAR signature failed to verify: /tmp/tmpdt2l8719 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066423
duration0.5856289863586426
status200
TLSTLSv1.2
headers
Servernginx
DateSat, 21 Mar 2026 04:13:43 GMT
Content-Typeapplication/java-archive
Content-Length45637
Last-ModifiedThu, 12 Mar 2026 14:56:34 GMT
Connectionkeep-alive
ETag"69b2d422-b245"
Accept-Rangesbytes
tlsping
hoststore.nethunter.com
ip45.33.83.228
addressstore.nethunter.com:443
connectionTLS
count10
min0.144474997
max0.186354191
average0.1672342558
stddev0.012083442768581474
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://submarine.strangled.net/fdroid/repo
ip178.68.58.166
VerificationExceptionJAR signature failed to verify: /tmp/tmp88_vmx57 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066425
duration0.8699510097503662
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:13:45 GMT
ServerApache/2.4.29 (Ubuntu)
Last-ModifiedSun, 01 Dec 2024 22:35:25 GMT
ETag"1087-6283d0c58d7a9"
Accept-Rangesbytes
Content-Length4231
Access-Control-Allow-Origin*
Access-Control-Allow-Headersorigin, x-requested-with, content-type
Access-Control-Allow-MethodsPUT, GET, POST, DELETE, OPTIONS
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostsubmarine.strangled.net
ip178.68.58.166
addresssubmarine.strangled.net:443
connectionTLS
count10
min0.325237497
max0.327948417
average0.32650137300000004
stddev0.0009353039545538133
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmpbqnnncu6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066442
duration1.143507957458496
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateSat, 21 Mar 2026 04:14:03 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostwww.anonymousmessenger.ly
ip185.176.41.167
addresswww.anonymousmessenger.ly:443
connectionTLS
count10
min0.334484324
max0.362037899
average0.34603123910000005
stddev0.012014347461813157
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.collaboraoffice.com/downloads/fdroid/repo
ip157.90.115.48
VerificationExceptionJAR signature failed to verify: /tmp/tmprtziwltm The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066451
duration0.7736570835113525
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:14:12 GMT
ServerApache/2.4.65 (Debian)
X-Content-Type-Optionsnosniff
Strict-Transport-Securitymax-age=31536000; includeSubdomains; preload
Referrer-Policystrict-origin-when-cross-origin
Last-ModifiedSun, 15 Mar 2026 02:54:40 GMT
ETag"11a3-64d0739378cfa"
Accept-Rangesbytes
Content-Length4515
x-robots-tagnoindex
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.collaboraoffice.com
ip157.90.115.48
addresswww.collaboraoffice.com:443
connectionTLS
count10
min0.257796147
max0.260591397
average0.25915359400000004
stddev0.0009749216777059625
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.cromite.org/fdroid/repo
ip89.46.108.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpdhhf9_wx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066456
duration0.8878309726715088
status200
TLSTLSv1.3
headers
Serveraruba-proxy
DateSat, 21 Mar 2026 04:14:17 GMT
Content-Typeapplication/java-archive
Content-Length4537
Connectionkeep-alive
Cache-Controlmax-age=60
Last-ModifiedMon, 02 Mar 2026 08:19:09 GMT
Accept-Rangesbytes
X-ServerNamewebx.aruba.it
Alt-Svch3=":443"; ma=86400
tlsping
hostwww.cromite.org
ip89.46.108.70
addresswww.cromite.org:443
connectionTLS
count10
min0.267752841
max0.27091328
average0.2692386452
stddev0.001080773329365018
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.droidware.info/fdroid/repo
ip104.18.29.229
starttime1774066462
duration0.3217329978942871
status403
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:14:22 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Varyaccept-encoding
Content-Encodinggzip
Servercloudflare
CF-RAY9dfa2120684d3d50-ATL
tlsping
hostwww.droidware.info
ip104.21.89.103
addresswww.droidware.info:443
connectionTLS
count10
min0.144277377
max0.211964236
average0.1875958409
stddev0.02031766699674343
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.ma-nic.de/fdroid/repo
ip109.250.138.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpqndn5udx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1774066463
duration0.7560961246490479
status200
TLSTLSv1.3
headers
DateSat, 21 Mar 2026 04:14:24 GMT
ServerApache/2.4.66 (Debian)
Last-ModifiedTue, 06 Jun 2023 16:06:08 GMT
ETag"1094-5fd7832786fe5"
Accept-Rangesbytes
Content-Length4244
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.ma-nic.de
ip109.250.138.232
addresswww.ma-nic.de:443
connectionTLS
count10
min0.360722848
max0.411772992
average0.387501615
stddev0.016525318120621035
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA