Mirror Monitor

Get the full history as JSON: report.json

Source code:https://gitlab.com/fdroid/repo-monitor

https://f-droid.org/repo
ip37.218.243.72
VerificationExceptionJAR signature failed to verify: /tmp/tmput5xh1v0 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191128
duration1.7539710998535156
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:12:08 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
ETag"ae72e9-6481f6f845f82"
Accept-Rangesbytes
tlsping
hostf-droid.org
ip37.218.247.73
addressf-droid.org:443
connectionTLS
count10
min0.228473451
max0.231137771
average0.2297392651
stddev0.0009038669471563224
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.tetaneutral.net/fdroid/repo
ip91.224.148.45
VerificationExceptionJAR signature failed to verify: /tmp/tmprv4748q3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190788
duration2.111644983291626
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:06:28 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostfdroid.tetaneutral.net
ip91.224.148.45
addressfdroid.tetaneutral.net:443
connectionTLS
count10
min0.237717401
max0.240222561
average0.23895639000000002
stddev0.0008367741368666915
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://ftp.agdsn.de/fdroid/repo
ip141.30.235.39
VerificationExceptionJAR signature failed to verify: /tmp/tmpa5fq7r2s The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190592
duration7.6692609786987305
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateMon, 12 Jan 2026 04:03:12 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostftp.agdsn.de
ip141.30.235.39
addressftp.agdsn.de:443
connectionTLS
count10
min0.257147484
max0.259727644
average0.258425378
stddev0.0008812856673996278
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://ftp.fau.de/fdroid/repo
ip131.188.12.211
VerificationExceptionJAR signature failed to verify: /tmp/tmp8p0owgyu The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190815
duration2.0759079456329346
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:06:56 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
ETag"ae72e9-6481f6f7e5400"
Accept-Rangesbytes
Content-Length11432681
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostftp.fau.de
ip131.188.12.211
addressftp.fau.de:443
connectionTLS
count10
min0.484193821
max0.575344398
average0.5359425891
stddev0.03364823067221487
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.gwdg.de/pub/android/fdroid/repo
ip134.76.12.6
VerificationExceptionJAR signature failed to verify: /tmp/tmp9bkaff_g The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190613
duration2.313887119293213
status200
TLSTLSv1.2
headers
Servernginx
DateMon, 12 Jan 2026 04:03:34 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostftp.gwdg.de
ip134.76.12.6
addressftp.gwdg.de:443
connectionTLS
count10
min0.379011115
max1.03391374
average0.493019313
stddev0.19458356230077278
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceindeterminate
cipher preference errorToo few ciphers supported
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://ftp.lysator.liu.se/pub/fdroid/repo
ip130.236.254.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpf9tzem67 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190622
duration2.202070951461792
status200
TLSTLSv1.3
headers
servernginx
dateMon, 12 Jan 2026 04:03:42 GMT
content-typeapplication/java-archive
content-length11432681
last-modifiedSun, 11 Jan 2026 16:41:52 GMT
etag"6963d2d0-ae72e9"
accept-rangesbytes
tlsping
hostftp.lysator.liu.se
ip130.236.254.251
addressftp.lysator.liu.se:443
connectionTLS
count10
min0.25800884
max0.26059771
average0.259326495
stddev0.0008564321406188507
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.cyberbits.eu/fdroid/repo
ip51.159.104.35
VerificationExceptionJAR signature failed to verify: /tmp/tmpjbywdvh5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190804
duration1.8034749031066895
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11432681
Content-Typeapplication/java-archive
Etag"dflwrg303g1s6t1ih"
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Referrer-Policystrict-origin-when-cross-origin
ServerCaddy
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Frame-OptionsDENY
DateMon, 12 Jan 2026 04:06:45 GMT
tlsping
hostmirror.cyberbits.eu
ip51.159.104.35
addressmirror.cyberbits.eu:443
connectionTLS
count10
min0.276398399
max0.302681038
average0.2925185975
stddev0.01106384049169963
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.eu.ossplanet.net/fdroid/repo
ip65.21.121.21
VerificationExceptionJAR signature failed to verify: /tmp/tmpcw_venmc The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190641
duration2.1543960571289062
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateMon, 12 Jan 2026 04:04:02 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostmirror.eu.ossplanet.net
ip65.21.121.21
addressmirror.eu.ossplanet.net:443
connectionTLS
count10
min0.297351309
max0.335657887
average0.3262338513
stddev0.012981903855783015
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.fcix.net/fdroid/repo
ip23.152.160.16
VerificationExceptionJAR signature failed to verify: /tmp/tmpkop7xc94 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190648
duration1.3647148609161377
status200
TLSTLSv1.3
headers
Servernginx/1.18.0
DateMon, 12 Jan 2026 04:04:08 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
ExpiresMon, 12 Jan 2026 04:09:08 GMT
Cache-Controlmax-age=300
Accept-Rangesbytes
tlsping
hostmirror.fcix.net
ip23.152.160.16
addressmirror.fcix.net:443
connectionTLS
count10
min0.171736293
max0.174182943
average0.17293905399999998
stddev0.0008561451297583816
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirror.kumi.systems/fdroid/repo
ip110.172.148.96
VerificationExceptionJAR signature failed to verify: /tmp/tmp1i6lw11d The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190652
duration2.725731134414673
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length11432681
Content-Typeapplication/java-archive
Etag"dflwrg303g1s6t1ih"
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
ServerCaddy
VaryAccept-Encoding
DateMon, 12 Jan 2026 04:04:13 GMT
tlsping
hostmirror.kumi.systems
ip110.172.148.96
addressmirror.kumi.systems:443
connectionTLS
count10
min0.356946176
max0.388638025
average0.37623633549999996
stddev0.010704862125951961
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.level66.network/fdroid/repo
ip141.98.136.67
VerificationExceptionJAR signature failed to verify: /tmp/tmp45pom_dw The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190660
duration2.36240291595459
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:04:21 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostmirror.level66.network
ip141.98.136.67
addressmirror.level66.network:443
connectionTLS
count10
min0.230291991
max0.232624201
average0.23148630000000003
stddev0.0008046061104596462
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.ossplanet.net/fdroid/repo
ip163.22.17.70
VerificationExceptionJAR signature failed to verify: /tmp/tmpqmu3l4pi The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190670
duration7.815751075744629
status200
TLSTLSv1.3
headers
Servernginx/1.18.0 (Ubuntu)
DateMon, 12 Jan 2026 04:04:34 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostmirror.ossplanet.net
ip163.22.17.70
addressmirror.ossplanet.net:443
connectionTLS
count10
min3.01276572
max3.6406839680000003
average3.0978561417000003
stddev0.18149013817829762
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://mirrors.dotsrc.org/fdroid/repo
ip130.225.254.116
VerificationExceptionJAR signature failed to verify: /tmp/tmpqnfiwyfa The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190716
duration2.2747578620910645
status200
TLSTLSv1.3
headers
Servernginx/1.28.0
DateMon, 12 Jan 2026 04:05:17 GMT
Content-Typeapplication/java-archive
Content-Length11421230
Last-ModifiedSat, 10 Jan 2026 19:24:45 GMT
Connectionkeep-alive
ETag"6962a77d-ae462e"
X-Frame-OptionsSAMEORIGIN
Referrer-Policystrict-origin
Accept-Rangesbytes
tlsping
hostmirrors.dotsrc.org
ip130.225.254.116
addressmirrors.dotsrc.org:443
connectionTLS
count10
min0.27463083
max0.27719758
average0.27587704900000004
stddev0.0009039838357343585
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://opencolo.mm.fcix.net/fdroid/repo
ip50.117.120.66
VerificationExceptionJAR signature failed to verify: /tmp/tmp8k6e5ljt The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190732
duration1.4368340969085693
status200
TLSTLSv1.3
headers
Servernginx/1.20.1
DateMon, 12 Jan 2026 04:05:32 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostopencolo.mm.fcix.net
ip50.117.120.66
addressopencolo.mm.fcix.net:443
connectionTLS
count10
min0.217621446
max0.245598276
average0.228320656
stddev0.010696076332287462
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_CCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://plug-mirror.rcac.purdue.edu/fdroid/repo
ip128.211.151.251
VerificationExceptionJAR signature failed to verify: /tmp/tmpu5j2ie4y The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190838
duration0.8781051635742188
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:07:18 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostplug-mirror.rcac.purdue.edu
ip128.211.151.251
addressplug-mirror.rcac.purdue.edu:443
connectionTLS
count10
min0.137498204
max0.171451833
average0.16001526850000003
stddev0.010072624439288512
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.init7.net/fdroid/repo
ip109.202.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmpo3x44iit The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190738
duration2.0744619369506836
status200
TLSTLSv1.3
headers
Servernginx/1.26.3
DateMon, 12 Jan 2026 04:05:39 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostmirror.init7.net
ip109.202.202.202
addressmirror.init7.net:443
connectionTLS
count10
min0.24901982
max0.25146415
average0.25029370799999995
stddev0.0008319495422656325
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 4096) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mirror.freedif.org/fdroid/repo
ip66.96.199.63
VerificationExceptionJAR signature failed to verify: /tmp/tmp35787lx5 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190763
duration3.858459949493408
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:06:04 GMT
Content-Typeapplication/java-archive
Content-Length11432681
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
Connectionkeep-alive
ETag"6963d2d0-ae72e9"
Accept-Rangesbytes
tlsping
hostmirror.freedif.org
ip66.96.199.63
addressmirror.freedif.org:443
connectionTLS
count10
min0.522299089
max0.548690858
average0.5362421008
stddev0.008690490599184312
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroid/repo
ip176.9.145.28
starttime1768190810
duration0.4657268524169922
status404
TLSTLSv1.3
headers
Servernginx/1.29.3
DateMon, 12 Jan 2026 04:06:50 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.25848276
max0.273356439
average0.2617045119
stddev0.00429023422162363
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://fdroid.swedneck.xyz/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.swedneck.xyz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a629ff450>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768190815
duration0.14891815185546875
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.29.3
DateMon, 12 Jan 2026 04:06:50 GMT
Content-Typetext/html; charset=utf-8
Transfer-Encodingchunked
Connectionkeep-alive
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://mirror.jarsilio.com/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='mirror.jarsilio.com', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a629ff650>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768190824
duration0.13223719596862793
status200
TLS[Errno -2] Name or service not known
headers
DateMon, 12 Jan 2026 04:06:56 GMT
ServerApache/2.4.58 (Ubuntu)
Last-ModifiedSun, 11 Jan 2026 16:41:52 GMT
ETag"ae72e9-6481f6f7e5400"
Accept-Rangesbytes
Content-Length11432681
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://ftp.osuosl.org/pub/fdroid/repo
ip140.211.166.134
starttime1768190825
duration0.32480311393737793
status404
TLSTLSv1.2
headers
DateMon, 12 Jan 2026 04:07:05 GMT
ServerApache
Content-Length261
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=iso-8859-1
tlsping
hostftp.osuosl.org
ip140.211.166.134
addressftp.osuosl.org:443
connectionTLS
count10
min0.26242403
max0.26909537
average0.266413094
stddev0.0022149237728156745
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://mirror.scd31.com/fdroid/repo
ip205.209.125.10
starttime1768190834
duration0.17052102088928223
status404
TLSTLSv1.2
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:07:14 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlsping
hostmirror.scd31.com
ip205.209.125.10
addressmirror.scd31.com:443
connectionTLS
count10
min0.090270776
max0.093062546
average0.09185603299999999
stddev0.0008904876966701999
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://fdroid.fi-do.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.fi-do.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a0ee90>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768190837
duration0.020720958709716797
status404
TLS[Errno -2] Name or service not known
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:07:14 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Content-Encodinggzip
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://android.izzysoft.de/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpdjx0j1o4 jarsigner: java.util.zip.ZipException: zip END header not found
starttime1768190840
duration0.7463290691375732
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:07:20 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Cache-Controlmax-age=2592000
ExpiresWed, 11 Feb 2026 04:07:20 GMT
VaryAccept-Encoding
Content-Encodinggzip
Content-Length1964
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typetext/html; charset=UTF-8
tlsping
hostandroid.izzysoft.de
ip144.76.109.58
addressandroid.izzysoft.de:443
connectionTLS
count10
min0.24367705
max0.353119036
average0.29379937479999996
stddev0.050717042340742764
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmpwr9ehg4q The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190847
duration1.0836341381072998
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateMon, 12 Jan 2026 04:07:28 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostanonymousmessenger.ly
ip185.176.41.167
addressanonymousmessenger.ly:443
connectionTLS
count10
min0.324810988
max0.357425046
average0.338557683
stddev0.012225940622575853
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://app.futo.org/fdroid/repo
ip159.65.228.96
VerificationExceptionJAR signature failed to verify: /tmp/tmpbxplpxzr The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190856
duration0.47203493118286133
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:07:36 GMT
Content-Typeapplication/java-archive
Content-Length5160
Last-ModifiedThu, 25 Dec 2025 00:11:31 GMT
Connectionkeep-alive
ETag"694c8133-1428"
Accept-Rangesbytes
tlsping
hostapp.futo.org
ip159.65.228.96
addressapp.futo.org:443
connectionTLS
count10
min0.123779905
max0.153782513
average0.14135878490000003
stddev0.010083613783467192
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://app.usb0.net/repo
ip104.21.6.28
starttime1768190859
duration0.26572394371032715
status404
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:07:40 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
Servercloudflare
Cache-Controlmax-age=14400
cf-cache-statusEXPIRED
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Varyaccept-encoding
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=pxlGcSkey%2BoX95SQ0Ro0l%2BcjteCNtD3Wypn2E4kDeDD5zC4M2TX%2FC7tOmC0TgZHIxXssjDh8qeSVqUN905hK7wL4IEzcVV9WUOc%3D"}]}
Content-Encodingbr
CF-RAY9bc9c9ca597eb543-ATL
alt-svch3=":443"; ma=86400
tlsping
hostapp.usb0.net
ip104.21.6.28
addressapp.usb0.net:443
connectionTLS
count10
min0.121463295
max0.206340051
average0.1854417685
stddev0.025445691470415602
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://apt.izzysoft.de/fdroid/repo
ip144.76.109.58
VerificationExceptionJAR signature failed to verify: /tmp/tmpa8khxqpd The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190861
duration1.6286439895629883
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:07:41 GMT
ServerApache
Referrer-Policystrict-origin-when-cross-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Permissions-Policyinterest-cohort=()
Content-Security-Policybase-uri 'self'; font-src 'self' data:; media-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' *.izzysoft.de *.qumran.org; frame-ancestors 'self' *.izzysoft.de *.qumran.org; block-all-mixed-content; script-src 'self';
Strict-Transport-Securitymax-age=15552000; includeSubDomains
Last-ModifiedSun, 11 Jan 2026 18:48:11 GMT
ETag"3017df-648213347504d"
Accept-Rangesbytes
Content-Length3151839
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostapt.izzysoft.de
ip144.76.109.58
addressapt.izzysoft.de:443
connectionTLS
count10
min0.243999091
max0.24628046
average0.24512477709999997
stddev0.0007956665565823978
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://archive.newpipe.net/fdroid/repo
ip159.69.138.33
VerificationExceptionJAR signature failed to verify: /tmp/tmp09phtdsx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190868
duration0.8848409652709961
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:07:48 GMT
Content-Typeapplication/java-archive
Content-Length28559
Last-ModifiedSun, 11 Jan 2026 23:19:23 GMT
Connectionkeep-alive
ETag"69642ffb-6f8f"
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000; includeSubDomains
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Referrer-Policystrict-origin
Permissions-Policyinterest-cohort=()
Content-Security-Policydefault-src 'self'; object-src 'none'; block-all-mixed-content
Accept-Rangesbytes
tlsping
hostarchive.newpipe.net
ip159.69.138.33
addressarchive.newpipe.net:443
connectionTLS
count10
min0.248778602
max0.251275632
average0.250078361
stddev0.0008527297357480869
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-nightly.s3.brave.com/fdroid/repo
ip3.166.160.25
VerificationExceptionThe repository's fingerprint does not match.
starttime1768190891
duration1.2858860492706299
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length142200
Connectionkeep-alive
DateMon, 12 Jan 2026 04:08:12 GMT
Last-ModifiedSun, 11 Jan 2026 01:55:58 GMT
ETag"3dc4398a434c95354c9ddbc5ed97f222"
x-amz-server-side-encryptionAES256
x-amz-version-idbEvC5tTA233X9R2cSGrpD3hd73G00_rk
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 454cea9dce953b32cce75c52c4877336.cloudfront.net (CloudFront)
X-Amz-Cf-PopMIA50-P3
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-Id6v1U6TKAelAJU7eHHQiv_QdVh3ebYKrbPPiWPsdfYCJ6MvYPPcPHTQ==
tlsping
hostbrave-browser-apk-nightly.s3.brave.com
ip3.166.160.25
addressbrave-browser-apk-nightly.s3.brave.com:443
connectionTLS
count10
min0.06346967
max0.066117001
average0.06477672809999999
stddev0.000880400443743689
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://brave-browser-apk-release.s3.brave.com/fdroid/repo
ip18.173.166.55
VerificationExceptionThe repository's fingerprint does not match.
starttime1768190893
duration1.0830049514770508
status200
TLSTLSv1.3
headers
Content-Typeapplication/java-archive
Content-Length39017
Connectionkeep-alive
DateMon, 12 Jan 2026 04:08:15 GMT
Last-ModifiedThu, 11 Dec 2025 20:11:57 GMT
ETag"2620e55ecf85c97a8b19590759cb96fe"
x-amz-server-side-encryptionAES256
x-amz-version-idumUH14_GQhPwlh8xofyrCy04Nm7um55l
Accept-Rangesbytes
ServerAmazonS3
X-CacheMiss from cloudfront
Via1.1 702ef314013a608397b521ec26967856.cloudfront.net (CloudFront)
X-Amz-Cf-PopMIA3-P7
Alt-Svch3=":443"; ma=86400
X-Amz-Cf-IdRvKZnSAn1fT4ZXVKvXfkOyquz1CEIPX3f9SgkS2x3QFGAlJN8aYr6A==
tlsping
hostbrave-browser-apk-release.s3.brave.com
ip18.173.166.55
addressbrave-browser-apk-release.s3.brave.com:443
connectionTLS
count10
min0.06055916
max0.06304563
average0.0618513776
stddev0.0008411014706828436
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://breezy-weather.github.io/fdroid-repo/fdroid/repo
ip185.199.108.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpp5vlmif1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190896
duration0.420306921005249
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length18961
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedMon, 12 Jan 2026 02:13:57 GMT
Access-Control-Allow-Origin*
Strict-Transport-Securitymax-age=31556952
ETag"696458e5-4a11"
expiresMon, 12 Jan 2026 04:18:16 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-IdE163:BE581:12FE3:156FE:696473B0
Accept-Rangesbytes
Age0
DateMon, 12 Jan 2026 04:08:16 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100120-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768190896.172874,VS0,VE18
VaryAccept-Encoding
X-Fastly-Request-ID242f102ed8fbf3bf716537e0eac2d1d956371e1e
tlsping
hostbreezy-weather.github.io
ip185.199.108.153
addressbreezy-weather.github.io:443
connectionTLS
count10
min0.062604561
max0.066284421
average0.064457768
stddev0.0012368110074177051
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://briarproject.org/fdroid/repo
ip157.90.23.135
VerificationExceptionJAR signature failed to verify: /tmp/tmpxswkc617 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190897
duration0.7863249778747559
status200
TLSTLSv1.3
headers
Servernginx/1.22.1
DateMon, 12 Jan 2026 04:06:32 GMT
Content-Typeapplication/java-archive
Content-Length4274
Last-ModifiedThu, 11 Dec 2025 10:35:57 GMT
Connectionkeep-alive
ETag"693a9e8d-10b2"
Strict-Transport-Securitymax-age=31536000; includeSubDomains
Accept-Rangesbytes
tlsping
hostbriarproject.org
ip157.90.23.135
addressbriarproject.org:443
connectionTLS
count10
min0.241222704
max0.243578064
average0.242398352
stddev0.000802491839494956
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://bubu1.eu/fdroidclassic/fdroid/repo
ip176.9.145.28
VerificationExceptionThe repository's fingerprint does not match.
starttime1768190902
duration0.8644399642944336
status200
TLSTLSv1.3
headers
Servernginx/1.29.3
DateMon, 12 Jan 2026 04:08:22 GMT
Content-Typeapplication/java-archive
Content-Length9793
Last-ModifiedWed, 08 Mar 2023 23:22:24 GMT
Connectionkeep-alive
ETag"640918b0-2641"
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostbubu1.eu
ip176.9.145.28
addressbubu1.eu:443
connectionTLS
count10
min0.252857653
max0.256152953
average0.254529945
stddev0.001141467059365271
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceclient
least strengthA
https://calyxos.gitlab.io/calyx-fdroid-repo/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmphw5ry32u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190908
duration0.47164297103881836
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length6874
Content-Typeapplication/java-archive
Etag"1981ccf49733b550a8cde9619f1d4c2cc6444ec15ebc2504c283e1287f416f7d"
ExpiresMon, 12 Jan 2026 04:18:28 UTC
Last-ModifiedMon, 12 Jan 2026 04:01:30 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KER685MJKDVAPF5NB9RQGXXG
DateMon, 12 Jan 2026 04:08:28 GMT
tlsping
hostcalyxos.gitlab.io
ip35.185.44.232
addresscalyxos.gitlab.io:443
connectionTLS
count10
min0.03971881
max0.04364348
average0.041665073
stddev0.001356060587968325
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/fdroid/repo
ip89.222.120.5
VerificationExceptionJAR signature failed to verify: /tmp/tmpiklx4nfj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190908
duration1.035283088684082
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:08:29 GMT
Content-Typeapplication/java-archive
Content-Length165847
Connectionkeep-alive
Last-ModifiedMon, 12 Jan 2026 02:57:40 GMT
Cache-Controlmax-age=0
ExpiresMon, 12 Jan 2026 04:08:29 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTk6jfpAsag3i/x9WHp4UJXScSFJEdvFRgAmwGkOlVq+YNq7NmqB2TFHY
X-77-NZT-Ray416cb7244cac1b65bd73646927aca300
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip89.222.120.5
addresscdn.kde.org:443
connectionTLS
count10
min0.111227332
max0.135566942
average0.1221689429
stddev0.009294248225926146
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://cdn.kde.org/android/stable-releases/fdroid/repo
ip89.222.120.5
VerificationExceptionJAR signature failed to verify: /tmp/tmpogwfx3xs The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768190911
duration0.7192251682281494
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:08:31 GMT
Content-Typeapplication/java-archive
Content-Length79123
Connectionkeep-alive
Last-ModifiedSun, 11 Jan 2026 08:58:43 GMT
Cache-Controlmax-age=0
ExpiresMon, 12 Jan 2026 04:08:31 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0
X-77-NZT-Ray416cb724239f41b5bf7364691b1e3f17
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlsping
hostcdn.kde.org
ip89.222.120.5
addresscdn.kde.org:443
connectionTLS
count10
min0.090626522
max0.131848493
average0.11385345089999999
stddev0.01588054047246268
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://eutopia.cz/experimental/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /experimental/fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1768190913
duration0.4681558609008789
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateMon, 12 Jan 2026 04:08:31 GMT
Content-Typeapplication/java-archive
Content-Length79123
Connectionkeep-alive
Last-ModifiedSun, 11 Jan 2026 08:58:43 GMT
Cache-Controlmax-age=0
ExpiresMon, 12 Jan 2026 04:08:31 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0
X-77-NZT-Ray416cb724239f41b5bf7364691b1e3f17
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://eutopia.cz/fdroid/repo
SSLErrorHTTPSConnectionPool(host='eutopia.cz', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(CertificateError("hostname 'eutopia.cz' doesn't match either of 'kupelnesk.sk', 'services.kupelnesk.sk', 'www.kupelnesk.sk'")))
starttime1768190918
duration0.25012898445129395
status200
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: Hostname mismatch, certificate is not valid for 'eutopia.cz'. (_ssl.c:992)
headers
DateMon, 12 Jan 2026 04:08:31 GMT
Content-Typeapplication/java-archive
Content-Length79123
Connectionkeep-alive
Last-ModifiedSun, 11 Jan 2026 08:58:43 GMT
Cache-Controlmax-age=0
ExpiresMon, 12 Jan 2026 04:08:31 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0
X-77-NZT-Ray416cb724239f41b5bf7364691b1e3f17
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.i2p.io/repo
ConnectTimeoutHTTPSConnectionPool(host='f-droid.i2p.io', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by ConnectTimeoutError(<urllib3.connection.HTTPSConnection object at 0x7d7a62a200d0>, 'Connection to f-droid.i2p.io timed out. (connect timeout=60)'))
starttime1768190923
duration60.15693497657776
status200
TLS[Errno 110] Connection timed out
headers
DateMon, 12 Jan 2026 04:08:31 GMT
Content-Typeapplication/java-archive
Content-Length79123
Connectionkeep-alive
Last-ModifiedSun, 11 Jan 2026 08:58:43 GMT
Cache-Controlmax-age=0
ExpiresMon, 12 Jan 2026 04:08:31 GMT
Strict-Transport-Securitymax-age=15768000
Referrer-Policystrict-origin-when-cross-origin
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
Permissions-Policyinterest-cohort=()
X-77-NZTkwWQ8izkU2XlxJZ1YWTHPPeM/A2DcW19N9arWof6SySJHvXHRpMVyu0
X-77-NZT-Ray416cb724239f41b5bf7364691b1e3f17
X-77-CacheMISS
ServerCDN77-Turbo
X-77-POPmiamiUSFL
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://f-droid.monerujo.io/fdroid/repo
ip35.185.44.232
VerificationExceptionJAR signature failed to verify: /tmp/tmp2hhphfau The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191127
duration0.5053129196166992
status200
TLSTLSv1.3
headers
Cache-Controlmax-age=600
Content-Length7600
Content-Typeapplication/java-archive
Etag"affdb5c6a9b95f4decc4c67a141ea146e5e87e303f64dbea67d8404c48779732"
ExpiresMon, 12 Jan 2026 04:22:07 UTC
Last-ModifiedTue, 17 Jun 2025 17:27:43 GMT
Permissions-Policyinterest-cohort=()
VaryOrigin
X-Request-Id01KER6EW799VYMMSEXGC18S7HW
DateMon, 12 Jan 2026 04:12:07 GMT
tlsping
hostf-droid.monerujo.io
ip35.185.44.232
addressf-droid.monerujo.io:443
connectionTLS
count10
min0.045397408
max0.048995088
average0.047091389000000004
stddev0.0011886648196564908
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.a3.pm/seabear/repo
ip172.67.220.96
starttime1768191138
duration6.455489158630371
status523
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:12:25 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7167
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9bc9d099ea15b4be-ATL
alt-svch3=":443"; ma=86400
tlsping
hostfdroid.a3.pm
ip172.67.220.96
addressfdroid.a3.pm:443
connectionTLS
count10
min0.125901946
max0.205179872
average0.18038601640000002
stddev0.02299727961511865
error
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.beocode.eu/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.beocode.eu', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a45850>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768191146
duration0.046729087829589844
status523
TLS[Errno -2] Name or service not known
headers
DateMon, 12 Jan 2026 04:12:25 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7167
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9bc9d099ea15b4be-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.bromite.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.bromite.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1768191146
duration0.24914002418518066
status523
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
DateMon, 12 Jan 2026 04:12:25 GMT
Content-Typetext/html; charset=UTF-8
Content-Length7167
Connectionkeep-alive
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Referrer-Policysame-origin
X-Frame-OptionsSAMEORIGIN
Servercloudflare
CF-RAY9bc9d099ea15b4be-ATL
alt-svch3=":443"; ma=86400
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.cgeo.org/fdroid/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmph0f2l6i3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191150
duration0.9110419750213623
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateMon, 12 Jan 2026 04:12:31 GMT
etag"6957af4b-17ff"
last-modifiedFri, 02 Jan 2026 11:43:07 GMT
servernginx/1.27.5
content-length6143
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.25103491
max0.25414
average0.252527596
stddev0.0010946509297049879
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.cgeo.org/repo
ip23.88.115.170
VerificationExceptionJAR signature failed to verify: /tmp/tmpd82ipqi6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191156
duration0.7398738861083984
status200
TLSTLSv1.3
headers
accept-rangesbytes
content-typeapplication/java-archive
dateMon, 12 Jan 2026 04:12:36 GMT
etag"6957af4b-17ff"
last-modifiedFri, 02 Jan 2026 11:43:07 GMT
servernginx/1.27.5
content-length6143
tlsping
hostfdroid.cgeo.org
ip23.88.115.170
addressfdroid.cgeo.org:443
connectionTLS
count10
min0.255170616
max0.269763125
average0.2579531491
stddev0.004033026338013286
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.fedilab.app/repo
ip54.38.93.15
VerificationExceptionJAR signature failed to verify: /tmp/tmpj5g_3qoj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191161
duration0.8820891380310059
status200
TLSTLSv1.3
headers
dateMon, 12 Jan 2026 04:12:41 GMT
content-typeapplication/java-archive
content-length41020
last-modifiedTue, 30 Sep 2025 18:41:32 GMT
etag"68dc245c-a03c"
accept-rangesbytes
permissions-policymicrophone=(), camera=(), geolocation=(), interest-cohort=()
x-frame-optionsdeny
x-content-type-optionsnosniff
tlsping
hostfdroid.fedilab.app
ip54.38.93.15
addressfdroid.fedilab.app:443
connectionTLS
count10
min0.268313089
max0.313670439
average0.29791206459999997
stddev0.012634143588298221
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.frostnerd.com/fdroid/repo
ip152.53.101.189
starttime1768191166
duration0.5199730396270752
status404
TLSTLSv1.3
headers
Alt-Svch3=":443"; ma=2592000
Expect-Ctmax-age=86400, enforce
Feature-Policymicrophone 'none'; camera 'none'
Permissions-Policycamera=(), geolocation=(), microphone=(), interest-cohort=()
Referrer-Policysame-origin
ServerCaddy
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection0
DateMon, 12 Jan 2026 04:12:47 GMT
Content-Length0
tlsping
hostfdroid.frostnerd.com
ip152.53.101.189
addressfdroid.frostnerd.com:443
connectionTLS
count10
min0.290486029
max0.331593387
average0.31116864499999997
stddev0.013166582253083356
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.i2pd.xyz/fdroid/repo
ip62.210.85.80
VerificationExceptionJAR signature failed to verify: /tmp/tmpix6dp5ue The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191171
duration0.8752210140228271
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:12:52 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.i2pd.xyz
ip62.210.85.80
addressfdroid.i2pd.xyz:443
connectionTLS
count10
min0.382284526
max0.397398375
average0.39157262160000006
stddev0.005266967043683589
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp521r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp521r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp521r1) - A
cipher preferenceclient
least strengthA
https://fdroid.koyu.space/fdroid/repo
SSLErrorHTTPSConnectionPool(host='fdroid.koyu.space', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLError(1, '[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)')))
starttime1768191180
duration0.2780289649963379
status200
TLS[SSL: TLSV1_ALERT_INTERNAL_ERROR] tlsv1 alert internal error (_ssl.c:992)
headers
Servernginx
DateMon, 12 Jan 2026 04:12:52 GMT
Content-Typeapplication/java-archive
Content-Length37848
Last-ModifiedTue, 09 Sep 2025 13:55:17 GMT
Connectionkeep-alive
ETag"68c031c5-93d8"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
X-Frame-OptionsSAMEORIGIN
X-Xss-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://fdroid.krombel.de/riot-dev-fdroid/fdroid/repo
ip164.68.122.149
VerificationExceptionJAR signature failed to verify: /tmp/tmpf865caiy The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191183
duration0.8254151344299316
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:13:04 GMT
Content-Typeapplication/java-archive
Content-Length4315
Last-ModifiedThu, 01 Aug 2019 17:05:29 GMT
Connectionkeep-alive
VaryAccept-Encoding
ETag"5d431bd9-10db"
Accept-Rangesbytes
tlsping
hostfdroid.krombel.de
ip164.68.122.149
addressfdroid.krombel.de:443
connectionTLS
count10
min0.237203051
max0.239469711
average0.23824256500000002
stddev0.0007789769394044981
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.krombel.de/riot-stable/fdroid/repo
ip164.68.122.149
VerificationExceptionJAR signature failed to verify: /tmp/tmp9tib33od jarsigner: java.util.zip.ZipException: zip END header not found
starttime1768191189
duration0.7483811378479004
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:13:09 GMT
Content-Typetext/html
Content-Length45
Last-ModifiedWed, 17 Apr 2019 21:22:15 GMT
Connectionkeep-alive
VaryAccept-Encoding
ETag"5cb79907-2d"
Accept-Rangesbytes
tlsping
hostfdroid.krombel.de
ip164.68.122.149
addressfdroid.krombel.de:443
connectionTLS
count10
min0.231845454
max0.234257794
average0.233083059
stddev0.0008302955454445118
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.libretro.com/repo
ip5.9.202.202
VerificationExceptionJAR signature failed to verify: /tmp/tmp1gpj61so The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191194
duration0.9004859924316406
status200
TLSTLSv1.2
headers
Content-Typeapplication/java-archive
Accept-Rangesbytes
ETag"1711916461"
Last-ModifiedWed, 18 Nov 2020 10:48:50 GMT
Content-Length5595
DateMon, 12 Jan 2026 04:13:15 GMT
Serverlighttpd/1.4.35
tlsping
hostfdroid.libretro.com
ip5.9.202.202
addressfdroid.libretro.com:443
connectionTLS
count10
min0.357745422
max0.362313921
average0.35994111
stddev0.0017358819068924011
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 1024) - A
  • TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA (secp256r1) - C
  • TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA (dh 1024) - D
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 1024) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 1024) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
  • Key exchange (dh 1024) of lower strength than certificate key
least strengthD
https://fdroid.metatransapps.com/fdroid/repo
ip49.12.195.92
VerificationExceptionJAR signature failed to verify: /tmp/tmp8k0gcu6f The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191210
duration1.1331760883331299
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:13:31 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostfdroid.metatransapps.com
ip49.12.195.92
addressfdroid.metatransapps.com:443
connectionTLS
count10
min0.242551942
max0.244733122
average0.24360229700000002
stddev0.0007821402837630855
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.nordgedanken.dev/repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.nordgedanken.dev', port=443): Max retries exceeded with url: /repos/CeqjCgrW_4yY_px59cntLkkAov3QRlwQ/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a63ad0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1768191218
duration0.21735286712646484
status200
TLS[Errno -5] No address associated with hostname
headers
DateMon, 12 Jan 2026 04:13:31 GMT
ServerApache/2.4.48 (Debian)
Permissions-Policyinterest-cohort=()
X-XSS-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
Content-Security-Policybase-uri 'self'; default-src 'none'; font-src 'self'; media-src 'self'; img-src 'self' metatransapps.com; style-src 'self' 'unsafe-inline' metatransapps.com; script-src 'self'; connect-src 'self'; object-src 'self'; form-action 'self' metatransapps.com; frame-ancestors 'self' metatransapps.com; block-all-mixed-content;
Strict-Transport-Securitymax-age=15552000
Last-ModifiedFri, 12 Sep 2025 00:41:19 GMT
ETag"d3aa-63e8fe98d2964"
Accept-Rangesbytes
Content-Length54186
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.partidopirata.com.ar/fdroid/repo
ip151.236.30.90
VerificationExceptionJAR signature failed to verify: /tmp/tmpgvpf51hl The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191218
duration0.8211829662322998
status200
TLSTLSv1.3
headers
Servernginx/1.26.1
DateMon, 12 Jan 2026 04:13:38 GMT
Content-Typeapplication/java-archive
Content-Length5211
Last-ModifiedTue, 07 Jun 2022 01:05:55 GMT
Connectionkeep-alive
ETag"629ea473-145b"
Cache-Controlno-cache
Access-Control-Allow-Origin*.partidopirata.com.ar
Strict-Transport-Securitymax-age=15552000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostfdroid.partidopirata.com.ar
ip151.236.30.90
addressfdroid.partidopirata.com.ar:443
connectionTLS
count10
min0.268583303
max0.296283242
average0.27593649319999997
stddev0.009554500588146218
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://fdroid.pixelfed.net/fdroid/repo
ip165.227.195.166
VerificationExceptionJAR signature failed to verify: /tmp/tmpeif_tkqg The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191229
duration0.45848917961120605
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:13:49 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlsping
hostfdroid.pixelfed.net
ip165.227.195.166
addressfdroid.pixelfed.net:443
connectionTLS
count10
min0.178712664
max0.218325933
average0.2055385662
stddev0.013845348468618117
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rakshazi.me/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rakshazi.me', port=443): Max retries exceeded with url: /repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a508d0>: Failed to establish a new connection: [Errno -5] No address associated with hostname'))
starttime1768191231
duration0.032820940017700195
status200
TLS[Errno -5] No address associated with hostname
headers
Servernginx
DateMon, 12 Jan 2026 04:13:49 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.rami.io/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='fdroid.rami.io', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62a6c350>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768191231
duration0.20047283172607422
status200
TLS[Errno -2] Name or service not known
headers
Servernginx
DateMon, 12 Jan 2026 04:13:49 GMT
Content-Typeapplication/java-archive
Content-Length3920
Last-ModifiedWed, 03 Sep 2025 11:12:20 GMT
Connectionkeep-alive
ETag"68b82294-f50"
X-Frame-OptionsSAMEORIGIN
X-XSS-Protection1; mode=block
X-Content-Type-Optionsnosniff
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://fdroid.tagesschau.de/repo
ip34.160.251.4
VerificationExceptionJAR signature failed to verify: /tmp/tmpp3mv9dtx The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191231
duration0.5272879600524902
status200
TLSTLSv1.3
headers
X-GUploader-UploadIDAJRbA5WMGfDLEtJBGxq-89gxUz8FnKdxDFnFevXxauwEbAifWARSSg1XLwYrC--nJRCPTdJa
x-goog-generation1753799322237430
x-goog-metageneration1
x-goog-stored-content-encodingidentity
x-goog-stored-content-length5415
x-goog-meta-goog-reserved-file-mtime1753799290
x-goog-hashcrc32c=jP+mJA==, md5=bo6TmFtlOnJBvkenJX41AQ==
x-goog-storage-classSTANDARD
Accept-Rangesbytes
Content-Length5415
ServerUploadServer
DateMon, 12 Jan 2026 04:13:51 GMT
ExpiresMon, 12 Jan 2026 05:13:51 GMT
Cache-Controlpublic, max-age=3600
Last-ModifiedTue, 29 Jul 2025 14:28:42 GMT
ETag"6e8e93985b653a7241be47a7257e3501"
Content-Typeapplication/octet-stream
Age1
Alt-Svch3=":443"; ma=2592000,h3-29=":443"; ma=2592000
tlsping
hostfdroid.tagesschau.de
ip34.160.251.4
addressfdroid.tagesschau.de:443
connectionTLS
count10
min0.041813969
max0.046421309
average0.044085857
stddev0.0014851445427957516
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
compressors
  • NULL
cipher preferenceserver
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • 64-bit block cipher 3DES vulnerable to SWEET32 attack
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthC
https://fdroid.videlibri.de/repo
ip95.143.172.218
VerificationExceptionJAR signature failed to verify: /tmp/tmpk45dqp02 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191232
duration0.8281610012054443
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:13:53 GMT
Content-Typeapplication/x-java-archive
Content-Length6633
Connectionkeep-alive
Servernginx
Last-ModifiedSat, 29 Nov 2025 17:10:00 GMT
ETag"19e9-644bed0f37273"
Accept-Rangesbytes
X-Xss-Protection1; mode=block
X-Frame-OptionsSAMEORIGIN
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
Referrer-Policystrict-origin-when-cross-origin
tlsping
hostfdroid.videlibri.de
ip95.143.172.218
addressfdroid.videlibri.de:443
connectionTLS
count10
min0.399339141
max0.402389281
average0.40092599999999995
stddev0.0010380388746906329
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
cipher preferenceclient
least strengthA
https://fdroidfamily.codeberg.page/repo
ip217.197.84.141
starttime1768191238
duration0.6397860050201416
status404
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Typetext/html; charset=utf-8
DateMon, 12 Jan 2026 04:13:59 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
Transfer-Encodingchunked
tlsping
hostfdroidfamily.codeberg.page
ip217.197.84.141
addressfdroidfamily.codeberg.page:443
connectionTLS
count10
min0.306093709
max0.338102437
average0.319508362
stddev0.013107825058058041
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://freeyourgadget.codeberg.page/fdroid/repo
ip217.197.84.141
VerificationExceptionJAR signature failed to verify: /tmp/tmpeshaovu6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191244
duration0.8880009651184082
status200
TLSTLSv1.3
headers
AllowGET, HEAD, OPTIONS
Alt-Svch3=":443"; ma=2592000,h3=":443"; ma=2592000
Cache-Controlpublic, max-age=600
Content-Length5636
Content-Typeapplication/java-archive
DateMon, 12 Jan 2026 04:14:04 GMT
Etag"bcc8e2dbf85eaac468141c926cc5c70fdf9a4514"
Last-ModifiedSat, 10 Jan 2026 22:03:14 GMT
Referrer-Policystrict-origin-when-cross-origin
Servergit-pages (git-pages), pages-server
Strict-Transport-Securitymax-age=63072000; includeSubdomains; preload
Via1.1 Caddy
tlsping
hostfreeyourgadget.codeberg.page
ip217.197.84.141
addressfreeyourgadget.codeberg.page:443
connectionTLS
count10
min0.316081149
max0.341573358
average0.3287948107
stddev0.008065395638496686
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://github.com/onionshare/onionshare-android-nightly/raw/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpifz37k3a The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191249
duration0.5573289394378662
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length3658
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"625338d4adeafd16c42bfe19d44f2e72c7513ebbd0a32f307c3182fcffdc650c"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id2952:3BDF62:2D509:3B2CD:69647506
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:14:09 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100135-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191249.488605,VS0,VE24
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID33b00a326b32dc1fa8369b1ee35fb170ef91c27c
ExpiresMon, 12 Jan 2026 04:19:09 GMT
Source-Age0
tlsping
hostgithub.com
ip140.82.113.4
addressgithub.com:443
connectionTLS
count10
min0.172506886
max0.269073953
average0.2402702551
stddev0.029471608001217738
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://gitlab.com/fdroid/fdroidclient-nightly/raw/master/fdroid/repo
ip172.65.251.78
VerificationExceptionJAR signature failed to verify: /tmp/tmp8rnutab8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191251
duration0.5156738758087158
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:14:11 GMT
Content-Typeapplication/octet-stream
Content-Length6083
Connectionkeep-alive
Servercloudflare
CF-Ray9bc9d3598b53af98-ATL
CF-Cache-StatusREVALIDATED
Accept-Rangesbytes
Cache-Controlmax-age=60, public, must-revalidate, stale-while-revalidate=60, stale-if-error=300, s-maxage=60
Content-Dispositionattachment
ETag"dce237e7b330ec8afce665b73fde1ff1"
Strict-Transport-Securitymax-age=31536000
VaryAccept-Encoding
content-security-policybase-uri 'self'; child-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ 'self' blob: data: https://embed.figma.com https://www.figma.com https://www.youtube.com; connect-src 'self' https://gitlab.com wss://gitlab.com https://sentry.gitlab.net https://new-sentry.gitlab.net https://customers.gitlab.com https://snowplow.trx.gitlab.net https://sourcegraph.com https://collector.prd-278964.gl-product-analytics.com https://analytics.gitlab.com snowplowprd.trx.gitlab.net; default-src 'self'; font-src 'self'; form-action 'self' https: http:; frame-ancestors 'self'; frame-src https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.googletagmanager.com/ns.html https://*.zuora.com/apps/PublicHostedPageLite.do https://gitlab.com/admin/ https://gitlab.com/assets/ https://gitlab.com/-/speedscope/index.html https://gitlab.com/-/sandbox/ https://embed.figma.com https://www.figma.com https://www.youtube.com; img-src 'self' data: blob: http: https:; manifest-src 'self'; media-src 'self' data: blob: http: https:; object-src 'none'; report-uri https://new-sentry.gitlab.net/api/4/security/?sentry_key=f5573e26de8f4293b285e556c35dfd6e&sentry_environment=gprd; script-src 'strict-dynamic' 'self' 'unsafe-inline' 'unsafe-eval' https://www.google.com/recaptcha/ https://www.gstatic.com/recaptcha/ https://www.recaptcha.net/ https://apis.google.com https://*.zuora.com/apps/PublicHostedPageLite.do 'nonce-Knb3cVR1FST9Zf5tyBn1iQ=='; style-src 'self' 'unsafe-inline'; worker-src 'self' https://gitlab.com/assets/ blob: data:
gitlab-lbhaproxy-main-14-lb-gprd
gitlab-svweb-gke-us-east1-c
nel{"max_age": 0}
permissions-policyinterest-cohort=()
ratelimit-limit500
ratelimit-namethrottle_unauthenticated_web
ratelimit-observed2
ratelimit-remaining498
ratelimit-reset1767021600
referrer-policystrict-origin-when-cross-origin
x-content-type-optionsnosniff
x-download-optionsnoopen
x-frame-optionsSAMEORIGIN
x-gitlab-meta{"correlation_id":"9b5a467cb5b2275e-ATL","version":"1"}
x-permitted-cross-domain-policiesnone
x-request-id9b5a467cb5b2275e-ATL
x-runtime0.146755
x-ua-compatibleIE=edge
x-xss-protection1; mode=block
Set-Cookie__cf_bm=qJZguivMDGMPRayVghN1Pfgk7jJkHriCEt8DoGOtsJE-1768191251-1.0.1.1-ayB3VtI6ccISoVHl62nxk9WdkGMp1gly2sGXnmqll1AFkBHIj8MmfV7pXYrsJBzywiDIjyL8PaLmGCHWMq6Ez6nszSh_bfG97WgPJ_uTmw4; path=/; expires=Mon, 12-Jan-26 04:44:11 GMT; domain=.gitlab.com; HttpOnly; Secure; SameSite=None, _cfuvid=pa3yEu5j7nly8WLqT2aSCA547YVfbA_6AwmMuPIVBSY-1768191251582-0.0.1.1-604800000; path=/; domain=.gitlab.com; HttpOnly; Secure; SameSite=None
tlsping
hostgitlab.com
ip172.65.251.78
addressgitlab.com:443
connectionTLS
count10
min0.063165417
max0.066630477
average0.064835804
stddev0.0011810317420886706
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://grobox.de/fdroid/repo
ip217.197.86.172
VerificationExceptionJAR signature failed to verify: /tmp/tmpvkqram63 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191253
duration0.9805469512939453
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:14:13 GMT
ServerApache
Upgradeh2,h2c
ConnectionUpgrade, Keep-Alive
Last-ModifiedFri, 12 Dec 2025 12:46:08 GMT
ETag"2965-645c0a543a8d3"
Accept-Rangesbytes
Content-Length10597
Keep-Alivetimeout=5, max=100
Content-Typeapplication/java-archive
tlsping
hostgrobox.de
ip217.197.86.172
addressgrobox.de:443
connectionTLS
count10
min0.402349789
max0.661341406
average0.4563737855
stddev0.08497713972333093
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://guardianproject-wind.s3.amazonaws.com/fdroid/repo
ip16.15.191.36
VerificationExceptionJAR signature failed to verify: /tmp/tmpbucsl065 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191265
duration0.5833470821380615
status200
TLSTLSv1.3
headers
x-amz-id-2bpVmthgHcsISauicaOa9C6shKEVV9LKwlD2z8V4uCaqVzNRt0JDts98oOIT7beil25dV+UvebFixxZh65DiwthOZP1xE8fgW
x-amz-request-idJ2YM9NDCY5QX2WQH
DateMon, 12 Jan 2026 04:14:26 GMT
Last-ModifiedFri, 31 Jan 2025 07:13:53 GMT
ETag"e3e79c0ad41eb80a8f3bd87727c953d5"
x-amz-server-side-encryptionAES256
x-amz-meta-s3cmd-attrsatime:1738307518/ctime:1738307518/gid:1000/gname:geheimnis/md5:e3e79c0ad41eb80a8f3bd87727c953d5/mode:33188/mtime:1738307518/uid:1000/uname:geheimnis
Accept-Rangesbytes
Content-Typeapplication/zip
Content-Length507773
ServerAmazonS3
tlsping
hostguardianproject-wind.s3.amazonaws.com
ip16.15.191.36
addressguardianproject-wind.s3.amazonaws.com:443
connectionTLS
count10
min0.076682106
max0.079543566
average0.0780841006
stddev0.0010245396641903315
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://guardianproject.info/fdroid/repo
ip204.19.241.151
VerificationExceptionJAR signature failed to verify: /tmp/tmp4vubpqw1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191269
duration0.6109628677368164
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:14:30 GMT
ServerApache/2.4.59 (Debian)
Permissions-Policyinterest-cohort=()
Feature-Policyambient-light-sensor 'none'; autoplay 'none'; accelerometer 'none'; camera 'none'; display-capture 'none'; document-domain 'none'; encrypted-media 'none'; fullscreen 'none'; geolocation 'none'; gyroscope 'none'; magnetometer 'none'; microphone 'none'; midi 'none'; payment 'none'; picture-in-picture 'none'; speaker 'none'; sync-xhr 'none'; usb 'none'; wake-lock 'none'; webauthn 'none'; vr 'none'; xr 'none';
Content-Security-Policydefault-src 'none'; base-uri 'self'; block-all-mixed-content; connect-src 'self'; font-src 'self'; form-action 'self'; frame-ancestors 'self'; img-src 'self' https://*.static.flickr.com https://*.staticflickr.com; media-src 'self'; script-src 'self' 'unsafe-inline'; style-src 'self' 'unsafe-inline';
Strict-Transport-Securitymax-age=31536000
Referrer-Policystrict-origin
X-Content-Type-Optionsnosniff
X-Frame-Optionssameorigin
X-Xss-Protection1; mode=block
VaryUser-Agent
Last-ModifiedSun, 11 Jan 2026 06:50:27 GMT
ETag"30ae9-648172c75cc9d"
Accept-Rangesbytes
Content-Length199401
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostguardianproject.info
ip204.19.241.151
addressguardianproject.info:443
connectionTLS
count10
min0.083377777
max0.085721286
average0.0845507884
stddev0.000804149439979063
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://haagch.frickel.club/files/fdroid/repo
ip159.195.50.59
VerificationExceptionJAR signature failed to verify: /tmp/tmpmbbqm8q8 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191272
duration0.8797109127044678
status200
TLSTLSv1.3
headers
Servernginx/1.28.0
DateMon, 12 Jan 2026 04:14:33 GMT
Content-Typeapplication/java-archive
Content-Length7603
Last-ModifiedThu, 06 Jan 2022 03:00:10 GMT
Connectionkeep-alive
ETag"61d65b3a-1db3"
Accept-Rangesbytes
tlsping
hosthaagch.frickel.club
ip159.195.50.59
addresshaagch.frickel.club:443
connectionTLS
count10
min0.242621975
max0.245205325
average0.243916906
stddev0.000853502679286367
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jak-linux.org/fdroid/repo
ip195.201.138.240
VerificationExceptionJAR signature failed to verify: /tmp/tmpga9n5km7 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191279
duration0.67165207862854
status200
TLSTLSv1.3
headers
Servernginx/1.24.0 (Ubuntu)
DateMon, 12 Jan 2026 04:14:39 GMT
Content-Typeapplication/java-archive
Content-Length4052
Last-ModifiedTue, 23 Mar 2021 17:51:53 GMT
Connectionkeep-alive
ETag"605a2ab9-fd4"
Strict-Transport-Securitymax-age=15768000
X-Frame-OptionsDENY
X-Content-Type-Optionsnosniff
X-XSS-Protection1; mode=block
Accept-Rangesbytes
tlsping
hostjak-linux.org
ip195.201.138.240
addressjak-linux.org:443
connectionTLS
count10
min0.241046618
max0.243609718
average0.2422682687
stddev0.0008867731986905195
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://jhass.github.io/insporation/fdroid/repo
ip185.199.110.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp8z5ybqsh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191285
duration0.4013960361480713
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length2948
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedThu, 22 Feb 2024 04:10:47 GMT
Access-Control-Allow-Origin*
ETag"65d6c947-b84"
expiresMon, 12 Jan 2026 04:13:45 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-IdDB1C:1F4BDD:2DFDB4B:33A393E:696472A1
Accept-Rangesbytes
Age0
DateMon, 12 Jan 2026 04:14:45 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100137-IAD
X-CacheHIT
X-Cache-Hits0
X-TimerS1768191285.131126,VS0,VE14
VaryAccept-Encoding
X-Fastly-Request-ID691671ccc450e49f836c75f74b41e62c5bf51866
tlsping
hostjhass.github.io
ip185.199.110.153
addressjhass.github.io:443
connectionTLS
count10
min0.062231587
max0.065776386
average0.06401720270000001
stddev0.001253952022271113
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://julianfairfax.gitlab.io/fdroid-repo/fdroid/repo
starttime1768191286
duration0.45970892906188965
status403
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:14:46 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9bc9d436ebebbd28"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=dvtIf6UoYNqh2JCQUHKrPlWhxWfaJLf%2FclWy0DWpAuHJZtgmLAIqjNxe5vUr%2FDNiy4pBI8WDztR%2FFw%2BiETNDjQQf0Tgk5tvS7gx7o34YfYTdrOcOIiRsyCGYbH8%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9bc9d436ebebbd28-ATL
Content-Encodingbr
tlsping
hostjulianfairfax.gitlab.io
ip35.185.44.232
addressjulianfairfax.gitlab.io:443
connectionTLS
count10
min0.038694479
max0.099502917
average0.0725074104
stddev0.0176471769909648
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://kaffeemitkoffein.de/fdroid/repo
ip95.113.179.177
VerificationExceptionJAR signature failed to verify: /tmp/tmpizf7e32k The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191287
duration0.9761049747467041
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:14:48 GMT
ServerApache/2.4.65 (Raspbian)
Last-ModifiedSun, 04 Jan 2026 14:34:12 GMT
ETag"21d3-64790d60a3b6d"
Accept-Rangesbytes
Content-Length8659
Strict-Transport-Securitymax-age=15768000
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostkaffeemitkoffein.de
ip95.113.179.177
addresskaffeemitkoffein.de:443
connectionTLS
count10
min0.458016489
max0.6895835
average0.5260092548
stddev0.06679889150588193
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM_8 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 3072) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM_8 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 3072) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256 (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 3072) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 3072) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_256_GCM_SHA384 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM_8 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CCM (rsa 4096) - A
  • TLS_RSA_WITH_ARIA_128_GCM_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256 (rsa 4096) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 4096) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 4096) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (dh 3072) of lower strength than certificate key
  • Key exchange (ecdh_x25519) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://microg.org/fdroid/repo
ip109.230.233.153
VerificationExceptionJAR signature failed to verify: /tmp/tmpdox2st30 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191326
duration0.8504009246826172
status200
TLSTLSv1.3
headers
Accept-Rangesbytes
Alt-Svch3=":443"; ma=2592000
Content-Length7942
Content-Typeapplication/java-archive
Etag"dex42v9yx1xo64m"
Last-ModifiedSat, 13 Dec 2025 13:09:15 GMT
ServerCaddy
VaryAccept-Encoding
DateMon, 12 Jan 2026 04:15:26 GMT
tlsping
hostmicrog.org
ip109.230.233.153
addressmicrog.org:443
connectionTLS
count10
min0.288843296
max0.308319645
average0.29780527059999995
stddev0.006284009657827804
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://mobileapp.bitwarden.com/fdroid/repo
ip151.101.1.91
VerificationExceptionJAR signature failed to verify: /tmp/tmpijk5_lt3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191331
duration0.41776299476623535
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length6274
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedMon, 15 Dec 2025 14:38:04 GMT
Access-Control-Allow-Origin*
ETag"69401d4c-1882"
expiresMon, 12 Jan 2026 03:23:24 GMT
x-proxy-cacheMISS
X-GitHub-Request-Id6D76:A92BF:1C2B:207C:696466D3
Via1.1 varnish, 1.1 varnish
X-Fastly-Request-IDb5fad0a5fa7160ce0e0770783b756c3e5200c664
Fastly-Debug-StatesDELIVER
Cache-Controlpublic, max-age=0, must-revalidate
Accept-Rangesbytes
Age0
DateMon, 12 Jan 2026 04:15:31 GMT
X-Served-Bycache-iad-kcgs7200116-IAD, cache-iad-kiad7000094-IAD
X-CacheMISS, HIT
X-Cache-Hits0, 0
X-TimerS1768191331.347926,VS0,VE14
VaryAccept-Encoding
X-Content-Type-Optionsnosniff
X-Service-Version31
Strict-Transport-Securitymax-age=31536000
tlsping
hostmobileapp.bitwarden.com
ip151.101.1.91
addressmobileapp.bitwarden.com:443
connectionTLS
count10
min0.060987897
max0.063559547
average0.06227319099999999
stddev0.0008871821745977543
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://molly.im/fdroid/repo
ip185.199.109.153
VerificationExceptionJAR signature failed to verify: /tmp/tmp_jenumzv The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191332
duration0.6192550659179688
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length5808
ServerGitHub.com
Content-Typeapplication/java-archive
Last-ModifiedSat, 27 Dec 2025 13:09:33 GMT
Access-Control-Allow-Origin*
ETag"694fda8d-16b0"
expiresMon, 12 Jan 2026 04:25:32 GMT
Cache-Controlmax-age=600
x-proxy-cacheMISS
X-GitHub-Request-IdD876:1168E5:2E3C831:33E8D2A:69647564
Accept-Rangesbytes
Age0
DateMon, 12 Jan 2026 04:15:32 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100106-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191333.838245,VS0,VE16
VaryAccept-Encoding
X-Fastly-Request-IDe203a864384fc4a38c73203ec7c202220f086891
tlsping
hostmolly.im
ip185.199.109.153
addressmolly.im:443
connectionTLS
count10
min0.061986897
max0.064742177
average0.06336872299999999
stddev0.0008902909470864009
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://nanolx.org/fdroid/repo
ip87.118.120.112
VerificationExceptionJAR signature failed to verify: /tmp/tmp0_ichcn6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191334
duration0.8432350158691406
status200
TLSTLSv1.3
headers
Servernginx
DateMon, 12 Jan 2026 04:15:34 GMT
Content-Typeapplication/java-archive
Content-Length4978
Last-ModifiedFri, 21 May 2021 19:39:16 GMT
Connectionkeep-alive
ETag"60a80c64-1372"
Strict-Transport-Securitymax-age=15768000; includeSubDomains
X-Powered-ByPleskLin
Accept-Rangesbytes
tlsping
hostnanolx.org
ip87.118.120.112
addressnanolx.org:443
connectionTLS
count10
min0.250452178
max0.253079767
average0.2517816789
stddev0.0008817027354565072
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://onosendai.herokuapp.com/repo
ip54.165.58.209
starttime1768191342
duration0.1370849609375
status404
TLSTLSv1.2
headers
Content-Length548
Cache-Controlno-cache, no-store
Content-Typetext/html; charset=utf-8
Date2026-01-12 04:15:42.353638654 +0000 UTC
Serverheroku-router
tlsping
hostonosendai.herokuapp.com
ip54.165.58.209
addressonosendai.herokuapp.com:443
connectionTLS
count10
min0.100339855
max0.102000055
average0.101366034
stddev0.0005420521198639482
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://pili.qi0.de/fdroid/repo
ip89.244.198.232
VerificationExceptionJAR signature failed to verify: /tmp/tmpv64tcuny The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191344
duration1.2502679824829102
status200
TLSTLSv1.3
headers
Servernginx/1.28.1
DateMon, 12 Jan 2026 04:15:45 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hostpili.qi0.de
ip89.244.198.232
addresspili.qi0.de:443
connectionTLS
count10
min0.402947352
max0.405873022
average0.404331541
stddev0.0009310493446692373
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://platschi.net/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='platschi.net', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62924690>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768191358
duration0.03327488899230957
status200
TLS[Errno -2] Name or service not known
headers
Servernginx/1.28.1
DateMon, 12 Jan 2026 04:15:45 GMT
Content-Typeapplication/java-archive
Content-Length24904
Last-ModifiedTue, 05 Aug 2025 08:01:40 GMT
Connectionkeep-alive
ETag"6891ba64-6148"
Strict-Transport-Securitymax-age=31536000; includeSubDomains; preload
Accept-Rangesbytes
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_ARIA_128_GCM_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp384r1) - A
  • TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CCM (dh 2048) - A
  • TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/2br-2b/Fdroid-repo/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpsteqo7tk The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191358
duration0.421734094619751
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length4999
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"070addb24bc77e917a11a8ee6ea1f3c786744d1cb98cc339fb2c6b24d782c415"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id846F:2816E2:374FE:464B3:6964757A
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:15:58 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100141-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191359.917893,VS0,VE34
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID302b85c9abbf964132a393c26940f086b3d92297
ExpiresMon, 12 Jan 2026 04:20:58 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.063018177
max0.066623207
average0.064870293
stddev0.0012540373248767379
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/MM2-0/fdroid/main/fdroid/repo
ip185.199.108.133
starttime1768191360
duration0.11527705192565918
status404
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length14
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
Content-Typetext/plain; charset=utf-8
X-GitHub-Request-IdA975:33B8FA:200D3:2D5CA:6964757F
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:16:00 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100056-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191360.355458,VS0,VE48
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID16187f0123aff0eac294dcbe1266e4c936c4aa25
ExpiresMon, 12 Jan 2026 04:21:00 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.111.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.062727317
max0.066789067
average0.064700066
stddev0.0013113681259543392
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/Tobi823/ffupdaterrepo/master/fdroid/repo
ip185.199.109.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpe5v8mv1_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191361
duration0.4302990436553955
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length8579
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"5ab32ffb61def9d7b2934061c2f42990c676a8d3547333d9097258bbf37ca087"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id7639:33B8FA:2014C:2D66A:69647581
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:16:01 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100114-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191362.568613,VS0,VE30
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID43e83b4a00b11ddaabaeaeae542cbc5dbc5270b6
ExpiresMon, 12 Jan 2026 04:21:01 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.110.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.063664027
max0.067636427
average0.065696117
stddev0.0013440448791688458
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/chrisgch/tca/master/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmp9aevx25o The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191362
duration0.3892710208892822
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length12648
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"532beef6ea36bf714bd587f06d693b07c3aaf9ca72cb812e91b67df4cff4b1b7"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id68D3:8FE18:F9C925:13E5877:696470CA
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:16:02 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100118-IAD
X-CacheHIT
X-Cache-Hits0
X-TimerS1768191363.952932,VS0,VE21
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID1ef02919e71f8be29006d40dad5e67dfa1b9e62e
ExpiresMon, 12 Jan 2026 04:21:02 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.109.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.065954606
max0.069729096
average0.067840787
stddev0.0012737241131222257
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/oxcl/fdroid-repo-tasker/refs/heads/main/direct-purchase/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpv57y0f6u The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191364
duration0.41468000411987305
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length10073
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"02b55943b27271d31d485f88c25aca8026d9c1f2d60f4a47053949d3d995fd8a"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-Id747A:22D8FA:1C34A51:238FCCD:69647582
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:16:04 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100173-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191364.347369,VS0,VE35
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-IDab360675c45d116420b6616f95f1bc041473d16f
ExpiresMon, 12 Jan 2026 04:21:04 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.062703307
max0.066792116
average0.0647055715
stddev0.001361835525067637
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://raw.githubusercontent.com/xarantolus/fdroid/main/fdroid/repo
ip185.199.108.133
VerificationExceptionJAR signature failed to verify: /tmp/tmpo6l_wavj The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191365
duration0.43857407569885254
status200
TLSTLSv1.3
headers
Connectionkeep-alive
Content-Length7501
Cache-Controlmax-age=300
Content-Security-Policydefault-src 'none'; style-src 'unsafe-inline'; sandbox
Content-Typeapplication/octet-stream
ETagW/"d06f156ecb82c0aa36029fad7a2595a36e1861269450b58e53807b6bfb60dc3c"
Strict-Transport-Securitymax-age=31536000
X-Content-Type-Optionsnosniff
X-Frame-Optionsdeny
X-XSS-Protection1; mode=block
X-GitHub-Request-IdD9B8:3D972:292FF:368C3:6964756C
Accept-Rangesbytes
DateMon, 12 Jan 2026 04:16:05 GMT
Via1.1 varnish
X-Served-Bycache-iad-kjyo7100045-IAD
X-CacheMISS
X-Cache-Hits0
X-TimerS1768191366.735574,VS0,VE49
VaryAuthorization,Accept-Encoding
Access-Control-Allow-Origin*
Cross-Origin-Resource-Policycross-origin
X-Fastly-Request-ID2ebb3bbf348da92421e198dec41571b3cfcf758b
ExpiresMon, 12 Jan 2026 04:21:05 GMT
Source-Age0
tlsping
hostraw.githubusercontent.com
ip185.199.108.133
addressraw.githubusercontent.com:443
connectionTLS
count10
min0.064025137
max0.067690717
average0.065814522
stddev0.001259723219729237
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://releases.nailyk.fr/repo
ip144.76.164.24
VerificationExceptionJAR signature failed to verify: /tmp/tmp3g_l1zj1 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191367
duration0.8033580780029297
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:07 GMT
ServerApache
Last-ModifiedMon, 12 Jan 2026 03:40:51 GMT
ETag"198c-64828a4366899"
Accept-Rangesbytes
Content-Length6540
Content-Typeapplication/java-archive
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
tlsping
hostreleases.nailyk.fr
ip144.76.164.24
addressreleases.nailyk.fr:443
connectionTLS
count10
min0.304826357
max0.384562503
average0.36127544899999997
stddev0.02320977328735136
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
least strengthA
https://releases.threema.ch/fdroid/repo
ip203.56.112.72
VerificationExceptionJAR signature failed to verify: /tmp/tmp9dcrp_71 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191371
duration0.7799999713897705
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:12 GMT
ServerApache
Access-Control-Allow-Origin*
Last-ModifiedTue, 09 Dec 2025 13:40:21 GMT
ETag"18e2-645850d9f51a5"
Accept-Rangesbytes
Content-Length6370
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/x-java-archive
tlsping
hostreleases.threema.ch
ip203.56.112.72
addressreleases.threema.ch:443
connectionTLS
count10
min0.435622438
max0.524864433
average0.49302766360000005
stddev0.02652292516365753
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://repo.kuschku.de/repo
ip148.251.132.182
VerificationExceptionJAR signature failed to verify: /tmp/tmpgt7qblo6 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191379
duration0.9222478866577148
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:19 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlsping
hostrepo.kuschku.de
ip148.251.132.182
addressrepo.kuschku.de:443
connectionTLS
count10
min0.401407782
max0.403954101
average0.40278181669999996
stddev0.0008312837520499322
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.mobilsicher.de/fdroid/repo
ConnectionErrorHTTPSConnectionPool(host='repo.mobilsicher.de', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by NewConnectionError('<urllib3.connection.HTTPSConnection object at 0x7d7a62937710>: Failed to establish a new connection: [Errno -2] Name or service not known'))
starttime1768191384
duration0.12322998046875
status200
TLS[Errno -2] Name or service not known
headers
DateMon, 12 Jan 2026 04:16:19 GMT
Content-Typeapplication/java-archive
Content-Length7678
Connectionkeep-alive
Last-ModifiedWed, 03 Sep 2025 15:16:34 GMT
ETag"68b85bd2-1dfe"
Accept-Rangesbytes
Strict-Transport-Securitymax-age=63072000; includeSubDomains; preload
tlspingNone
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp384r1) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp384r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp384r1) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp384r1) - A
cipher preferenceserver
least strengthA
https://repo.netsyms.com/fdroid/repo
ip172.67.148.121
VerificationExceptionJAR signature failed to verify: /tmp/tmp_vyqve5_ The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191385
duration0.4770669937133789
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:25 GMT
Content-Typeapplication/java-archive
Content-Length11099
Connectionkeep-alive
Servercloudflare
VaryUser-Agent, accept-encoding
cf-cache-statusHIT
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=qTM0kYb6wX7VqpsAaQUFMIu5s9HPLbGc3vI1J1h%2Bar%2B%2B7zcuJGgP7h4GI5gRBbI5y4%2Bg0tLIwp%2BJhrU7GNAsh%2Fk06YeNVi9iKLFmbgvGzdg%3D"}]}
Last-ModifiedSat, 18 Nov 2023 06:40:11 GMT
etag"2b5b-60a67864e3f1c"
Accept-Rangesbytes
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Permissions-Policyinterest-cohort=()
X-Content-Type-Optionsnosniff
Age1029
Cache-Controlmax-age=14400
CF-RAY9bc9d69e6a310f57-ATL
alt-svch3=":443"; ma=86400
tlsping
hostrepo.netsyms.com
ip172.67.148.121
addressrepo.netsyms.com:443
connectionTLS
count10
min0.151778144
max0.211198662
average0.18955873500000003
stddev0.020181696752348512
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://rfc2822.gitlab.io/fdroid-firefox/fdroid/repo
starttime1768191386
duration0.3162569999694824
status403
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:27 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionclose
accept-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cf-mitigatedchallenge
critical-chSec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policyrequire-corp
cross-origin-resource-policysame-origin
origin-agent-cluster?1
permissions-policyaccelerometer=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policysame-origin
server-timingchlray;desc="9bc9d6a97df09320"
x-content-type-optionsnosniff
x-frame-optionsSAMEORIGIN
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
Report-To{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QVbUu19rNG1Arupe0Q6%2F2wwgn0hEa9E8MMI%2B9Mv0EaWSBq6jcQguV6KDrNSGme2OHkKtf49N1TalPmDiN220aGNqL7McI5NGmyjGCy2Zo%2Bws6%2BFmaK5p43tz9FU%3D"}],"group":"cf-nel","max_age":604800}
NEL{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
VaryAccept-Encoding
Strict-Transport-Securitymax-age=31536000
Servercloudflare
CF-RAY9bc9d6a97df09320-ATL
Content-Encodingbr
tlsping
hostrfc2822.gitlab.io
ip35.185.44.232
addressrfc2822.gitlab.io:443
connectionTLS
count10
min0.042234139
max0.048873078
average0.0449371897
stddev0.0018876981673407994
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://s2.spiritcroc.de/fdroid/repo
ip23.88.107.207
VerificationExceptionJAR signature failed to verify: /tmp/tmp1jhjamp3 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191387
duration0.9066481590270996
status200
TLSTLSv1.2
headers
Servernginx
DateMon, 12 Jan 2026 04:16:28 GMT
Content-Typeapplication/java-archive
Content-Length11350
Last-ModifiedMon, 22 Dec 2025 11:07:53 GMT
Connectionkeep-alive
ETag"69492689-2c56"
Strict-Transport-Securitymax-age=15768000; includeSubDomains; preload
Accept-Rangesbytes
tlsping
hosts2.spiritcroc.de
ip23.88.107.207
addresss2.spiritcroc.de:443
connectionTLS
count10
min0.361482436
max0.367460136
average0.364525481
stddev0.00205812516912966
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
warnings
  • Key exchange (ecdh_x25519) of lower strength than certificate key
least strengthA
https://s3.amazonaws.com/storymaker/fdroid/repo
ip16.182.40.160
starttime1768191394
duration0.10952186584472656
status403
TLSTLSv1.3
headers
x-amz-request-id0SB43RERCZMBDNW6
x-amz-id-2H5tBXFbkQMq8w8PXUekUrOUdvjjWHWoczDPBi4KHP2GoBIF5VoXHcser7nTJskfwRLo2GXU7V3A=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateMon, 12 Jan 2026 04:16:34 GMT
ServerAmazonS3
tlsping
hosts3.amazonaws.com
ip54.231.140.96
addresss3.amazonaws.com:443
connectionTLS
count10
min0.074708177
max0.077433257
average0.07594888999999999
stddev0.000931271755386688
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
cipher preferenceserver
least strengthA
https://secfirst.org/fdroid/repo
SSLErrorHTTPSConnectionPool(host='secfirst.org', port=443): Max retries exceeded with url: /fdroid/repo/index-v1.jar (Caused by SSLError(SSLCertVerificationError(1, '[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)')))
starttime1768191396
duration0.33318591117858887
status403
TLS[SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: certificate has expired (_ssl.c:992)
headers
x-amz-request-id0SB43RERCZMBDNW6
x-amz-id-2H5tBXFbkQMq8w8PXUekUrOUdvjjWHWoczDPBi4KHP2GoBIF5VoXHcser7nTJskfwRLo2GXU7V3A=
Content-Typeapplication/xml
Transfer-Encodingchunked
DateMon, 12 Jan 2026 04:16:34 GMT
ServerAmazonS3
tlspingNone
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_256_CBC_SHA (rsa 2048) - A
  • TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_CAMELLIA_128_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
least strengthA
https://static.cryptomator.org/android/fdroid/repo
ip172.67.132.219
VerificationExceptionJAR signature failed to verify: /tmp/tmp8fr5t2sh The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191409
duration0.9259629249572754
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:49 GMT
Content-Typeapplication/java-archive
Content-Length6188
Connectionkeep-alive
Accept-Rangesbytes
etag"342f5a8ebdf8a77587b0b8f9095c2075"
last-modifiedMon, 06 Oct 2025 16:58:07 GMT
x-amz-id-2txg6d5788059d194842a650-00696475b1
x-amz-request-idtxg6d5788059d194842a650-00696475b1
Cache-Controlmax-age=28800
cf-cache-statusMISS
Nel{"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Varyaccept-encoding
Report-To{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=f5YD9%2FUEpRLXCXsHieJsyaIdi7hQQ0KXzZ8GAWGEGBgTeende%2FsleD5bM6C%2Fb1et2pgBEjvFR8%2B3tAfEChN6N8I6vakFDl53NzKuGG%2BJlk2sIwrPGFk%3D"}]}
Servercloudflare
CF-RAY9bc9d732df2b57b4-ATL
alt-svch3=":443"; ma=86400
tlsping
hoststatic.cryptomator.org
ip172.67.132.219
addressstatic.cryptomator.org:443
connectionTLS
count10
min0.165695004
max0.214563252
average0.1967373885
stddev0.015957200019650078
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://store.nethunter.com/repo
ip45.33.83.228
VerificationExceptionJAR signature failed to verify: /tmp/tmpdykni_xv The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191411
duration0.5198688507080078
status200
TLSTLSv1.2
headers
Servernginx
DateMon, 12 Jan 2026 04:16:51 GMT
Content-Typeapplication/java-archive
Content-Length45628
Last-ModifiedThu, 08 Jan 2026 12:23:24 GMT
Connectionkeep-alive
ETag"695fa1bc-b23c"
Accept-Rangesbytes
tlsping
hoststore.nethunter.com
ip45.33.83.228
addressstore.nethunter.com:443
connectionTLS
count10
min0.144738894
max0.167524654
average0.1529096933
stddev0.008065386079291912
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
least strengthA
https://submarine.strangled.net/fdroid/repo
ip178.68.58.166
VerificationExceptionJAR signature failed to verify: /tmp/tmpgwpy8omv The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191412
duration0.8086509704589844
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:16:53 GMT
ServerApache/2.4.29 (Ubuntu)
Last-ModifiedSun, 01 Dec 2024 22:35:25 GMT
ETag"1087-6283d0c58d7a9"
Accept-Rangesbytes
Content-Length4231
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostsubmarine.strangled.net
ip178.68.58.166
addresssubmarine.strangled.net:443
connectionTLS
count10
min0.325137677
max0.475193622
average0.3411909045
stddev0.04467394975556376
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 2048) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_128_CBC_SHA (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 (dh 2048) - A
  • TLS_DHE_RSA_WITH_AES_256_CBC_SHA (dh 2048) - A
  • TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A
  • TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A
  • TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
cipher preferenceserver
least strengthA
https://www.anonymousmessenger.ly/fdroid/repo
ip185.176.41.167
VerificationExceptionJAR signature failed to verify: /tmp/tmpdwaqig99 The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191430
duration0.8733260631561279
status200
TLSTLSv1.3
headers
Servernginx/1.27.0
DateMon, 12 Jan 2026 04:17:11 GMT
Content-Typeapplication/java-archive
Content-Length5581
Last-ModifiedThu, 21 Jul 2022 14:06:02 GMT
Connectionkeep-alive
ETag"62d95d4a-15cd"
Accept-Rangesbytes
tlsping
hostwww.anonymousmessenger.ly
ip185.176.41.167
addresswww.anonymousmessenger.ly:443
connectionTLS
count10
min0.350746671
max0.361541431
average0.35522147800000003
stddev0.004271853890579711
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CCM_8 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_ARIA_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_128_CBC_SHA256 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.collaboraoffice.com/downloads/fdroid/repo
ip157.90.115.48
VerificationExceptionJAR signature failed to verify: /tmp/tmpztmbou7o The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191440
duration0.7181241512298584
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:17:21 GMT
ServerApache/2.4.65 (Debian)
X-Content-Type-Optionsnosniff
Strict-Transport-Securitymax-age=31536000; includeSubdomains; preload
Referrer-Policystrict-origin-when-cross-origin
Last-ModifiedSun, 11 Jan 2026 02:30:47 GMT
ETag"118e-648138bd17945"
Accept-Rangesbytes
Content-Length4494
x-robots-tagnoindex
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.collaboraoffice.com
ip157.90.115.48
addresswww.collaboraoffice.com:443
connectionTLS
count10
min0.267400629
max0.270566779
average0.268912836
stddev0.0010961479322158052
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (dh 4096) - A
  • TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (dh 4096) - A
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
warnings
  • Key exchange (secp256r1) of lower strength than certificate key
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.cromite.org/fdroid/repo
ip89.46.108.70
starttime1768191445
duration5.668020963668823
status502
TLSTLSv1.3
headers
Serveraruba-proxy
DateMon, 12 Jan 2026 04:17:31 GMT
Content-Typetext/html
Transfer-Encodingchunked
Connectionkeep-alive
ETagW/"69414629-1bf25"
Alt-Svch3=":443"; ma=86400
tlsping
hostwww.cromite.org
ip89.46.108.70
addresswww.cromite.org:443
connectionTLS
count10
min0.27166506
max0.27496156
average0.273329212
stddev0.0010847307951634816
error
ssl-enum-ciphers
TLSv1.2
ciphers
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1) - A
  • TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.droidware.info/fdroid/repo
ip104.18.27.114
starttime1768191456
duration0.32492709159851074
status403
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:17:36 GMT
Content-Typetext/html; charset=UTF-8
Transfer-Encodingchunked
Connectionkeep-alive
X-Frame-OptionsSAMEORIGIN
Referrer-Policysame-origin
Cache-Controlprivate, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
ExpiresThu, 01 Jan 1970 00:00:01 GMT
VaryAccept-Encoding
Servercloudflare
CF-RAY9bc9d85b5dc0bd11-ATL
Content-Encodinggzip
tlsping
hostwww.droidware.info
ip104.21.89.103
addresswww.droidware.info:443
connectionTLS
count10
min0.146953124
max0.210922332
average0.1832816392
stddev0.01997063474762759
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA
https://www.ma-nic.de/fdroid/repo
ip109.250.136.203
VerificationExceptionJAR signature failed to verify: /tmp/tmp5r21t30n The jar will be treated as unsigned, because it is signed with a weak algorithm that is now disabled. Re-run jarsigner with the -verbose option for more details.
starttime1768191457
duration0.7402000427246094
status200
TLSTLSv1.3
headers
DateMon, 12 Jan 2026 04:17:37 GMT
ServerApache/2.4.65 (Debian)
Last-ModifiedTue, 06 Jun 2023 16:06:08 GMT
ETag"1094-5fd7832786fe5"
Accept-Rangesbytes
Content-Length4244
Keep-Alivetimeout=5, max=100
ConnectionKeep-Alive
Content-Typeapplication/java-archive
tlsping
hostwww.ma-nic.de
ip109.250.136.203
addresswww.ma-nic.de:443
connectionTLS
count10
min0.311253579
max0.484999894
average0.38119078500000003
stddev0.0603599572044753
error
ssl-enum-ciphers
TLSv1.0
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.1
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceserver
TLSv1.2
ciphers
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
compressors
  • NULL
cipher preferenceclient
TLSv1.3
ciphers
  • TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A
  • TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A
  • TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A
cipher preferenceclient
least strengthA