Collections:
Other Resources:
EMAILADDRESS=postmaster@lokis-chaos.de, piwik.lokis-chaos.de,...
Certificate summary -
Owner: EMAILADDRESS=postmaster@lokis-chaos.de, piwik.lokis-chaos.de, DE, OID.2.5.4.13=Tlh6gAguOTU7lE33
Issuer: StartCom Class 1 Primary Intermediate Server CA, Secure Digital Certificate Signing, StartCom Ltd., IL
Expiration: Thu Nov 07 16:00:37 EST 2013
MD5: 9B:15:ED:A8:F8:64:B8:E5:C8:1C:60:AD:6D:9C:F3:66
Hash: Owner Hash=091902c1, Issuer Hash=ea59305e
✍: FYIcenter.com
Information extracted out of the certificate:
Owner: EMAILADDRESS=postmaster@lokis-chaos.de, CN=piwik.lokis-chaos.de,
C=DE, OID.2.5.4.13=Tlh6gAguOTU7lE33
Issuer: CN=StartCom Class 1 Primary Intermediate Server CA, OU=Secure
Digital Certificate Signing, O=StartCom Ltd., C=IL
Serial number: 7f9ec
Valid from: Tue Nov 06 01:20:45 EST 2012 until: Thu Nov 07 16:00:37 EST
2013
Certificate fingerprints:
MD5: 9B:15:ED:A8:F8:64:B8:E5:C8:1C:60:AD:6D:9C:F3:66
SHA1: C7:02:75:B5:0B:69:1F:C5:63:1A:13:9D:60:36:E6:EA:43:55:E8:B8
SHA256:
9E:32:D0:9F:8D:01:F6:D1:A3:EA:57:B6:AB:78:83:11:74:8C:D0:6E:A6:B4:D4:C8:26:
BF:C7:A9:EB:5C:B7:7C
Signature algorithm name: SHA1withRSA
Version: 3
Extensions:
#1: ObjectId: 1.3.6.1.5.5.7.1.1 Criticality=false
AuthorityInfoAccess [
[
accessMethod: ocsp
accessLocation: URIName: http://ocsp.startssl.com/sub/class1/server/ca
,
accessMethod: caIssuers
accessLocation: URIName:
http://aia.startssl.com/certs/sub.class1.server.ca.crt
]
]
#2: ObjectId: 2.5.29.35 Criticality=false
AuthorityKeyIdentifier [
KeyIdentifier [
0000: EB 42 34 D0 98 B0 AB 9F F4 1B 6B 08 F7 CC 64 2E .B4.......k...d.
0010: EF 0E 2C 45 ..,E
]
]
#3: ObjectId: 2.5.29.19 Criticality=false
BasicConstraints:[
CA:false
PathLen: undefined
]
#4: ObjectId: 2.5.29.31 Criticality=false
CRLDistributionPoints [
[DistributionPoint:
[URIName: http://crl.startssl.com/crt1-crl.crl]
]]
#5: ObjectId: 2.5.29.32 Criticality=false
CertificatePolicies [
[CertificatePolicyId: [2.23.140.1.2.1]
[] ]
[CertificatePolicyId: [1.3.6.1.4.1.23223.1.2.3]
[PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.1
qualifier: 0000: 16 22 68 74 74 70 3A 2F 2F 77 77 77 2E 73 74 61
."http://www.sta
0010: 72 74 73 73 6C 2E 63 6F 6D 2F 70 6F 6C 69 63 79 rtssl.com/policy
0020: 2E 70 64 66 .pdf
], PolicyQualifierInfo: [
qualifierID: 1.3.6.1.5.5.7.2.2
qualifier: 0000: 30 81 EA 30 27 16 20 53 74 61 72 74 43 6F 6D 20
0..0'. StartCom
0010: 43 65 72 74 69 66 69 63 61 74 69 6F 6E 20 41 75 Certification Au
0020: 74 68 6F 72 69 74 79 30 03 02 01 01 1A 81 BE 54 thority0.......T
0030: 68 69 73 20 63 65 72 74 69 66 69 63 61 74 65 20 his certificate
0040: 77 61 73 20 69 73 73 75 65 64 20 61 63 63 6F 72 was issued accor
0050: 64 69 6E 67 20 74 6F 20 74 68 65 20 43 6C 61 73 ding to the Clas
0060: 73 20 31 20 56 61 6C 69 64 61 74 69 6F 6E 20 72 s 1 Validation r
0070: 65 71 75 69 72 65 6D 65 6E 74 73 20 6F 66 20 74 equirements of t
0080: 68 65 20 53 74 61 72 74 43 6F 6D 20 43 41 20 70 he StartCom CA p
0090: 6F 6C 69 63 79 2C 20 72 65 6C 69 61 6E 63 65 20 olicy, reliance
00A0: 6F 6E 6C 79 20 66 6F 72 20 74 68 65 20 69 6E 74 only for the int
00B0: 65 6E 64 65 64 20 70 75 72 70 6F 73 65 20 69 6E ended purpose in
00C0: 20 63 6F 6D 70 6C 69 61 6E 63 65 20 6F 66 20 74 compliance of t
00D0: 68 65 20 72 65 6C 79 69 6E 67 20 70 61 72 74 79 he relying party
00E0: 20 6F 62 6C 69 67 61 74 69 6F 6E 73 2E obligations.
]] ]
]
#6: ObjectId: 2.5.29.37 Criticality=false
ExtendedKeyUsages [
serverAuth
]
#7: ObjectId: 2.5.29.18 Criticality=false
IssuerAlternativeName [
URIName: http://www.startssl.com/
]
#8: ObjectId: 2.5.29.15 Criticality=false
KeyUsage [
DigitalSignature
Key_Encipherment
Key_Agreement
]
#9: ObjectId: 2.5.29.17 Criticality=false
SubjectAlternativeName [
DNSName: piwik.lokis-chaos.de
DNSName: lokis-chaos.de
]
#10: ObjectId: 2.5.29.14 Criticality=false
SubjectKeyIdentifier [
KeyIdentifier [
0000: 82 79 FE 1D F6 61 E3 1F 02 3C C7 67 AA 63 E5 88 .y...a...<.g.c..
0010: 6D 10 C7 BE m...
]
]
Certificate in PEM format (Base64 encoded X.509):
-----BEGIN CERTIFICATE----- MIIGZjCCBU6gAwIBAgIDB/nsMA0GCSqGSIb3DQEBBQUAMIGMMQswCQYDVQQGEwJJ TDEWMBQGA1UEChMNU3RhcnRDb20gTHRkLjErMCkGA1UECxMiU2VjdXJlIERpZ2l0 YWwgQ2VydGlmaWNhdGUgU2lnbmluZzE4MDYGA1UEAxMvU3RhcnRDb20gQ2xhc3Mg MSBQcmltYXJ5IEludGVybWVkaWF0ZSBTZXJ2ZXIgQ0EwHhcNMTIxMTA2MDYyMDQ1 WhcNMTMxMTA3MjEwMDM3WjBxMRkwFwYDVQQNExBUbGg2Z0FndU9UVTdsRTMzMQsw CQYDVQQGEwJERTEdMBsGA1UEAxMUcGl3aWsubG9raXMtY2hhb3MuZGUxKDAmBgkq hkiG9w0BCQEWGXBvc3RtYXN0ZXJAbG9raXMtY2hhb3MuZGUwggEiMA0GCSqGSIb3 DQEBAQUAA4IBDwAwggEKAoIBAQC8ZhpCDf9z48GX3V22v3jnvRHEhL2uCTs5ULXO xt0lUrFYdgaH4MhDXl8CWR2Oht17xNyqKIKGZGKkL186Nj4sVCuqKjrHVWxmTmAr eTO0UaWYIOjGQqvzSROShUKmBSG+4DQ6yVy1W5b8vT0DW9vlZdqqZRCUg1YfyMd7 2Rah8Vosq5tndb5uVV1sqHnqLZYxI8hqRtQODuvqhKCwbrcAbR5CSBasA6gz2HYN d+D8X+Q7DAl5gAljdTP+Sx+EijTpB5NgBUE9Ltp7/j6okLvnHwI9kZbrVBY4exFh jcjrwz7m83LBBWc7YPd01IzQ9jEKvW3WPhW7x1LdZhMqd3rHAgMBAAGjggLpMIIC 5TAJBgNVHRMEAjAAMAsGA1UdDwQEAwIDqDATBgNVHSUEDDAKBggrBgEFBQcDATAd BgNVHQ4EFgQUgnn+HfZh4x8CPMdnqmPliG0Qx74wHwYDVR0jBBgwFoAU60I00Jiw q5/0G2sI98xkLu8OLEUwLwYDVR0RBCgwJoIUcGl3aWsubG9raXMtY2hhb3MuZGWC Dmxva2lzLWNoYW9zLmRlMIIBVgYDVR0gBIIBTTCCAUkwCAYGZ4EMAQIBMIIBOwYL KwYBBAGBtTcBAgMwggEqMC4GCCsGAQUFBwIBFiJodHRwOi8vd3d3LnN0YXJ0c3Ns LmNvbS9wb2xpY3kucGRmMIH3BggrBgEFBQcCAjCB6jAnFiBTdGFydENvbSBDZXJ0 aWZpY2F0aW9uIEF1dGhvcml0eTADAgEBGoG+VGhpcyBjZXJ0aWZpY2F0ZSB3YXMg aXNzdWVkIGFjY29yZGluZyB0byB0aGUgQ2xhc3MgMSBWYWxpZGF0aW9uIHJlcXVp cmVtZW50cyBvZiB0aGUgU3RhcnRDb20gQ0EgcG9saWN5LCByZWxpYW5jZSBvbmx5 IGZvciB0aGUgaW50ZW5kZWQgcHVycG9zZSBpbiBjb21wbGlhbmNlIG9mIHRoZSBy ZWx5aW5nIHBhcnR5IG9ibGlnYXRpb25zLjA1BgNVHR8ELjAsMCqgKKAmhiRodHRw Oi8vY3JsLnN0YXJ0c3NsLmNvbS9jcnQxLWNybC5jcmwwgY4GCCsGAQUFBwEBBIGB MH8wOQYIKwYBBQUHMAGGLWh0dHA6Ly9vY3NwLnN0YXJ0c3NsLmNvbS9zdWIvY2xh c3MxL3NlcnZlci9jYTBCBggrBgEFBQcwAoY2aHR0cDovL2FpYS5zdGFydHNzbC5j b20vY2VydHMvc3ViLmNsYXNzMS5zZXJ2ZXIuY2EuY3J0MCMGA1UdEgQcMBqGGGh0 dHA6Ly93d3cuc3RhcnRzc2wuY29tLzANBgkqhkiG9w0BAQUFAAOCAQEAhA+2hfT9 YodjwJ67n9zbOxPWNzZ1zaTr66xYi+4y+4LImEFqIOlS9OD2/lo1PbcXt4a5ketl Ii1P1LyF2QmCU30pRy2017cohg2a746u/G8cMAt/J7bhqBqjGCzrVWMrpKayO00l kgOVC0IocrhiFkWApPSP38IHl9zCEmvrzsY5lvfZ2b7KmwZ13RoEqzbg+do8+ca3 zQ7sYeDtqp7QOafvXBb81naqsiAwz8+yaqL1qBpQjYxzLhYI8D1ukN+G07lL1ykl KYn29AKrgNtMXo+9pLL2evaFZO1DBgYENUCQyvZkGrc7I27R05NEHg+bkkrhlUx/ ZNRM1hZbnAvP0w== -----END CERTIFICATE-----
Visit the Web site using this certificate: https://www.movie2k.to
2013-07-24, ∼4374🔥, 0💬
Popular Posts:
How to export a certificate from a cert8.db file to a certificate file in PEM format? If you want to...
Certificate Summary: Subject: SwissSign Gold CA - G2 Issuer: SwissSign Gold CA - G2 Expiration: 2036...
Certificate summary - Owner: www.hatena.ne.jp, "Hatena Co., Ltd.", L=Kyoto-shi, ST=Kyoto, JP Issuer:...
Certificate summary - Owner: www.msu.edu, Information Technology Services, Michigan State University...
How to delete a root CA (Certificate Authority) certificate from IE? I don't know this CA and don't ...