Filter by:

ict-procurement.digital.gov.au

/var/www/disclogs/web/web/showDomain.php (line 14)
  • reset($query->fetchAll(PDO::FETCH_ASSOC))
    9
    array
    • domain_name
      ict-procurement.digital.gov.au
      30
      string
    • second_level_domain_name
      digital.gov.au
      14
      string
    • whois
      null
      null
    • dns
      {"A": ["54.252.130.223", "13.210.163.207"]}
      stringjsonobject
    • ip_whois
      {"region": "ap-southeast-2", "service": "AMAZON", "entities": ["AMAZON"], "ip_prefix": "54.252.0.0/16"}
      stringjsonobject
      • region
        ap-southeast-2
        14
        string
      • service
        AMAZON
        6
        string
      • ip_prefix
        54.252.0.0/16
        13
        string
    • active
      true
      boolean
    • data_created_at
      2018-06-07 23:25:49.067311+00
      -5m 3w
      stringdatetime
    • data_updated_at
      2018-06-07 23:52:50.661204+00
      -5m 3w
      stringdatetime
    • https
      {"ocsp_response": null, "certificate_chain": [{"issuer": {"commonName": "Let's Encrypt Authority X3", "countryName": "US", "organizationName": "Let's Encrypt"}, "subject": {"commonName": "ict-procurement.digital.gov.au"}, "keyUsage": "<KeyUsage(digital_signature=True, content_commitment=False, key_encipherment=True, data_encipherment=False, key_agreement=False, key_cert_sign=False, crl_sign=False, encipher_only=None, decipher_only=None)>", "subjectAltName": ["ict-procurement.digital.gov.au"], "not_valid_after": "2018-09-02T21:08:25", "basicConstraints": "<BasicConstraints(ca=False, path_length=None)>", "extendedKeyUsage": "<ExtendedKeyUsage([<ObjectIdentifier(oid=1.3.6.1.5.5.7.3.1, name=serverAuth)>, <ObjectIdentifier(oid=1.3.6.1.5.5.7.3.2, name=clientAuth)>])>", "not_valid_before": "2018-06-04T21:08:25", "authorityInfoAccess": "<AuthorityInformationAccess([<AccessDescription(access_method=<ObjectIdentifier(oid=1.3.6.1.5.5.7.48.1, name=OCSP)>, access_location=<UniformResourceIdentifier(value='http://ocsp.int-x3.letsencrypt.org')>)>, <AccessDescription(access_method=<ObjectIdentifier(oid=1.3.6.1.5.5.7.48.2, name=caIssuers)>, access_location=<UniformResourceIdentifier(value='http://cert.int-x3.letsencrypt.org/')>)>])>", "certificatePolicies": "<CertificatePolicies([<PolicyInformation(policy_identifier=<ObjectIdentifier(oid=2.23.140.1.2.1, name=Unknown OID)>, policy_qualifiers=None)>, <PolicyInformation(policy_identifier=<ObjectIdentifier(oid=1.3.6.1.4.1.44947.1.1.1, name=Unknown OID)>, policy_qualifiers=['http://cps.letsencrypt.org', <UserNotice(notice_reference=None, explicit_text='This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/')>])>])>", "subjectKeyIdentifier": "<SubjectKeyIdentifier(digest=b'd-*\\xc0\\xfc2\\xf6\\xd1h\\xe2O\\xd3Y\\x90\\x122\\xc0\\xc2j\\xfd')>", "authorityKeyIdentifier": "<AuthorityKeyIdentifier(key_identifier=b'\\xa8Jjc\\x04}\\xdd\\xba\\xe6\\xd19\\xb7\\xa6Ee\\xef\\xf3\\xa8\\xec\\xa1', authority_cert_issuer=None, authority_cert_serial_number=None)>", "signature_hash_algorithm": "sha256", "PrecertificateSignedCertificateTimestamps": "<PrecertificateSignedCertificateTimestamps([<cryptography.hazmat.backends.openssl.x509._SignedCertificateTimestamp object at 0x7fe09e4dc7f0>, <cryptography.hazmat.backends.openssl.x509._SignedCertificateTimestamp object at 0x7fe09e4dc9b0>])>"}, {"issuer": {"commonName": "DST Root CA X3", "organizationName": "Digital Signature Trust Co."}, "subject": {"commonName": "Let's Encrypt Authority X3", "countryName": "US", "organizationName": "Let's Encrypt"}, "keyUsage": "<KeyUsage(digital_signature=True, content_commitment=False, key_encipherment=False, data_encipherment=False, key_agreement=False, key_cert_sign=True, crl_sign=True, encipher_only=None, decipher_only=None)>", "not_valid_after": "2021-03-17T16:40:46", "basicConstraints": "<BasicConstraints(ca=True, path_length=0)>", "not_valid_before": "2016-03-17T16:40:46", "authorityInfoAccess": "<AuthorityInformationAccess([<AccessDescription(access_method=<ObjectIdentifier(oid=1.3.6.1.5.5.7.48.1, name=OCSP)>, access_location=<UniformResourceIdentifier(value='http://isrg.trustid.ocsp.identrust.com')>)>, <AccessDescription(access_method=<ObjectIdentifier(oid=1.3.6.1.5.5.7.48.2, name=caIssuers)>, access_location=<UniformResourceIdentifier(value='http://apps.identrust.com/roots/dstrootcax3.p7c')>)>])>", "certificatePolicies": "<CertificatePolicies([<PolicyInformation(policy_identifier=<ObjectIdentifier(oid=2.23.140.1.2.1, name=Unknown OID)>, policy_qualifiers=None)>, <PolicyInformation(policy_identifier=<ObjectIdentifier(oid=1.3.6.1.4.1.44947.1.1.1, name=Unknown OID)>, policy_qualifiers=['http://cps.root-x1.letsencrypt.org'])>])>", "subjectKeyIdentifier": "<SubjectKeyIdentifier(digest=b'\\xa8Jjc\\x04}\\xdd\\xba\\xe6\\xd19\\xb7\\xa6Ee\\xef\\xf3\\xa8\\xec\\xa1')>", "cRLDistributionPoints": "<CRLDistributionPoints([<DistributionPoint(full_name=[<UniformResourceIdentifier(value='http://crl.identrust.com/DSTROOTCAX3CRL.crl')>], relative_name=None, reasons=None, crl_issuer=None)>])>", "authorityKeyIdentifier": "<AuthorityKeyIdentifier(key_identifier=b'\\xc4\\xa7\\xb1\\xa4{,q\\xfa\\xdb\\xe1K\\x90u\\xff\\xc4\\x15`\\x85\\x89\\x10', authority_cert_issuer=None, authority_cert_serial_number=None)>", "signature_hash_algorithm": "sha256"}], "SSLV2 Cipher Suites": [], "SSLV3 Cipher Suites": [], "TLSV1 Cipher Suites": ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", "TLS_DHE_RSA_WITH_AES_256_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_RSA_WITH_AES_256_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_RSA_WITH_3DES_EDE_CBC_SHA"], "ocsp_response_status": null, "TLSV1_1 Cipher Suites": ["TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", "TLS_DHE_RSA_WITH_AES_256_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_RSA_WITH_AES_256_CBC_SHA", "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_RSA_WITH_AES_128_CBC_SHA", "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_RSA_WITH_3DES_EDE_CBC_SHA"], "TLSV1_2 Cipher Suites": ["TLS_DHE_RSA_WITH_AES_256_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384", "TLS_DHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_RSA_WITH_AES_256_CBC_SHA256", "TLS_DHE_RSA_WITH_AES_256_CBC_SHA256", "TLS_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA", "TLS_RSA_WITH_AES_256_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384", "TLS_RSA_WITH_AES_256_GCM_SHA384", "TLS_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_DHE_RSA_WITH_AES_128_GCM_SHA256", "TLS_RSA_WITH_AES_128_CBC_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256", "TLS_RSA_WITH_AES_128_GCM_SHA256", "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_AES_128_CBC_SHA256", "TLS_DHE_RSA_WITH_AES_128_CBC_SHA", "TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA", "TLS_RSA_WITH_AES_128_CBC_SHA", "TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256", "TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_RSA_WITH_3DES_EDE_CBC_SHA", "TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA"], "TLSV1_3 Cipher Suites": [], "is_leaf_certificate_ev": false, "is_ocsp_response_trusted": null, "symantec_distrust_timeline": null, "tls_server_name_indication": "ict-procurement.digital.gov.au", "certificate_matches_hostname": true, "has_sha1_in_certificate_chain": false, "highest_ssl_version_supported": "TLSV1_2", "certificate_included_scts_count": 2, "has_anchor_in_certificate_chain": false, "openssl_cipher_string_supported": "ECDHE-RSA-AES256-GCM-SHA384", "is_certificate_chain_order_valid": true, "certificate_has_must_staple_extension": false}
      stringjsonobject
      • ocsp_response
        null
        null
      • ocsp_response_status
        null
        null
      • is_leaf_certificate_ev
        false
        boolean
      • is_ocsp_response_trusted
        null
        null
      • symantec_distrust_timeline
        null
        null
      • tls_server_name_indication
        ict-procurement.digital.gov.au
        30
        string
      • certificate_matches_hostname
        true
        boolean
      • has_sha1_in_certificate_chain
        false
        boolean
      • highest_ssl_version_supported
        TLSV1_2
        7
        string
      • certificate_included_scts_count
        2
        integer
      • has_anchor_in_certificate_chain
        false
        boolean
      • openssl_cipher_string_supported
        ECDHE-RSA-AES256-GCM-SHA384
        27
        string
      • is_certificate_chain_order_valid
        true
        boolean
      • certificate_has_must_staple_extension
        false
        boolean
titlepathsize_bytesword_countload_time
ICT Procurement Taskforce | Digital Transformation Agency / 13135 357 0.490006497
ICT Procurement Taskforce Report /assets/documents/ICT-procurement-taskforce-report_WCAG.pdf 571887 17741 0.825002486