Audit Trail
Evidence record for domain check
Integrity Verified
Test Node Identity
{
"os": "Linux srv1440888 6.8.0-101-generic #101-Ubuntu SMP PREEMPT_DYNAMIC Mon Feb 9 10:15:05 UTC 2026 x86_64",
"hostname": "srv1440888",
"php_version": "8.3.30",
"server_ipv4": "76.13.221.142",
"server_ipv6": "2a02:4780:5e:2789::1"
}
Node Network Evidence
{
"profile": "dual_stack",
"enforcement_evidence": {
"egress_check": {
"v4_egress": "76.13.221.142",
"v6_egress": "2a02:4780:5e:2789::1"
},
"ip_routes_v4": "default via 76.13.221.254 dev eth0 proto static \n76.13.221.0/24 dev eth0 proto kernel scope link src 76.13.221.142 \n",
"ip_routes_v6": "2a02:4780:5e::/48 dev eth0 proto kernel metric 256 pref medium\nfe80::/64 dev eth0 proto kernel metric 256 pref medium\ndefault via 2a02:4780:5e::1 dev eth0 proto static metric 1024 pref medium\n",
"sysctl_flags": {
"net.ipv6.conf.all.disable_ipv6": "0"
},
"nftables_summary": "unavailable or no permissions"
}
}
DNS Responses
A
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23408 ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; ANSWER SECTION: bankrakyat.com.my. 60 IN A 45.60.159.140 bankrakyat.com.my. 60 IN A 45.60.155.140
DS
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42494 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; AUTHORITY SECTION: com.my. 1800 IN SOA b.nic.my. hostmaster.nic.my. 2026018479 1800 900 604800 3600
MX
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 34212 ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; ANSWER SECTION: bankrakyat.com.my. 26 IN MX 10 mx1.bankrakyat.com.my. bankrakyat.com.my. 26 IN MX 20 mx2.bankrakyat.com.my. bankrakyat.com.my. 26 IN MX 0 mx.bankrakyat.com.my.
NS
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6166 ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; ANSWER SECTION: bankrakyat.com.my. 3600 IN NS hpnt4.bankrakyat.com.my.
TXT
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16054 ;; flags: qr rd ra; QUERY: 1, ANSWER: 9, AUTHORITY: 0, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; ANSWER SECTION: bankrakyat.com.my. 2679 IN TXT "qhfldc0gk1d4mz1zkss92pq03rb8wf8g" bankrakyat.com.my. 2679 IN TXT "google-site-verification=shtLgWmZ5HrZHol95--947CqYF01H9Qo-84YZ_pCY5s" bankrakyat.com.my. 2679 IN TXT "globalsign-domain-verification=442AE5C04430BF18E93E3A6A169F9D39" bankrakyat.com.my. 2679 IN TXT "FV7uIXEhnkDoGZgJ8r6xuBSkgcNRDmkC9RgApf2Za2E2JDDMJiRMrg1v7mfefb2bwguZ1uIHkbl4dgLzeT3bMA==" bankrakyat.com.my. 2679 IN TXT "_ietdkg9nc5qt7mkqy6p87x0sn33gfp4" bankrakyat.com.my. 2679 IN TXT "globalsign-domain-verification=162a2a62301ce4ea1829c6a33062cd57" bankrakyat.com.my. 2679 IN TXT "jk54b2t4zltw3sr6xxwdb9p6wclsftft" bankrakyat.com.my. 2679 IN TXT "v=spf1 ip4:1.9.61.235 ip4:1.9.61.236 ip4:1.9.61.165 ip4:168.63.237.150 ip4:207.46.227.230 ip4:168.63.248.182 include:email-messaging.com -all" bankrakyat.com.my. 2679 IN TXT "google-site-verification=xGp-DJguir1j4D4dfcQgyIezmhmO0L-X8sp6PpdOHtU"
AAAA
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64847 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; AUTHORITY SECTION: bankrakyat.com.my. 900 IN SOA hpnt4.bankrakyat.com.my. admin.bankrakyat.com.my. 2017102097 10800 3600 2419200 900
RRSIG
hpnt4.bankrakyat.com.my. admin.bankrakyat.com.my. 2017102097 10800 3600 2419200 900
DNSKEY
;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 16926 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; AUTHORITY SECTION: bankrakyat.com.my. 873 IN SOA hpnt4.bankrakyat.com.my. admin.bankrakyat.com.my. 2017102097 10800 3600 2419200 900
DNSSEC_VALIDATION
; unsigned answer bankrakyat.com.my. 3600 IN SOA hpnt4.bankrakyat.com.my. admin.bankrakyat.com.my. 2017102097 10800 3600 2419200 900
DNS Resolution Performance
Comparison of A (IPv4) vs AAAA (IPv6) query times across resolvers and transports. Shows median (p50) of 3 samples.
| Resolver | Transport | A (IPv4) | AAAA (IPv6) | Delta |
|---|---|---|---|---|
| System | Default | 7.58 ms (p95: 7.74) | 9.04 ms (p95: 18.09) | +1.5 ms |
| IPv4 | 32.76 ms (p95: 46.15) | 30.01 ms (p95: 31.16) | -2.8 ms | |
| IPv6 | 31.82 ms (p95: 44.25) | 26.1 ms (p95: 37.26) | -5.7 ms | |
| Cloudflare | IPv4 | 11.68 ms (p95: 16.97) | 18.97 ms (p95: 19.04) | +7.3 ms |
| Cloudflare | IPv6 | 18.96 ms (p95: 33.39) | 17.81 ms (p95: 2038.91) | -1.2 ms |
TLS Handshake Details
{
"ipv4": {
"ip_used": "45.60.155.140",
"ip_version": 4,
"raw_handshake": "4007F9047D740000:error:0A000458:SSL routines:ssl3_read_bytes:tlsv1 unrecognized name:../ssl/record/rec_layer_s3.c:1599:SSL alert number 112\nCONNECTED(00000010)\n---\nno peer certificate available\n---\nNo client certificate CA names sent\n---\nSSL handshake has read 7 bytes and written 319 bytes\nVerification: OK\n---\nNew, (NONE), Cipher is (NONE)\nSecure Renegotiation IS NOT supported\nCompression: NONE\nExpansion: NONE\nNo ALPN negotiated\nEarly data was not sent\nVerify return code: 0 (ok)\n---"
}
}
HTTP Response Headers
{
"v4_http": {
"http_code": 503,
"curl_error": null,
"primary_ip": "45.60.155.140",
"total_time_ms": 320.45,
"connect_time_ms": 160.5,
"response_headers": [
"HTTP/1.1 503 Service Unavailable",
"Content-Type: text/html",
"Cache-Control: no-cache, no-store",
"Connection: close",
"Content-Length: 706",
"X-Iinfo: 6-59314600-0 0NNN RT(1772787679233 0) q(0 -1 -1 -1) r(0 -1)"
],
"starttransfer_time_ms": 320.33
},
"v4_https": {
"http_code": 0,
"curl_error": "OpenSSL/3.0.13: error:0A000458:SSL routines::tlsv1 unrecognized name",
"primary_ip": "45.60.155.140",
"total_time_ms": 320.18,
"connect_time_ms": 159.43,
"response_headers": [],
"starttransfer_time_ms": 0
}
}
Connectivity Test Output
{
"tcp_connect_v4_80": "503 0.159775 0.319707",
"tcp_connect_v4_443": "000 0.159867 0.000000"
}
Integrity Details
Algorithm: hmac-sha256-v1
Root Hash: 1fe0726c288a0157e2a3ce0f4042dfe480aa4245b0a637080f4950b186b1fbd3
http_headers: 4565b016a9a28a59a67c7117dea6754e63d628b2c9906befa76de2fd582d6933
dns_responses: c175f62282a40244e91bd46ae0da4b78ca64963fec38f8275098bcee6b9b4343
tls_handshake: 9d961a264e5a17c8ada6dfa12833dd9c92def5c545b775d07b1999b938385809
connectivity_log: 23fc609240bd270152adcf0b13199b049d0c23380b41484874bb7730d9d6f88a
dns_resolution_times: 8d31926369d73f398694e2ee4d831455c211cac271380afd091363780a63ea51