The default certbot action is to renew certs when they have less than 1/3 life left.
Certs are issued for 90 days.
So that means at/after 60 days of use | 30 days [or less] left of use.
The cert shown has 79 days left of use.
It should not need to be renewed for another 49 days.
So, today... "sudo certbot renew" will check that cert life and do nothing.
You should be able to see that detail in the log file.
[/var/log/letsencrypt/lesencrypt.log]
From my perspective [from USA over Internet] all these requests return the exact same cert: openssl s_client -connect 86.92.96.222:443 -servername nvbgm.nl openssl s_client -connect 86.92.96.222:443 -servername nvbgm1.nl openssl s_client -connect 86.92.96.222:443 -servername www.nvbgm.nl openssl s_client -connect 86.92.96.222:443 -servername www.nvbgm1.nl
$ nmap -Pn -p80,443 nvbgm.nl
Starting Nmap 7.80 ( https://nmap.org ) at 2023-08-26 15:08 PDT
Nmap scan report for nvbgm.nl (86.92.96.222)
Host is up (0.16s latency).
rDNS record for 86.92.96.222: 86-92-96-222.fixed.kpn.net
PORT STATE SERVICE
80/tcp closed http
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 0.58 seconds
$ nmap -Pn -p80,443 nvbgm1.nl
Starting Nmap 7.80 ( https://nmap.org ) at 2023-08-26 15:08 PDT
Nmap scan report for nvbgm1.nl (86.92.96.222)
Host is up (0.19s latency).
rDNS record for 86.92.96.222: 86-92-96-222.fixed.kpn.net
PORT STATE SERVICE
80/tcp closed http
443/tcp open https
Nmap done: 1 IP address (1 host up) scanned in 0.44 seconds