Hello @Thom0ne,
The presently being served certificate can be viewed here https://decoder.link/sslchecker/www.r0amwild.com/443 and matches this certificate crt.sh | 15759570328
I see this for http://www.r0amwild.com/
I see this for https://www.r0amwild.com/
$ curl -Ii https://www.r0amwild.com
HTTP/1.1 200 OK
Date: Sat, 14 Dec 2024 21:45:32 GMT
Server: Apache/2.4.58 (Ubuntu)
Last-Modified: Sat, 14 Dec 2024 17:28:30 GMT
ETag: "2110-6293e46acf1f0"
Accept-Ranges: bytes
Content-Length: 8464
Vary: Accept-Encoding
Content-Type: text/html
$ curl -vIi https://www.r0amwild.com
* Trying 195.35.32.76:443...
* Connected to www.r0amwild.com (195.35.32.76) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* CAfile: /etc/ssl/certs/ca-certificates.crt
* CApath: /etc/ssl/certs
* TLSv1.0 (OUT), TLS header, Certificate Status (22):
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS header, Certificate Status (22):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS header, Finished (20):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.2 (OUT), TLS header, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_256_GCM_SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=r0ammild.com
* start date: Dec 14 19:57:58 2024 GMT
* expire date: Mar 14 19:57:57 2025 GMT
* subjectAltName: host "www.r0amwild.com" matched cert's "www.r0amwild.com"
* issuer: C=US; O=Let's Encrypt; CN=E5
* SSL certificate verify ok.
* TLSv1.2 (OUT), TLS header, Supplemental data (23):
> HEAD / HTTP/1.1
> Host: www.r0amwild.com
> User-Agent: curl/7.81.0
> Accept: */*
>
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* TLSv1.3 (IN), TLS handshake, Newsession Ticket (4):
* old SSL session ID is stale, removing
* TLSv1.2 (IN), TLS header, Supplemental data (23):
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
HTTP/1.1 200 OK
< Date: Sat, 14 Dec 2024 21:45:36 GMT
Date: Sat, 14 Dec 2024 21:45:36 GMT
< Server: Apache/2.4.58 (Ubuntu)
Server: Apache/2.4.58 (Ubuntu)
< Last-Modified: Sat, 14 Dec 2024 17:28:30 GMT
Last-Modified: Sat, 14 Dec 2024 17:28:30 GMT
< ETag: "2110-6293e46acf1f0"
ETag: "2110-6293e46acf1f0"
< Accept-Ranges: bytes
Accept-Ranges: bytes
< Content-Length: 8464
Content-Length: 8464
< Vary: Accept-Encoding
Vary: Accept-Encoding
< Content-Type: text/html
Content-Type: text/html
<
* Connection #0 to host www.r0amwild.com left intact
Do you have more evidence?