Deep SSL/TLS Vulnerability Test
This report provides a deep analysis of the SSL/TLS configuration of new-api.bpjs-kesehatan.go.id. It checks for protocol support, cipher strength, and known vulnerabilities.
Scan Results
Testing all IP addresses (port 443): 36.67.50.104 160.25.178.35 160.25.179.35 ----------------------------------------------------- Start 2026-01-21 07:52:08 -->> 36.67.50.104:443 (new-api.bpjs-kesehatan.go.id) <<-- Further IP addresses: 160.25.179.35 160.25.178.35 rDNS (36.67.50.104): -- Oops: TCP connect problem Unable to open a socket to 36.67.50.104:443. Done 2026-01-21 07:54:15 [ 137s] -->> 36.67.50.104:443 (new-api.bpjs-kesehatan.go.id) <<-- ----------------------------------------------------- Start 2026-01-21 07:54:15 -->> 160.25.178.35:443 (new-api.bpjs-kesehatan.go.id) <<-- Further IP addresses: 160.25.179.35 36.67.50.104 rDNS (160.25.178.35): -- Oops: TCP connect problem Unable to open a socket to 160.25.178.35:443. Done 2026-01-21 07:56:22 [ 264s] -->> 160.25.178.35:443 (new-api.bpjs-kesehatan.go.id) <<-- ----------------------------------------------------- Start 2026-01-21 07:56:23 -->> 160.25.179.35:443 (new-api.bpjs-kesehatan.go.id) <<-- Further IP addresses: 36.67.50.104 160.25.178.35 rDNS (160.25.179.35): -- Oops: TCP connect problem Unable to open a socket to 160.25.179.35:443. Done 2026-01-21 07:58:30 [ 392s] -->> 160.25.179.35:443 (new-api.bpjs-kesehatan.go.id) <<-- ----------------------------------------------------- Done testing now all IP addresses (on port 443): 36.67.50.104 160.25.178.35 160.25.179.35
About this Scan
This scan uses testssl.sh to check for:
- Protocols: SSLv2, SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3
- Vulnerabilities: Heartbleed, POODLE, FREAK, Logjam, DROWN, etc.
- Cipher Suites: Weak ciphers, perfect forward secrecy (PFS) support.