Deep SSL/TLS Vulnerability Test

This report provides a deep analysis of the SSL/TLS configuration of new-api.bpjs-kesehatan.go.id. It checks for protocol support, cipher strength, and known vulnerabilities.

Scan Results

Testing all IP addresses (port 443): 36.67.50.104 160.25.178.35 160.25.179.35
-----------------------------------------------------
 Start 2026-01-21 07:52:08        -->> 36.67.50.104:443 (new-api.bpjs-kesehatan.go.id) <<--

 Further IP addresses:   160.25.179.35 160.25.178.35 
 rDNS (36.67.50.104):    -- Oops: TCP connect problem

Unable to open a socket to 36.67.50.104:443. 


 Done 2026-01-21 07:54:15 [ 137s] -->> 36.67.50.104:443 (new-api.bpjs-kesehatan.go.id) <<--

-----------------------------------------------------
 Start 2026-01-21 07:54:15        -->> 160.25.178.35:443 (new-api.bpjs-kesehatan.go.id) <<--

 Further IP addresses:   160.25.179.35 36.67.50.104 
 rDNS (160.25.178.35):   -- Oops: TCP connect problem

Unable to open a socket to 160.25.178.35:443. 


 Done 2026-01-21 07:56:22 [ 264s] -->> 160.25.178.35:443 (new-api.bpjs-kesehatan.go.id) <<--

-----------------------------------------------------
 Start 2026-01-21 07:56:23        -->> 160.25.179.35:443 (new-api.bpjs-kesehatan.go.id) <<--

 Further IP addresses:   36.67.50.104 160.25.178.35 
 rDNS (160.25.179.35):   -- Oops: TCP connect problem

Unable to open a socket to 160.25.179.35:443. 


 Done 2026-01-21 07:58:30 [ 392s] -->> 160.25.179.35:443 (new-api.bpjs-kesehatan.go.id) <<--

-----------------------------------------------------
Done testing now all IP addresses (on port 443): 36.67.50.104 160.25.178.35 160.25.179.35

About this Scan

This scan uses testssl.sh to check for:

  • Protocols: SSLv2, SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3
  • Vulnerabilities: Heartbleed, POODLE, FREAK, Logjam, DROWN, etc.
  • Cipher Suites: Weak ciphers, perfect forward secrecy (PFS) support.

Run Another Scan Recent Scans