Deep SSL/TLS Vulnerability Test
This report provides a deep analysis of the SSL/TLS configuration of tsrdarashaw.com. It checks for protocol support, cipher strength, and known vulnerabilities.
Scan Results
Testing all IP addresses (port 443): 49.248.22.173 122.169.125.166 ----------------------------------------------------- Start 2026-03-17 04:04:55 -->> 49.248.22.173:443 (tsrdarashaw.com) <<-- Further IP addresses: 122.169.125.166 rDNS (49.248.22.173): static-173.22.248.49-tataidc.co.in. Oops: TCP connect problem Unable to open a socket to 49.248.22.173:443. Done 2026-03-17 04:07:02 [ 137s] -->> 49.248.22.173:443 (tsrdarashaw.com) <<-- ----------------------------------------------------- Start 2026-03-17 04:07:02 -->> 122.169.125.166:443 (tsrdarashaw.com) <<-- Further IP addresses: 49.248.22.173 rDNS (122.169.125.166): dsl-mum-static-ilp-166.125.169.122.airtelbroadband.in. Oops: TCP connect problem Unable to open a socket to 122.169.125.166:443. Done 2026-03-17 04:09:10 [ 265s] -->> 122.169.125.166:443 (tsrdarashaw.com) <<-- ----------------------------------------------------- Done testing now all IP addresses (on port 443): 49.248.22.173 122.169.125.166
About this Scan
This scan uses testssl.sh to check for:
- Protocols: SSLv2, SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3
- Vulnerabilities: Heartbleed, POODLE, FREAK, Logjam, DROWN, etc.
- Cipher Suites: Weak ciphers, perfect forward secrecy (PFS) support.