SSL Cipher Suite & Security Scanner avatar

SSL Cipher Suite & Security Scanner

Pricing

from $1.00 / 1,000 host scans

Go to Apify Store
SSL Cipher Suite & Security Scanner

SSL Cipher Suite & Security Scanner

Audit TLS versions and negotiated cipher suites for a list of domains to ensure compliance and robust web security.

Pricing

from $1.00 / 1,000 host scans

Rating

0.0

(0)

Developer

Andok

Andok

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

19 days ago

Last modified

Share

TLS Cipher Suite Scanner

Scan TLS cipher suites to detect weak or deprecated configurations across your entire domain inventory. Outdated ciphers like RC4 or CBC-mode suites remain a top finding in compliance audits, and many teams lack visibility until a scanner flags them. Check hundreds of hosts in parallel and get structured results ready for reporting.

Features

  • Cipher suite detection — identifies the exact cipher suite negotiated during the TLS handshake
  • Protocol version reporting — reports TLS 1.2, TLS 1.3, or older protocol versions for each host
  • Certificate validation — checks whether the server certificate is authorized and trusted
  • ALPN negotiation — reports Application-Layer Protocol Negotiation results (h2, http/1.1)
  • Bulk scanning — check hundreds of domains concurrently in a single run
  • Flexible input — accepts plain domains, URLs, or objects with domain/url fields

Input

FieldTypeRequiredDefaultDescription
domainsarrayYesList of domains or hostnames to scan (e.g., example.com). Also accepts URLs or objects with domain/url fields
timeoutSecondsintegerNo15Connection timeout per domain in seconds (1-60)
concurrencyintegerNo10Number of domains to scan in parallel (1-50)

Input Example

{
"domains": [
"google.com",
"github.com",
"example.com"
],
"concurrency": 20
}

Output

Each domain produces one dataset record with the negotiated TLS parameters and certificate status.

Key output fields:

  • domain (string) — the hostname that was scanned
  • status (string) — scan result status (OK or ERROR)
  • protocol (string) — negotiated TLS version (e.g., TLSv1.3)
  • cipher (string) — negotiated cipher suite name (e.g., TLS_AES_256_GCM_SHA384)
  • authorized (boolean) — whether the server certificate is trusted
  • alpn (string) — negotiated ALPN protocol (e.g., h2)
  • error (string | null) — error message if the connection failed
  • checkedAt (string) — ISO 8601 timestamp

Output Example

{
"domain": "github.com",
"status": "OK",
"protocol": "TLSv1.3",
"cipher": "TLS_AES_128_GCM_SHA256",
"authorized": true,
"alpn": "h2",
"error": null,
"checkedAt": "2026-03-09T12:00:00.000Z"
}

Pricing

EventCost
Host Scan$0.001

Pay only for hosts successfully scanned. Respects your per-run spending limit.

Use Cases

  • Security audits — verify that all enterprise endpoints use TLS 1.2+ with strong cipher suites
  • PCI DSS compliance — confirm no deprecated protocols or weak ciphers are in use across payment-processing domains
  • Vendor risk assessment — bulk-scan third-party domains to evaluate their TLS configurations before onboarding
  • Infrastructure migration — validate cipher suite consistency after moving to new hosting or CDN providers
  • Scheduled monitoring — run weekly scans to detect cipher downgrades or misconfigurations after server changes
ActorWhat it adds
Security Headers AnalyzerAudit HTTP security headers (HSTS, CSP, etc.) to complement TLS-level checks
SSL Certificate MonitorMonitor certificate expiry dates alongside cipher suite auditing
Subdomain FinderDiscover all subdomains first, then feed them into cipher scanning