The SSL/TLS Security Analyzer API is a lightweight and developer-friendly tool for analyzing SSL/TLS configurations of domains. It provides grading from A–F, detects weak ciphers, checks supported protocols, validates certificates, and highlights common vulnerabilities. Whether you’re building a security dashboard, monitoring system, or compliance tool, this API makes SSL/TLS checks seamless.
Base URL
ssl-tls-security-analyzer-api.p.rapidapi.com
Endpoint: /analyze
Methods
GET
POST
Description
Analyze a given domain’s SSL/TLS configuration.
Input: domain/host (and optional port/timeout).
Output: SSL grade, TLS versions, weak ciphers, certificate details, and vulnerability notes.
Query Parameters (GET)
Parameter | Type | Required | Default | Description |
---|---|---|---|---|
domain |
string | ✅ Yes | — | Target domain or hostname (e.g., example.com ). |
host |
string | ❌ No | — | Alias for domain . |
port |
int | ❌ No | 443 | Port to connect to. |
timeout |
int | ❌ No | 5 | Connection timeout in seconds. |
Example GET Request
/analyze?domain=example.com
Request Body (POST)
{
"domain": "example.com",
"port": 443,
"timeout": 5
}
-
domain
(orhost
) – required -
port
– optional, default443
-
timeout
– optional, default5
Response (200 OK)
{
"domain": "example.com",
"port": 443,
"ssl_grade": "B",
"tls_versions": ["TLSv1.2", "TLSv1.3"],
"cipher_list": [
"AES128-SHA",
"AES256-SHA256"
],
"weak_ciphers": [
"AES128-SHA"
],
"certificate": {
"subject": "CN=example.com",
"issuer": "CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US",
"valid_from": "2025-08-01T12:00:00",
"valid_to": "2025-10-30T12:00:00",
"expired": false,
"days_until_expiry": 54
},
"vulnerabilities": [
"Legacy TLS 1.0/1.1 supported",
"Weak ciphers: AES128-SHA",
"Heartbleed: Deep Heartbleed checks not performed by default."
]
}
Error Responses
Code | Example | Meaning |
---|---|---|
400 |
{"error": "domain parameter is required (e.g. domain=example.com)"} |
Missing required parameter. |
500 |
{"error": "internal error", "details": "traceback..."} |
Unexpected internal server error. |
Grading Logic (A–F)
Grades are based on protocol support, cipher strength, and certificate validity:
- A – Only modern TLS (1.2/1.3), strong ciphers, valid cert.
- B – Minor issues (e.g., TLS 1.0 support, weak cipher present).
- C – Legacy protocols/ciphers allowed, but not SSLv3.
- D – SSLv3 or multiple weak ciphers supported.
- F – Expired certs, critical misconfigurations, or only legacy SSL/TLS.
Notes
- POODLE flagged if SSLv3 is enabled.
- Weak Diffie-Hellman flagged if DH params < 2048 bits.
- Output JSON is always structured and safe for integration.
Top comments (0)