If this tool helped you, you can buy us a coffee ☕
Scan websites or servers for the TLS Ticketbleed vulnerability (CVE-2016-9244) to assess the risk of memory information leaks.
Please enter a domain or IP address to start detection

Random User Agent Generator
Generate random browser User-Agent strings for developers, QA testers, and web scrapers to simulate various devices and platforms.

MAC Address Vendor Lookup
Enter a MAC address to instantly identify the device manufacturer and detailed physical address. Perfect for network management and security auditing.

IPv4 / IPv6 Address Converter
A two-way IPv4 and IPv6 address converter for network configuration, debugging, and format validation.

Download Link Converter
Convert HTTP/HTTPS file URLs into dedicated download links for Thunder, FlashGet, and QQ Xuanfeng to use with various download clients.

Random User Agent Generator
Generate random browser User-Agent strings for developers, QA testers, and web scrapers to simulate various devices and platforms.

MAC Address Vendor Lookup
Enter a MAC address to instantly identify the device manufacturer and detailed physical address. Perfect for network management and security auditing.

IPv4 / IPv6 Address Converter
A two-way IPv4 and IPv6 address converter for network configuration, debugging, and format validation.

Download Link Converter
Convert HTTP/HTTPS file URLs into dedicated download links for Thunder, FlashGet, and QQ Xuanfeng to use with various download clients.

TLS LOGJAM Vulnerability Scanner
Scan your website's TLS configuration for the LOGJAM vulnerability and evaluate the security of your Diffie-Hellman key exchange.
When your website uses an affected version of OpenSSL, attackers can repeatedly request Session Tickets to steal up to 31 bytes of sensitive data from server memory, including session keys, thereby compromising TLS/HTTPS communication security. Designed for this scenario, our tool simulates a specific TLS handshake process to detect whether the target domain and specified port are vulnerable to the TLS Ticketbleed vulnerability (CVE-2016-9244). TLS Session Tickets are a mechanism used to resume TLS sessions, intended to reduce handshake overhead, but implementation flaws can lead to information disclosure.
Q: What is the specific impact of the TLS Ticketbleed vulnerability?
A: Attackers can exploit this vulnerability to read sensitive information (such as session keys and HTTP header fragments) from server memory, potentially leading to session hijacking or man-in-the-middle (MitM) attacks. The vulnerability severity rating is HIGH.
Q: How can I fix a detected Ticketbleed vulnerability?
A: Upgrade OpenSSL to a patched version (1.0.1t, 1.0.2h, or higher), or disable the session ticket feature in your server configuration.
Please ensure you enter a valid domain name; the tool does not support testing pure IP addresses. The scan results only reflect the server's response status at the current moment; you will need to rescan after any configuration changes. This tool is a specialized scanner and does not replace comprehensive penetration testing or security audits.
For security operations personnel, we recommend integrating this tool into your regular asset vulnerability scanning workflow. Typical testing scenario: Enter "github.com" and port "443". If it returns "OK", it indicates that the service is currently not affected by CVE-2016-9244. Note that even if the test passes, regular re-checks are advised, and you should ensure that the server's OpenSSL version is continuously updated to prevent other potential TLS/SSL vulnerabilities. In hybrid cloud or containerized environments, all nodes exposing HTTPS services should be tested individually.