The SSL Checker actor scans IPs or subnets for SSL certificate details using masscan. It retrieves response headers, titles, and redirected URLs for HTTP and HTTPS. Customize parameters and set result limits for efficient scanning
The SSL and Web Analyzer is a powerful tool that allows users to scan IP ranges, including AWS and Google Cloud networks, to discover critical information such as services running behind Web Application Firewalls (WAFs), potential vulnerabilities, subdomains, and endpoints. It operates like a Shodan-style search engine but offers deeper insights into small companies' infrastructure that larger search engines might overlook.
This actor is designed for security professionals, including hackers, bug bounty hunters, and penetration testers, to increase their attack surface and identify vulnerable endpoints across vast networks.
If you're new to SSL and Web Analyzer or ethical hacking, don't worry. The SSL and Web Analyzer tool is easy to use and highly flexible. You can either use Masscan for a fast scan or provide a list of IP addresses to skip Masscan. Here's how:
Quick Video Tutorial on YouTube:
To start scanning IP ranges or IP addresses, simply fill in the input form. The SSL and Web Analyzer tool recognizes the following input parameters:
[!NOTE] If you are provided more than one IP range, the result won't show up until Masscan is complete from scanning all provided IP ranges.
Use Masscan for Scanning (Checkbox)...: A boolean flag indicating whether or not to use Masscan for scanning.
CIDR or IP Addresses: A list of IP ranges in CIDR format or individual IP addresses for scanning.
Masscan Ports: (Optional) The port(s) you wish to scan with Masscan The default Port of Masscan is 443 you can add more Port if needed like (e.g., 80, 443 or 0-65535). Required only when Masscan is used.
Masscan Rate: (Optional) The rate limit for Masscan (number of packets per second). Required only when Masscan is used.
Maximum Results Limit: (Optional) Set the maximum number of results you want to receive.
Proxy Configuration: (Optional) Use Apify's proxy services to anonymize your scan or access results from a specific geographical location.
1{ 2 "Ips_or_CIDR": [ 3 "3.80.0.0/12", 4 "3.208.0.0/12" 5 ], 6 "Used_Or_Not_Used_Masscan": true, 7 "masscan_port": "443", 8 "masscan_rate": 10000, 9 "max_results": 100, 10 "proxyConfiguration": { 11 "useApifyProxy": true, 12 "apifyProxyGroups": [ 13 "RESIDENTIAL" 14 ], 15 "apifyProxyCountry": "BW" 16 } 17}
1{ 2 "Ips_or_CIDR": [ 3 "3.91.85.6", 4 "3.84.160.117", 5 "3.92.19.235" 6 ], 7 "Used_Or_Not_Used_Masscan": false, 8 "max_results": 33, 9 "proxyConfiguration": { 10 "useApifyProxy": true, 11 "apifyProxyGroups": [ 12 "RESIDENTIAL" 13 ], 14 "apifyProxyCountry": "BW" 15 } 16}
max_results
parameter.You get the output from SSL and Web Analyzer Data Extractor stored in a tab. Here's an example of some of the output after the scan is complete :
1{ 2 "Ips_or_CIDR": [ 3 "3.80.0.0/12" 4 ], 5 "Used_Or_Not_Used_Masscan": true, 6 "masscan_port": "443", 7 "masscan_rate": 10000, 8 "max_results": 2000, 9 "proxyConfiguration": { 10 "useApifyProxy": false 11 } 12}
1[ 2 { 3 "title": "", 4 "redirected_url": "", 5 "request": "https://3.94.15.209:443", 6 "port": "443", 7 "ip": "3.94.15.209", 8 "domain": "*.execute-api.us-east-1.amazonaws.com", 9 "response_text": "{"message":"Forbidden"}", 10 "response_headers": { 11 "Date": "Mon, 07 Oct 2024 23:21:14 GMT", 12 "Content-Type": "application/json", 13 "Content-Length": "23", 14 "Connection": "keep-alive", 15 "x-amzn-RequestId": "c1f2ff47-007d-481e-9a76-02f2bd2c21bc", 16 "x-amzn-ErrorType": "ForbiddenException", 17 "x-amz-apigw-id": "fTX0oGxcoAMEawg=" 18 } 19 }, 20... 21]
The SSL and Web Analyzer integrates seamlessly with Apify’s platform and other tools such as:
You can also use webhooks to trigger alerts or actions whenever a scan completes.
SSL and Web Analyzer
For issues and support, please create a ticket or contact fridaytechnolog@gmail.com.
Yes, if you're scraping publicly available data for personal or internal use. Always review Websute's Terms of Service before large-scale use or redistribution.
No. This is a no-code tool — just enter a job title, location, and run the scraper directly from your dashboard or Apify actor page.
It extracts job titles, companies, salaries (if available), descriptions, locations, and post dates. You can export all of it to Excel or JSON.
Yes, you can scrape multiple pages and refine by job title, location, keyword, or more depending on the input settings you use.
You can use the Try Now button on this page to go to the scraper. You’ll be guided to input a search term and get structured results. No setup needed!