POODLE Test

Recently a vulnerability in the SSLv3 protocol was discovered by Google researchers, which allows to decrypt session keys and, as a consequence, read confidential information. Much like the 2011 BEAST attack, this man-in-the-middle attack enforces an SSLv3 connection, although your Browser and the server on the other end may support higher/newer protocols.

Further information:

It is strongly recommended to deactivate SSL 3.0 completely in your Browser and on any server. You can check here, if your server configuration needs to be updated:


NEW You can also bulk check multiple servers.

Vulnerable Server

Until now we found 2164 servers vulnerable to the POODLE attack. The most recent additions to this list are:

Server Service letzte Prüfung
beneficio.scprev.sc.gov.br https
beneficio.scprev.sc.gov.br https
dgca.gov.kw https
erreserbakirolak.erandio.eus https
mail.frw.ir https
erreserbakirolak.erandio.eus https
erreserbakirolak.erandio.eus https
erreserbakirolak.erandio.eus https
radio.100fm.by https
developer.xpressbet.com https
e.mrktl.email https
uat.kcppoint.com https
citrix.jetelectronics.com https
bhawananugya.mp.gov.in https
id.avg.com https