Free SSL Certificate Checker
Check SSL certificate validity, issuer, expiry, and SAN list for any domain. Uses public Certificate Transparency logs - no scanning, no API key, no signup. Free, instant, comprehensive.
Quick Answer
An SSL certificate checker reports whether a domain has a valid public certificate, who issued it, when it expires, and which subdomains it covers. The U2L SSL Checker queries Certificate Transparency (CT) logs via crt.sh - the same database browsers use to verify cert legitimacy. Returns the most recent currently-valid certificate plus a count of historical certs for the domain.
Quick Facts
- Queries public Certificate Transparency (CT) logs via crt.sh. No live TLS handshake; CT logs cover 99%+ of public certificates.
- Returns the issuer (Let's Encrypt, DigiCert, Sectigo, Google Trust, etc.), validity dates, days until expiry, and the full SAN (Subject Alternative Names) list.
- Detects expired certs, soon-to-expire certs (under 30 days), and overprovisioned certs (excessive SANs that hint at misconfiguration).
- CT-log mandate: since 2018, Chrome, Firefox, Safari, and Edge require CT submission for new public certs. So any browser-trusted cert appears here.
- Cached at the U2L edge for 1 hour. Repeat lookups return instantly without re-querying crt.sh.
- Free, no API key. For deeper analysis (cert chain validation, OCSP, vulnerability scan), use SSL Labs or testssl.sh.
- Useful for: pre-launch QA, expiry monitoring, brand-protection (rogue certs), DNS migration verification, security audits.
How to check SSL certificate info
Two steps. Domain in, cert details out.
- 1
Enter the domain
Type the domain (or subdomain) into the search box. The tool strips https:// and trailing /paths automatically.
- 2
Review the cert details
Issuer, validity dates, days until expiry, and SAN list appear. Look for upcoming expiry warnings (under 30 days) and unexpected issuer changes.
- 3
Optional: drill into history
The tool reports the count of all CT-logged certs for the domain. Click through to crt.sh for the full historical view.
What is a SSL Certificate Checker?
SSL Certificate Checker is a tool that reports SSL certificate metadata for any domain. Instead of opening a browser, clicking the lock icon, and reading the cert dialog, you get the same info as a clean JSON-backed page. Behind the scenes, the U2L tool queries Certificate Transparency (CT) logs - the public, mandatory cert database that browsers use to verify cert legitimacy.
Certificate Transparency was launched by Google in 2013 as a defense against rogue certificate issuance. Every certificate authority (CA) is required to submit issued certs to public, append-only logs. Chrome started requiring CT inclusion for new EV certs in 2015 and for all certs in 2018; Firefox, Safari, and Edge followed. So any cert your browser trusts appears in CT logs - and so any cert appears in the U2L tool.
The U2L tool queries crt.sh, a free public CT-log search engine maintained by Sectigo (formerly Comodo CA) since 2013. crt.sh aggregates CT submissions from all major logs (Argon, Xenon, Nimbus, Yeti) and provides a JSON API. The U2L wrapper normalizes the response into a clean per-cert view: issuer, validity dates, SAN list, serial number.
What this tool is NOT: a live TLS handshake check. We don't dial port 443 on your domain and inspect what cert it serves right now. That's a different (and more invasive) check provided by SSL Labs, testssl.sh, and similar tools. CT-log lookup is faster and covers most use cases - you can see the latest issued cert without bothering the origin server.
How does a SSL Certificate Checker work?
When you submit a domain, the U2L API normalizes the input (strips https://, www., trailing path), validates the format, then calls https://crt.sh/?q=DOMAIN&output=json. crt.sh returns an array of cert records - sometimes hundreds for popular domains - each with issuer, validity dates, common name, SANs, and a serial number.
The U2L wrapper filters to currently-valid certs (not_before <= now <= not_after), sorts by issuance date descending, and returns the most recently issued. This is almost always the cert your browser would see if it visited the domain right now (sometimes wrong by a few minutes during an active rotation, but rarely meaningfully).
The full SAN list is parsed from the raw cert. Wildcard SANs (*.example.com) are common; the tool surfaces them along with explicit subdomains. Long SAN lists (50+ entries) often indicate misconfigured shared certs or hosting platforms that put many tenants on one cert.
Results are cached at the Cloudflare edge for 1 hour with public Cache-Control headers. Repeat queries for the same domain return instantly. crt.sh is free but can be slow during peak hours; the cache layer protects users from those slow paths and keeps response times consistent.
Use Cases
How marketers, businesses, and developers use ssl certificate checker.
Pre-launch SSL QA
Before launching a new site, verify the cert is issued, valid, and covers the right SANs. Catch issuer typos and missing wildcards before users hit the cert error.
Expiry monitoring
Quarterly check on production domains. Catch certs expiring in the next 30 days before they break customer logins. Use as a fallback when your monitoring stack misses one.
Brand-protection (rogue cert detection)
Look for unexpected certs issued for your domain. Rogue certs from a different issuer than your standard CA can indicate a compromised account or misconfigured DNS.
DNS migration verification
After moving a domain to a new hosting provider, confirm the new cert is issued and live. CT logs show the cert immediately after issuance, before DNS fully propagates.
Subdomain audit
Check which subdomains are covered by your wildcard cert. SAN list reveals exactly what's protected; missing entries signal DNS that's not yet behind your cert.
Security audit
Compliance audits often require evidence of cert validity. The CT-log lookup is publicly verifiable evidence that doesn't require server access.
Vendor due diligence
Evaluating a SaaS vendor? Check their cert. Issued by a reputable CA? Recent issue date? SAN list reasonable? All signal good operational hygiene.
M&A technical due diligence
Acquisition target's domains - run cert checks on the full portfolio. Identifies expired or risky certs before close.
DNS migration planning
When changing CDN or hosting providers, confirm the existing cert (or new cert) covers all required SANs. Avoid mid-migration surprises.
Detecting unauthorized cert issuance
Periodic CT-log audits catch certs issued for your domains by unauthorized parties. Use CAA DNS records to prevent this; CT-log lookup confirms whether prevention is working.
SSL Certificate Checker vs Alternatives
Side-by-side feature and pricing comparison with the top alternatives.
| Feature | U2L | SSL Labs | testssl.sh | crt.sh direct |
|---|---|---|---|---|
| Free unlimited lookups | Self-host | |||
| CT-log query (issuer, dates, SANs) | Mixed | Mixed | ||
| Live TLS handshake check | ||||
| Cert chain + OCSP validation | ||||
| Vulnerability scan (Heartbleed, etc.) | ||||
| Browser-only (no install) | ||||
| Edge-cached (sub-second response) | 1h | |||
| JSON / API output | Paid tier |
SSL Certificate Checker vs SSL Labs (ssllabs.com)
SSL Labs is the gold standard for live SSL/TLS analysis. Live TLS handshake, full cert chain validation, OCSP status, vulnerability scan (Heartbleed, POODLE, ROBOT), and a letter grade (A+, B, F). Free, no signup; scans take 30-90 seconds.
U2L's tool is faster and simpler: CT-log query for cert metadata only. For 'when does my cert expire?', U2L is faster. For 'is my TLS configuration secure?', SSL Labs is mandatory. Both are useful for different jobs.
SSL Certificate Checker vs testssl.sh
testssl.sh is a comprehensive command-line TLS scanner. Self-hosted, runs from your own machine, deep analysis (cipher suites, vulnerability checks, cert pinning). Open source, MIT license.
U2L's web tool is a quick CT-log lookup, no install required. For deep server-side TLS auditing in CI/CD, testssl.sh remains the right choice. For 'check my cert real quick', U2L is faster.
Best Practices
Set up automated expiry monitoring
CT-log lookup is for ad-hoc checks. For production, use a monitoring stack that alerts on certs under 30 days from expiry. Check Pingdom, UptimeRobot, or Cloudflare's cert manager.
Use CAA DNS records to limit issuance
CAA records (Certificate Authority Authorization) restrict which CAs can issue certs for your domain. Without CAA, any CA can issue certs for any domain. CAA + CT-log monitoring catches unauthorized issuance.
Verify SAN list covers all subdomains
After issuance, run the SSL checker and confirm every subdomain you serve traffic on appears in the SAN list. Missing entries cause cert errors for affected subdomains.
Audit cert issuer changes
If your standard CA is Let's Encrypt and a Sectigo cert appears for your domain, investigate. Either someone in your org bought a different cert, or the CA was compromised.
Re-check after CDN or hosting migrations
After moving hosting providers, the cert may change. CT-log lookup confirms the new cert is issued and active before declaring migration complete.
Don't trust 'no cert found' as a positive signal
If the tool returns 'no cert in CT logs', it doesn't mean your domain has no cert. CT-log submission is mandatory for browser-trusted certs only; private/internal certs aren't logged.
Cross-reference with SSL Labs for production audits
U2L gives you the cert metadata. SSL Labs gives you the full TLS configuration grade. Use both: U2L for speed, SSL Labs for depth.
Be aware of the 1-hour cache
Results are cached for 1 hour. If you just renewed a cert and the U2L tool shows the old one, wait a minute (CT submission is fast but not instant). Re-check after 5 minutes for the new issuance.
Common Mistakes to Avoid
Confusing CT-log lookup with live TLS check
U2L queries CT logs - the historical record of cert issuance. It does NOT dial port 443 and inspect what cert is being served right now. If your origin is misconfigured but the cert is logged, U2L still shows the cert as 'valid' even if browsers can't reach it.
Treating CT-log gaps as 'no cert'
Domains with no public cert (internal services, private CAs) won't appear in CT logs. The tool returns 'no certificate found' but that's not the same as 'has no cert' - it's 'has no public cert'.
Ignoring upcoming expiry
30 days to expiry isn't a panic - but it is a planning window. Renewals via Let's Encrypt are auto and reliable; manual CA renewals (Sectigo, DigiCert paid tiers) need a human in the loop.
Trusting the wrong cert during rotation
During active cert rotation, two certs may be valid simultaneously. CT-log lookup returns the most recently issued; that's almost always right but can be wrong by minutes during the cutover.
Trusting the SAN list as exhaustive
Each cert covers a specific SAN list. Multi-cert deployments (one cert per subdomain) don't appear together; query each subdomain separately to see its cert.
Using CT-log lookup for vulnerability assessment
CT logs don't tell you if your TLS configuration is secure (cipher suites, protocol versions, OCSP stapling). For TLS health, run SSL Labs.
Querying private/internal domain names
Internal domains (intranet.company.local, dev.company.internal) typically use private CAs that don't submit to CT logs. The tool returns no results - that's expected.
Technical Specifications
| Source | Certificate Transparency logs via crt.sh |
| Coverage | 99%+ of browser-trusted public certs (CT-mandatory since 2018) |
| Fields returned | Common Name, Issuer, Not Before, Not After, days until expiry, SANs, serial number |
| Cache TTL | 1 hour at the Cloudflare edge |
| Lookup timeout | 12 seconds (crt.sh can be slow for popular domains) |
| Punycode (IDN) support | Yes - input as xn-- form for canonical lookup |
| Live TLS handshake | No - use SSL Labs or testssl.sh for that |
| Vulnerability scan | No - use SSL Labs for Heartbleed, POODLE, ROBOT, etc. |
| API endpoint | GET /api/tools/ssl-checker?domain=example.com |
Industry-Specific Use Cases
DevOps and SRE
Production cert expiry monitoring, post-deploy verification, automated audit scripts via the API.
Security and compliance
SOC 2 / ISO 27001 evidence collection, brand-protection (rogue cert detection), CA provider audit.
Web developers and freelancers
Pre-launch QA on client domains, post-deploy verification, troubleshooting cert errors.
M&A and due diligence
Domain portfolio audit during acquisition. Identify expired or risky certs before close.
Brand protection
Periodic CT-log audits for unexpected certs issued for your domains. Combine with CAA DNS for prevention.
SaaS providers and customer success
Customer-domain cert health checks, onboarding QA for white-label customers, troubleshooting customer reports.
Frequently Asked Questions
What's Certificate Transparency?
Is this a live SSL check or just a database lookup?
Why doesn't my internal domain show any certs?
How fresh is the data?
Why are there so many certs for my domain?
What does 'days until expiry' mean exactly?
What's a SAN?
Can I check a specific subdomain?
Does this work for internal / staging domains?
Can I check certs for an IP address?
Will this catch rogue certs issued for my domain?
How do I detect when a cert is about to expire?
What's an issuer?
Why does my just-renewed cert not show up?
Does the tool support IDN / punycode domains?
Is there an API I can call programmatically?
Should I use this or SSL Labs?
What happens if crt.sh is down?
Related Free Tools
Whois Lookup
Look up registrar, owner, creation date, expiry, and DNS for any domain. Free Whois data, no API key.
Free QR Code API
REST API for generating SVG and GIF QR codes. WiFi, vCard, URL, and text. Free, no API key, edge-cached.
DNS / CNAME Checker
Look up A, AAAA, CNAME, MX, TXT, NS records for any domain. Verify global DNS propagation in seconds.
HTTP Header Inspector
Inspect HTTP request and response headers for any URL. Cache, security, CORS, and server details.
URL Shortener Speed Test
Compare redirect response times across 10+ URL shorteners. Real measurements in your browser.
Deep Link Tester
Test iOS Universal Links and Android App Links. Validate scheme, host, and fallback behavior.
Key Terms
- SSL / TLS
- Secure Sockets Layer / Transport Layer Security. Cryptographic protocols for encrypting HTTPS traffic. SSL is the older name; TLS 1.2 / 1.3 is modern. Casually called 'SSL' even though TLS is the actual protocol.
- Certificate Transparency (CT)
- Public, append-only log of all certs issued by participating CAs. Required for browser trust since 2018. CT logs let anyone verify which certs exist for a domain.
- Certificate Authority (CA)
- A trusted entity that issues SSL certs. Common CAs: Let's Encrypt (free), Google Trust Services, DigiCert, Sectigo, GoDaddy. Browsers maintain a 'trusted CA' list; certs from non-trusted CAs cause errors.
- Subject Alternative Name (SAN)
- A cert field listing additional hostnames the cert is valid for. Modern certs cover multiple hostnames via SANs (example.com + *.example.com + api.example.com all in one cert).
- CAA record
- DNS Certification Authority Authorization (RFC 6844). Restricts which CAs can issue certs for a domain. Without CAA, any CA can issue. With CAA, unauthorized issuance fails. Use with CT-log monitoring for full protection.
- Issuer
- The CA that issued the cert. Visible in the cert metadata. Common issuers' intermediate names: Let's Encrypt (R3, R10, E1), Google Trust (GTS), DigiCert (DigiCert TLS RSA), Cloudflare (CF Origin), Sectigo (Sectigo RSA).
Want automated expiry alerts and rogue-cert monitoring?
Sign up free for U2L Pro to schedule daily CT-log checks across all your domains, receive expiry alerts 30/60/90 days out, and detect rogue certs from unexpected issuers. No credit card; takes 30 seconds.
Sign up free