SSL / TLS Analysis

Certificate healthin one API call

Validation, chain, protocols, ciphers, expiry, and CT-log monitoring. Free tier with no credit card.

Free analysis · 100 free checks/month · No credit card

What we check on every certificate

Six layers of inspection — designed to surface issues before users see browser warnings.

Certificate validation

Verify validity, issuer trust, signature algorithm, and proper configuration.

Chain verification

Walk the full chain from leaf to root, flagging missing intermediates and broken links.

Protocol audit

Detect supported TLS versions; flag deprecated SSL 3.0, TLS 1.0, TLS 1.1.

Cipher suite audit

Identify weak ciphers (RC4, 3DES, CBC) and recommend AEAD alternatives.

Expiration monitoring

Track expiry across your fleet and alert before browser warnings hit users.

CT log monitoring

Watch Certificate Transparency logs for unauthorized issuance against your domains.

What the API returns

Sample shape from GET /api/check/certificates?domain=example.com.

JSON responseexample.com
{
  "subject": "CN=example.com",
  "issuer": "C=US, O=Let's Encrypt, CN=R3",
  "serialNumber": "03:5c:98:1d:a3:…",
  "validFrom": "2026-04-12T00:00:00Z",
  "validTo": "2026-07-11T00:00:00Z",
  "daysRemaining": 69,
  "signatureAlgorithm": "SHA256-RSA",
  "protocols": ["TLSv1.2", "TLSv1.3"],
  "weakCipherSuites": [],
  "chainLength": 3,
  "chainComplete": true,
  "fingerprintSha256": "a4:71:…:8c",
  "sanDomains": ["example.com", "*.example.com"],
  "hstsMaxAge": 31536000
}

Add the domain to your watchlist to receive expiry and CT-log alerts via webhooks or the SSE stream.

Who runs this

DevOps teams

Track expiry across hundreds of domains and avoid pages caused by silent renewals.

Security teams

Audit TLS posture, hunt weak ciphers, and detect rogue CT-log entries early.

Compliance

Meet PCI DSS, HIPAA, and ISO requirements for TLS configuration with auditable reports.

Third-party risk

Vet vendor TLS posture before integration; spot expired certs that signal neglected systems.

Frequently asked questions

What SSL/TLS issues do you detect?

Certificate validity and expiration, chain completeness, supported protocol versions (flagging SSL 3.0 / TLS 1.0 / TLS 1.1 as deprecated), cipher suites (flagging RC4, 3DES, weak CBC modes), missing HSTS, hostname mismatches, weak signature algorithms (SHA-1), self-signed certificates in production, and CT-log entries that indicate unauthorized issuance.

Can I monitor certificate expiration?

Yes. Add domains to your watchlist and the platform tracks expiration continuously, alerting you via email, webhook, or SSE stream at 30, 14, 7, and 1 day(s) before expiry — fully configurable per asset.

Do you check Certificate Transparency logs?

Yes. We monitor public CT logs and alert when a certificate is issued for any domain on your watchlist. This catches CA misissuance and unauthorized internal certificates that could enable man-in-the-middle attacks.

What TLS versions should I support?

TLS 1.2 (with secure cipher suites) and TLS 1.3 only. Disable TLS 1.0 and 1.1 — they are deprecated and have known vulnerabilities. Our analyzer flags any deprecated protocol detected on your endpoint.

Is the analysis API public?

Yes. The certificate analysis endpoint is available with a free API key (rate-limited at 100 requests/month on the Free tier). Higher-volume monitoring with continuous tracking, webhooks, and SSE alerts is included on Basic and Pro plans.

How do you compare to SSL Labs?

SSL Labs is excellent for one-shot interactive testing. We focus on continuous monitoring across an asset inventory, machine-readable JSON output, programmatic alerts, and CT-log surveillance — designed to drop into SOC and DevOps pipelines, not just web browsers.

Get notified before certs expire

Free API key, 100 checks/month, no credit card. Continuous monitoring on Basic and Pro.