| Field | Value | Copy |
|---|---|---|
| {{ row.k }} | {{ row.v }} |
| IP | Grade | TLS 1.3 | Forward Secrecy | OCSP | HSTS | Vulnerabilities | Copy |
|---|---|---|---|---|---|---|---|
| {{ ep.ip }} | {{ ep.grade || '—' }} | {{ ep.tls13 ? 'Yes' : 'No' }} | {{ ep.fs ? 'Yes' : 'No' }} | {{ ep.ocsp ? 'Yes' : 'No' }} | {{ ep.hsts ? 'Yes' : 'No' }} | {{ ep.vulns ? ep.vulns : 'None' }} | |
| No endpoint data. | |||||||
| Field | Value | Copy |
|---|---|---|
| {{ row.k }} | {{ row.v }} | |
| No certificate data. | ||
| # | Subject | Issuer | Not Before | Not After | Copy |
|---|---|---|---|---|---|
| {{ idx + 1 }} | {{ c.subject }} | {{ c.issuer }} | {{ c.notBefore }} | {{ c.notAfter }} | |
| No chain data. | |||||
| Protocol | Cipher Suite | Key Exchange | Strength | Copy |
|---|---|---|---|---|
| {{ r.protocol }} | {{ r.cipher }} | {{ r.kx }} | {{ r.strength }} | |
| No protocol data. | ||||
Website certificates are the digital credentials that let a browser start a private connection and display the padlock with confidence. A website ssl certificate checker helps you confirm that configuration choices line up with expected security posture before you trust changes or investigate errors.
You get a concise grade for each reachable server and one headline grade that summarizes the set. Alongside the grades you see when the certificate expires, whether modern connection standards are supported, and whether common weaknesses appear in the scan.
Enter a single hostname and run a check. The scan queries the target, collects certificate facts, notes supported protocol versions, and lists the suites those servers advertise. It also records forward secrecy, stapled status responses, and a strict transport policy when present so you can spot gaps quickly and act with context.
Use it when renewing a certificate, rolling out a new endpoint, or comparing infrastructure changes. If a result seems out of character, recheck later so transient routing or cache effects do not mislead your decision.
Grades and flags describe configuration only and do not speak to business reputation or content safety. Avoid pasting secrets, and prefer test hosts for experiments.
Transport Layer Security (TLS) protects data in transit between a client and a server. The scan observes what each server endpoint advertises during connection setup: certificate identity and lifetime, supported protocol versions, offered cipher suites, forward secrecy capability, stapled status responses, and strict transport policy signals.
The report computes an overall grade label by alphabetically sorting the endpoint grades and selecting the first label in that order. It also derives a single “days to expiry” value by taking the smallest remaining lifetime across endpoints so the earliest renewal risk is visible.
Endpoint results include vulnerability flags when the remote analyzer reports known issues. Labels indicate whether at least one endpoint supports modern protocol versions, forward secrecy, stapled responses, and strict transport policy.
Comparability depends on mode. A cache‑friendly run accepts recently cached analysis up to the maximum age you choose, which improves repeatability across close‑in time. A deep run requests a fresh analysis and may take longer to complete.
| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
| D | Days to certificate expiry across all endpoints (minimum) | days (integer, ceil) | Derived |
| Earliest certificate “Not After” timestamp over endpoints | ms since epoch | Endpoint data | |
| Current time on the client | ms since epoch | Client clock |
| Constant | Value | Notes |
|---|---|---|
| Grade labels (order for counts) | A+, A, A‑, B, C, D, E, F, T, M | Overall grade is alphabetical first across endpoints, not a weighted score. |
| Vulnerability flags | Heartbleed, POODLE, POODLE TLS, FREAK, Logjam, DROWN, ROBOT, Zombie POODLE, GOLDENDOODLE, Ticketbleed, Bleichenbacher, RC4 | Shown when reported by the analyzer for an endpoint. |
| Poll delay | 3 000 ms | Up to 120 attempts per run. |
| Request timeout | 25 000 ms | Per fetch attempt via public CORS proxies. |
| Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
|---|---|---|---|---|---|---|
| Domain | Text | 1 | 253 | ^(?=.{1,253}$)(?!-)[A-Za-z0-9-]{1,63}(?<!-)(\.(?!-)[A-Za-z0-9-]{1,63}(?<!-))*$ |
“Enter a domain.” · “Enter a valid hostname (e.g., example.com).” | example.com |
| Mode | Select | — | — | fast · deep | — | — |
| Max cache age | Number (hours) | 1 | — | step 1 | — | — |
| Fetch full endpoint details | Boolean | — | — | on/off | — | — |
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| Hostname | ASCII labels only; no wildcards | Tables, badges, charts, JSON, CSV | UTF‑8 text; numbers as shown | Expiry uses ceiling to whole days |
Networking & storage behavior. The scan runs in the client and sends the hostname to a public analyzer service using cross‑origin proxy fetches. Results are rendered locally; copying and downloads occur on the client. No server operated by this page stores your inputs.
Diagnostics & determinism. Identical inputs can yield different outputs when cache settings differ or when the upstream service updates its data. The overall grade is derived by alphabetical order and is not a statistical average.
Privacy & compliance. The hostname you provide is sent to a third‑party analyzer to generate results. No data is stored by this page beyond your current session.
Certificate and protocol checks produce a quick security snapshot of a hostname and its reachable servers.
You now have an actionable profile of the site’s certificate and protocol posture.
No storage occurs on this page. The hostname is sent to a public analyzer to produce the report. Results render in the client.
Requests use a “do not publish” flag.Grades come from the analyzer’s model. The overall grade shown here is the first label in alphabetical order across endpoints.
A short “days to expiry” value, missing modern protocol support, or multiple vulnerability flags usually signals priority follow‑up.
Expiry is in whole days, dates use your locale, and JSON/CSV exports present text and numbers exactly as displayed.
No. Input must be a literal hostname. Wildcards, paths, schemes, and ports are not accepted by validation.
No. The analyzer is queried over the network. If the service is unavailable, the scan fails and you can retry later.
This tool assesses deployed hosts. It does not parse or validate certificate signing requests.
If an endpoint lacks certificate timing data or the client clock is skewed, the display may be empty or show unusual values.
They are labels from the analyzer’s grade set. No extra meaning is defined here beyond their presence in results.
For consistency, test at similar times of day and from the same network.