SSL Certificate Checker

Verify any domain's SSL/TLS certificate — expiry, issuer, SANs, key type, and validity

Enter a domain name. The protocol and path are stripped automatically.
Try:

Frequently Asked Questions

An SSL (Secure Sockets Layer) certificate — more accurately called a TLS (Transport Layer Security) certificate today — is a digital certificate that authenticates a website's identity and enables encrypted communication. It binds a domain name to an organization's identity and a public key. When a browser connects to a server with SSL, it verifies the certificate before establishing a secure HTTPS connection.

SSL certificates have a limited validity period (typically 90 days to 1 year). When a certificate expires, browsers display a security warning and block access to the site. Expired certificates do not protect communications. Website administrators must renew certificates before they expire. Services like Let's Encrypt offer free 90-day certificates with auto-renewal.

Subject Alternative Names (SANs) are a certificate extension that allows a single SSL certificate to cover multiple domain names. For example, a certificate for example.com might also cover www.example.com, mail.example.com, and *.example.com (wildcard). Modern browsers require SANs — the Common Name (CN) field alone is no longer accepted as valid.

DV (Domain Validated): Only verifies domain ownership. Fast and cheap/free (Let's Encrypt). Good for personal sites.

OV (Organization Validated): Verifies the domain and the organization behind it. Better for businesses.

EV (Extended Validation): Most rigorous — verifies legal identity of the organization. Previously showed a green bar in browsers; now shown in cert details.

A wildcard certificate uses an asterisk (*) in the domain to cover all subdomains at one level. For example, *.example.com covers www.example.com, api.example.com, mail.example.com, etc., but not sub.api.example.com (two levels deep). Wildcard certs save money when you need to secure many subdomains.

A certificate is "not trusted" when it is not issued (or not chained) to a Certificate Authority (CA) that the browser trusts. This can happen with self-signed certificates, certificates from unknown CAs, or if the intermediate certificate chain is incomplete. Browsers maintain a list of trusted root CAs; any cert that can't be traced back to a trusted root is flagged as untrusted.

About This SSL Checker

This free SSL Certificate Checker connects directly to the target server on port 443 and retrieves the SSL/TLS certificate in real time. It shows the certificate's common name, organization, issuer (Certificate Authority), validity dates, days remaining, subject alternative names (SANs), key type and size, and signature algorithm. The tool checks whether the certificate chain validates correctly against trusted root CAs.

Common Certificate Authorities

CATypeNotes
Let's EncryptDVFree, 90-day, auto-renew
DigiCertDV/OV/EVPremium, widely trusted
SectigoDV/OV/EVFormerly Comodo
GlobalSignDV/OV/EVEnterprise focus
ZeroSSLDVFree 90-day certs
Amazon ACMDVFree for AWS services

SSL Certificate Status Guide

StatusMeaning
ValidCertificate is current and trusted
Expiring SoonExpires within 30 days
ExpiredCertificate has expired
UntrustedChain not trusted by browsers
Self-SignedNot issued by a public CA