SSL certificate inspector
SSL/TLS /api/v1/ssl/certIssuer, SAN, validity, fingerprints, full chain — for any TLS endpoint.
host.tools
CN=host.tools-
#0
host.toolsissuer: C=US, O=Google Trust Services, CN=WE1
-
#1
WE1issuer: C=US, O=Google Trust Services LLC, CN=GTS Root R4
-
#2
GTS Root R4issuer: C=BE, O=GlobalSign nv-sa, OU=Root CA, CN=GlobalSign Root CA
Fingerprints
F6:BB:C7:6F:26:A5:46:52:16:3A:97:9A:1E:45:75:56:59:1A:13:D5:6D:F5:0A:2E:E0:A7:20:71:50:A6:D0:D9:88:97:8C:3A:87:3E:92:90:33:34:1B:A5:7B:3B:61:02:F3:D7:55:45:-
1
Paste your input
Enter the value at the top — domain, IP, URL, email, ASN, hash, whatever fits this tool. The smart input auto-detects type.
-
2
Click "Inspect"
host.tools issues real probes (DNS, HTTP, TCP, TLS, WHOIS where applicable) and renders the result in milliseconds.
-
3
Open the API tab
Every web tool has a sibling /api/v1/ssl/cert JSON endpoint with the same payload. One copy-as-curl click and you're scripting it.
TLS misconfigurations cause silent failure: cert chains break, ciphers drift, HSTS times out. A 30-second cert audit beats a 3 AM page every single time.
/api/v1/ssl/cert?q=host.tools
curl -s '/api/v1/ssl/cert?q=host.tools'
<iframe src="/ssl/cert?q={INPUT}&embed=1"
width="100%" height="600" frameborder="0"></iframe>
Drop into any HTML page. The embed=1 flag hides nav and footer.
Common questions
Is SSL certificate inspector free?
Where does the data come from?
How fresh are the results?
?nocache=1 for a forced refresh.Can I run this from the command line?
host.tools ssl cert YOUR_INPUT.Can I monitor results over time?
Run SSL certificate inspector on a schedule. Get pinged when it changes.
Pro gets you bulk lookups, monitors, webhook alerts, history, exports and 10,000 API calls/day. $19/mo.
- ✓Schedule any tool — every 1, 5, 15, 60 min
- ✓Diff against last run, alert on change
- ✓Webhook + email + Slack + PagerDuty + OpsGenie
- ✓Bulk CSV upload, 1,000 inputs per job
- ✓Export results as CSV / NDJSON / Excel
- ✓90-day history, comparison view