SSL certificate inspector
SSL/TLS /api/v1/ssl/certIssuer, SAN, validity, fingerprints, full chain — for any TLS endpoint.
timgraham.dev
CN=timgraham.dev-
#0
timgraham.devissuer: C=US, O=Let's Encrypt, CN=R12
-
#1
R12issuer: C=US, O=Internet Security Research Group, CN=ISRG Root X1
Fingerprints
7B:CE:16:98:F9:F6:BE:CB:8A:4A:04:B4:E3:E2:BC:A1:16:5B:A8:D0:66:65:CF:01:6E:EA:76:94:F2:3A:89:D0:CC:2B:FC:DB:7F:69:08:42:87:2C:D4:E7:8C:81:92:70:7C:5D:04:2B:-
1
Paste your input
Enter the value at the top — domain, IP, URL, email, ASN, hash, whatever fits this tool. The smart input auto-detects type.
-
2
Click "Inspect"
host.tools issues real probes (DNS, HTTP, TCP, TLS, WHOIS where applicable) and renders the result in milliseconds.
-
3
Open the API tab
Every web tool has a sibling /api/v1/ssl/cert JSON endpoint with the same payload. One copy-as-curl click and you're scripting it.
TLS misconfigurations cause silent failure: cert chains break, ciphers drift, HSTS times out. A 30-second cert audit beats a 3 AM page every single time.
/api/v1/ssl/cert?q=timgraham.dev
curl -s '/api/v1/ssl/cert?q=timgraham.dev'
<iframe src="/ssl/cert?q={INPUT}&embed=1"
width="100%" height="600" frameborder="0"></iframe>
Drop into any HTML page. The embed=1 flag hides nav and footer.
Common questions
Is SSL certificate inspector free?
Where does the data come from?
How fresh are the results?
?nocache=1 for a forced refresh.Can I run this from the command line?
host.tools ssl cert YOUR_INPUT.Can I monitor results over time?
Run SSL certificate inspector on a schedule. Get pinged when it changes.
Pro gets you bulk lookups, monitors, webhook alerts, history, exports and 10,000 API calls/day. $19/mo.
- ✓Schedule any tool — every 1, 5, 15, 60 min
- ✓Diff against last run, alert on change
- ✓Webhook + email + Slack + PagerDuty + OpsGenie
- ✓Bulk CSV upload, 1,000 inputs per job
- ✓Export results as CSV / NDJSON / Excel
- ✓90-day history, comparison view