Domain to search for certificates
Sort order for results
Detecting Phishing Domains?
CT logs reveal fraudulent certificates. Our team monitors for brand impersonation and domain abuse.
What Is Certificate Transparency
Certificate Transparency (CT) is an open framework for monitoring and auditing the issuance of TLS/SSL certificates. Created by Google and standardized in RFC 6962, CT requires Certificate Authorities (CAs) to log every certificate they issue into publicly auditable, append-only logs. This allows domain owners, security researchers, and browsers to detect misissued or unauthorized certificates—a critical defense against man-in-the-middle attacks and CA compromise.
Before CT, a compromised or rogue CA could issue certificates for any domain without detection. Notable incidents—like the DigiNotar breach (2011) and Symantec's misissued certificates (2015-2017)—demonstrated the need for transparency. Since 2018, Google Chrome requires all publicly trusted certificates to be logged in CT logs, making CT a foundational component of web security.
How Certificate Transparency Works
The CT system involves three components:
CT Logs: Publicly accessible, append-only servers that record certificate data. Each log entry includes the certificate, a timestamp, and a Signed Certificate Timestamp (SCT) proving the log received it. Major logs are operated by Google (Argon, Xenon), Cloudflare (Nimbus), and Let's Encrypt (Oak).
Monitors: Services that watch CT logs for new certificates. Domain owners use monitors to detect certificates issued for their domains—authorized or not. If an unauthorized certificate appears, it indicates a potential compromise or CA misbehavior.
Auditors: Verify that logs are behaving honestly—that entries are not being removed or modified after insertion.
| Component | Role | Examples |
|---|---|---|
| CT Log | Store certificate records | Google Argon, Cloudflare Nimbus |
| Monitor | Watch for new certificates | crt.sh, Facebook CT Monitor |
| Auditor | Verify log integrity | Browser-based verification |
Common Use Cases
- Domain monitoring: Detect unauthorized certificates issued for your domains, indicating potential CA compromise or phishing infrastructure
- Threat intelligence: Search CT logs for certificates registered to lookalike domains used in phishing campaigns
- Certificate inventory: Discover all certificates ever issued for your organization's domains across all CAs
- Incident response: Investigate suspicious TLS infrastructure by examining certificate details and issuance history
- Compliance auditing: Verify that all certificates in your environment are properly logged in CT
Best Practices
- Monitor your domains continuously — Set up automated alerts for new certificates issued for your domains using services like crt.sh or Facebook's CT monitor
- Search for lookalike domains — Regularly search CT logs for certificates on domains similar to yours (typosquatting, homograph attacks)
- Verify SCTs in certificates — Modern browsers check for Signed Certificate Timestamps; ensure your CA includes them
- Use CT data for certificate inventory — CT logs are the most comprehensive source of all publicly trusted certificates for your domains
- Investigate unexpected certificates immediately — An unauthorized certificate for your domain could indicate a CA compromise or an active man-in-the-middle attack
Frequently Asked Questions
Common questions about the Certificate Transparency Lookup
Certificate Transparency (CT) is a public logging system that records all SSL/TLS certificates issued by Certificate Authorities. It was created to detect misissued or fraudulent certificates that could be used for man-in-the-middle attacks. By monitoring CT logs, organizations can discover unauthorized certificates issued for their domains and detect potential security threats before they cause harm.
ℹ️ Disclaimer
This tool is provided for informational and educational purposes only. All processing happens entirely in your browser - no data is sent to or stored on our servers. While we strive for accuracy, we make no warranties about the completeness or reliability of results. Use at your own discretion.