Certificate Transparency Log Search

Search Certificate Transparency logs to discover all certificates issued for a domain

Search CT Logs

Quick Examples

About Certificate Transparency

What is Certificate Transparency?

Certificate Transparency (CT) is an open framework for monitoring and auditing SSL/TLS certificates. All publicly-trusted Certificate Authorities are required to log certificates to public CT logs, creating an append-only, cryptographically-assured record of all certificates issued.

Benefits of CT Logs

  • Security Monitoring: Detect unauthorized or mis-issued certificates for your domains in real-time
  • Asset Discovery: Discover all subdomains and hostnames that have certificates, useful for inventory and security audits
  • Certificate Management: Track certificate renewals, expirations, and issuer patterns across your infrastructure
  • Compliance & Auditing: Maintain compliance by ensuring only authorized CAs issue certificates for your domains

Common Use Cases

  • Subdomain Enumeration: Discover all subdomains for a domain by analyzing SANs in issued certificates (Security teams use this for attack surface mapping)
  • Mis-issuance Detection: Identify certificates issued by unauthorized CAs or for unexpected hostnames (Detect phishing domains or internal names leaked to public logs)
  • Certificate Lifecycle Tracking: Monitor certificate renewals, track expiration dates, and plan migrations (DevOps teams use this to prevent outages from expired certificates)
  • CA Diversity Analysis: Understand which CAs are issuing certificates for your organization (Compliance teams verify approved CA usage)

Key Certificate Fields

  • Common Name (CN): Primary domain name the certificate is issued for
  • Subject Alternative Names (SANs): Additional hostnames covered by the certificate, including wildcards
  • Issuer: Certificate Authority that issued the certificate (e.g., Let's Encrypt, DigiCert)
  • Validity Period: Start (Not Before) and end (Not After) dates when the certificate is valid
  • Serial Number: Unique identifier assigned by the CA, used for revocation lookups
  • Entry Timestamp: When the certificate was logged to CT, which may differ from issuance date

Security Considerations

  • CT Logs are Public: All logged certificates are publicly visible. Avoid including sensitive hostnames in SANs if they should remain private.
  • Monitor for Unexpected Issuance: Regularly check CT logs for your domains to detect phishing attempts or unauthorized certificates.
  • CAA Records: Use DNS CAA records to restrict which CAs can issue certificates for your domains.
  • Certificate Pinning: For high-security applications, consider certificate pinning to prevent MITM attacks.

Best Practices

  • Regular Monitoring: Periodically search CT logs for your domains to detect anomalies
  • Automate Alerts: Set up automated monitoring to alert on new certificate issuance
  • Review SANs Carefully: Ensure certificates only include necessary hostnames to minimize exposure
  • Track Expiration Dates: Monitor certificates expiring soon to prevent service disruptions
  • Validate Issuers: Ensure only authorized CAs are issuing certificates for your domains

Quick Tips

  • CT logs are append-only and cannot be modified or deleted
  • Wildcard certificates (*.example.com) cover all subdomains
  • Internal hostnames in SANs become publicly visible via CT logs
  • Most browsers require CT compliance for certificates to be trusted
  • crt.sh searches multiple CT log servers for comprehensive results
  • Certificate issuance != activation - check validity dates carefully
  • Use CAA records to specify which CAs can issue for your domain