TOOLS / SSL / TLS
SSL / TLS Certificate Inspector
Connect to any host over TLS and inspect its certificate chain — subject, issuer, validity, signature algorithm, SAN list, days-to-expiry.
What it does
TLS certificates secure every HTTPS connection. When something breaks — Heartbleed-era vulnerability surface, expired certs, weak signature algorithms, or misconfigured chains — your users see browser warnings or your service fails entirely. Our inspector performs a real TLS handshake to the host you specify, captures the server’s certificate plus chain, and decodes everything: subject and issuer CN, SHA-1 vs SHA-256 signing, validity window, days-to-expiry, and the full Subject Alternative Name list.
How to use it
- Enter a host (e.g. example.com) or host:port (e.g. example.com:8443).
- Click "Inspect cert".
- Read the validity panel — green = valid, yellow = expires soon, red = already expired.
- Review the SAN list to confirm the cert covers all the hostnames you serve.
- Check the issuer — Let’s Encrypt, DigiCert, Sectigo are all reputable; an unfamiliar issuer warrants investigation.
Common use cases
Frequently asked questions
Why does it say "days_left: -5"? +
What does "expires_soon" mean? +
Why is my chain only 2 certs deep? +
SHA-1 vs SHA-256? +
Can I check a self-signed cert? +
Related tools
Related coverage on Ciphers Security
- YARA-X 1.16.0: Faster Scans, Panic Fixes, and Neovim LSP Support
- Instructure Removed from ShinyHunters' Leak Site as Canvas Breach Deadline Passes
- Costa Rica Joins Have I Been Pwned as the 42nd Government
- LummaC2 Infostealer Targets US Critical Infrastructure: CISA-FBI Advisory AA25-141B and DOJ Domain Seizures
- MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware
Free for everyone, no signup required. Tool runs at /tools/ssl-checker/ — bookmark or share.