Resolved addresses
No target addresses were returned.
Check public certificate details for a hostname.
Use TLS Certificate Check to resolve a host, inspect public certificate metadata, and quickly review issuer, subject, hostname coverage, and expiry before moving to the next troubleshooting step.
This page is a browser-safe certificate preflight. It does not replace full socket-level TLS debugging.
No target addresses were returned.
No certificate observations were returned.
This page normalizes a host into an HTTPS target, resolves the hostname through public DNS, and attempts to fetch public TLS certificate metadata for the endpoint.
Use it to review the likely presented certificate subject, issuer, validity period, and basic hostname coverage before moving to deeper TLS validation.
It does not replace server-side certificate inspection. Full chain analysis and handshake debugging still require backend or command-line TLS tools.
A browser shows an SSL or certificate warning and you need a quick certificate-focused check.
HTTPS works inconsistently and you want to verify issuer, hostname, and expiry details.
A recent certificate renewal may not be serving the expected leaf certificate.
A hostname resolves, but you still need to confirm a certificate is actually being presented on port 443.
You need a fast next step after HTTPS Check before deeper server-side TLS debugging.
Certificate expiry, hostname mismatch, or issuer issues may be blocking users from reaching the site.
Likely meaning: The remote endpoint presented certificate metadata that the certificate API could inspect.
Common causes: This usually means the HTTPS endpoint is reachable and serving a visible certificate chain.
Next action: Review the subject, issuer, SAN coverage, and validity window, then compare them with the expected hostname.
Likely meaning: The leaf certificate is close to expiry even though it is still valid right now.
Common causes: Renewal automation may be missing, failing, or not yet deployed to the live endpoint.
Next action: Renew and deploy the certificate before expiration, then re-run the check.
Likely meaning: The certificate may not cover the exact hostname you entered.
Common causes: The wrong certificate may be deployed, or the hostname may be missing from the certificate SAN list.
Next action: Compare the entered host with the returned common name and SAN values, then correct the certificate or hostname.
Likely meaning: The browser-safe page could not retrieve certificate metadata for the hostname you entered.
Common causes: The TLS metadata endpoint may be unavailable, the host may not present a certificate cleanly, or network policy may block the lookup.
Next action: Continue to HTTPS Check, DNS Lookup, or a server-side TLS command such as openssl for deeper validation.
Likely meaning: The hostname did not return A or AAAA records from the resolver used by this page.
Common causes: The hostname may be wrong, missing, stale, or published incorrectly.
Next action: Run DNS Lookup and check nameservers or propagation next.
Likely meaning: This page uses public TLS metadata and browser-safe requests instead of direct socket inspection.
Common causes: Frontend code cannot open raw TLS sockets or inspect every handshake detail by itself.
Next action: Use this as a fast certificate preflight, then continue to server-side TLS diagnostics if you need the full chain and handshake transcript.
The wrong certificate is deployed for the hostname
The certificate is valid but close to expiry
The hostname resolves, but no usable certificate details can be retrieved
The certificate may not include the requested hostname in the SAN list
HTTPS fails even though DNS resolves because the certificate or TLS endpoint is wrong
The domain points to the right host, but the edge still serves an old certificate
Confirm secure reachability and browser-visible HTTPS behavior for the same host.
If the certificate looks correct, inspect browser-facing security headers next.
If the hostname or edge looks wrong, inspect the underlying DNS records next.
Compare plain HTTP behavior when redirects or scheme handling may be part of the problem.
Verify HTTPS availability, response chain, and TLS handshake basics.
Review HTTP response status, headers, and redirect behavior.
Review common browser-facing security headers on a site.
Query A, AAAA, CNAME, TXT, and other DNS records for a domain.
Check whether a host responds and measure round-trip latency.
It normalizes a hostname into an HTTPS target, resolves DNS for the host, and attempts to fetch public certificate metadata so you can review issuer, subject, SAN, and expiry details.
Enter a host or URL such as example.com, www.example.com, or https://example.com. The check focuses on the hostname and assumes port 443.
No. This is a browser-safe certificate preflight. For full handshake debugging, chain inspection, or private endpoints, use server-side TLS tooling too.
The public certificate metadata service may be unavailable, blocked, or unable to inspect the endpoint from this environment even when the site itself is up.
Usually HTTPS Check, DNS Lookup, and Security Headers Check depending on whether the problem looks like certificate mismatch, secure reachability, or browser policy.
It helps surface likely mismatch risk, but final hostname validation still depends on the full certificate SAN list and the exact host the browser requested.