Fetch the certificate
The trace starts the same way a browser does: open a TLS connection, receive the certificate chain, and inspect the leaf certificate for the domain name, issuer, validity window, and CT data.
Certificate Transparency verifier
Fetch the live certificate, decode SCT promises, rebuild the CT leaf, and verify the Merkle path against the log’s signed tree head.
The trace starts the same way a browser does: open a TLS connection, receive the certificate chain, and inspect the leaf certificate for the domain name, issuer, validity window, and CT data.
Certificate Transparency is not a replacement for normal TLS validation. The hostname still needs to match, and the chain still needs to lead back to a trusted root.
A Signed Certificate Timestamp is a log’s signed promise that it will include a certificate or precertificate. Embedded SCTs usually point at a precertificate, so this tool rebuilds that CT leaf before asking the log for proof.
RFC 6962: Signed Certificate Timestamp
The log returns a short audit path instead of the whole tree. Combining the leaf hash with those sibling hashes should recreate the signed tree head root exactly.
Merkle audit paths Signed tree heads