SSL Certificate Expiry Checker — Bulk Domains

Paste domains. See certificate expiry at a glance.

🔒 Runs 100% in your browser — your files never leave your device

🕐 Cron Builder & Visualiser Visualize job overlaps 🔒 SSL Checker Check cert expiry 🐳 Docker Auditor Audit compose files 🛡️ Firewall Auditor Audit UFW rules 🔀 Reverse Proxy Mapper Map routing & audit 🤖 robots.txt Audit crawl & AI bots

Your SSL timeline will appear here after you paste domains and click Visualize.

No domains to check — add at least one domain above.

< 7 days < 30 days Safe Error >200 day cert

Note: Some domains (Google, Cloudflare, Akamai) use private CAs not fully indexed in public certificate logs.

How It Works

1. Paste

Paste any number of domains, one per line. No https:// needed.

2. Check

Click Check domains. Results appear progressively — each domain is queried from Certificate Transparency logs.

3. Review

Color-coded cards show expiry, issuer and days remaining. Export as PNG. Nothing leaves your browser.

Frequently Asked Questions

What does this SSL checker do?

Paste any number of domains and instantly see certificate expiry dates, issuer, and status. Color-coded results show which certs are healthy, expiring soon, or already expired.

Why is my domain showing orange?

Orange means the domain is served via a CDN (like Cloudflare or Fastly). The certificate shown belongs to the CDN, not your origin server. This is normal but worth knowing.

How is the 200-day SSL limit relevant?

Apple proposed reducing the maximum SSL certificate validity to 200 days by 2027, with a phased reduction starting in 2026 (47-day cap by 2027). This tool flags any cert whose total validity period exceeds 200 days — these were issued under the old 398-day rules and will need replacement at next renewal.

Does this tool store my domain names?

No. All checks run directly from your browser. Your domains are never sent to or stored on any ConfigClarity server.

Why is a domain showing an error?

The domain may be unreachable, blocking CORS requests, or using a self-signed certificate. Try checking it directly with your browser first.