uaunknown/unknown
crt.sh · dev-docs

crt.sh: Overview

A practical introduction to crt.sh for certificate-transparency and hostname research.

status
Published
slug
overview
published
Apr 21, 2026

crt.sh: Overview

crt.sh is one of the simplest and most useful passive tools for domain and infrastructure research because certificate-transparency data often reveals parts of a hostname footprint that ordinary browsing does not.

What it is good for

crt.sh is strongest when you need to:

  • find certificates issued for a domain
  • inspect historical certificate data
  • spot hostnames associated with certificate issuance
  • expand a target's likely public web surface

It is especially good as an early passive pivot.

Why CT data matters

Whenever certificates are issued publicly, they leave traces in certificate-transparency logs. Those traces can reveal:

  • subdomains
  • naming patterns
  • brand variants
  • historical issuance context
  • clues about infrastructure scale or structure

That does not mean every hostname is still alive or important. It means the certificate history is often worth reading.

What crt.sh does not prove

A hostname in CT data does not automatically prove:

  • that it is still active
  • that it is in scope for your question
  • that it is sensitive
  • that it reflects current infrastructure

It is a discovery and orientation layer. Follow-up validation still matters.

Workflow position

crt.sh is often best used:

  1. very early for hostname discovery
  2. before heavier infrastructure tooling
  3. alongside DNS and historical domain context

That combination usually produces a stronger picture than CT data alone.

last published Apr 21, 2026