crt.sh: Overview
crt.sh is one of the simplest and most useful passive tools for domain and infrastructure research because certificate-transparency data often reveals parts of a hostname footprint that ordinary browsing does not.
What it is good for
crt.sh is strongest when you need to:
- find certificates issued for a domain
- inspect historical certificate data
- spot hostnames associated with certificate issuance
- expand a target's likely public web surface
It is especially good as an early passive pivot.
Why CT data matters
Whenever certificates are issued publicly, they leave traces in certificate-transparency logs. Those traces can reveal:
- subdomains
- naming patterns
- brand variants
- historical issuance context
- clues about infrastructure scale or structure
That does not mean every hostname is still alive or important. It means the certificate history is often worth reading.
What crt.sh does not prove
A hostname in CT data does not automatically prove:
- that it is still active
- that it is in scope for your question
- that it is sensitive
- that it reflects current infrastructure
It is a discovery and orientation layer. Follow-up validation still matters.
Workflow position
crt.sh is often best used:
- very early for hostname discovery
- before heavier infrastructure tooling
- alongside DNS and historical domain context
That combination usually produces a stronger picture than CT data alone.