Current TLS state for a host, in one call.

Pass a domain or IP. Get back the active certificate, full chain, expiry dates, SANs, and connection diagnostics from a live TLS handshake.

WHAT THIS API RETURNS

Live TLS state, not just certificate metadata.

The SSL Lookup API performs a live TLS handshake against a target and returns the certificate, the full chain, validity dates, SANs, fingerprints, and connection diagnostics. Where Deepinfo's historical SSL corpus tells you what was observed, this API tells you what is being served right now.

Pass the target as a domain or IP. Optionally pass port to scope the handshake to a non-default port. The response includes parsed certificate fields, the original chain, connection status, and any parse errors.

Use this when you need ground-truth TLS state for compliance evidence, certificate-expiry checks, or impersonation-detection workflows that need to see the cert as the user sees it.

REQUEST

One endpoint, one required parameter.

Endpoint:

GET https://api.deepinfo.com/v1/lookup/ssl?target={target}

Parameters:

Name In Type Required Description
target query string Yes A domain or IP such as deepinfo.com or 203.0.113.42.
port query integer No TCP port for the TLS handshake. Defaults to 443.
proxy query string No Optional proxy region or routing hint. See docs for supported values.

Authentication is by API token in the request header. See docs.deepinfo.com for the full request reference.

SAMPLE RESPONSE

See what the API returns.

Real response structure for the Current TLS state for a host, in one call endpoint. Field coverage may vary based on query parameters and data availability.

JSON RESPONSE
{
  "target": "deepinfo.com",
  "port": 443,
  "check_date": "2026-05-02T08:30:11Z",
  "connection_status": "ok",
  "parsed": {
    "subject": "CN=deepinfo.com",
    "issuer": "CN=Let's Encrypt R3, O=Let's Encrypt, C=US",
    "not_before": "2026-02-09T00:00:00Z",
    "not_after": "2026-08-09T23:59:59Z",
    "sans": ["deepinfo.com", "www.deepinfo.com"],
    "fingerprint_sha256": "3a4b...e9",
    "key_algorithm": "RSA",
    "key_size": 2048
  },
  "certificate": "-----BEGIN CERTIFICATE-----
MIIFa...truncated
-----END CERTIFICATE-----",
  "parse_errors": []
}
STRUCTURED VIEW
Fields
Target
deepinfo.com
Port
443
Check date
2026-05-02T08:30:11Z
Connection status
ok
Certificate
-----BEGIN CERTIFICATE----- MIIFa...truncated -----END CERTIFICATE-----
Parsed
Subject
CN=deepinfo.com
Issuer
CN=Let's Encrypt R3, O=Let's Encrypt, C=US
Not before
2026-02-09T00:00:00Z
Not after
2026-08-09T23:59:59Z
Sans
deepinfo.com, www.deepinfo.com
Fingerprint sha256
3a4b...e9
Key algorithm
RSA
Key size
2048
Parse errors
Count
0

Sample response shown. Real responses depend on query parameters, data availability, and API version. Talk to us for full schema documentation.

“Live TLS state including the full chain, SAN list, and connection diagnostics returns in one shape we can drop into a SIEM enrichment rule. Replaced a hand-rolled OpenSSL wrapper that nobody wanted to maintain.”

— Detection Engineering Manager, Major Cloud Provider
GET STARTED

Run a sample call, or batch lookup your asset set.

We'll set up token access and answer schema questions on a call.

Talk to us Browse API docs