Certificate Transparency
Detect new certs for your domains (including wildcards). Filter by patterns, issuer, SANs, key algo, precerts, and rate spikes.
- CT log monitor + alert rules
- Certificate details & timelines
- Easy “what changed?” views
Track newly issued certificates, WHOIS/RDAP changes, and DNS drift. Configure alert rules, keep a clean history, and automate via API — without paying “enterprise brand-risk” pricing.
Three modules, one UI, consistent alerting & history.
Detect new certs for your domains (including wildcards). Filter by patterns, issuer, SANs, key algo, precerts, and rate spikes.
Daily RDAP snapshots with history and diffs. Get notified when registration, contacts, nameservers, or expiry data changes.
Track DNS records over time (A/AAAA/CNAME/TXT/MX/CAA/NS…). Catch unauthorized changes and drift between environments.
Build templates and rules: severity, conditions, routing, and dedupe. Track delivery status.
Two minutes to get from “huh?” to “alert received”.
Pick modules per domain: CT, RDAP, DNS. Start with one and expand.
Define routing and formatting (email/webhook, etc.). Reuse everywhere.
Match on patterns and change types. Assign severity and dedupe windows.
Every change is stored. Compare snapshots and export via API.
Pull alerts, snapshots, and diffs into your own automation. If you prefer a UI: ignore the API, enjoy the UI.
GET /api/v1/domains
GET /api/v1/ct/alerts?domain=example.com
GET /api/v1/rdap/history?domain=example.com
GET /api/v1/dns/diff?domain=example.com&from=...&to=...
Replace these placeholders with your screenshots. Keep filenames and just drop images into ./assets/.
Simple limits. No sales calls. Cancel anytime.
$0/month
$100/month
Billed monthly (USD).
If you need multi-org management, SSO, or larger limits, you can still run this approach internally — or talk to your friendly local security engineer (you). 😉
The stuff people ask before they hit “Start free”.
Certificate Transparency logs (new certificates), RDAP snapshots (registration/WHOIS-like data), and DNS records over time. Each module has rules + alerts + history.
Yep — everything here uses public signals (CT logs, RDAP, DNS). It’s domain-based rather than brand-based.
The landing page assumes templates can route to email/webhook; wire it to whatever you support today. Swap the text to match your current implementation.
Yes. The UI works fine on its own, but the API is there if you want to feed a SIEM/SOAR pipeline or custom tooling.
Spin up a free tier account and you’ll be receiving alerts in minutes.