Certificate transparency

Lean how Validin collects and delivers certificate data.

Certificate Transparency (CT) data provides visibility into publicly logged TLS certificates issued across the internet.

Validin's CT dataset records certificate issuance and reuse to support analysis of domain relationships, certificate lifecycle changes, and shared infrastructure.

Data collection model

Validin collects Certificate Transparency data by continuously monitoring global Certificate Transparency (CT) logs.

Collection is passive and log-based and does not depend on DNS resolution, host availability, or active service measurement.

Certificate records are ingested directly from publicly available CT logs and stored as historical observations.

📘

Note

Certificate Transparency data is independent of host response collection. Certificates may be observed in CT logs even when the associated service is not reachable or not yet deployed.

Coverage scope

Validin monitors global CT logs at scale and maintains long-term historical coverage.

AttributeValue
Monitoring start2020
Certificates observed~1.5 billion per month
Log coverageGlobal CT logs
Collection modelContinuous monitoring

Certificate records include initial issuance, renewal, and replacement events.

Certificate data extracted

Validin extracts and stores structured certificate fields from CT log entries.

Certificate fieldDescription
SubjectCertificate subject fields
IssuerCertificate authority information
SANsSubject Alternative Name values
Validity periodNot before and not after timestamps
Serial numberCertificate serial identifier
FingerprintsMD5 and SHA256 certificate hashes

Each certificate is stored with timestamps to support historical analysis.

Active and passive certificate context

Certificate data is exposed in the platform in two ways:

ContextDescription
Active certificatesCertificates observed during host response collection
Passive certificatesCertificates indexed directly from CT logs

This separation allows analysis of certificate issuance independently from observed network services.

📘

Note

A certificate may appear in CT logs before DNS records exist or before a service becomes reachable.

Certificate reuse and correlation

Certificate data supports correlation across domains and infrastructure.

Common analysis patterns include:

  • Multiple domains sharing the same certificate
  • Reuse of certificates across IP addresses
  • Shared SAN values across unrelated domains
  • Certificate rotation associated with infrastructure changes

These correlations support identification of related assets and shared operational patterns.

Historical certificate state

Validin maintains historical Certificate Transparency data dating back to 2020.

Historical certificate data includes:

  • First seen and last seen timestamps
  • Reissuance and renewal events
  • Changes to SAN lists
  • Issuer changes over time

This allows reconstruction of certificate usage at specific points in time.

Change tracking

Certificate changes are recorded as individual observations over time.

Change typeDescription
New issuanceCertificate first observed
ReissuanceCertificate renewed or replaced
SAN changeModification to SAN values
Issuer changeChange in certificate authority

Changes can be correlated with DNS and host response data to support infrastructure analysis.

📘

Note

Tracking certificate reuse and change patterns supports identification of shared infrastructure and coordinated updates.

Data access in the platform

Certificate Transparency data is exposed as queryable historical data, including:

  • Certificate metadata and fingerprints
  • SAN-based domain relationships
  • Issuer and validity timelines
  • Correlation with DNS and host response data

Certificate data is accessed as a historical dataset and does not require live service availability.