search

outlook.com

Every SSL/TLS certificate ever issued for this name, indexed from public CT logs.

csv export pro
total records
2,000
active · on this page
8
expired · on this page
12
unique issuers · on this page
11
issuers on this pageMicrosoft4DigiCert3Unknown Issuer3Google Trust2GoDaddy2SECOM Trust Systems …1cPanel1Sectigo1
domainstatus
sdfedge-pilot.outlook.comcrt.sh
SECOM Trust Systems …
expired 1y ago
fleetppe.outlook.comcrt.sh
cPanel
expired 1y ago
spamlogsffra.azure.protection.outlook.comcrt.sh
Sectigo
expired 1y ago
spamlogausppesf.azure.protection.outlook.comcrt.sh
Microsoft
expired 1y ago
spamlognginxssl.azure.protection.outlook.comcrt.sh
Microsoft
expired 1y ago
junjietest.prdtrs01.outlook.comcrt.sh
Microsoft
expired 1y ago
exap.um.outlook.comcrt.sh
ZeroSSL
expired 2mo ago
plat.m365networking.outlook.comcrt.sh
DigiCert
expires in 6mo
tafe.prdtsb01.outlook.comcrt.sh
Unknown Issuer
expires in 2mo
surfer.olc.protection.outlook.comcrt.sh
Google Trust
expires in 3mo
*.prdtrs01.prod.outlook.comcrt.sh
GlobalSign
expires in 4mo
spamlogsfapc.azure.protection.outlook.comcrt.sh
GoDaddy
expired 9d ago
ppe.aliasdirectory.outlook.comcrt.sh
Google Trust
expired 2mo ago
*.queue.edproxy.aed04.ediscovery.outlook.comcrt.sh
GoDaddy
expired 25d ago
demo-onboarding-dns-test-1.outlook.comcrt.sh
Unknown Issuer
expired 2y ago
exap.um.outlook.comcrt.sh
Cloudflare
expired 1y ago
*.services.web.outlook.comcrt.sh
Microsoft
expires in 5mo
routeresolutionclient.outlook.comcrt.sh
DigiCert
expires in 3mo
test.outlook.comcrt.sh
DigiCert
expires in 3mo
miraconfigmgmtitar.outlook.comcrt.sh
Unknown Issuer
expires in 2mo
Pipe results into your recon pipeline
# Python
$ pip install ct-radar
$ ct-radar outlook.com | httpx -silent
# Go
$ go install github.com/imfht/ct-radar-cli/cli@latest
$ ct-radar outlook.com | nuclei
Free tier: 100 searches/day · Pro $29/mo for 10,000/day

Related domains under .com

About certificate history for outlook.com

This page lists every X.509 (SSL/TLS) certificate ever issued for outlook.com and its subdomains, as recorded in public Certificate Transparency (CT) logs. CT logs are an immutable, append-only record of every certificate issued by participating Certificate Authorities (CAs), as required by the major browsers since 2018.

Subdomain enumeration via CT logs is one of the highest-signal techniques in reconnaissance — every time a TLS certificate is issued, all Subject Alternative Names (SANs) on that certificate become public. Internal and forgotten subdomains regularly show up here days after they're set up.

To monitor outlook.com for newly-issued certificates in real-time (useful for detecting unauthorized issuance, phishing variants, or shadow IT) add it to your watchlist (Pro plan).