Settings

SSL is not valid for expired.badssl.com

Certificate Validity

The date range during which this certificate is trusted.

Not valid before: Apr  9 00:00:00 2015 GMT
Not valid after:  Apr 12 23:59:59 2015 GMT

Certificate Chain

The hierarchy of certificates from the server cert to the root CA.

Certificate chain
 0 s:OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.badssl.com
   i:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Apr  9 00:00:00 2015 GMT; NotAfter: Apr 12 23:59:59 2015 GMT
 1 s:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
   i:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA384
   v:NotBefore: Feb 12 00:00:00 2014 GMT; NotAfter: Feb 11 23:59:59 2029 GMT
 2 s:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
   i:C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
   v:NotBefore: May 30 10:48:38 2000 GMT; NotAfter: May 30 10:48:38 2020 GMT
---

Certificate Details

Who the certificate was issued to and by whom.

Subject: OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.badssl.com
Issuer:  C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA

Connection Details

TLS version, cipher suite, and verification status.

SSL handshake has read 5003 bytes and written 459 bytes
Verification error: certificate has expired
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: 0488DDBF4E5817F49418C8EB665C2F52B55FB430002FBDBFEBA6AFFFCF28A3C4
    Session-ID-ctx: 
    Master-Key: 6048F77D8364ECA1FAE58EE7E0B8956C6C32F1E8591734B0BF5B1988F3590C6B64A90DB0E27711B139A8C8F0EA7DAA98
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - ed d4 f4 e4 92 a0 d9 41-9c 98 78 a3 c9 7b b0 ce   .......A..x..{..
    0010 - 30 e2 2c 20 21 cd da ed-e5 e6 5b fc ae a4 80 c1   0., !.....[.....
    0020 - 70 c5 29 d9 7b 8f 57 b4-10 61 09 c1 89 d7 89 e2   p.).{.W..a......
    0030 - 3c 9c b6 7b 2c ae a7 78-d1 37 8a df 2a 8b 6d 90   <..{,..x.7..*.m.
    0040 - 74 32 dc 47 b1 0f f3 c8-39 b5 1e 5d fc ed 1a 21   t2.G....9..]...!
    0050 - 8f 62 b3 8d d3 28 d6 82-a1 7a 1b 72 6e f8 5a f4   .b...(...z.rn.Z.
    0060 - cd ac a4 b5 6e 01 76 3b-48 e5 97 ef e8 99 4d 89   ....n.v;H.....M.
    0070 - 25 a3 07 ca c7 6c 17 1f-8e 56 d6 4b cf 65 48 01   %....l...V.K.eH.
    0080 - 96 f0 cf 83 ef 50 79 09-ba e1 14 dd 13 c7 67 c4   .....Py.......g.
    0090 - 82 c2 71 08 a7 61 eb 44-e1 30 78 87 3f b5 e1 d7   ..q..a.D.0x.?...
    00a0 - 56 4c 91 1f f4 61 fd 3c-3d 46 1c f4 bb 87 bb 94   VL...a.<=F......
    00b0 - 12 91 df 60 61 65 0f 02-b4 d2 76 2a 65 ea 23 3e   ...`ae....v*e.#>

    Start Time: 1766303228
    Timeout   : 7200 (sec)
    Verify return code: 10 (certificate has expired)
+ Full Certificate (PEM)

The base64-encoded X.509 certificate.

-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

SSL is not valid for expired.badssl.com

Not valid before: Apr  9 00:00:00 2015 GMT
Not valid after:  Apr 12 23:59:59 2015 GMT

CONNECTED(00000003)
---
Certificate chain
 0 s:OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.badssl.com
   i:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
   v:NotBefore: Apr  9 00:00:00 2015 GMT; NotAfter: Apr 12 23:59:59 2015 GMT
 1 s:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
   i:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
   a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA384
   v:NotBefore: Feb 12 00:00:00 2014 GMT; NotAfter: Feb 11 23:59:59 2029 GMT
 2 s:C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Certification Authority
   i:C=SE, O=AddTrust AB, OU=AddTrust External TTP Network, CN=AddTrust External CA Root
   a:PKEY: rsaEncryption, 4096 (bit); sigalg: RSA-SHA384
   v:NotBefore: May 30 10:48:38 2000 GMT; NotAfter: May 30 10:48:38 2020 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=OU=Domain Control Validated, OU=PositiveSSL Wildcard, CN=*.badssl.com
issuer=C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA
---
No client certificate CA names sent
Peer signing digest: SHA512
Peer signature type: RSA
Server Temp Key: ECDH, prime256v1, 256 bits
---
SSL handshake has read 5003 bytes and written 459 bytes
Verification error: certificate has expired
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES128-GCM-SHA256
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES128-GCM-SHA256
    Session-ID: 0488DDBF4E5817F49418C8EB665C2F52B55FB430002FBDBFEBA6AFFFCF28A3C4
    Session-ID-ctx: 
    Master-Key: 6048F77D8364ECA1FAE58EE7E0B8956C6C32F1E8591734B0BF5B1988F3590C6B64A90DB0E27711B139A8C8F0EA7DAA98
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    TLS session ticket lifetime hint: 300 (seconds)
    TLS session ticket:
    0000 - ed d4 f4 e4 92 a0 d9 41-9c 98 78 a3 c9 7b b0 ce   .......A..x..{..
    0010 - 30 e2 2c 20 21 cd da ed-e5 e6 5b fc ae a4 80 c1   0., !.....[.....
    0020 - 70 c5 29 d9 7b 8f 57 b4-10 61 09 c1 89 d7 89 e2   p.).{.W..a......
    0030 - 3c 9c b6 7b 2c ae a7 78-d1 37 8a df 2a 8b 6d 90   <..{,..x.7..*.m.
    0040 - 74 32 dc 47 b1 0f f3 c8-39 b5 1e 5d fc ed 1a 21   t2.G....9..]...!
    0050 - 8f 62 b3 8d d3 28 d6 82-a1 7a 1b 72 6e f8 5a f4   .b...(...z.rn.Z.
    0060 - cd ac a4 b5 6e 01 76 3b-48 e5 97 ef e8 99 4d 89   ....n.v;H.....M.
    0070 - 25 a3 07 ca c7 6c 17 1f-8e 56 d6 4b cf 65 48 01   %....l...V.K.eH.
    0080 - 96 f0 cf 83 ef 50 79 09-ba e1 14 dd 13 c7 67 c4   .....Py.......g.
    0090 - 82 c2 71 08 a7 61 eb 44-e1 30 78 87 3f b5 e1 d7   ..q..a.D.0x.?...
    00a0 - 56 4c 91 1f f4 61 fd 3c-3d 46 1c f4 bb 87 bb 94   VL...a.<=F......
    00b0 - 12 91 df 60 61 65 0f 02-b4 d2 76 2a 65 ea 23 3e   ...`ae....v*e.#>

    Start Time: 1766303228
    Timeout   : 7200 (sec)
    Verify return code: 10 (certificate has expired)
    Extended master secret: no
---
Your IP: 216.73.216.115

About DNSApe

DNSApe is a fast, no-nonsense network diagnostics toolkit built for developers, sysadmins, and security researchers.

Version History

2.0 - 2025-12-21

Complete rewrite

  • Rebuilt with Laravel 12, Livewire 3, and Tailwind CSS 4
  • Live ping monitoring with real-time Chart.js visualization
  • Email Security tool: SPF, DKIM, DMARC validation
  • REST API with JSON responses (60 req/min)
  • MCP server for AI assistant integration (Claude, ChatGPT, etc.)
  • Slack integration with /dns, /whois, /ssl slash commands
  • Help tooltips explaining each tool and record type
  • Shareable ping sessions with unique URLs
  • Pretty/Raw view toggle with persistent preference
  • Browser-based ping for client-side latency testing
  • Enhanced WHOIS with domain + IP info combined
  • Improved SSL certificate error handling

Version 2.1 with performance improvements and bug fixes coming soon.

1.1.3 - 2019-04-30
  • Moved to new infrastructure, resolving most DNS Traversal issues
  • Replaced RBL with SSL validation tool
1.1.2 - 2019-04-17
  • Fixed DNS Traversal issue causing many requests to fail
1.1.1 - 2019-04-16
  • Minor UI adjustments
  • Added links to lookups in DNS results
  • Updated dependencies
  • Increased session timeout to 1 week to eliminate 419 errors
  • Updated IP address display
  • Removed dnsape.com as default lookup
1.1 - 2019-02-15
  • Several UI adjustments
  • Dark mode setting is persistent between sessions via cookie
  • Added GDPR cookie banner for session cookies
  • Added tool to show client IP in lookup field (settings menu)
  • Keyboard shortcuts for tools, focusing, text size, copying URLs
  • Shareable lookup URLs - browser address changes with tool usage
  • Added links to Github repo and feature voting
  • Several error handling and bug fixes
1.0.7 - 2019-01-11
  • Fixed HTTP Headers issue with multiple HTTPS redirects
1.0.6 - 2019-01-09
  • HTTP Headers now forward to and display HTTPS headers
  • UI adjustments
1.0.5 - 2019-01-08
  • Dark Mode!
1.0.4 - 2019-01-07
  • TLD and subdomain validation fixes
1.0.3 - 2019-01-06
  • Updated DNS Cache host list
  • IP address validation improvements
  • Fixed progress bar bug with failed queries
  • UI adjustments
1.0.2 - 2019-01-05
  • IPWhois and Ping now work with IP addresses as well as hostnames
  • Several validation enhancements reduce errors for many lookups
  • Several UI adjustments
1.0.1 - 2019-01-04
  • Added Recent Updates panel
  • Fixed Whois search for many TLDs
  • Fixed DNS Traversal for many TLDs
  • Changed to fluid viewport width
  • Added Privacy Policy
1.0 - 2019-01-02
  • Initial release