TLS / SSL certificate
WI
wikipedia.org TLS certificate
wikipedia.org
port 443
208.80.154.224
What this means
Browsers will accept this certificate. Plan a renewal before the expiry date below — most CAs auto-renew at 30 days remaining.
Certificate details
- Subject CN
- *.wikipedia.org
- Issuer
- Let's Encrypt / E7
- Valid from
- Apr 7, 2026, 08:52 PM (17d ago)
- Valid to
- Jul 6, 2026, 08:52 PM (1s ago)
- Days remaining
- 72
- Key
- EC prime256v1
- Signature
- ECDSA-PRIME256V1
- Hostname match
- yes
- SHA-256 fingerprint
- 47:20:A8:6F:44:0E:B4:8C:97:92:E5:CB:A9:C8:FE:8B:12:7C:80:6F:15:EA:60:75:07:24:BF:33:25:49:7A:9B
Subject Alternative Names (41)
*.m.mediawiki.org*.m.wikibooks.org*.m.wikidata.org*.m.wikimedia.org*.m.wikinews.org*.m.wikipedia.org*.m.wikiquote.org*.m.wikisource.org*.m.wikiversity.org*.m.wikivoyage.org*.m.wiktionary.org*.mediawiki.org +29 more
What to try next
Full HTTP probe
Run /check/wikipedia.org to see live HTTP status, response time, and 24h history alongside this cert.
Renewal reminder
Set a 30-day-before-expiry calendar reminder. Most outages caused by expired certs come from missed renewals.
Check related
Compare with related services or apex/subdomain combinations to spot inconsistencies.
Methodology
- Probe
- We open a TLS handshake to port 443 with the supplied hostname as the SNI, read the peer certificate via getPeerCertificate(true), and validate the hostname against subjectAlternativeName via tls.checkServerIdentity.
- Counts as DOWN
- The TLS handshake fails entirely (TCP refused, handshake timeout, or rejected ClientHello) — we couldn't read a certificate at all.
- Counts as DEGRADED
- Reserved for soon-to-expire certificates and warning-only validation issues like a self-signed cert. Browsers may still warn even when our check labels the cert valid.
- Detail
- All certificate details come from getPeerCertificate(true) on the established socket. We do not enumerate cipher suites, test downgrade attacks, or scan for protocol-level weaknesses; this is read-only certificate inspection.
- Cadence
- Every 5 minutes, in parallel across 4 monitoring regions (US East Virginia, US West Oregon, Europe London, Asia Singapore).
- Rate-limited targets
- If a host returns 429 or consistently drops connections from our IPs, we cap retries at 3 and report the last observed status — we do not flood the target to confirm the outage.
- Data source
- Direct probes from our monitoring infrastructure. We do not aggregate crowd reports, Twitter mentions, or DownDetector signals — every result on this page is a live network request.