GlobalSign Atlas R3 DV TLS CA H2 2021
What is GlobalSign Atlas R3 DV TLS CA H2 2021?
Intermediate issued under GlobalSign's Atlas automation platform for DV TLS — used by customers on the Atlas API and managed-SSL resellers. Atlas is GlobalSign's scriptable certificate issuance platform; this intermediate serves its DV customers.
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| URL | Screenshot | Flags | Details |
|---|
Frequently asked questions about GlobalSign Atlas R3 DV TLS CA H2 2021
What is GlobalSign Atlas R3 DV TLS CA H2 2021?
GlobalSign Atlas R3 DV TLS CA H2 2021 is a publicly trusted intermediate certificate authority operated by GlobalSign nv-sa and chained to GlobalSign Root CA - R3. It is recognized by all mainstream browsers and operating system trust stores, so the certificate itself is not a phishing indicator - the same intermediate signs millions of legitimate sites. phishunt only flags the specific domains listed below as suspicious; GlobalSign Atlas R3 DV TLS CA H2 2021 as a CA is fine.
Is GlobalSign Atlas R3 DV TLS CA H2 2021 a legitimate certificate authority?
Yes. GlobalSign Atlas R3 DV TLS CA H2 2021 is a publicly trusted intermediate CA operated by GlobalSign nv-sa, included in the Microsoft, Apple, Google and Mozilla root trust stores. Every mainstream browser automatically accepts certificates it signs. The intermediate itself is not a phishing signal — what matters is the specific domain. phishunt flags only the suspicious domains listed below; GlobalSign Atlas R3 DV TLS CA H2 2021 keeps signing millions of legitimate sites.
Who runs the GlobalSign Atlas R3 DV TLS CA H2 2021 certificate authority?
GlobalSign Atlas R3 DV TLS CA H2 2021 is operated by GlobalSign nv-sa. It is a RSA intermediate that chains up to the GlobalSign Root CA - R3 root, which GlobalSign nv-sa also owns. Anyone can look up the chain in the public Certificate Transparency logs; the same operator publishes a Certificate Policy / Certification Practice Statement (CP/CPS) describing how issuance and revocation work.
What does GlobalSign Atlas R3 DV TLS CA H2 2021 mean when my browser shows it as the issuer?
When a browser shows GlobalSign Atlas R3 DV TLS CA H2 2021 as the certificate issuer for a site, it means TLS was validated through GlobalSign nv-sa's RSA chain ending at GlobalSign Root CA - R3. That is normal for tens of millions of legitimate sites that use GlobalSign nv-sa's automated DV TLS. The certificate proves the connection is encrypted and that the certificate matches the hostname — it does not prove the site behind it is trustworthy. Always verify the domain name itself.
Why does GlobalSign Atlas R3 DV TLS CA H2 2021 show up on phishing sites?
GlobalSign nv-sa issues RSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not GlobalSign Atlas R3 DV TLS CA H2 2021 itself.
How do I verify a certificate issued by GlobalSign Atlas R3 DV TLS CA H2 2021?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at GlobalSign Root CA - R3, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid GlobalSign Atlas R3 DV TLS CA H2 2021 certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between GlobalSign Atlas R3 DV TLS CA H2 2021 and AlphaSSL CA - SHA256 - G2?
GlobalSign Atlas R3 DV TLS CA H2 2021 and its siblings (AlphaSSL CA - SHA256 - G2, AlphaSSL CA - SHA256 - G4) share the same operator (GlobalSign nv-sa) and roll up to the same root (GlobalSign Root CA - R3). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.