RapidSSL TLS RSA CA G1
What is RapidSSL TLS RSA CA G1?
Budget DV TLS sold under the RapidSSL brand through DigiCert resellers.
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|---|---|---|---|---|
| 2025-11-06 13:26 | 2025-11-06 13:26 | ![]() |
Details | ||
| 2025-11-03 12:43 | 2025-11-03 12:43 | ![]() |
Details | ||
| 2025-10-25 01:02 | 2025-10-25 01:02 | ![]() |
Details | ||
| 2025-10-23 12:42 | 2025-10-23 12:42 | ![]() |
Details | ||
| 2025-10-22 01:00 | 2025-10-22 01:00 | ![]() |
Details | ||
| 2025-10-21 12:46 | 2025-10-21 12:46 | ![]() |
Details | ||
| 2025-10-21 01:17 | 2025-10-21 01:17 | ![]() |
Details | ||
| 2025-10-19 01:00 | 2025-10-19 01:00 | ![]() |
Details | ||
| 2025-10-18 15:24 | 2025-10-18 15:24 | ![]() |
Details | ||
| 2025-10-03 00:53 | 2025-10-03 00:53 | ![]() |
Details | ||
| 2025-10-01 00:58 | 2025-10-01 00:58 | ![]() |
Details | ||
| 2025-10-01 00:58 | 2025-10-01 00:58 | ![]() |
Details | ||
| 2025-06-25 02:23 | 2025-06-25 02:23 | ![]() |
Details | ||
| 2025-06-25 02:23 | 2025-06-25 02:23 | ![]() |
Details |
Suspicious sites — confidence is not always 100%. Use for Threat Hunting or watchlists.
| URL | Screenshot | Flags | Details |
|---|---|---|---|
| http://holaserviciio11.clouda… | ![]() |
Details | |
| http://networkwebcr78.cloudac… | ![]() |
Details | |
| https://infoeeess1111.wpdevcl… | ![]() |
Details | |
| https://accessionoxdg.wpdevcl… | ![]() |
Details | |
| https://holaserviciio11.cloud… | ![]() |
Details | |
| https://holaserviciio11.cloud… | ![]() |
Details | |
| https://holaserviciio11.cloud… | ![]() |
Details | |
| https://networkwebcr78.clouda… | ![]() |
Details | |
| https://networkwebcr78.clouda… | ![]() |
Details | |
| https://servicenet8.cloudacce… | ![]() |
Details | |
| https://eeesser1.cloudaccess.… | ![]() |
Details | |
| https://eeesser1.cloudaccess.… | ![]() |
Details | |
| http://grupocorreosenvio-ps.w… | ![]() |
Details | |
| https://grupocorreosenvio-ps.… | ![]() |
Details |
Frequently asked questions about RapidSSL TLS RSA CA G1
What is RapidSSL TLS RSA CA G1?
RapidSSL TLS RSA CA G1 is a publicly trusted intermediate certificate authority operated by DigiCert (RapidSSL brand) and chained to DigiCert Global Root G2. It is recognized by all mainstream browsers and operating system trust stores, so the certificate itself is not a phishing indicator - the same intermediate signs millions of legitimate sites. phishunt only flags the specific domains listed below as suspicious; RapidSSL TLS RSA CA G1 as a CA is fine.
Is RapidSSL TLS RSA CA G1 a legitimate certificate authority?
Yes. RapidSSL TLS RSA CA G1 is a publicly trusted intermediate CA operated by DigiCert (RapidSSL brand), included in the Microsoft, Apple, Google and Mozilla root trust stores. Every mainstream browser automatically accepts certificates it signs. The intermediate itself is not a phishing signal — what matters is the specific domain. phishunt flags only the suspicious domains listed below; RapidSSL TLS RSA CA G1 keeps signing millions of legitimate sites.
Who runs the RapidSSL TLS RSA CA G1 certificate authority?
RapidSSL TLS RSA CA G1 is operated by DigiCert (RapidSSL brand). It is a RSA intermediate that chains up to the DigiCert Global Root G2 root, which DigiCert (RapidSSL brand) also owns. Anyone can look up the chain in the public Certificate Transparency logs; the same operator publishes a Certificate Policy / Certification Practice Statement (CP/CPS) describing how issuance and revocation work.
What does RapidSSL TLS RSA CA G1 mean when my browser shows it as the issuer?
When a browser shows RapidSSL TLS RSA CA G1 as the certificate issuer for a site, it means TLS was validated through DigiCert (RapidSSL brand)'s RSA chain ending at DigiCert Global Root G2. That is normal for tens of millions of legitimate sites that use DigiCert (RapidSSL brand)'s automated DV TLS. The certificate proves the connection is encrypted and that the certificate matches the hostname — it does not prove the site behind it is trustworthy. Always verify the domain name itself.
Why does RapidSSL TLS RSA CA G1 show up on phishing sites?
DigiCert (RapidSSL brand) issues RSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not RapidSSL TLS RSA CA G1 itself.
How do I verify a certificate issued by RapidSSL TLS RSA CA G1?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at DigiCert Global Root G2, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid RapidSSL TLS RSA CA G1 certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between RapidSSL TLS RSA CA G1 and Thawte TLS RSA CA G1?
RapidSSL TLS RSA CA G1 and its siblings (Thawte TLS RSA CA G1, GeoTrust TLS RSA CA G1, Encryption Everywhere DV TLS CA - G1, RapidSSL TLS DV RSA Mixed SHA256 2020 CA-1) share the same operator (DigiCert (RapidSSL brand)) and roll up to the same root (DigiCert Global Root G2). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.
