TLS Certificate
R13
About R13
- Operator
- Internet Security Research Group (ISRG)
- Chains to
- ISRG Root X1
- Key type
- RSA
- In use since
- 2024
Free automated DV TLS via ACME, commonly seen on new sites issued through the standard Let's Encrypt staging-to-prod flow.
Frequently asked questions
Is R13 a legitimate certificate authority?
Yes. R13 is a publicly trusted intermediate CA operated by Internet Security Research Group (ISRG) and chained to ISRG Root X1. It is recognized by all mainstream browsers and operating system trust stores. The certificate itself is not a phishing indicator — the same intermediate signs millions of legitimate sites.
Why does R13 show up on phishing sites?
Internet Security Research Group (ISRG) issues RSA domain-validated certificates automatically and at no cost (or very low cost), which is the exact workflow scammers need to put HTTPS on a throwaway domain. Domain validation only proves that the requester controls the domain name, not that the site behind it is trustworthy. phishunt lists the specific domains currently flagged below — those are the suspicious ones, not R13 itself.
How do I verify a certificate issued by R13?
In a desktop browser, click the padlock in the address bar and open the certificate viewer. Confirm the issuer chain ends at ISRG Root X1, that the subject matches the domain you expect, and that the notAfter date has not passed. A valid R13 certificate only proves TLS was negotiated correctly — always verify the domain name itself belongs to the service you intended to visit.
What is the difference between R13 and R10?
R13 and its siblings (R10, R11, R12, R14) share the same operator (Internet Security Research Group (ISRG)) and roll up to the same root (ISRG Root X1). CAs rotate multiple intermediates so that if one key ever has to be revoked, the damage is contained. As a user, you can treat all of them as the same trust anchor.
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| Last check (UTC) | First seen (UTC) ▾ | URL | Screenshot | Flags | Details |
|---|---|---|---|---|---|
| 2026-04-14 19:30 | 2026-04-10 03:00 | ![]() |
PhishTank | Details | |
| 2026-04-14 19:30 | 2026-04-09 00:00 | ![]() |
PhishTank urlscan | Details | |
| 2026-04-14 19:30 | 2026-04-04 01:01 | ![]() |
OpenPhish urlscan | Details | |
| 2026-04-14 19:30 | 2026-03-29 00:00 | ![]() |
PhishTank | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish urlscan | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 13:01 | ![]() |
OpenPhish | Details | |
| 2026-04-14 19:30 | 2026-03-28 01:01 | ![]() |
OpenPhish urlscan | Details | |
| 2026-04-14 19:30 | 2026-03-28 01:01 | ![]() |
OpenPhish urlscan | Details |
It is strongly recommended to use them for Threat Hunting or add them to a Watchlist.
| URL | Screenshot | Flags | Details |
|---|---|---|---|
| https://microsoft.lyearn.com | ![]() |
PhishTank | Details |
| https://outlook36validar.webc… | ![]() |
PhishTank urlscan | Details |
| https://coinbase.hepai-inc.com | ![]() |
OpenPhish urlscan | Details |
| https://spotify.fourthwall.app | ![]() |
PhishTank | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| https://support.m365-microsof… | ![]() |
OpenPhish | Details |
| https://support.m365-microsof… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| https://santander.bniconsulti… | ![]() |
OpenPhish urlscan | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| http://support.m365-microsoft… | ![]() |
OpenPhish | Details |
| https://office365.internal-al… | ![]() |
OpenPhish urlscan | Details |
| https://office365.internal-al… | ![]() |
OpenPhish urlscan | Details |
















