There was no good way to see what CT logs are actually used by CAs, so I made a dashboard of Censys data on exe.dev.

There are some interesting patterns, but the main one is that Let's Encrypt is the only CA that evenly spreads load. Other CAs are mostly using older logs, or their own logs and Google's.

(Of course, LE is 50% of issuance, and GTS is 25%, so the rest don't matter much.)

https://groups.google.com/a/chromium.org/d/msgid/ct-policy/718571cb-a841-4102-bcfa-3fe3feab63ae%40app.fastmail.com

@filippo They may not matter much in volume, but lots of orgs are still tied to the OV/EV certs from legacy CAs.

We still need to pull from just about all the CT Logs to get a complete picture for our discovery tool.

https://www.certkit.io/tools/ct-logs/

Search Certificate Transparency Logs

Search the TLS certificate transparency logs to find public certificates issued.This can reveal new subdomains, certificate renewals, or suspicious activity.Great for security monitoring, domain research, and uncovering hidden infrastructure.

CertKit SSL Certificate Management
@certkit They don't matter in terms of CA write load, monitors definitely need to consume all logs.