Enterno.io scanned the top-1M sites via ALPN negotiation: 34% support HTTP/3 (up +8% year-over-year). Leaders — Cloudflare (98% HTTP/3), Google (96%), Fastly (91%). Adoption on origin servers without a CDN is only 2.3%. First-connection mobile gain vs HTTP/2 over TLS 1.3 is ~180ms TTFB.
Below: key findings, platform breakdown, implications, methodology, FAQ.
| Metric | Pass-rate / Value | Median | p75 |
|---|---|---|---|
| HTTP/3 enabled (top-1M) | 34.1% | — | — |
| HTTP/3 via Cloudflare | 98% | — | — |
| HTTP/3 via Fastly | 91% | — | — |
| HTTP/3 at origin (no CDN) | 2.3% | — | — |
| HTTP/2 only | 58% | — | — |
| HTTP/1.1 only (legacy) | 7.9% | — | — |
| Platform | Share | Pass / Detail | avg LCP |
|---|---|---|---|
| Cloudflare | 21% | HTTP/3: 98% | — |
| AWS CloudFront | 14% | HTTP/3: 76% | — |
| Fastly | 4% | HTTP/3: 91% | — |
| Google Cloud CDN | 5% | HTTP/3: 96% | — |
| Azure Front Door | 3% | HTTP/3: 68% | — |
| Origin (no CDN) | 46% | HTTP/3: 2% | — |
Scan of the top-1M per Tranco list (March 2026). Used curl --http3 and nghttp3 to verify ALPN negotiation for HTTPS ports. CDN identified by SOA/CNAME chain and Server header. TTFB measured from three geographies (Frankfurt, Virginia, Singapore) × 5 repeats per URL.
SSL/TLS is the encryption protocol that protects data between the browser and server. Our tool analyzes the certificate, chain of trust, TLS version, and knownvulnerabilities.
Issuer, validity period, signature algorithm, covered domains (SAN), and validation type (DV/OV/EV).
Full chain verification: from leaf certificate through intermediates to root CA.
Protocol version (TLS 1.2/1.3), cipher suites, Perfect Forward Secrecy (PFS) support.
Set up a monitor — get Telegram and email alerts 30/14/7 days before expiration.
SSL certificate monitoring
TLS config audit
HTTPS as ranking factor
customer trust
www and subdomains.Strict-Transport-Security header forces browsers to always use HTTPS.SSL certificate monitoring, check history and alerts 30 days before expiry.
Sign up freeThree reasons: (1) nginx HTTP/3 stable only since 1.25 (March 2023); (2) kernel UDP performance on Linux trails TCP in non-CDN scenarios; (3) operational complexity of QUIC (retries, NAT rebinding).
On fast wired connections it is a close call (HTTP/2 TCP + BBR is comparable). The gain shows up on mobile/Wi-Fi with packet loss — typically 100-200ms TTFB.
No. HTTP/3 is a transport-level change; the API is identical to HTTP/2. Only proxy/edge server configuration changes.
<a href="/en/ssl">Enterno SSL/TLS Checker</a> shows supported protocols including HTTP/3. Or at the terminal: <code>curl -I --http3 https://example.com</code>.