WEB
Subdomain Finder
Find subdomains (limited)
Input
Terminal
Console ready. Execute a command to see output...
About Subdomain Finder
Expand the Attack Surface
Subdomain enumeration is the first step in security auditing. It reveals the breadth of an organization's infrastructure.
Hidden Treasures
- test.example.com: May have weak passwords.
- vpn.example.com: Critical entry points.
- old.example.com: Legacy systems that haven't been patched in years.
How it works: We query Certificate Transparency logs via crt.sh (passive, fetches historical issued certificates), then DNS-probe a short list of common subdomain names (active, around 90 names) to catch entries that never appeared in a public certificate. Not exhaustive, but a fast pragmatic mix.
How to use Subdomain Finder
- Enter the apex domainJust the bare domain, e.g.
example.com. Subdomain inputs do not enumerate further levels reliably. - Hit Find SubdomainsThe tool queries crt.sh and runs around 90 common-name DNS probes in parallel.
- Read the resultA deduplicated, sorted list. CT log entries may be historical and may not currently resolve.
- Verify and exploreUse DNS Lookup to confirm each interesting subdomain is currently live. Use HTTP Headers and SSL Checker on the ones that are.
Frequently Asked Questions
- Two sources combined. Passive: we query Certificate Transparency logs via crt.sh, which lists every publicly issued TLS certificate. Active: we DNS-probe a short list of around 90 common subdomain names (mail, blog, dev, staging, api, vpn, etc.). The two sets are unioned, deduplicated, and sorted.