Subdomain Finder

Find subdomains (limited)

Input

• Uses Certificate Transparency logs & DNS

• Rate limited to prevent abuse

Discover subdomains for a domain by combining Certificate Transparency logs with active DNS probing of common subdomain names.

Terminal

Console ready. Execute a command to see output...

About Subdomain Finder

Expand the Attack Surface

Subdomain enumeration is the first step in security auditing. It reveals the breadth of an organization's infrastructure.

Hidden Treasures

  • test.example.com: May have weak passwords.
  • vpn.example.com: Critical entry points.
  • old.example.com: Legacy systems that haven't been patched in years.

How it works: We query Certificate Transparency logs via crt.sh (passive, fetches historical issued certificates), then DNS-probe a short list of common subdomain names (active, around 90 names) to catch entries that never appeared in a public certificate. Not exhaustive, but a fast pragmatic mix.

How to use Subdomain Finder

  1. Enter the apex domain
    Just the bare domain, e.g. example.com. Subdomain inputs do not enumerate further levels reliably.
  2. Hit Find Subdomains
    The tool queries crt.sh and runs around 90 common-name DNS probes in parallel.
  3. Read the result
    A deduplicated, sorted list. CT log entries may be historical and may not currently resolve.
  4. Verify and explore
    Use DNS Lookup to confirm each interesting subdomain is currently live. Use HTTP Headers and SSL Checker on the ones that are.

Frequently Asked Questions

Two sources combined. Passive: we query Certificate Transparency logs via crt.sh, which lists every publicly issued TLS certificate. Active: we DNS-probe a short list of around 90 common subdomain names (mail, blog, dev, staging, api, vpn, etc.). The two sets are unioned, deduplicated, and sorted.