TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Subdomain.center – discover all subdomains for a domain

385 pointsby adam_gyroscopeover 1 year ago

33 comments

gnymanover 1 year ago
You cannot hide anything on the internet anymore, the full IPv4 range is scanned regularly by multiple entities. If you open a port on a public IP it will get found.<p>If it&#x27;s a obscure non-standard port it might take longer, but if it&#x27;s on any of the standard ports it will get probed very quickly and included tools like shodan.io<p>The reason why I&#x27;m repeating this, is that not everyone knows this. People still (albeit less) put up elastic and mongodb instances with no authentication on public IP&#x27;s.<p>The second thing which isn&#x27;t well known is the Certificate Transparency logs. This is the reason why you can&#x27;t (without a wildcard cert) hide any HTTPS service. When you ask Let&#x27;s Encrypt (or any CA actually) to generate veryobscure.domain.tld they will send that to the Certificate Transparency logs. You can find every certificate which was minted for a domain on a tool like <a href="https:&#x2F;&#x2F;crt.sh" rel="nofollow noreferrer">https:&#x2F;&#x2F;crt.sh</a><p>There are many tools like subdomain.center, <a href="https:&#x2F;&#x2F;hackertarget.com&#x2F;find-dns-host-records&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;hackertarget.com&#x2F;find-dns-host-records&#x2F;</a> comes to mind. The most impressive one I&#x27;ve seen, which found more much more than expected, is Detectify (which is a paid service, no affiliation), they seem to combine the passive data collection (like subdomain.center) with active brute to find even more subdomains.<p>But you can probably get 95% there by using CT and a brute-force tool like <a href="https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r">https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r</a>
评论 #37533114 未加载
评论 #37532649 未加载
评论 #37532503 未加载
评论 #37532692 未加载
评论 #37534308 未加载
评论 #37538868 未加载
评论 #37535597 未加载
评论 #37533643 未加载
评论 #37533244 未加载
评论 #37533462 未加载
banana_giraffeover 1 year ago
Cute, it managed to find 121486 subdomains for amazonaws.com [1], and somehow I suspect that&#x27;s a tiny fraction of what&#x27;s in use.<p><a href="https:&#x2F;&#x2F;gist.githubusercontent.com&#x2F;Q726kbXuN&#x2F;bf8a9a22b81fe651e38f67548aeb7f3f&#x2F;raw&#x2F;e47a312c7a9dc7a9ce41ca1c522a687479a0cf4c&#x2F;amazonaws.json" rel="nofollow noreferrer">https:&#x2F;&#x2F;gist.githubusercontent.com&#x2F;Q726kbXuN&#x2F;bf8a9a22b81fe65...</a>
Brananarchyover 1 year ago
As others have said, certificate transparency seems to be doing some heavy lifting here. It reports subdomains for me that have never had a public CNAME or A record, but have had let&#x27;s encrypt certs issued for internal use.<p>It&#x27;s also missing some that have not had certs issued, but that are in public DNS
评论 #37532354 未加载
评论 #37532479 未加载
评论 #37533288 未加载
TheHappyOddishover 1 year ago
Hardly &quot;all subdomains&quot;. Unless it&#x27;s doing an AXFR of my zone file (unlikely), this isn&#x27;t possible.<p>It&#x27;s a scraper&#x2F;guesser, using cert transparency, common names, etc. Cute toy, but false claims.
评论 #37535472 未加载
hankchinaskiover 1 year ago
I would be keen to know what techniques are used. Usually subdomain discovery is done with dns axfr transfer request which leaks the entire dns zone (but this only works on ancient and unpatched nameservers) or with dictionary attacks. There are some other techniques you can check if you look at the source code of amass (open source Golang reconnaissance&#x2F;security tool), or CT logs. Dns dumpster is one of the tools I used alongside pentest tools (commercial) and amass (oss)
评论 #37531942 未加载
derefrover 1 year ago
Interesting. Our domain has some subdomains with a numeric suffix; and the API response here has entries in that pattern for not only the particular subdomains that exist or ever existed, but also for subdomains of the same pattern that go <i>beyond</i> any suffix number we&#x27;ve ever actually used.<p>You&#x27;d think they&#x27;d at least be filtering their response by checking which subdomains actually have an A&#x2F;AAAA&#x2F;CNAME record on them...
评论 #37532041 未加载
评论 #37532849 未加载
blueflowover 1 year ago
I entered my own domains and i got so many garbage entries. It feels like an AI reading letsencrypt logs and then adding made up shit to it.
internet2000over 1 year ago
For my personal domain: it got the ones I have on the SSL cert alternative subject names, made up three, returned one I deleted more than a year ago, and didn&#x27;t find two. Very curious.
评论 #37532398 未加载
donatjover 1 year ago
Interesting. It only found less that a quarter of the subdomains of the site I work on, and everything it did find is public facing. I wonder if that’s maybe something to do with how we set up certificates for public vs internal subdomains? It even missed “staging.” which should be nearly identical in configuration to www
SushiHippieover 1 year ago
Note, if you looked up a domain and it had no results, you should check back again after some minutes. I looked my domain up and had zero results, which was weird as it should at least find some in the ct logs, but a few minutes later it showed some subdomains.
评论 #37535671 未加载
RockRobotRockover 1 year ago
This is certificate transparency doing most of the work, right?
评论 #37531947 未加载
评论 #37531909 未加载
Arubisover 1 year ago
If this were able to determine which wildcard subdomains were active for a given domain, you could use it to figure out a lot of B2B companies’ client&#x2F;customer list.
Xorakiosover 1 year ago
Just for giggles, does anyone else remember when &quot;subdomains&quot; were called &quot;machine names&quot; because physical devices were limited to one service?<p>www. ftp. mail.<p>... weren&#x27;t theoretical or merely mnemonic.<p>Felt like an old coot when using &quot;machine name&quot; to a 40 year old IT professional and she was perplexed!
评论 #37570583 未加载
p4bl0over 1 year ago
It gave me empty results for some of my domains that have multiple subdomains that have TLS certificate associated with them so that must appear in the certificate transparency log.<p>I guess it should be &quot;discover <i>some</i> subdomains for <i>some</i> domains&quot;.
评论 #37533212 未加载
pabs3over 1 year ago
More options here: <a href="https:&#x2F;&#x2F;wiki.archiveteam.org&#x2F;index.php&#x2F;Finding_subdomains" rel="nofollow noreferrer">https:&#x2F;&#x2F;wiki.archiveteam.org&#x2F;index.php&#x2F;Finding_subdomains</a>
评论 #37536156 未加载
ohufover 1 year ago
The subdomain explorer may be fun, but their Exploit Observer is really useful: <a href="https:&#x2F;&#x2F;www.exploit.observer&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.exploit.observer&#x2F;</a>
评论 #37533087 未加载
keepamovinover 1 year ago
This is fantastic!!!<p>What kind of security considerations are there to having multi-tenant user applications on subdomains and then having them exposed like this?<p>I&#x27;m building a SaaS right now, and I guess one thing is that a given username can then be discovered as a valid login for the system...but obviously that&#x27;s only part of the login credential.<p>Maintaining a list of mappings to opaque subdomains seems to reduce targeting, and conceal login partial credentials, but doesn&#x27;t seem to offer much besides.<p>Analysis?
评论 #37532258 未加载
cm2187over 1 year ago
One thing I noticed looking at my logs is that there is almost no unsolicited traffic (i.e. failed authentication attempts, exploits of various worldpress bugs, etc) through ipv6. I think it&#x27;s a function of 1) those coming from networks (compromised home devices, etc) that don&#x27;t support v6, 2) the v6 address space being too large to scan (the size of an encryption key), so good security by obscurity. This would nullify 2).
weird-eye-issueover 1 year ago
I got back an empty list for my domain on Cloudflare with several subdomains (non wildcard)<p>edit: I retried on my computer (was on my phone earlier) and now it returns all of our subdomains, even picking up our test R2 bucket. In guessing I was rate limited because I accidentally loaded the example file a few times
hbcondo714over 1 year ago
Seems similar yet still useful to Wolfram Alpha; just enter a domain and click on the &quot;Subdomains&quot; button:<p><a href="https:&#x2F;&#x2F;www.wolframalpha.com&#x2F;input?i=ycombinator.com" rel="nofollow noreferrer">https:&#x2F;&#x2F;www.wolframalpha.com&#x2F;input?i=ycombinator.com</a>
franky47over 1 year ago
Sublist3r [1] does a similar job, as long as you have the authorisation to use it on a particular domain, as it uses more aggressive discovery techniques.<p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r">https:&#x2F;&#x2F;github.com&#x2F;aboul3la&#x2F;Sublist3r</a>
asmorover 1 year ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;projectdiscovery&#x2F;subfinder">https:&#x2F;&#x2F;github.com&#x2F;projectdiscovery&#x2F;subfinder</a> does this, but it explains all the methods and lets you choose to only do a passive scan.
johntiger1over 1 year ago
Took a while, but was impressed it detected all of ours: <a href="https:&#x2F;&#x2F;api.subdomain.center&#x2F;?domain=radiantai.health" rel="nofollow noreferrer">https:&#x2F;&#x2F;api.subdomain.center&#x2F;?domain=radiantai.health</a>
评论 #37532125 未加载
perryizgr8over 1 year ago
It detects only some of mine. To be precise, it does not detect subdomains being served by a service behind a CloudFlare tunnel.
xg15over 1 year ago
I think as soon as cert transparency was introduced, it was pretty clear we would eventually get something like this.
judge2020over 1 year ago
<a href="https:&#x2F;&#x2F;dnsdumpster.com" rel="nofollow noreferrer">https:&#x2F;&#x2F;dnsdumpster.com</a>
TechBro8615over 1 year ago
I get a rate limit error when I click the text input (I&#x27;m on a VPN).
评论 #37533422 未加载
mmarquezsover 1 year ago
Nice, last time I used Wolframalpha for this.
webprofusionover 1 year ago
This is a CT log search right?
zX41ZdbWover 1 year ago
How can I download the entire dataset from this service?
maul666over 1 year ago
dpd.co.uk
Ochaover 1 year ago
Missed some for me
评论 #37532087 未加载
tobinfekkesover 1 year ago
This is crazy, I was just looking for this exact thing a couple days ago. Thank you for sharing. Brilliant work.