Uncover Every Subdomain Hiding in Your Attack Surface
Forgotten staging servers, orphaned dev environments, and shadow IT subdomains are where breaches begin. Our Subdomain Finder combines certificate transparency logs, passive DNS intelligence, and targeted brute-forcing to map your full external footprint - so you can secure what you did not know existed.
Try Subdomain Finder
How It Works
From target input to actionable findings in three straightforward steps.
Enter a Root Domain
Provide the target domain (e.g., example.com). The scanner accepts apex domains and will recursively discover subdomains across all depth levels.
Multi-Source Enumeration
The engine queries certificate transparency logs, passive DNS databases, search engine caches, and common wordlists simultaneously. Results are deduplicated and validated with live DNS resolution.
Review and Export Results
Browse discovered subdomains with their IP addresses, HTTP status codes, and server headers. Export the full inventory as CSV or JSON for integration with your asset management workflow.
Key Capabilities
Purpose-built scanning backed by real penetration testing expertise.
Certificate Transparency Mining
Extracts subdomains from publicly logged TLS certificates, catching domains that never appear in DNS brute-force wordlists.
Passive DNS Correlation
Queries historical DNS resolution databases to surface subdomains that were active in the past but may still resolve today.
Smart Wordlist Brute-Force
Runs a curated wordlist augmented with permutations based on discovered naming patterns, significantly increasing hit rates.
Live Validation
Every discovered subdomain is resolved in real time. Dead records are flagged separately so you can focus on live assets.
HTTP Probing
Automatically checks discovered hosts for running web servers and captures response codes, titles, and technology fingerprints.
Wildcard Detection
Identifies wildcard DNS configurations to prevent false positives from polluting your results.
Common Use Cases
Why Use Pentestas
Security tools built by penetration testers, not just developers.
Enterprise-Grade Accuracy
Our scanning engine is built on the same methodologies our penetration testers use in manual engagements, tuned to minimize false positives and surface genuine risk.
Fast, Actionable Results
Get findings in minutes rather than days. Every result includes severity ratings, technical evidence, and clear remediation steps your team can act on immediately.
Continuous Monitoring
Schedule recurring scans from the Pentestas platform to catch regressions before they reach production. Stay ahead of new CVEs and configuration drift.
Privacy First
Your scan data is encrypted at rest and in transit. You own your data, with full control over retention and export.
Detailed Reporting
Export findings as PDF, CSV, or JSON. Feed results directly into your SIEM, ticketing system, or CI/CD pipeline through our REST API.
Instant Setup
Run scans directly from your browser. Enter a target, click scan, and receive results. Ready in under a minute.
Start scanning with Subdomain Finder today
Create a free account and run your first scan in under a minute. Full platform access during your 14-day trial.