Discover subdomains for any domain using Certificate Transparency logs and DNS brute-forcing. Uncover forgotten assets, development servers, and the full scope of a domain's attack surface.
Searches Certificate Transparency logs (crt.sh) and brute-forces 80+ common subdomain prefixes. May take 15-30 seconds.
Here's a sample of what a subdomain scan returns for a typical domain.
| Subdomain | IP | Source |
|---|---|---|
| www.example.com | 93.184.216.34 | CT + DNS |
| mail.example.com | 93.184.216.35 | DNS |
| api.example.com | 93.184.216.40 | CT log |
| staging.example.com | 10.0.1.50 | CT log |
| dev.example.com | 10.0.1.51 | DNS |
| cdn.example.com | 104.16.132.229 | CT + DNS |
| app.example.com | 93.184.216.42 | CT log |
| blog.example.com | 76.76.21.21 | CT log |
Queries crt.sh — a public database of every SSL certificate ever issued. When a certificate is created for staging.example.com, it gets logged permanently. We find those entries and extract every subdomain.
Tests 80+ common subdomain prefixes (www, mail, api, dev, staging, admin, etc.) by resolving DNS records. If the subdomain resolves to an IP, it exists.
Every discovered subdomain gets its A record resolved so you can see exactly which IP address it points to — useful for identifying shared hosting, CDNs, and internal servers.
Results from both methods are merged and deduplicated. Subdomains found by both CT logs and DNS brute force are tagged 'CT + DNS' so you can see which method found what.
Filters out wildcard DNS responses that would otherwise flood results with false positives. Only genuine, individually-configured subdomains are returned.
CT logs catch subdomains that DNS brute force misses (unique names like jira.example.com) and brute force catches subdomains with no SSL certificate. Together they provide the most complete picture.
Map your full attack surface before an attacker does. Forgotten staging servers, old dev environments, and shadow IT subdomains are prime targets. If it resolves, it can be attacked.
Subdomain enumeration is step one of any external assessment. CT logs reveal subdomains that aren't linked from the main site — internal tools, admin panels, and staging environments.
Audit your DNS footprint. Find subdomains created by other teams, identify stale records pointing to decommissioned servers, and catch DNS entries that should have been cleaned up.
See what infrastructure a competitor is running — what tools they use (jira.company.com, grafana.company.com), where they host (IP analysis), and how their infrastructure is organized.
| Feature | AcuityScan | crt.sh | Sublist3r |
|---|---|---|---|
| CT log search | ✓ | ✓ Core feature | ✓ (via APIs) |
| DNS brute force | ✓ 80+ prefixes | ✗ | ✓ (local only) |
| IP resolution | ✓ Automatic | ✗ | ✓ |
| No install needed | ✓ Browser-based | ✓ | ✗ Requires Python |
| Wildcard filtering | ✓ | ✗ Shows raw results | ✓ |
| Source labeling | ✓ CT / DNS / Both | CT only | Source listed |
| Full site audit | ✓ Part of 350+ check | ✗ Certs only | ✗ CLI tool only |
| All scans | Free, unlimited | Free | Free (open source) |
The checks DNS plus 7 other categories — email, SSL, performance, SEO, accessibility, privacy, and mobile.
Run