Free tool · Asset discovery
Subdomain inventory + enumeration
Query public Certificate Transparency logs for every subdomain that has ever had a TLS certificate issued, then test which ones still resolve. Find forgotten dev environments and dangling CNAMEs before attackers do. No signup.
What this tool checks
We query public Certificate Transparency log aggregators for every cert that has ever been issued to any subdomain of the apex. CT logs are append-only: every cert any CA has issued since 2018 is in there. The result is a near-complete inventory of subdomains that have existed at any point in the domain's history.
Then we resolve each candidate in current DNS to surface which still have live A / AAAA / CNAME records, and which are cert-only ghosts (issued cert, no current DNS). The live ones are your current attack surface; the ghosts are interesting for historical inventory and abandoned-asset detection.
Cert issuance volume is also a signal - a subdomain with 50 certs over 6 years is a long-running production system; a subdomain with 1 cert from 2 years ago is probably an abandoned dev box.
How to read the results
Live with active records: legitimate current assets. Make sure they're inventoried in your asset register.
Live with CNAME to dead resource: subdomain takeover risk. The CNAME points to an external service (S3 bucket, Heroku app, GitHub Pages site) that has been deprovisioned but the CNAME wasn't cleaned up. Anyone who re-registers the target name now controls your subdomain. Highest-priority finding to act on.
NXDOMAIN with historical certs: subdomain existed at some point, doesn't anymore. Useful for historical inventory and post-incident "what did we used to expose" audits.