Live Subdomains
Resolves discovered subdomains to confirm which are currently live and responding.
Free account required
Enumerate subdomains via DNS records, certificate transparency logs, and brute-force.
Comprehensive subdomain discovery using multiple sources: certificate transparency log queries, DNS brute-force with curated wordlists, passive DNS databases, and web crawl data. Identifies live hosts, expired domains, and takeover candidates.
What it detects
Detection capabilities
Resolves discovered subdomains to confirm which are currently live and responding.
Identifies dangling DNS records pointing to deprovisioned cloud services (S3, GitHub Pages, Heroku).
Queries CT logs to find subdomains that appear in TLS certificates — including staging and internal ones.
Detects wildcard DNS configurations that may mask real subdomain enumeration results.
Step-by-step guide
Input the root domain (e.g., example.com). The tool handles all subdomain prefix enumeration.
Select passive (CT logs, passive DNS), active (DNS brute-force), or both for maximum coverage.
Download found subdomains as a text list for use in further recon or full hunt sessions.
Keep going
Discover hidden endpoints, admin paths, and API routes from any web application.
Use tool →
Find open redirects, SSRF indicators, and injection points in any URL.
Use tool →
Extract API keys, internal endpoints, and auth tokens from JavaScript files.
Use tool →