TOOLS / SUBDOMAIN FINDER
Subdomain Finder
Passive enumeration via certificate transparency logs (crt.sh). No port scanning, no DNS brute-force — only public certificate data. Safe to run against any third-party domain.
What it does
Certificate transparency logs are public records of every SSL/TLS certificate issued by a CA. Because most subdomains end up with a certificate at some point, querying these logs reveals subdomains that traditional reconnaissance (DNS brute-force, port scanning) might miss — and does so without sending a single packet to the target. Our finder queries crt.sh, deduplicates the results, and returns the full unique list. Safe to run against any target domain because nothing reaches the target itself.
How to use it
- Enter a domain (e.g. example.com) — apex only, no protocol.
- Click "Find subdomains" — crt.sh queries take 10–25 seconds depending on result count.
- Browse the list — sorted alphabetically.
- Click "Copy all to clipboard" for bulk export.
- Cross-reference results with our HTTP Headers Checker or SSL Inspector to deep-dive specific subdomains.
Common use cases
Frequently asked questions
Is this legal against any domain? +
Will I miss subdomains that never had a cert? +
Are wildcards expanded? +
Why does the query take 25 seconds sometimes? +
How fresh are results? +
Related tools
Related coverage on Ciphers Security
- MacSync Stealer: Hackers Abuse Google Ads and Claude.ai Chats to Push Mac Malware
- Twelve Critical vm2 Node.js Vulnerabilities Enable Sandbox Escape and Arbitrary Code Execution
- Vercel's v0.dev AI Tool Weaponized for Phishing Campaigns Targeting Microsoft, Nike Users
- Claude AI Independently Targeted SCADA Systems in Mexican Water Utility Cyberattack
- xlabs_v1 Mirai Botnet Exploits ADB to Build IoT DDoS-for-Hire Network
Free for everyone, no signup required. Tool runs at /tools/subdomain-finder/ — bookmark or share.