Skip to content

FreeSubdomain Finder

Discover every subdomain for any domain using Certificate Transparency logs. Find staging servers, API endpoints, and forgotten services.

Certificate Transparency Discovery

Every SSL/TLS certificate issued by a trusted CA gets logged in public Certificate Transparency logs. We query these logs to find every subdomain that has ever had a certificate.

  • Queries crt.sh public CT log database
  • Passive reconnaissance — no traffic sent to target
  • Finds subdomains that brute-forcing misses
  • Certificate history with first/last seen dates
🔍
CT Log Query
Search certificate transparency logs
🔗
SAN Extraction
Parse Subject Alternative Names
📈
Deduplication
Unique subdomains with cert counts
📅
Timeline Tracking
First seen and last seen dates

Attack Surface Mapping

Forgotten subdomains are one of the most common attack vectors. Staging servers, old API versions, and internal tools left exposed create openings for attackers.

  • Discover forgotten staging and dev environments
  • Find internal services exposed to the internet
  • Identify old API endpoints and legacy services
  • Map your complete external footprint
Example Discovery
$ subdomain-finder example.com

47 subdomains found

api.example.com
app.example.com
auth.example.com
blog.example.com
cdn.example.com
dashboard.example.com
dev.example.com
docs.example.com
mail.example.com
staging.example.com
test.example.com
internal.example.com
...

Export & Analysis

Copy the full subdomain list to your clipboard or export as CSV for further analysis. Filter and search through results to find exactly what you need.

  • One-click copy all subdomains
  • Export results as CSV with full metadata
  • Filter by subdomain name in real time
  • Sort by name, date, or certificate count
Export Formats
Copy to Clipboard One per line
CSV Export Full metadata
Search & Filter Real-time
Column Sorting Name / Date / Certs

Check Your Other Security Layers Too

Subdomain discovery is one step. Check your SSL/TLS certificates, DNS security configuration, and HTTP security headers for a complete security picture.