Skip to content

Domains

The Domains view displays every root domain ShadowMap monitors for your organization. Each domain is the anchor point for a tree of subdomains, IP addresses, web applications, and security findings. Keeping this list accurate and up to date is essential -- an untracked domain is an unprotected domain.

Overview

Domains

The table lists all domains with sortable columns, inline status indicators, and expandable detail rows.

ColumnDescription
DomainThe root domain name (e.g., example.com)
StatusOnline or Offline, based on the most recent scan
OrganizationsBusiness units or entities associated with this domain
SubdomainsCount of discovered subdomains under this domain
IP AddressesCount of unique IPs resolving from this domain's assets
AppsNumber of web applications detected on this domain
AlertsNumber of open security findings tied to this domain
SSL CertificatesCount of SSL/TLS certificates issued for this domain
RegistrarDomain registrar (e.g., GoDaddy, Namecheap, Cloudflare)
Registered DateWhen the domain was originally registered
Expiry DateWhen the domain registration expires
CountryCountry associated with the domain's registration or hosting
ASNAutonomous System Number for the domain's primary IP
Custom TagsUser-defined labels for organizing domains by business context
Last Seen OnDate of the most recent successful scan

Filters

Use the filter bar to narrow down your domain list by:

  • Domain Name -- search by full or partial domain name
  • Status -- Online or Offline
  • Country -- filter by hosting country
  • ASN -- filter by autonomous system number
  • Domain Validity -- Valid, Expired, Expiring Soon, or No Expiry Date
  • Custom Tags -- filter by any user-defined tag values

Filters combine with AND logic. Your active filter state is preserved when exporting.

Domain Detail View

Click any domain to expand its inline detail, which surfaces critical registration health indicators:

  • Is Expired -- whether the domain registration has lapsed (red if true)
  • Is Multilocked -- whether the domain has multiple registrar locks enabled (green if true, indicating good security posture)
  • Lock Effectiveness -- qualitative rating of the domain's transfer protection (red for "Very Low", amber for "Low")
  • Is Redacted -- whether WHOIS privacy protection is active (green if true)

DNS Records

The detail view displays current DNS records grouped by type (A, AAAA, MX, NS, TXT, CNAME), showing only the most recent records when history exists. This helps you verify that DNS is configured correctly and detect unauthorized changes.

WHOIS Information

Registrar details, name servers (NS1, NS2), registration and expiry dates are pulled from WHOIS lookups and displayed alongside the domain. This data feeds the Domain Validity filter, enabling you to quickly find domains that need renewal.

Domain Expiry Monitoring

Expired or soon-to-expire domains pose a serious risk. An attacker who registers your lapsed domain inherits all traffic directed to it -- email, web requests, API calls -- and can impersonate your organization. ShadowMap categorizes domain validity into four states:

StateMeaning
ValidExpiry date is more than 100 days away
Expiring SoonExpiry date is within the next 100 days
ExpiredExpiry date has passed
No Expiry DateWHOIS data does not include an expiry date (common with some ccTLDs)

Use the Domain Validity filter to isolate domains that need attention.

Custom Tags

You can apply custom tags to domains to add business context that ShadowMap cannot infer automatically -- for example, tagging domains by business unit, acquisition date, or compliance scope. Tags are searchable and appear in exports.

Export

Click Export to download a CSV containing all visible columns plus DNS records, name servers, custom tags, and organizations. The export respects your current filter state.

How Domains Connect to the Broader Attack Surface

Each domain is a starting point for discovery. ShadowMap uses your domain list to:

  1. Enumerate subdomains via DNS and CT logs
  2. Resolve subdomains to IP addresses
  3. Scan IPs for open ports and services
  4. Crawl web applications for technology fingerprinting
  5. Match detected technologies against CVE databases

Changes to your domain list -- adding a new domain or removing a decommissioned one -- cascade through the entire discovery pipeline.

ShadowMap by Security Brigade