Skip to content

Subdomains

The Subdomains view lists every subdomain ShadowMap has discovered across your entire domain portfolio. Subdomains are where the real attack surface lives -- each one is a potential entry point that may host applications, expose services, or be vulnerable to takeover.

Overview

Subdomains

ShadowMap continuously discovers subdomains using DNS enumeration, Certificate Transparency log monitoring, and web crawling. New subdomains are typically detected within hours of creation.

ColumnDescription
SubdomainThe fully qualified subdomain name (e.g., staging.api.example.com)
StatusOnline or Offline, based on whether the subdomain currently resolves and responds
IP AddressThe IP address the subdomain resolves to (via DNS A record)
OrganizationThe entity associated with this subdomain's hosting
CountryGeographic location of the hosting infrastructure
CityCity-level geolocation
ProviderASN provider / hosting company (e.g., AWS, Cloudflare, DigitalOcean)
First Seen OnWhen ShadowMap first discovered this subdomain
Last Seen OnThe most recent scan that confirmed this subdomain exists

Filters

Narrow down your subdomain list using the filter bar:

  • Subdomain -- search by full or partial name
  • IP Address -- filter by resolved IP
  • Status -- Online or Offline
  • Country -- filter by hosting country
  • City -- filter by hosting city
  • Provider -- filter by ASN / hosting provider

Combining filters lets you answer questions like "show me all offline subdomains hosted outside our primary cloud provider" -- a common indicator of shadow IT or decommissioned infrastructure.

Why Subdomain Monitoring Matters

Subdomains are the most dynamic part of your attack surface. Development teams create them for staging environments, QA testing, API endpoints, and microservices -- often without informing the security team. Each unmonitored subdomain is a potential risk.

Subdomain Takeover

When a subdomain's DNS record points to a cloud service (S3 bucket, Azure App Service, Heroku, etc.) that has been decommissioned, an attacker can claim that service and serve content under your domain. This is one of the most common attack vectors in EASM. Signs to watch for:

  • Subdomains with Offline status that still have DNS CNAME records pointing to cloud providers
  • Subdomains where the Provider is a cloud platform but no application responds

Forgotten and Stale Subdomains

Subdomains created months or years ago for one-off projects often run outdated software with known vulnerabilities. Use the First Seen On date to identify long-lived subdomains, then cross-reference with the Alerts module to check for unresolved findings.

Shadow IT Discovery

When business units provision infrastructure without going through official channels, those assets still appear in DNS. ShadowMap's continuous discovery catches these automatically. Look for subdomains with unfamiliar naming patterns or hosted on providers your organization does not officially use.

Development and Staging Exposure

Subdomains like dev., staging., test., uat., and internal. frequently expose sensitive data, debug endpoints, or admin panels. These should either be restricted by IP allowlist or taken offline entirely.

Subdomain Detail View

Click any subdomain to view its detail page, which aggregates everything ShadowMap knows about that asset:

Applications

Web applications hosted on this subdomain, including their technology stack, HTTP status, and risk rating.

Open Ports

If the subdomain resolves to an IP address, the detail view shows all open ports detected on that IP, including service name, product, version, CPE identifier, and banner data.

Alert Summary

A breakdown of security findings tied to this subdomain, categorized by severity (High, Medium, Low, Informational). This gives you an at-a-glance risk assessment without leaving the asset view.

Stealer Logs

If this subdomain appears in info-stealer malware logs, matching entries are shown here. This indicates that credentials for applications on this subdomain have been harvested by malware.

Data Breaches

Breach records where the affected domain matches this subdomain's base domain. Helps identify whether credentials associated with this asset have been exposed in known breaches.

Threat Exposure

Based on the technology stack detected on this subdomain (via its IP), ShadowMap correlates against the CVE database to show relevant vulnerabilities, including CVSS scores, KEV (Known Exploited Vulnerability) flags, and linked threat actors.

Export

Click Export to download a CSV of all subdomains matching your current filters. The export includes subdomain name, status, and last seen date.

  • Domains -- the root domains these subdomains belong to
  • IP Addresses -- the IPs these subdomains resolve to
  • Web Applications -- applications hosted on your subdomains
  • Alerts -- security findings associated with your subdomains
  • Stealer Logs -- compromised credentials matching your subdomains
  • Data Breaches -- breach data involving your domains

ShadowMap by Security Brigade