DNS records are digital fingerprints revealing hosting, email providers, internal naming, and service dependencies. Subdomain enumeration uses passive sources (CT logs, search engines, passive DNS with 200+ data providers) and active techniques (brute-forcing, zone transfers, NSEC walking) to map an organization’s complete external surface. Tools like Subfinder (45 APIs), Amass (87 APIs), and BBOT lead open-source discovery. AI-driven tools like Subwiz now predict likely subdomains via LLM pattern analysis, finding ~10% more results than traditional wordlists.

9+
DNS record types for OSINT
200+
Freemium subdomain data sources
87
Amass passive API integrations
45
Subfinder API sources
10%
Additional subs via AI prediction
~3,000+
Sites checked by Maigret

What DNS Records Reveal to Investigators

The Domain Name System is far more than a phone book for the internet. Every DNS record associated with a domain is a potential intelligence artifact, revealing infrastructure choices, service providers, internal naming conventions, and sometimes operational security failures. Understanding what each record type exposes is foundational to any domain-focused OSINT investigation.

A records map domains to IPv4 addresses, revealing hosting providers and potentially shared infrastructure. AAAA records do the same for IPv6. MX records expose email providers — a record pointing to aspmx.l.google.com means Google Workspace, while mail.protection.outlook.com means Microsoft 365 (Digging DNS — An OSINT Perspective on DNS Records). NS records delegate authority and reveal DNS hosting choices. CNAME records create aliases that can expose CDN providers, SaaS platforms, and — when targets are deprovisioned — subdomain takeover vulnerabilities.

TXT records are a particular goldmine for fingerprinting. Domain verification tokens prove associations with specific Google, Facebook, or cloud accounts. SPF records in TXT format list authorized mail servers, revealing additional IP infrastructure. DKIM and DMARC records expose email authentication configurations. SOA records contain serial numbers that, when tracked over time via passive DNS, indicate when an organization modifies its DNS zone (Digging DNS).

DNS Record Types for OSINT

RecordReturnsOSINT Value
A / AAAAIPv4 / IPv6 addressHosting provider, shared infrastructure, IP range mapping
MXMail server hostnameEmail provider identification (Google Workspace, Microsoft 365, self-hosted)
NSAuthoritative nameserversDNS hosting provider, delegation patterns
CNAMECanonical aliasCDN/SaaS identification, subdomain takeover candidates
TXTArbitrary textSPF (mail servers), DKIM, domain verification tokens, service fingerprinting
SOAZone authority infoPrimary nameserver, admin email, serial number (change tracking)
PTRReverse DNS hostnameReveals domains for a given IP, exposes hidden services
CAACertificate authoritiesWhich CAs are authorized to issue certificates for the domain
SRVService locationsDiscovers specific services and their ports (SIP, XMPP, LDAP)

Passive vs Active Subdomain Enumeration

Passive enumeration gathers subdomain data from third-party sources without sending a single packet to the target. This includes Certificate Transparency logs (which record every SSL certificate issued, exposing hostnames in CN and SAN fields), search engine indexing (site:example.com dorks), public DNS datasets like Rapid7’s Forward DNS study, web archives, and threat intelligence feeds. Passive techniques are undetectable by the target, making them ideal for initial reconnaissance (YesWeHack — Subdomain Enumeration Guide (2025)).

Active enumeration involves direct interaction with the target’s DNS infrastructure. DNS brute-forcing sends resolution requests for wordlist-derived subdomains (dev.example.com, staging.example.com, api-v2.example.com). Zone transfers (AXFR) attempt to copy the entire DNS zone — a devastating misconfiguration when successful. NSEC walking exploits DNSSEC-signed zones to enumerate records without brute-forcing. Active methods yield more results but appear in DNS server logs and can trigger security alerts (Outpost24 — The Dangerous Art of Subdomain Enumeration (2025)).

Subdomain Enumeration Tools Comparison

ToolTypeSites/SourcesKey Strength
SubfinderPassive~45 APIsSpeed — finds 90% of results in 1/10th the time of competitors
Amass (OWASP)Passive + Active~87 APIsMost comprehensive — correlates ASNs, CIDRs, graph visualization
BBOTPassive + ActiveRecursive modelHighest unique subdomain count in benchmarks via recursive discovery
SubdominatorPassive~50 sourcesRising alternative focused on integrating newest free APIs
puredns + massdnsActive (brute)Custom wordlistsFastest brute-forcing with wildcard filtering and DNS poisoning detection
SubwizAI-assistedLLM-generatedPredicts likely subdomains via pattern analysis, ~10% more discoveries

A 2022 benchmark by Black Lantern Security found that BBOT discovered the highest total subdomains, while Subfinder found 90% of BBOT’s results in roughly one-tenth the time (BLS — Subdomain Enumeration Tool Face-off). In 2025, Subdomain Center noted over 200 entities now offer freemium subdomain data, yet Amass integrates only 87 and Subfinder 45 (OSINT Team — Passive Subdomain Enumeration (2025)).

AI-Driven Subdomain Discovery

A significant 2025 development is the emergence of AI-assisted enumeration. Hadrian’s Subwiz uses a lightweight generative language model (approximately 1,000 times smaller than ChatGPT) trained specifically on subdomain naming patterns from historical DNS records. Instead of cycling through fixed wordlists, it dynamically predicts likely subdomains based on organizational naming conventions. Internal testing shows up to a 10% increase in discovered subdomains compared to traditional approaches, particularly effective at finding forgotten or shadow infrastructure (Hadrian — How AI is Transforming Subdomain Enumeration (2025)).

Passive Data Sources

Certificate Transparency Logs

Every publicly trusted SSL certificate is logged in append-only CT logs. Since certificates contain hostnames in their Subject and SAN fields, querying aggregators like crt.sh or Censys reveals subdomains the target has issued certificates for. This is passive, free, and often discovers internal hostnames like vpn.corp.example.com or jenkins-ci.dev.example.com that never appeared in public DNS datasets.

Web Archives and Search Engines

The Wayback Machine CDX API supports wildcard queries (*.example.com/*) that return every archived URL, exposing subdomains that existed historically even if they’ve since been removed. Google dorking with site:example.com reveals indexed subdomains. Passive DNS aggregators like SecurityTrails, VirusTotal, and AlienVault OTX maintain historical resolution data from global DNS sensor networks.

Zone Transfers and Misconfigurations

A DNS zone transfer (AXFR) replicates the entire zone file from a primary to secondary nameserver. When misconfigured to allow transfers from any source, this hands an investigator the complete list of every record in the zone. The technique dates to the earliest days of DNS but still produces results: the Panama Papers breach famously started with subdomain enumeration that revealed a vulnerable WordPress installation (Outpost24). Testing requires a single command: dig axfr example.com @ns1.example.com. Best practice restricts AXFR to authorized secondary servers via ACLs, but audits consistently find exceptions.

Investigation Workflow

An effective DNS reconnaissance workflow proceeds in layers. Start passive: query CT logs, passive DNS databases, search engines, and web archives to build a baseline subdomain list without touching the target. Validate passively discovered subdomains with DNS resolution using tools like httpx or httprobe to identify which are live. For authorized engagements, escalate to active techniques: brute-force with targeted wordlists, attempt zone transfers, and probe for NSEC-walkable zones. Correlate discovered subdomains with IP addresses, ASNs, and WHOIS data to map organizational infrastructure. Finally, fingerprint live subdomains for technologies, versions, and potential vulnerabilities.

Key Definitions

DNS Enumeration
The systematic process of discovering all DNS records (A, AAAA, MX, NS, TXT, CNAME, SOA, SRV, PTR) for a target domain to map infrastructure, services, and potential attack surface.
Subdomain Brute-Forcing
Active technique that resolves candidate subdomains from a wordlist against a target’s nameservers. Tools like puredns and massdns can test millions of candidates per minute using distributed resolvers.
Zone Transfer (AXFR)
DNS mechanism to replicate zone data between servers. When misconfigured, allows any requester to download the complete zone file containing every DNS record.
Passive DNS
Historical DNS resolution data collected by sensor networks without querying the target directly. Aggregators like SecurityTrails and Farsight DNSDB maintain billions of records from global vantage points.
Certificate Transparency (CT)
Append-only public logs of every SSL/TLS certificate issued. Since certificates contain hostnames in CN and SAN fields, CT logs are a rich passive source of subdomain data.
Subdomain Takeover
Vulnerability where a CNAME record points to a deprovisioned service (e.g., blog.example.comexample.herokuapp.com). An attacker can register the target hostname and serve content under the victim’s subdomain.
NSEC Walking
Technique to enumerate DNSSEC-signed zones by following NSEC (Next Secure) records, which list the next existing record name in the zone, allowing sequential discovery without brute-forcing.

Sources

Digging DNS — An OSINT Perspective on DNS Records (record types as digital fingerprints). YesWeHack — Subdomain Enumeration Guide (2025) (passive and active techniques). Outpost24 — The Dangerous Art of Subdomain Enumeration (2025) (AXFR, Panama Papers). Black Lantern Security — Subdomain Enumeration Face-off (2022) (benchmark results). OSINT Team — Passive Enumeration (2025) (200+ freemium sources). Hadrian — Subwiz AI Enumeration (2025) (LLM-driven discovery). WhoisXML API — DNS Reconnaissance Use Cases (enrichment workflows). ProjectDiscovery — Subdomain Enumeration (Reconnaissance 102) (tool comparison).

Frequently Asked Questions

What DNS records are most useful for OSINT?

TXT records are the richest: SPF reveals mail servers, verification tokens link to cloud accounts. MX records identify email providers. CNAME records expose CDN/SaaS dependencies and subdomain takeover opportunities. A/AAAA records map hosting infrastructure.

What is the difference between passive and active subdomain enumeration?

Passive queries third-party sources (CT logs, search engines, passive DNS) without touching the target — undetectable. Active interacts directly via brute-forcing, zone transfers, or NSEC walking — more results but visible in logs. Start passive, escalate to active when authorized.

Which subdomain enumeration tool is best?

Subfinder is fastest for passive-only (90% of BBOT’s results in 1/10th the time). Amass is most comprehensive (87 APIs + active). BBOT finds the most unique subdomains via recursive discovery. Subwiz adds ~10% more via AI prediction.

Is subdomain enumeration legal?

Passive enumeration using public data (CT logs, search engines) is generally legal. Active techniques (brute-forcing, zone transfers) interact with the target and should only be done with authorization. Always verify your scope and applicable laws (CFAA, Computer Misuse Act).

WHOIS, DNS records, and domain registration data
🔍 Subdomain Scanner
Enumerate subdomains for any domain
📡 DNS Recon
Query DNS record types and zone data
🔐 CT Monitor
Certificate Transparency log search
🔐 CT for OSINT 2026
How CT logs expose infrastructure
🏛 Wayback Recon
Discover subdomains via archived URLs