1-How-to-Find-Subdomains-of-a-Domain_

How to Find Subdomains of a Domain?

Subdomains are separate sections of a primary domain (e.g., mail.yourbrand.ae, api.yourbrand.ae), each potentially pointing to a different server, application, or service. As a UAE-accredited .ae domain registrar since 2008, we at AEserver see firsthand how businesses in the UAE build out complex subdomain structures, and how many forget to clean them up. Orphaned staging environments, exposed dev panels, and dangling DNS records are far more common than most domain owners realize.

Whether you’re auditing your own .ae domain’s infrastructure, conducting authorized security research, or simply want to understand what’s publicly visible about your online presence, this guide covers practical, hands-on methods with real commands for Linux and Windows.

⚠ Important: Only use these methods on domains you own or have explicit permission to scan. Unauthorized scanning of third-party domains may violate the UAE Cybersecurity Law and the laws in your jurisdiction.

Why Subdomain Auditing Matters for .ae Domain Owners

When we manage DNS for thousands of .ae domains at AEserver, we regularly encounter the same patterns. A business launches staging.company.ae during development, migrates to production, and never removes the staging subdomain. Six months later, that forgotten environment, running outdated software with no SSL, becomes a liability.

Here’s why every .ae domain owner should periodically audit their subdomains:

Dangling DNS records. You pointed shop.yourbrand.ae to a third-party platform, cancelled the subscription, but never removed the CNAME. An attacker can now claim that endpoint and serve content on your domain.
Exposed dev/staging environments. dev.yourbrand.ae is still live with default credentials, debug mode enabled, and no SSL certificate, fully visible to anyone who checks.
Shadow IT subdomains. A marketing team created promo.yourbrand.ae pointing to a landing page builder. No one on the IT side knows it exists or manages its security.
Expired SSL on subdomains. Your main domain has a valid certificate, but portal.yourbrand.ae shows a browser warning, damaging customer trust.
💡 From AEserver: If you’re managing DNS through AEserver’s DNS Management Tool or cPanel, start by exporting your current DNS zone file. This gives you a baseline of all records, A, CNAME, MX, TXT, including subdomains you may have forgotten about.

Method 1. Google Dorks, Search Engine Operators

The fastest approach that requires zero installation. Google indexes subdomains, and you can surface them using advanced search operators. This works especially well for .ae domains since they tend to have fewer pages indexed than .com domains, making the results more focused.

1

Basic subdomain search

Open Google and type:

Google → search bar
site:yourbrand.ae -www

The site: operator restricts results to a specific domain, and -www excludes the main subdomain so only the others show up.

2

Chained exclusion queries

For more precise results, keep adding known subdomains as exclusions:

site:yourbrand.ae -www -shop -blog

Every time you discover a known subdomain, add it with a minus sign to force Google to reveal new results.

3

Targeted service discovery

Finding admin panels, APIs, and staging environments
site:yourbrand.ae inurl:admin
site:yourbrand.ae inurl:api
site:yourbrand.ae inurl:dev
site:yourbrand.ae inurl:staging
💡 Tip: Don’t limit yourself to Google. Try Bing (site:yourbrand.ae), DuckDuckGo, and Yandex, they often index subdomains that Google misses. For .ae domains specifically, Yandex can sometimes surface results that Western search engines overlook.

Method 2. Certificate Transparency (crt.sh), SSL Certificate Logs

Every SSL/TLS certificate is recorded in public Certificate Transparency logs. The service crt.sh lets you search these logs and find subdomains that have ever been issued a certificate. This is particularly revealing for .ae domains, if you’ve ever ordered an SSL certificate for a subdomain, it’s in these logs permanently, even after the certificate expires.

1

Via browser

Navigate to the following URL, replacing the domain:

https://crt.sh/?q=%25.yourbrand.ae

The %25 is the URL-encoded % wildcard character. You’ll get a table of all certificates ever issued for subdomains of that domain.

2

Via command line (Linux / macOS)

Terminal
curl -s "https://crt.sh/?q=%25.yourbrand.ae&output=json" | jq -r '.[].name_value' | sort -u

This sends a request to the crt.sh JSON API, extracts the name_value field (certificate hostnames) via jq, and outputs a unique sorted list.

3

Via command line (Windows PowerShell)

PowerShell
(Invoke-RestMethod "https://crt.sh/?q=%25.yourbrand.ae&output=json").name_value | Sort-Object -Unique
💡 Tip: crt.sh also shows expired certificates. This is useful, old subdomains may still be live or contain vulnerabilities. If you discover certificates you don’t recognize, it may indicate unauthorized subdomain creation.

Method 3. DNS Utilities, nslookup, dig, host

Classic DNS tools built into the OS let you verify specific subdomains and attempt DNS zone transfers.

1

Checking a specific subdomain

OS Command
Linux / macOS
dig mail.yourbrand.ae +short
Linux / macOS
host mail.yourbrand.ae
Windows
nslookup mail.yourbrand.ae
Windows (PS)
Resolve-DnsName mail.yourbrand.ae

If the subdomain exists, you’ll get an IP address back. If not, the response will be NXDOMAIN.

2

Attempting a DNS Zone Transfer (AXFR)

A zone transfer requests a full copy of the DNS zone. If the server is misconfigured, it will hand over the entire record list, including all subdomains.

Linux / macOS, first, find the nameservers
dig NS yourbrand.ae +short
Then attempt the zone transfer
dig AXFR yourbrand.ae @ns1.yourbrand.ae
Windows
nslookup -type=NS yourbrand.ae
nslookup -type=AXFR yourbrand.ae ns1.yourbrand.ae
⚠ Note: In 99% of cases the zone transfer will be denied, that’s expected and correct behavior. AEserver’s nameservers, for example, block unauthorized zone transfers by default. But misconfigured servers are more common than you’d think, so it’s always worth testing your own domain.
3

Fetching all DNS record types

Linux, all records for a domain
dig yourbrand.ae ANY +noall +answer
Windows PowerShell
Resolve-DnsName yourbrand.ae -Type ANY

MX, TXT, SRV, and CNAME records frequently contain subdomain names in their values. For instance, your MX records might reveal mail.yourbrand.ae, and TXT records for email verification often reference specific subdomains.

Method 4. Online Reconnaissance Services

Specialized services aggregate data from multiple sources, DNS, certificates, search indexes, archives, and return a ready-made subdomain list. These are especially convenient if you want quick results without installing anything.

subdomainfinder.c99.nl
Fast online subdomain scanner. Shows IP addresses, detects Cloudflare, supports private scanning. Export results to CSV and JSON.
dnsdumpster.com
Free subdomain search + DNS infrastructure map with a visual graph of server relationships.
securitytrails.com
DNS record history, current subdomains, associated domains. Free tier, 50 queries per month.
virustotal.com
The Relations tab for any domain reveals known subdomains and associated IPs.
shodan.io
Search engine for internet-connected devices. Filter hostname:yourbrand.ae shows subdomains with open ports.
censys.io
Similar to Shodan but focused on certificates and TLS. Excellent at finding hidden subdomains.
💡 Tip: Start with Subdomain Finder (c99.nl) or DNSDumpster for a quick overview, then use SecurityTrails for deeper analysis with historical DNS change tracking. For .ae domains, SecurityTrails’ historical view is particularly useful, it lets you see DNS changes all the way back to when the domain was first registered.

Method 5. Subdomain Brute-Forcing, Automated Enumeration

Brute-forcing means trying possible subdomain names from a wordlist. The tool prepends each word to the domain and checks whether DNS resolves it.

1

Subfinder (Linux / macOS / Windows)

One of the best tools available, fast, quiet, and leverages dozens of passive sources.

Installation (requires Go)
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
Basic usage
subfinder -d yourbrand.ae -o subdomains.txt
Verbose mode, shows which source found each subdomain
subfinder -d yourbrand.ae -v -o subdomains.txt
2

Amass (Linux / macOS / Windows)

A powerful OWASP tool that combines passive collection, DNS brute-forcing, and certificate analysis.

Installation
sudo apt install amass          # Linux
brew install amass               # macOS
choco install amass              # Windows via Chocolatey
Passive mode (fast, no direct queries to the target)
amass enum -passive -d yourbrand.ae -o amass-results.txt
Active mode (DNS brute-force + resolving)
amass enum -active -d yourbrand.ae -brute -o amass-results.txt
3

Manual brute-force without installing any tools

If you don’t want to install specialized utilities, you can use built-in OS tools:

Linux / macOS, bash one-liner
for sub in www mail ftp admin dev staging api blog shop test portal vpn webmail cpanel; do
  host $sub.yourbrand.ae | grep "has address" && echo "[+] $sub.yourbrand.ae found"
done
Windows PowerShell
$subs = "www","mail","ftp","admin","dev","staging","api","blog","shop","test","portal","vpn","webmail","cpanel"
foreach ($s in $subs) {
  try {
    $r = Resolve-DnsName "$s.yourbrand.ae" -ErrorAction Stop
    Write-Host "[+] $s.yourbrand.ae → $($r.IPAddress)" -ForegroundColor Green
  } catch { }
}
📂 Where to get wordlists: The best collection is SecLists on GitHub. The file Discovery/DNS/subdomains-top1million-5000.txt offers the best balance between speed and coverage. For thorough scans, use subdomains-top1million-110000.txt.

Method 6. Reverse DNS & WHOIS Analysis

If you know the IP address or IP range of the target organization, you can discover subdomains through reverse DNS lookups.

1

Reverse DNS for a single IP

OS Command
Linux
dig -x 93.184.216.34 +short
Linux
host 93.184.216.34
Windows
nslookup 93.184.216.34
Windows (PS)
Resolve-DnsName 93.184.216.34 -Type PTR
2

Scanning an IP range (Linux)

Sweeping a /24 subnet
for ip in $(seq 1 254); do
  host 93.184.216.$ip | grep "domain name pointer" | grep ".ae"
done
3

Finding the IP range via WHOIS

Linux
whois yourbrand.ae
Or by IP
whois 93.184.216.34

WHOIS reveals the owning organization and its allocated IP blocks. You can then run mass reverse DNS across those blocks. You can also use the AEserver WHOIS Lookup tool for a quick browser-based check.

Method 7. Web Archives & Historical Data

Even if a subdomain is no longer live, it may have been indexed in the past. Web archives preserve that data.

1

Wayback Machine API

Linux / macOS
curl -s "http://web.archive.org/cdx/search/cdx?url=*.yourbrand.ae&output=text&fl=original&collapse=urlkey" | sed 's|https\?://||' | cut -d'/' -f1 | sort -u

This queries the Wayback Machine index for all URLs matching *.yourbrand.ae, extracts the hostnames, and outputs unique values.

2

waybackurls utility (Linux / macOS)

Installation and usage
go install github.com/tomnomnom/waybackurls@latest

echo "yourbrand.ae" | waybackurls | unfurl domains | sort -u
3

SecurityTrails, DNS history

At securitytrails.com, enter the domain and navigate to the Historical Data section. It shows every DNS record that has ever existed, including deleted subdomains. This is particularly useful if your .ae domain has been through hosting migrations, old records from previous providers often linger.

Method 8. HTTP Header & Content Analysis

The website itself often leaks its own subdomains through HTTP headers, JavaScript files, and HTML source code.

1

Finding subdomains in HTTP headers

Linux / macOS
curl -sI https://yourbrand.ae | grep -iE "location|content-security-policy|link"

Headers like Content-Security-Policy, Location (redirects), and Link frequently reference subdomains, CDNs, APIs, static assets.

2

Extracting from JavaScript and HTML

Linux, download the page and grep for subdomains
curl -s https://yourbrand.ae | grep -oP '[a-zA-Z0-9._-]+\.yourbrand\.ae' | sort -u
Deep analysis, scan all JS files referenced on the page
curl -s https://yourbrand.ae | grep -oP 'src="[^"]*\.js"' | while read js; do
  curl -s "https://yourbrand.ae$js" | grep -oP '[a-zA-Z0-9._-]+\.yourbrand\.ae'
done | sort -u
💡 Tip: Pay close attention to files like config.js, env.js, and app.js, developers frequently hardcode internal API URLs and service subdomains in these files.

Combined Approach, Maximum Coverage

No single method provides 100% results. The best approach is combining several tools and then merging and verifying the output.

1

Collecting from multiple sources (Linux)

Script: collect-subdomains.sh
#!/bin/bash
DOMAIN="yourbrand.ae"
OUTPUT="all-subs-$DOMAIN.txt"

# Source 1: crt.sh
curl -s "https://crt.sh/?q=%25.$DOMAIN&output=json" | jq -r '.[].name_value' >> $OUTPUT

# Source 2: Subfinder
subfinder -d $DOMAIN -silent >> $OUTPUT

# Source 3: Wayback Machine
curl -s "http://web.archive.org/cdx/search/cdx?url=*.$DOMAIN&output=text&fl=original&collapse=urlkey" | cut -d'/' -f3 >> $OUTPUT

# Deduplicate and sort
sort -u $OUTPUT -o $OUTPUT
echo "Unique subdomains found: $(wc -l < $OUTPUT)"
2

Verification, which subdomains are actually live

After collecting the list, you need to check which discovered subdomains actually respond:

Linux, using httpx (by ProjectDiscovery)
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest

cat all-subs-yourbrand.ae.txt | httpx -silent -status-code -title

The httpx utility probes each subdomain over HTTP/HTTPS and displays the response code and page title. This lets you quickly identify live services, admin panels, and forgotten applications.

Windows PowerShell, simple check
Get-Content subdomains.txt | ForEach-Object {
  try {
    $r = Invoke-WebRequest "http://$_" -TimeoutSec 3 -UseBasicParsing -ErrorAction Stop
    Write-Host "[+] $_ → $($r.StatusCode)" -ForegroundColor Green
  } catch { }
}

What to Do After You Find Your Subdomains

Discovering subdomains is only half the job. Here’s what you should do with the results:

1

Remove unused subdomains

Log into your cPanel or DNS Management Tool and delete A/CNAME records for subdomains you no longer use. This eliminates dangling DNS vulnerabilities.

2

Secure active subdomains with SSL

Every active subdomain should have a valid SSL certificate. Consider a Wildcard SSL Certificate, it covers *.yourbrand.ae, so any current or future subdomain is automatically protected.

3

Restrict access to internal subdomains

Subdomains like staging, dev, or admin should be IP-restricted or password-protected. If you’re on a Cloud VPS or Dedicated Server, configure firewall rules to whitelist only your office IPs.

4

Set up monitoring

Schedule a quarterly subdomain audit using the combined script above as part of your broader website security best practices. New subdomains can appear without your knowledge, especially in larger teams.

✅ AEserver customers: If you’re not sure which subdomains are safe to remove, or need help setting up a Wildcard SSL, our support team is available 24/7 via live chat or WhatsApp. We’ll review your DNS zone with you and help clean up anything that shouldn’t be there.

Summary

1

Google Dorks: free, instant, but only finds indexed subdomains

2

crt.sh (Certificate Transparency): highly effective, reveals even internal subdomains that have certificates

3

DNS Utilities (dig, nslookup): verify specific names + attempt zone transfers

4

Online Services: Subdomain Finder, DNSDumpster, SecurityTrails, VirusTotal, Shodan aggregate many sources

5

Brute-Force (Subfinder, Amass): discovers subdomains that don’t appear in any public source

6

Reverse DNS + WHOIS: useful when you know the organization’s IP range

7

Web Archives: finds deleted and historical subdomains

8

Content Analysis: JavaScript files and HTTP headers leak internal services

✅ Recommendation: For a proper audit, use at least 3-4 methods from this list. Start with crt.sh and Subfinder for quick passive collection, verify the results with httpx, and supplement with website content analysis.
Rohit S.

Rohit S.

Partner Manager at AEserver and an expert in national domains (ccTLDs), as well as in protecting brands and intellectual property on the Internet. Specializes in domain portfolio management, digital positioning and legal protection through domain zones. Has been certified by Google in the basics of digital marketing. LinkedIn

.ae Price
.bh Price
icon-qa
Google_Cloud_Partner_UAE
icon-microsoft
cpanel uae partner logo
icon-ripe-ncc.svg
⚡ Build your website in 60 seconds with AI + WordPress — now 50% off
This is default text for notification bar