Subdomains
Subdomains
Subdomains Section Filters
At the top of the Subdomains page, there is a filter bar with multiple dropdowns to help narrow down the results and focus on specific assets. The following filters are available:
1. Domain
Filters results based on the main domain.
Example: Selecting example.com will display only its associated subdomains.
2. Subdomain
Focuses results on a specific subdomain.
Example: Selecting api.example.com will isolate that subdomain's data.
3. IP
Displays subdomains that resolve to a specific IP address.
Example: If both www.example.com and vpn.example.com resolve to 104.18.16.64, only those will be shown.
4. Port
Filters based on open ports discovered during the scan.
Example: Selecting port 443 shows subdomains using HTTPS.
5. Cloud
Filters subdomains by their cloud service provider.
Example: Only display subdomains hosted on Cloudflare, AWS, or Azure.
6. PTR
Filters based on reverse DNS records (PTR).
Example: If an IP resolves back to example.cloudflare.net, this filter will include it.
7. CNAME
Filters subdomains based on CNAME records.
Example: If app.example.ps points to example.azurewebsites.net, this filter highlights such links.
8. More
Includes additional advanced filtering options:
Subdomain Status (Live / Dormant)
Scan Status
Technology Stack (e.g., WordPress, Bootstrap)
Service Provider (e.g., Azure, Cloudflare)
Geolocation (Country / City)
If a Subdomain Is Not Visible
Some subdomains may not appear in the main list due to applied filters, sync delays, or data availability. In such cases, use the following option:
Manage Subdomains
Clicking Manage Subdomains opens a complete management panel where you can:
View all discovered subdomains, even if filtered out in the main view
Add a new subdomain manually → once a new subdomain is added, the system automatically performs a full scan and generates a Security Rating for that subdomain.
Rescan an individual subdomain
Delete subdomains from the list
Search across all entries (regardless of page filters)
This feature ensures full visibility and control over your subdomain inventory.
Subdomain Card
Each subdomain is displayed as a card containing technical and security information.
Thumbnail Preview
A visual screenshot of the subdomain homepage (if available).
Subdomain Name
Example:
www.example.com. Status tags may also appear here (e.g., Active, Dormant).IP Address & Hosting Provider
Displays the resolved IP and associated organization (e.g., Cloudflare, Inc.).
Location
Shows the server’s geolocation with country and city.
Open Ports
Example:
80,443,2052, and a count of additional ports. Each indicates protocol access.Detected Technologies
Tags like
Bootstrap,HTTP/3,WordPress (6.6.1), and more.Last Scan Timestamp
Indicates when the last scan was performed (e.g., “5 months ago”).
Rescan Button
Allows you to manually trigger an updated scan for that subdomain.
Subdomain Card – Right Panel (Security)
Security Rating
A visual gauge showing a score from 0–100%. Green = strong posture, red = poor.
Certificate Status
Shows number of valid SSL/TLS certificates (e.g.,
1 Valid).Web Application Firewall (WAF)
Indicates if a WAF is protecting the asset (e.g., Cloudflare WAF active).
Security Headers
Shows the number of missing or misconfigured HTTP headers (e.g.,
20 Missed).More Details
Button that expands into a detailed technical and security report.
Subdomain – More Details View
When you click More Details on any subdomain card, a comprehensive technical and security profile of that subdomain is displayed. This section provides deeper context to understand risks, hosting details, and potential exposures.
1. General Information
Domain/Subdomain: The exact asset being analyzed (e.g.,
www.example.com).Hosting Provider: The organization managing the hosting infrastructure (e.g., Cloudflare, Inc.).
Region: Geographic location of the hosting server. This helps correlate risks with jurisdiction or compliance requirements.
PTR Record (Reverse DNS): The reverse lookup name tied to the IP address. If none is detected, it is marked as N/A.
2. Certificate Issues:
Number of SSL/TLS certificate problems such as expiration, weak ciphers, or misconfiguration.
3. Security Rating:
A calculated percentage (0–100%) reflecting the overall security posture of the subdomain. Higher percentages indicate stronger configurations.
3. IP and Risk Indicators
IP Address: The resolved IP associated with the subdomain.
Risk Score: A numeric rating of potential malicious or suspicious behavior linked to this IP.
Confidence Level: Indicates how certain AttackMetricx is about the collected data (Low, Medium, High).
ASN (Autonomous System Number): Identifies the network block the IP belongs to, tied to a specific provider.
Organization (ORG): The company or entity owning the ASN.
Flags: Contextual security attributes about the IP:
Proxy – Detects if the IP is operating behind a known proxy service.
TOR – Identifies if the IP is part of the TOR anonymity network.
Known Attacker – Flags IPs listed in attacker feeds or threat intelligence sources.
Bot – Indicates whether the IP is associated with automated or malicious bot activity.
VPN Feeds – Detects if the IP is part of commercial/public VPN services (not Virtual Private Network in general use, but IPs listed in VPN intelligence feeds).
Private – Shows whether the IP belongs to private ranges or anonymization services.
4. Ports Section
The Ports Section provides a detailed breakdown of the network services exposed by each subdomain. AttackMetricx goes beyond simple enumeration, delivering both TCP and UDP visibility enriched with contextual security data.
External Ports: Total count of open TCP ports identified on the subdomain.
UDP Ports: AttackMetricx also performs discovery on UDP services (e.g., DNS, SNMP), which are often overlooked but can be exploited if left exposed.
Risky Ports: Highlights ports that are frequently targeted or known to be insecure (e.g., FTP, RDP, Telnet).
HTTP Only: Flags services that are accessible only via HTTP without HTTPS a critical misconfiguration that leaves traffic unencrypted.
Cloud Detection: Identifies whether the service is hosted on a recognized cloud provider. If marked Undetected, no match was found in known cloud IP ranges.
Missed Headers: Shows the count of missing or misconfigured HTTP security headers, such as
Strict-Transport-SecurityorX-Content-Type-Options. Missing these can expose applications to attacks like XSS and clickjacking.
⚠️ Note on Cloudflare Ports
Cloudflare supports a set of non-standard HTTP(S) ports by default, such as 2052, 2053, 2082, 2083, 2086, 2087, 2095, 2096, 8443, 8880. Their presence does not necessarily mean the origin server is exposing them, but that they are accessible through Cloudflare’s edge network.
When you click on a subdomain, AttackMetricx provides in-depth service details per port, including:
Active Service Identification: Shows the exact service or protocol running on the port (e.g., HTTPS, SSH, MySQL).
WAF Protection: Indicates whether the service is protected by a Web Application Firewall and the provider (e.g., Cloudflare WAF).
Certificate Status: Validates whether SSL/TLS certificates are correctly deployed and identifies certificate issues.
Security Headers Check: Verifies if proper HTTP security headers are implemented for web services on that port.
Request & Response Body: Displays raw HTTP request and response data, enabling analysts to verify how the service responds under real-world conditions.
Technology Fingerprinting: Detects technologies in use on the service (e.g., WordPress, PHP, Nginx, Bootstrap).
5. Screenshot Preview
A live snapshot of the subdomain’s homepage (if accessible), confirming whether the site is active and rendering content.
6. Technology Stack
Identifies technologies used by the subdomain (e.g., WordPress, PHP, Bootstrap, MySQL).
This is valuable because:
Outdated CMS or plugins may introduce CVEs.
Frameworks and libraries highlight potential attack vectors.
New protocols (e.g., HTTP/3) indicate modern adoption but require secure configurations.
7. Vulnerabilities
Displays vulnerabilities detected on the subdomain, classified by type and severity.
Passive Detection: Identifies known fingerprints and exposed meta-information.
Active Scanning: AttackMetricx runs its custom Vulnerability Scanning Engine, built with tailored tools, templates, and exploit checks, to validate risks beyond passive data.
Exploitable Flag: Shows whether the vulnerability is practically exploitable or informational only.
8. Certificates
Provides certificate details if available, including validity status, issuer, and expiration. Missing certificates or weak configurations are highlighted under Certificate Issues.
9. Web Application Firewall (WAF)
Indicates whether the subdomain is protected by a WAF and identifies the provider (e.g., Cloudflare WAF enabled).
10. HTTP Response Headers
Displays raw HTTP response headers from the server, including:
Date,Server,Content-Type,CF-RAYand more.Highlights missing security headers such as:
Strict-Transport-Security (HSTS) – Prevents protocol downgrade attacks.
Content-Security-Policy (CSP) – Mitigates cross-site scripting.
X-Frame-Options – Protects against clickjacking.
X-XSS-Protection – Helps detect reflected XSS attacks.
Headers marked N/A indicate missing or improperly set policies.
11. HTTP Response
Shows the raw server response body and status (e.g., 200 OK).
This confirms the subdomain is live and serving valid content.
Last updated
Was this helpful?