
Subdomain Catalog Overview
Overview
The Subdomain Catalog lists every subdomain identified through integrations, scans, or adapters (like DNS, CRT, TechDetect, or VM).It provides analytics-driven visualizations at the top — summarizing total subdomains, exposed assets, vulnerable entries, and environment distribution — followed by an interactive table of subdomain details. This page serves as the primary discovery layer before diving into each subdomain’s detailed profile page.
Key Metrics and Analytics

Displays the complete count of discovered subdomains within your organization.

Highlights subdomains linked to one or more vulnerabilities.

Indicates subdomains that are publicly accessible and not behind protected environments.

Pie chart showing vulnerability breakdown by severity — Critical, High, Medium, and Low.

Shows the ratio of open versus closed vulnerabilities, helping teams monitor remediation effectiveness.

Displays how subdomains are classified (Production, Staging, Dev, QA, etc.), giving quick visibility into operational spread.
Search, Filters, and Sorting
The catalog offers advanced search and filter options to locate specific subdomains:| Filter | Description |
|---|---|
| Owners | Filter by assigned owner or responsible user. |
| Risk | Sort or filter by automatic risk score. |
| Exposure | Show only subdomains marked as Exposed or Safe. |
| Environment | Filter by environment tag such as Prod, Staging, or Dev. |
| Adapters | Show subdomains discovered via specific adapters (e.g., DNS, CRT). |
| Tags | Filter by applied business or technology tags. |
| Sources | View which data source originated the discovery. |
| Date Range | Filter by first or last detection date to focus on new findings. |
Subdomain Table Columns

| Column | Description |
|---|---|
| Asset Value | Subdomain name (with DNS resolver info). |
| Vuln Count | Number of vulnerabilities linked with the subdomain. |
| Exposure | Current exposure status (Exposed, Safe, Shadowed). |
| Auto Risk | Auto-calculated score based on associated vulnerabilities and rules. |
| Environment | Environment classification (Production, Staging, Dev). |
| Owner | Assigned individual responsible for this subdomain. |
| Tags | Labels like TechDetect, jQuery, or business-specific tags. |
| Associations | Number of related assets or dependencies. |
| Detected On | Timeline of when the asset was first and last found. |
Subdomains Full View

- Vulnerability risk and trends over time
- Severity distribution (Critical, High, Medium, Low)
- Technology and service fingerprinting
- Open port visibility and relation mapping
- Tags, ownership details, and adapter discovery sources
Subdomain Summary
At the top, you’ll find an overview of the subdomain, including:| Field | Description |
|---|---|
| Subdomain Name | Fully qualified domain name (e.g., email.forum.bugcrowd.com). |
| Status | Shows if the subdomain is Active, Decommissioned, or Deleted. |
| Source | Indicates which adapter discovered it (e.g., CRTsh, DNS, VM). |
| Exposed | Marks whether the subdomain is externally exposed. |
| Environment | Classification such as production, staging, or development. |
| Risk Score | Calculated automatically based on asset classifiers. |
| Managed By | Owner or team responsible for maintaining this subdomain. |
| Detection History | Displays “First Found” and “Last Found” timestamps. |
Vulnerability Insights

Subdomain Details View
Vulnerability Trends
It helps visualize the impact of remediation or new findings.
Severity Distribution
- Vulnerability title
- Assessment name
- Severity level
- Current remediation state (In Review, Resolved, Retest)
- Detection timeline
Tags and Technologies
Tags
Examples:
email-server, google-cloud, smtp, production.Detected Technologies
Open Ports & Asset Relations

Open Ports and Relations Graph
Open Ports
Shows real-time visibility into network exposure:- Identifies open ports with status, service type, and security risk.
- Helps network teams close unnecessary or unsafe ports.
Asset Relations Graph
Visualizes how this subdomain is connected to other assets like IP addresses or parent domains.It allows easy tracing of asset lineage and network topology for impact analysis.
Ownership & Management Actions

Subdomain Details View
- Assign or Change Owner – ensure accountability.
- Decommission Asset – mark a subdomain as inactive or migrated.
- Delete Asset – permanently remove deprecated entries.
How Subdomains Are Discovered
AIM continuously updates subdomain data using multiple adapters such as:- CRTsh Adapter – pulls SSL certificate records for domain enumeration.
- DNS Adapter – maps DNS record structures.
- VM Adapter – enriches assets with linked vulnerabilities.
- TechDetect Adapter – fingerprints technologies and open services.
Example Use Cases
- Security Analysts: Track critical or high-risk subdomains and their associated vulnerabilities.
- Asset Managers: Assign ownership, tag business units, and ensure coverage across cloud and on-premises assets.
- Developers: Understand which staging or dev environments are publicly exposed.
- Compliance Teams: Validate that production domains have no unmanaged external exposure.