Skip to main content
Subdomain Catalog in AIM

Subdomain Catalog Overview


Overview

The Subdomain Catalog lists every subdomain identified through integrations, scans, or adapters (like DNS, CRT, TechDetect, or VM).
It provides analytics-driven visualizations at the top — summarizing total subdomains, exposed assets, vulnerable entries, and environment distribution — followed by an interactive table of subdomain details.
This page serves as the primary discovery layer before diving into each subdomain’s detailed profile page.

Key Metrics and Analytics

Total Subdomains graph

Displays the complete count of discovered subdomains within your organization.

Vulnerable Subdomains graph

Highlights subdomains linked to one or more vulnerabilities.

Exposed Subdomains graph

Indicates subdomains that are publicly accessible and not behind protected environments.

Vulnerability Severity Distribution

Pie chart showing vulnerability breakdown by severity — Critical, High, Medium, and Low.

Vulnerability State Distribution

Shows the ratio of open versus closed vulnerabilities, helping teams monitor remediation effectiveness.

Environment Distribution

Displays how subdomains are classified (Production, Staging, Dev, QA, etc.), giving quick visibility into operational spread.


Search, Filters, and Sorting

The catalog offers advanced search and filter options to locate specific subdomains:
FilterDescription
OwnersFilter by assigned owner or responsible user.
RiskSort or filter by automatic risk score.
ExposureShow only subdomains marked as Exposed or Safe.
EnvironmentFilter by environment tag such as Prod, Staging, or Dev.
AdaptersShow subdomains discovered via specific adapters (e.g., DNS, CRT).
TagsFilter by applied business or technology tags.
SourcesView which data source originated the discovery.
Date RangeFilter by first or last detection date to focus on new findings.
All filters can be combined for granular search queries — ideal for analysts and security engineers managing large inventories.

Subdomain Table Columns

Subdomain Ports and Relation Graph
Each row in the catalog table displays detailed metadata:
ColumnDescription
Asset ValueSubdomain name (with DNS resolver info).
Vuln CountNumber of vulnerabilities linked with the subdomain.
ExposureCurrent exposure status (Exposed, Safe, Shadowed).
Auto RiskAuto-calculated score based on associated vulnerabilities and rules.
EnvironmentEnvironment classification (Production, Staging, Dev).
OwnerAssigned individual responsible for this subdomain.
TagsLabels like TechDetect, jQuery, or business-specific tags.
AssociationsNumber of related assets or dependencies.
Detected OnTimeline of when the asset was first and last found.

Subdomains Full View

Subdomain Ports and Relation Graph
Each subdomain discovered by AIM is automatically enriched with contextual intelligence such as:
  • Vulnerability risk and trends over time
  • Severity distribution (Critical, High, Medium, Low)
  • Technology and service fingerprinting
  • Open port visibility and relation mapping
  • Tags, ownership details, and adapter discovery sources
This allows security teams to manage subdomains not just as data points — but as living assets that evolve across your organization’s digital footprint.

Subdomain Summary

At the top, you’ll find an overview of the subdomain, including:
FieldDescription
Subdomain NameFully qualified domain name (e.g., email.forum.bugcrowd.com).
StatusShows if the subdomain is Active, Decommissioned, or Deleted.
SourceIndicates which adapter discovered it (e.g., CRTsh, DNS, VM).
ExposedMarks whether the subdomain is externally exposed.
EnvironmentClassification such as production, staging, or development.
Risk ScoreCalculated automatically based on asset classifiers.
Managed ByOwner or team responsible for maintaining this subdomain.
Detection HistoryDisplays “First Found” and “Last Found” timestamps.

Vulnerability Insights

Subdomain Details in AIM

Subdomain Details View

Vulnerability Trends

Displays how vulnerabilities have changed over time for this specific subdomain.
It helps visualize the impact of remediation or new findings.

Severity Distribution

A breakdown of vulnerabilities by severity — Critical, High, Medium, and Low — giving instant insight into overall risk posture.
Below this chart, you’ll find the Vulnerabilities Table, showing:
  • Vulnerability title
  • Assessment name
  • Severity level
  • Current remediation state (In Review, Resolved, Retest)
  • Detection timeline
Each entry directly links to its respective vulnerability report inside the VM module.

Tags and Technologies

Tags

Tags help categorize assets by business unit, product, or technology.
Examples: email-server, google-cloud, smtp, production.

Detected Technologies

Lists technologies identified via asset fingerprinting — including languages, frameworks, and services (e.g., NodeJS, React, HTTP/1.1, GitHub).

Open Ports & Asset Relations

Subdomain Ports and Relation Graph

Open Ports and Relations Graph

Open Ports

Shows real-time visibility into network exposure:
  • Identifies open ports with status, service type, and security risk.
  • Helps network teams close unnecessary or unsafe ports.

Asset Relations Graph

Visualizes how this subdomain is connected to other assets like IP addresses or parent domains.
It allows easy tracing of asset lineage and network topology for impact analysis.

Ownership & Management Actions

Subdomain Details in AIM

Subdomain Details View

Each subdomain includes clear management controls:
  • Assign or Change Owner – ensure accountability.
  • Decommission Asset – mark a subdomain as inactive or migrated.
  • Delete Asset – permanently remove deprecated entries.
Ownership and lifecycle states sync with other connected modules automatically.

How Subdomains Are Discovered

AIM continuously updates subdomain data using multiple adapters such as:
  • CRTsh Adapter – pulls SSL certificate records for domain enumeration.
  • DNS Adapter – maps DNS record structures.
  • VM Adapter – enriches assets with linked vulnerabilities.
  • TechDetect Adapter – fingerprints technologies and open services.
Each discovery updates the dashboard metrics, asset relations, and risk calculations automatically.

Example Use Cases

  • Security Analysts: Track critical or high-risk subdomains and their associated vulnerabilities.
  • Asset Managers: Assign ownership, tag business units, and ensure coverage across cloud and on-premises assets.
  • Developers: Understand which staging or dev environments are publicly exposed.
  • Compliance Teams: Validate that production domains have no unmanaged external exposure.

Explore Live Demo

Explore AIM Live — No Signup Needed

Instantly explore how Snapsec AIM discovers, enriches, and tracks every asset in real time — all without creating an account.