Frequently Asked Questions
What is the purpose of the DNSDumpster Search?
Domain-based reconnaissance allows security teams to map an organization’s Internet infrastructure efficiently. Starting with DNS queries, we can discover and enumerate the external attack surface by correlating DNS records with other Internet-scale datasets. This process reveals networks, IP addresses, and services that comprise the organization’s public-facing infrastructure.
This approach serves both defensive and offensive security operators by identifying critical assets and potential entry points. Security teams can prioritize their efforts by focusing on high-value targets and vulnerabilities, while penetration testers can assess potential attack vectors during security assessments.
What can I search for on DNSDumpster?
DNSDumpster supports two primary search types. You can search by domain name to discover subdomains, DNS records, and associated infrastructure for a target domain. Alternatively, you can search by IP network block (CIDR notation) to retrieve service banners across a range of IP addresses. This dual approach allows you to perform domain-centric reconnaissance or network-centric banner grabbing from a single interface.
How does DNSDumpster find subdomains for a given domain?
DNSDumpster identifies subdomains by leveraging multiple data sources. These include certificate transparency logs, various search engines, and extensive web data repositories like Common Crawl. By aggregating and analyzing data from these sources, DNSDumpster can reveal a broad range of hosts and subdomains associated with a target domain.
What is the Banner Search and how does it work?
The Banner Search allows you to retrieve service banners from IP addresses within a specified CIDR block. By entering an IP range in CIDR notation, DNSDumpster returns banner data for discovered services across those addresses. This is useful for identifying exposed services, software versions, and potential misconfigurations across a network range. Free users can retrieve up to 32 results, while Plus members can search ranges up to /24 (254 hosts).
The banner search is also available as an API endpoint, enabling integration into your own tools and automated workflows. For higher volume banner searches covering up to Class B networks, visit https://hackertarget.com/banner-grabbing/.
Can I use the data in my commercial tools or reports?
Yes, you may use data from DNSDumpster in your commercial products, tools, or reports, provided that you include clear attribution to DNSDumpster. Proper credit ensures acknowledgment of the data’s source and supports the continued availability of these services.
How many queries can I run?
With a free DNSDumpster membership, you are limited to 50 queries per day with a 50 result limit. A Plus membership is available, allowing up to 200 queries per day with up to 200 results. This upgraded membership provides more flexibility and is ideal for users who require higher query limits.
For the banner search, free users can query up to a /32 (single IP), while Plus members can search ranges up to /24 (254 hosts). For comprehensive Attack Surface Discovery and Vulnerability Identification we recommend our parent company https://hackertarget.com/. Where you can use the Domain Profiler tool to get thousands of results from a single domain, and then pivot to scanning discovered endpoints with the suite of vulnerability scanners.
