Historical DNS Search

SecApps Scout utilises one of the largest DNS record history databases, with billions of nameserver changes detected daily. Our premium bulk domain history checker allows querying thousands of subdomains per single SecApps Scout execution. In addition, each subdomain is actively validated before included in the final result, ensuring that all information is up-to-date at all time.

This page discusses how the domain history works and how you can identify critical assets in your cloud and on-prem infrastructure. We will discuss the following topics:

  • What is domain history?
  • How SecApps Scout utilises domain history databases?
  • Who benefits from domain history search?

What is domain history?

Domain history is a record of changes made to DNS records of a domain. It shows changes of the DNS zone file, including changes made to the DNS server configuration, DNS records, DNS delegation records, DNS zone file, DNS delegation file etc. In addition, it shows all changes that were made to the subdomain, such as modifications of DNS records, creation, modification, and deletion of DNS zones.

How SecApps Scout utilises domain history databases?

With the help of our premium bulk domain history checker, you can query up to 10,000 subdomains per apex domain in a single SecApps Scout execution. In addition, SecApps Scout allows up to five apex domains per execution bring the total number of records to 50,000 per single execution. Furthermore, each domain is dynamically validated and records extracted live to ensure that only new information is captured.

Domain history is a powerful tool for finding critical assets that can be used for attacks. For example, if you want to find critical assets in your company, you can use domain history to find objects that indicate a higher risk.

Who benefits from domain history search?

Domain history allows discovering critical assets such as critical servers, databases, and other objects that can be attacked. It can also be used to exploit information about insecure web applications, discover public buckets and other resources that can lead to data loss and data theft, or gain more insight into your cloud or on-premises infrastructure.