Domain OSINT Verified May 16, 2026

Security Trails

SecurityTrails provides historical DNS records, WHOIS history, subdomain enumeration, and IP intelligence for domain and infrastructure investigation.

Open Tool

Investigator Use

SecurityTrails is a domain and DNS intelligence platform providing historical DNS records, subdomain discovery, current and historical WHOIS data, and associated IP infrastructure for any domain. It is one of the most comprehensive sources for passive DNS data available to investigators, maintaining years of historical records across hundreds of millions of domains.

What investigators use SecurityTrails for: discovering all subdomains associated with a target domain, viewing historical DNS A, MX, NS, and TXT records to understand infrastructure changes over time, finding other domains that previously pointed to the same IP address, and identifying the true IP of hosts currently behind Cloudflare or other proxies.

What data SecurityTrails exposes: current and historical DNS records for any domain, subdomain lists generated from passive DNS and certificate transparency, associated IP addresses and their hosting history, WHOIS registration history with registrar changes, mail server configurations, and linked domains that share infrastructure characteristics.

Historical DNS data is one of SecurityTrails' most valuable features for OSINT. When a domain operator moves their servers behind Cloudflare, the real IP is hidden — but SecurityTrails often shows the A record that existed before the CDN was put in place. This technique, called origin IP discovery, is critical in domain attribution investigations.

Subdomain enumeration: SecurityTrails' subdomain endpoint returns hundreds or thousands of subdomains for large organizations, many of which will not appear in certificate transparency logs or standard enumeration tools. These subdomains often expose staging environments, internal tools, and forgotten test servers.

API access: SecurityTrails offers a free tier with limited daily queries, a personal plan for researchers, and enterprise plans with bulk API access. The free tier provides enough for basic investigations, but large-scale subdomain enumeration requires a paid plan.

In a workflow: use SecurityTrails immediately after identifying a target domain. Run subdomain discovery, then check historical A records for each subdomain to identify real IP addresses. Feed discovered IPs into Shodan and Censys to enumerate exposed services. Cross-reference WHOIS history to identify registrant changes that might indicate domain transfer or seizure.

#Security Trails #Domain OSINT tools #Domain OSINT resources #dns #infrastructure #analysis #correlations #domain #historical #history

Before You Pivot

Record Context

Capture the target, search terms, and why this source is relevant before you leave the page.

Preserve Evidence

Archive volatile pages, save screenshots, and keep timestamps for anything that may change.

Corroborate

Treat one tool as a lead source. Confirm important findings with independent sources.

Related Tools

Related Workflows