Certificate transparency logs may show for which subdomains certificates were obtained, e.g. see https://crt.sh.
Search results might reveal subdomains. Again,
dnsrecon
can do this with the-t goo
option (uses Google specifically).Checking other TLDs for the same name might reveal some other variants or IP addresses. E.g. if
example.com
exists,example.org
might exist as well.dnsrecon
can also do this withdnsrecon -t tld -d example.com
.Crawling a website or finding references elsewhere might give hints. (Help wanted: which tool to use?)
Looking at TLS certificates often yields results. Be sure to check the ports for HTTPS, SMTP(S), FTP(S), etc. and use STARTTLS.
There are third party tools which can list subdomains in a domain. Their methods are less clear, but crawling the internet and historical records (maybe a domain transfer was once possible?) are often part of it. (Help wanted: any recommendations? I only remember seeing that it exists.)