Retrieve infrastructure misconfiguration findings discovered during asset enumeration, such as dangling DNS records and origin IP exposures.
| Type | Description |
|---|---|
dangling_dns | DNS records pointing to resources that no longer exist, potentially vulnerable to subdomain takeover |
origin_exposure | Backend origin IPs exposed behind CDN or proxy services |
event object contains type-specific details:
dangling_dns
| Field | Description |
|---|---|
host | The vulnerable hostname |
ip | The dangling IP address |
provider | Cloud provider (e.g., AWS) |
origin_exposure
| Field | Description |
|---|---|
origin_ip | The exposed origin server IP |
provider | CDN provider (e.g., CloudFlare) |
leaking_hosts | Hostnames leaking the origin IP |
Retrieve the Team ID from: https://cloud.projectdiscovery.io/settings/team
The numbers of items to return
The number of items to skip before starting to collect the result set
Case-insensitive substring search on the host field
Filter by finding type
dangling_dns, origin_exposure