Retrieve infrastructure misconfiguration findings discovered during asset enumeration. Currently detects AWS dangling DNS (Elastic IPs that no longer exist) and Cloudflare origin IP exposure.
Documentation Index
Fetch the complete documentation index at: https://docs.projectdiscovery.io/llms.txt
Use this file to discover all available pages before exploring further.
| Type | Description |
|---|---|
dangling_dns | AWS Elastic IPs that no longer exist, leaving DNS records vulnerable to subdomain takeover |
origin_exposure | Cloudflare-proxied origin IPs independently discoverable through other hostnames |
event object contains type-specific details:
dangling_dns
| Field | Description |
|---|---|
host | The vulnerable hostname |
ip | The dangling IP address |
provider | Cloud provider (e.g., AWS) |
origin_exposure
| Field | Description |
|---|---|
origin_ip | The exposed origin server IP |
provider | CDN provider (e.g., Cloudflare) |
leaking_hosts | The hostnames from your inventory that resolve directly to the origin IP |
Retrieve the Team ID from: https://cloud.projectdiscovery.io/settings/team
The numbers of items to return
The number of items to skip before starting to collect the result set
Case-insensitive substring search on the host field
Filter by finding type
dangling_dns, origin_exposure