Use this file to discover all available pages before exploring further.
Need advanced workflows or custom domain discovery configurations? Our team can help set up enterprise-grade configurations tailored to your infrastructure. Talk to our team to discuss your specific requirements.
Modern enterprises frequently have complex infrastructures spread across many domains and business units. ProjectDiscovery’s Associated Domains Discovery gives security teams instant visibility into their entire organizational attack surface by automatically discovering related domains through multiple intelligence sources.The platform correlates data from three primary sources:
Acquisition History - Corporate subsidiaries and acquired companies from business intelligence sources
Certificate History - SSL/TLS certificate transparency logs revealing shared infrastructure
WHOIS History - Domain registration records identifying common ownership
This multi-source approach ensures comprehensive coverage, discovering domains that might be missed when relying on a single data source.
Tracking assets across multiple organizations, subsidiaries, and technical infrastructures is notoriously difficult when done manually. Security teams traditionally had to compile lists of related domains from internal knowledge or public records, then run separate scans for each-a time-consuming and error-prone process.
Incomplete Visibility: Large organizations might have dozens of related domains across subsidiaries, product brands, and acquired companies. Manually mapping all these entities is a huge challenge. In practice, many enterprises have hundreds or even thousands of related entities, making it difficult to get a clear picture of their full attack surface.
Constant Change: Mergers, acquisitions, and infrastructure changes mean the set of assets is constantly evolving. Without continuous updates, asset inventories become outdated quickly. Domains can change ownership or get spun up rapidly in cloud environments.
Fragmented Data Sources: Information about related domains is scattered across financial databases, certificate logs, WHOIS records, and press releases. Mapping out which domains are owned by your organization requires extensive research across multiple sources.
Risk of Unknown Assets: Unknown or unmanaged assets can lead to security incidents. A forgotten website under an acquired company or a domain sharing your SSL certificate could become an easy target for attackers.
Source: Business Intelligence & Corporate RecordsProjectDiscovery integrates with corporate intelligence sources to automatically identify subsidiaries, acquired companies, and related brands associated with your organization.What it discovers:
Subsidiary companies and their domains
Acquired company assets
Related brands and product domains
Corporate hierarchy relationships
Evidence provided:
Field
Description
acquired_company
Name of the acquired company
acquired_date
Date of acquisition
acquirer_name
Parent organization name
source_url
Link to source information
When you onboard to the platform, it automatically pulls known subsidiaries and related entities-giving you an instant snapshot of your organization’s broad footprint without manual research.
Source: Certificate Transparency LogsSSL/TLS certificates often reveal domain relationships that aren’t visible through other means. Organizations frequently use shared certificates across related properties, or certificate organization fields expose ownership.What it discovers:
Domains sharing the same SSL certificate
Domains with matching certificate organization names
Source: Domain Registration RecordsWHOIS records provide authoritative information about domain ownership. By analyzing registration patterns, the platform identifies domains that share organizational ownership.What it discovers:
Access Associated Domains in the platform to view domains related to your verified domains. By default, the platform automatically discovers and displays associated domains for all your verified domains.
Navigate to Assets → Domains in the left sidebar
View associated domains automatically discovered for your verified domains
Optionally search for a specific domain to explore its associations
Review results grouped by discovery source
Add discovered domains to your asset inventory for monitoring
Query associated domains programmatically using the Associated Domains API.Default behavior - Returns associated domains for all your verified domains:
curl -X GET "https://api.projectdiscovery.io/v1/domain/associated" \ -H "X-Api-Key: YOUR_API_KEY"
Query specific domain - Optionally specify a domain to get its associated domains:
curl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com" \ -H "X-Api-Key: YOUR_API_KEY"
Filter by source:
# Only acquisition historycurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&source=acquisition_history" \ -H "X-Api-Key: YOUR_API_KEY"# Only certificate historycurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&source=certificate_history" \ -H "X-Api-Key: YOUR_API_KEY"# Multiple sourcescurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&source=certificate_history,whois_history" \ -H "X-Api-Key: YOUR_API_KEY"
Filter by liveness:
# Only active/reachable domainscurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&active=true" \ -H "X-Api-Key: YOUR_API_KEY"
Pagination and sorting:
# Paginated results sorted by subdomain countcurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&limit=50&page=1&sort=subdomain_count" \ -H "X-Api-Key: YOUR_API_KEY"
Raw output (plain text):
# Get just domain names, one per linecurl -X GET "https://api.projectdiscovery.io/v1/domain/associated?domain=meta.com&raw=true" \ -H "X-Api-Key: YOUR_API_KEY"
Associated Domains Discovery returns up to 10 results per query on standard plans. Upgrade to Enterprise for complete associated domain discovery results.
Use all sources: Don’t filter by source initially-let the platform correlate across all three sources for maximum coverage.
Check inactive domains: Domains marked as active: false may still be valuable-they could be parked domains or temporarily down services that attackers might target.
Review subdomain counts: High subdomain counts often indicate active infrastructure worth investigating further.
Associated Domains Discovery is not a one-time static pull. The platform continuously enhances its correlation capabilities:
Real-time certificate monitoring: New certificates are indexed as they appear in transparency logs
WHOIS update tracking: Registration changes are detected and reflected in results
Acquisition intelligence: Corporate events are tracked and correlated with domain ownership
Liveness probing: Domain reachability is regularly checked and updated
As your organization grows-launching new websites, spinning up cloud services, or acquiring companies-the platform automatically updates discoveries and keeps track of new potential entry points.
For complete API documentation including all parameters, response schemas, and code examples in multiple languages, see the Associated Domains API Reference.