How to Discover Hidden Services with Claude
Find hidden web services with Claude and ToolRouter. Discover exposed infrastructure.
ToolSecurity HTTPxClaude turns HTTP service probing into a thorough, conversational security review that connects each finding to its broader implications. Ask Claude to check security headers, discover hidden services, verify SSL configurations, and enumerate subdomains while explaining the risk and remediation for every issue found. Its chaining capability lets you start with a broad reconnaissance and progressively drill into specific areas of concern.
Connect ToolRouter to Claude
1Go to Settings → Connectors → Add custom connector
2Enter the details below and click Add
Name
ToolRouterURL
https://api.toolrouter.com/mcp3Done — works on Claude chat, desktop, and mobile
Steps
Once connected (see setup above), use the Security HTTPx tool:
- Ask Claude: "Probe my infrastructure for hidden services using security-httpx" and provide your domain or IP range
- Claude scans for responding HTTP services and returns details on each
- Review the discovered services and identify any that should not be publicly accessible
- Decommission or restrict access to unauthorized services
Example Prompt
Try this with Claude using the Security HTTPx tool
Scan all subdomains of mycompany.com for hidden HTTP services. I want to find any staging, test, or admin services that are accidentally exposed.
Tips
- Ask Claude to check non-standard ports where hidden services often run
- Compare discovered services against your known inventory to identify unknowns
- Run discovery scans monthly to catch newly exposed services quickly