How to Enumerate Subdomains with OpenClaw

Subdomain enumeration with OpenClaw and ToolRouter. Discover all subdomains.

Tool
Security HTTPx icon
Security HTTPx

OpenClaw runs HTTP service probes as systematic, large-scale scanning operations that cover your entire web infrastructure in one pass. Feed it a list of domains, subdomains, and IP ranges to get back a comprehensive inventory of responding services with their security header status, SSL configuration, and detected technologies. Its batch scanning approach is essential for organizations managing large infrastructures that need continuous visibility into their HTTP attack surface.

Connect ToolRouter to OpenClaw

1Install the CLI
npm install -g toolrouter-mcp
2Call tools directly from OpenClaw
toolrouter-mcp call web-search search --query "AI tools"
toolrouter-mcp tools

Steps

Once connected (see setup above), use the Security HTTPx tool:

  1. Ask OpenClaw: "Enumerate all subdomains of my domain"
  2. OpenClaw discovers and probes subdomains
  3. Review the complete subdomain inventory
  4. Secure or decommission any unintended subdomains

Example Prompt

Try this with OpenClaw using the Security HTTPx tool
Discover all subdomains of mycompany.com and check which ones have live HTTP services.

Tips

  • Forgotten subdomains running old software are among the easiest targets for attackers
  • Maintain a living inventory of all authorized subdomains and compare against scan results
  • Wildcard DNS records can mask subdomain takeover vulnerabilities -- check for these

Related Workflows

Full Security AssessmentComprehensive security assessment combining infrastructure probing, vulnerability scanning, penetration testing, and CVE intelligence.SSL and DNS AuditAudit SSL certificates, DNS configuration, HTTP security headers, and domain registration for security gaps.Subdomain Security ScanEnumerate subdomains, probe services, scan for takeover vulnerabilities, and capture visual evidence.Infrastructure Health CheckVerify DNS resolution, service availability, and server locations to ensure infrastructure is healthy and correctly configured.Web Application Security TestCrawl a web application, analyze HTTP security, test for injections, and document findings with screenshots.Network ReconnaissanceMap the complete network attack surface through DNS enumeration, geolocation, service probing, and attack vector analysis.API Security TestingTest API endpoints for authentication flaws, injection vulnerabilities, and compliance with OWASP API Security Top 10.Certificate MonitoringMonitor SSL/TLS certificates for expiration, verify TLS configuration, and confirm domain ownership alignment.Cloud Security AuditAudit cloud infrastructure by discovering assets, probing for misconfigurations, testing cloud-specific attacks, and checking CVEs.Third-Party Risk AssessmentAssess third-party vendor security through identity verification, external security probing, attack surface analysis, and breach history.Continuous Security MonitoringMaintain ongoing security visibility through DNS monitoring, service probing, vulnerability scanning, and CVE tracking.Dark Web Exposure CheckCheck for organizational data exposure on the web including credential leaks, paste sites, and breach databases.