Undetected vulnerable
subdomain takeover

Use this to find new services to takeover.
Looking forward to your validation and contribution by sending fingerprints to github.

Github How to contribution?
Affected Fingerprints Mode SCAN AT SCAN By
███████ "cname": "contact-staging.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "403",
"title": "Xapo Bank - Request Blocked"
"redirect": "No redirects"
private 1 year ago Subdosec.i3rB
███████ "cname": "contact-form-webservice.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "403",
"title": "Xapo Bank - Request Blocked"
"redirect": "No redirects"
private 1 year ago Subdosec.i3rB
███████ "cname": "",
"a_records": "",
"status_code": "308",
"title": "Sign in | Imperial Tobacco - UKI"
"redirect": "https://consumer-first.feature..."
private 1 year ago Subdosec.i3rB
███████ "cname": "consul.ztna.tooling-prod.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "302",
"title": "Sign in ・ Cloudflare Access"
"redirect": "https://xapo.cloudflareaccess...."
private 1 year ago Subdosec.i3rB
███████ "cname": "consul.ztna.tooling-dev.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "302",
"title": "Sign in ・ Cloudflare Access"
"redirect": "https://xapo.cloudflareaccess...."
private 1 year ago Subdosec.i3rB
███████ "cname": "consul-test-module-srv-server.ztna.workload-stg.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "302",
"title": "Sign in ・ Cloudflare Access"
"redirect": "https://xapo.cloudflareaccess...."
private 1 year ago Subdosec.i3rB
███████ "cname": "",
"a_records": "",
"status_code": "302",
"title": "Sign In"
"redirect": "https://consul.infra.███████/"
private 1 year ago Subdosec.i3rB
███████ "cname": "consul.cli.ztna.tooling-prod.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "302",
"title": "Sign in ・ Cloudflare Access"
"redirect": "https://xapo.cloudflareaccess...."
private 1 year ago Subdosec.i3rB
███████ "cname": "consul.cli.ztna.tooling-dev.███████.cdn.cloudflare.net",
"a_records": "",
"status_code": "302",
"title": "Sign in ・ Cloudflare Access"
"redirect": "https://xapo.cloudflareaccess...."
private 1 year ago Subdosec.i3rB
███████ "cname": "d-9r1tnlw8nj.execute-api.eu-west-1.amazonaws.com",
"a_records": "",
"status_code": "502",
"title": "502 Bad Gateway"
"redirect": "No redirects"
private 1 year ago Subdosec.i3rB