- https://viewdns.info/reverseip/
- bing: "ip:8.8.8.8"
- http://atsameip.intercode.ca/
- https://dnslytics.com/reverse-ip
- https://myip.ms/browse/sites_history/
- https://viewdns.info/iphistory/
- https://threatcrowd.org/ - see "dns resolutions" in results
- https://cyber-hub.pw/domain_history.php
- https://dnshistory.org/dns-records
- https://viewdns.info/reversens/
- https://hackertarget.com/find-shared-dns-servers/
- https://dnslytics.com/reverse-ns
See also "Domain IP History" tools
- http://www.crimeflare.org:82/cfs.html
- article: https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/uncovering-cloudflare
- http://whoishistory.ru/ - history for .RU, .SU, .РФ domains
- https://domainwat.ch
- google: "site:*.domain.com"
- https://dnsdumpster.com/
- https://crt.sh/ - historical data of SSL cert, see Common Name data
- https://cyber-hub.pw/domain_resolver.php
- https://github.com/guelfoweb/knock - brute-forcing, wildcard detection
- https://github.com/aboul3la/Sublist3r - search engines, dnsdumpster, brute-forcing
- https://github.com/OWASP/Amass -
amass enum
command
- https://github.com/beurtschipper/Depix - recovers text blured with linear box filter
- https://github.com/m0rtem/CloudFail - dnsdumpster, crimeflare, brute-force