Security Check
Free Subdomain Takeover Risk Check
Detect dangling CNAME records that expose your subdomains to takeover. VP Shield checks your DNS against known vulnerable service fingerprints used in real attacks.
Check for takeover risk →What's Checked
- CNAME record enumeration and resolution
- Dangling CNAME detection
- Known vulnerable service fingerprint matching
- Risk severity classification
- Affected subdomain listing
- Remediation steps for each finding
- Coverage of 50+ cloud and SaaS platforms
- One-click re-scan after remediation
Common Questions
- What is a subdomain takeover?
- A subdomain takeover occurs when a DNS record points to a cloud resource that no longer exists. An attacker who can register or claim that resource can serve content from your subdomain. Browsers and users trust it as your domain, enabling phishing, cookie theft, and CSP bypass.
- Which services are most commonly affected?
- GitHub Pages, Heroku, AWS S3, Azure App Service, Shopify, Zendesk, Ghost, and Fastly are among the most commonly exploited. Any platform-as-a-service that uses customer-specific hostnames is potentially vulnerable if your CNAME points to a deleted resource.
- How do I fix a subdomain takeover risk?
- If the subdomain is no longer needed, delete the CNAME record from your DNS. If the service is still needed, recreate the resource at the same service with the same hostname, or migrate to a different approach. Do not just delete the cloud resource without also removing the DNS record.
Run a free domain security scan
VP Shield checks DNS, TLS, email authentication, security headers, and subdomain takeover risk for any domain. Free, no login, two minutes.
Related Services
Free DNS Hygiene Check
Instantly check your domain DNS configuration for dangling CNAMEs, missing CAA records, nameserver consistency issues, and other misconfigurations that expose your organisation to attack.
Check your DNS →Free Email Authentication Check
Check your domain SPF, DKIM, and DMARC configuration in seconds. See whether your domain can currently be spoofed for phishing email and get specific fixes to close the gap.
Check email authentication →Free TLS & SSL Grade Check
Check your domain TLS configuration and get an SSL Labs-equivalent grade. Identifies weak cipher suites, deprecated protocol versions, certificate issues, and missing HSTS.
Check your TLS grade →