Adnan Tariq

Adnan Tariq

Automated DNS Records Lookup for Subdomains with HackerTarget API Reports

๐Ÿง  EnumX: Auto DNS Lookup for Subdomains with Markdown Export

Whoโ€™s it for

Security engineers, red teamers, or automation-curious teams looking to enhance passive reconnaissance with minimal effort. Ideal for early-stage security setups, bug bounty hunters, and SME SOC analysts.

What it does

This workflow performs passive subdomain enumeration and DNS record lookup for a given domain. It parses the data, generates a clean markdown report, and sends it via email.

๐ŸŒ Uses HackerTarget APIs for subdomain and DNS data

๐Ÿง  Parses records (A, AAAA, CNAME, TXT, MX, NS, SOA)

๐Ÿ“จ Sends a structured markdown report to a designated inbox

๐Ÿ›ก๏ธ Useful for recon, misconfiguration detection, and compliance evidence

How to set up
Replace the email address in the Gmail node with your recipient.

(Optional) Replace HackerTarget API with your own recon APIs.

Click Execute Workflow or trigger via cron on schedule.

View the full markdown output in your inbox.

Requirements
Free Gmail account (with n8n Gmail OAuth2 configured)

(Optional) Replace example.com with your target domain

Internet access (API calls use HTTPS)

How to customize the workflow
Modify the target domain via the "๐ŸŒ Target Domain" Set node

Adjust markdown format in โ€œ๐Ÿ“ Format DNS Markdownโ€

Replace Gmail node with Slack/Telegram/Notion if preferred

Add additional enrichment nodes (e.g., Shodan, VirusTotal) for deeper analysis

*๐Ÿ’ผ This template is part of the CYBERPULSE AI BlueOps/RedOps suite.

Do you want to automate your business?

Let's talk about your project