Adnan Tariq

Adnan Tariq

Automated DNS Records Lookup for Subdomains with HackerTarget API Reports

🧠 EnumX: Auto DNS Lookup for Subdomains with Markdown Export

Who's it for

Security engineers, red teamers, or automation-curious teams looking to enhance passive reconnaissance with minimal effort. Ideal for early-stage security setups, bug bounty hunters, and SME SOC analysts.

What it does

This workflow performs passive subdomain enumeration and DNS record lookup for a given domain. It parses the data, generates a clean markdown report, and sends it via email.

🌐 Uses HackerTarget APIs for subdomain and DNS data

🧠 Parses records (A, AAAA, CNAME, TXT, MX, NS, SOA)

πŸ“¨ Sends a structured markdown report to a designated inbox

πŸ›‘οΈ Useful for recon, misconfiguration detection, and compliance evidence

How to set up
Replace the email address in the Gmail node with your recipient.

(Optional) Replace HackerTarget API with your own recon APIs.

Click Execute Workflow or trigger via cron on schedule.

View the full markdown output in your inbox.

Requirements
Free Gmail account (with n8n Gmail OAuth2 configured)

(Optional) Replace example.com with your target domain

Internet access (API calls use HTTPS)

How to customize the workflow
Modify the target domain via the "🌐 Target Domain" Set node

Adjust markdown format in β€œπŸ“ Format DNS Markdown”

Replace Gmail node with Slack/Telegram/Notion if preferred

Add additional enrichment nodes (eg, Shodan, VirusTotal) for deeper analysis

*πŸ’Ό This template is part of the CYBERPULSE AI BlueOps/RedOps suite.

Do you want to automate your business?

Let's talk about your project