x402basequality 0.65

Subdomain discovery for any domain via x402 micropayment ($0.01 USDC on Base).

Price
per_call
Protocol
x402
Verified
no

What it does

The `/domain/subdomains` endpoint on domain.hugen.tokyo performs subdomain enumeration for a given domain name. It is one of seven domain intelligence checks offered by the Domain Intelligence API, which also covers WHOIS, DNS records, SSL certificates, tech stack detection, security headers, and redirect tracing.

This specific endpoint accepts a `domain` query parameter (e.g., `example.com`) via HTTP GET and returns a list of discovered subdomains along with a count. The endpoint is pay-per-call at $0.01 USDC on the Base network, settled via the x402 protocol. A sample response from the x402 challenge shows fields like `subdomain_count` and a `subdomains` array.

Alternative access methods are available: an MCP gateway at `mcp.hugen.tokyo/mcp` that brokers payment across 2300+ x402 APIs, a free API key with $0.05 credit via `discovery.hugen.tokyo`, or the `x402-pay` Python SDK for one-line access without wallet setup. The API has a full OpenAPI 3.1 spec and Swagger docs at `/docs`. Response schemas for the subdomain endpoint are not explicitly defined in the OpenAPI spec beyond validation errors.

Capabilities

subdomain-enumerationdomain-intelligencex402-micropaymentbase-usdc-settlementrest-apiget-request

Use cases

  • Discovering subdomains of a target domain during security reconnaissance
  • Mapping an organization's external attack surface
  • Validating subdomain configurations as part of domain auditing
  • Feeding subdomain lists into vulnerability scanners or monitoring tools
  • Enumerating infrastructure endpoints for asset inventory

Fit

Best for

  • Security researchers performing domain reconnaissance
  • Automated agents needing pay-per-call subdomain discovery without API key signup
  • Developers building domain intelligence pipelines

Not for

  • Bulk subdomain enumeration of thousands of domains (per-call pricing adds up)
  • Deep recursive subdomain brute-forcing requiring custom wordlists

Quick start

# Using the x402-pay Python SDK
pip install x402-pay

import x402_pay
response = x402_pay.get(
    'https://domain.hugen.tokyo/domain/subdomains?domain=example.com'
)
print(response.json())

Example

Response

{
  "subdomains": [
    "www.example.com",
    "mail.example.com",
    "api.example.com"
  ],
  "subdomain_count": 3
}

Endpoint

Transporthttp
Protocolx402
Pay to0x29322Ea7EcB34aA6164cb2ddeB9CE650902E4f60
CurrencyUSD COIN

Quality

0.65/ 1.00

The endpoint is live (402 challenge captured) with a valid OpenAPI 3.1 spec and Swagger docs. However, the response schema for the subdomains endpoint is empty in the spec, and the only example response comes from the x402 challenge sample. No dedicated pricing page or detailed documentation beyond the auto-generated Swagger UI.

Warnings

  • Response schema is not defined in the OpenAPI spec — the sample response is inferred from the x402 challenge payload only.
  • No dedicated documentation or pricing page exists (both return 404).
  • Root URL returns 404; only /docs provides useful information.

Citations

Provenance

Indexed fromx402_bazaar
Enriched2026-04-22 02:25:52Z · anthropic/claude-opus-4.6 · v2
First seen2026-04-21
Last seen2026-04-22

Agent access

Subdomain discovery for any domain via x402 micropayment ($0.01 USDC on Base). — Clawmart · Clawmart