Fact-checked by Grok 2 weeks ago

Subdomain

A subdomain is a hierarchical subdivision of a domain name in the Domain Name System (DNS), consisting of one or more labels prefixed to a parent domain name and separated by dots, such as "mail" in "mail.example.com", which forms part of the overall DNS namespace tree structure. This structure allows a subdomain to be contained within its parent domain if its full name ends with the parent's name, enabling precise identification of resources like servers or services beneath the parent. Defined in the foundational DNS specifications, subdomains support the distributed management of the global namespace by breaking it into manageable parts. Subdomains are defined by DNS resource records in the parent domain's zone, such as A or CNAME records for direct management, while delegation through NS records assigns authority over the subdomain to specific name servers, allowing the parent domain's administrator to offload control to another entity. This delegation process ensures that each subdomain has a designated manager responsible for its operation, including maintaining accurate records and providing reliable service, while adhering to principles of competence, fairness, and technical stability. In practice, subdomains facilitate the organization of website content or services—for instance, directing "blog.example.com" to a separate hosting environment or "api.example.com" to an application server—without requiring separate domain registrations. Beyond basic naming, subdomains play a critical role in DNS delegation across the , from top-level domains downward, promoting and local autonomy in resource addressing. They must comply with DNS standards for labels (up to 63 characters, alphanumeric with hyphens) and overall name length (up to 255 octets), ensuring across resolvers and servers. While subdomains enhance flexibility, they also introduce considerations like separate security configurations, as vulnerabilities in one (e.g., via misconfigured records) do not automatically affect the parent but require vigilant management.

Fundamentals

Definition and Structure

A subdomain is a domain that is contained within a larger domain in the hierarchical structure of the (DNS). Specifically, a domain qualifies as a subdomain if its name ends with the name of the containing domain, establishing a relationship; for instance, in the name "blog.", "blog." is a subdomain of "". This containment reflects the tree-like organization of DNS, where subdomains represent branches below the parent domain. The syntactic structure of a subdomain follows the general rules for DNS domain names, consisting of one or more labels separated by dots (periods). Each label, which forms the subdomain (e.g., "blog" in "blog.example.com"), must be between 1 and 63 octets in length, using only letters (A-Z, a-z), digits (0-9), and hyphens (-), with the label starting with a letter and ending with a letter or digit; the entire , including all labels and separators, is limited to 255 octets. Dots serve as hierarchical separators, reading from left (most specific) to right (towards the root). Subdomains support internationalized domain names (IDNs) through encoding, which converts non-ASCII characters into an ASCII-compatible format prefixed with "xn--", allowing global script usage while adhering to DNS protocols. In the DNS hierarchy, subdomains inherit certain properties from their parent domain, such as the affiliation, but can operate with independent configurations, including separate authoritative name servers for of control. This independence enables partitioned management without altering the parent domain's settings. Common examples include "www.example.com", where "www" serves as a subdomain label for services under "example.com", and multi-level subdomains like "sub.blog.example.com", which nests "sub" beneath "blog.example.com".

DNS Mechanics

The (DNS) resolves subdomains through a hierarchical query process involving multiple server types. When a client seeks to resolve a subdomain such as "sub.example.com", the resolver initiates a query, typically starting with a local recursive resolver or directly via iterative queries to servers. In recursive resolution, the resolver sets the Recursion Desired (RD) flag in the query, prompting the receiving to perform the full lookup on behalf of the client by querying other servers until obtaining the answer or a negative response (NXDOMAIN). Iterative resolution, used by resolvers without recursion support, involves the client sending queries sequentially; each responding server provides either the final answer or a referral (non-authoritative NS records pointing to the next closer server). The step-by-step for a subdomain begins at one of the 13 root server clusters, which respond with NS records delegating to the (TLD) servers for ".com". The resolver then queries the TLD servers, which provide NS records for the authoritative servers of "". Finally, the authoritative name servers for "" are queried for the specific records of "sub.example.com", returning the relevant resource records (RRs) or indicating non-existence. This process relies on port 53 for efficiency, with fallback for larger responses, and incorporates caching to minimize repeated queries. Subdomains are managed via specific DNS resource record types that map names to resources or delegate authority. The A record (type 1) associates a subdomain with a 32-bit IPv4 address, enabling direct host resolution. The AAAA record (type 28) extends this to 128-bit addresses, allowing subdomains to resolve to IPv6 hosts. CNAME records (type 5) create aliases, pointing a subdomain (e.g., "www.sub.example.com") to another canonical name for simplified management. NS records (type 2) specify authoritative name servers for the subdomain itself. MX records (type 15) define mail exchangers for subdomains, including a preference value to prioritize servers for routing. Delegation enables independent subdomain management through NS records in the parent zone (e.g., "example.com"), which point to separate authoritative name servers responsible for the subdomain's . When a query reaches the parent's authoritative , it responds with the NS records and associated A/AAAA "glue" records to provide the IP addresses of those delegated servers, allowing the resolver to query them directly for subdomain-specific RRs. This mechanism partitions the namespace, permitting subdomains to be administered by different entities without altering the parent domain's configuration. Wildcard DNS provide dynamic handling for unspecified subdomains using an () as the leftmost (e.g., ".example.com"), synthesizing responses for any matching descendant not explicitly defined in the . For instance, a wildcard MX like "*.example.com MX 10 mail.example.com" directs for any undefined subdomain (e.g., "temp.example.com") to the specified mail server. Wildcards apply only within the and are overridden by explicit or deeper delegations; they do not match the wildcard owner itself or cross boundaries, ensuring precise control over dynamic resolutions. Later clarifications in RFC 4592 refined wildcard interactions, such as prohibiting CNAMEs at the wildcard to avoid alias issues.

Historical Development

Origins in DNS

In the and early , the depended on centrally maintained host tables, such as the HOSTS.TXT file distributed by SRI-NIC, to map human-readable host names to IP addresses across the network. As the ARPANET grew to include thousands of hosts from systems and emerging workstations, this flat, centralized approach proved inadequate, leading to escalating file sizes, high distribution costs, and administrative bottlenecks that conflicted with the Internet's distributed architecture. These limitations underscored the necessity for a hierarchical naming system capable of supporting scalable, decentralized management of names and addresses. To resolve these challenges, proposed the (DNS) in 1983 through 882 and 883, introducing a distributed, hierarchical database for name resolution. Central to this design were subdomains, defined as contiguous portions of the domain name space administered independently within a parent domain, such as A.B.C.D as a subdomain of B.C.D. This tree-structured hierarchy, with labels separated by dots and read from most specific to root, allowed for unlimited subdomain creation and delegation of authority, enabling efficient organization and scalability across diverse networks. Early implementations of DNS began in 1983–1984, with Mockapetris developing the first operational , "," for DEC systems at the University of Southern California's Information Sciences Institute (USC-ISI) and SRI-NIC under sponsorship. By 1984–1985, adoption spread to universities and -affiliated sites, where subdomains were initially employed to organize hosts under top-level domains like .edu and —for instance, grouping machines at ISI under isi.edu or military systems under mil subdomains. The , completed its transition to DNS by fall 1985, with all campus hosts and mail gateways relying on subdomain-based addressing. A pivotal came in 1987 with the publication of 1034 and 1035, which obsoleted RFC 882 and 883 while standardizing DNS protocols and explicitly codifying via NS () resource records. These records identify authoritative name servers for subdomains at points in the , facilitating distributed query and independent administration of name spaces.

Evolution and Standardization

The commercialization of the internet in the 1990s drove significant expansion in the use of subdomains, as businesses and organizations increasingly adopted hierarchical domain structures to manage growing online presence. This period saw the formalization of oversight under the Internet Assigned Numbers Authority (IANA), whose functions were assumed by the Internet Corporation for Assigned Names and Numbers (ICANN) in 1998, which coordinated top-level domains (TLDs) and facilitated deeper layers of subdomains under existing TLDs like .com and .net. Key advancements in standardization came through (IETF) (s) that addressed practical needs for subdomains. In June 1999, RFC 2606 reserved specific TLDs such as .test, .example, .invalid, and .localhost to avoid conflicts in testing, , and local development, explicitly supporting subdomain experimentation without impacting DNS. In March 2003, RFC 3490 introduced Internationalizing Domain Names in Applications (IDNA), enabling the use of non-ASCII characters in domain labels—including subdomains—through ASCII-Compatible Encoding (ACE) with , thus broadening global accessibility. During the and , updates focused on enhancing security and efficiency in subdomain resolution. DNS Security Extensions (DNSSEC), standardized in RFC 4033, RFC 4034, and RFC 4035 in March 2005, provided cryptographic authentication for DNS data, including subdomain , to prevent spoofing and tampering. Concurrently, deployment for DNS root and authoritative servers, which began gaining traction in the early , improved redundancy and reduced latency in subdomain queries by routing to the nearest server instance. integration advanced with RFC 3596 in September 2003, which defined for mapping subdomains to IPv6 addresses, supporting the protocol's rollout and dual-stack environments throughout the decade. More recent standardization efforts, up to 2025, have emphasized privacy and scalability. ICANN's 2012 New gTLD Program, launched in January of that year, approved over 1,200 new generic TLDs (e.g., .app, .blog), vastly increasing opportunities for layered subdomains under specialized extensions and fostering innovation in domain hierarchies. In the 2020s, attention shifted to encrypted DNS protocols, with RFC 8484 in October 2018 standardizing (DoH), which encapsulates subdomain queries in to protect against and enhance user privacy without altering core DNS mechanics. Ongoing refinements, such as the April 2025 draft of NIST SP 800-81r3, continue to guide secure DNS implementations applicable to subdomains.

Practical Applications

Branding and Organization

Subdomains play a key role in organizing websites by enabling the creation of distinct, logical sections under a domain, avoiding the need for multiple top-level domains. For instance, often use subdomains like shop.example.com for functionalities and .example.com for publishing, which streamlines and categorizes user experiences effectively. This approach maintains a unified while allowing for targeted to specific audiences. Custom subdomains, sometimes referred to as vanity subdomains, facilitate memorable and personalized URLs that enhance user experience and support branding efforts. An example is assigning user-specific subdomains such as john.doe.com, which provides a professional, branded feel without acquiring a new domain. These setups improve click-through rates and user trust by making links more intuitive and relevant, while also enabling SEO partitioning to focus optimization on niche content independently from the main site. From the 1990s onward, personal branding has leveraged such custom subdomains on early web hosting services, allowing individuals to establish unique online presences tied to established platforms. In terms of content management, subdomains permit independent hosting arrangements or distinct (CMS) implementations while preserving the overarching parent brand. By configuring DNS records to point a subdomain to a separate or provider, different teams or departments can operate their sections autonomously—for example, using a specialized CMS for a portal without affecting the main site's infrastructure. This flexibility supports scalable operations, as seen in corporate environments where subdomains like support.microsoft.com host dedicated customer service resources managed separately from the primary domain.

Load Balancing and Clustering

Subdomains play a crucial role in clustering by enabling the of across multiple backend servers to enhance and . In configurations, a single subdomain such as www.[example.com](/page/Example.com) can be associated with multiple IPv4 or addresses through A or records in the , allowing DNS resolvers to cycle through these addresses on successive queries and direct clients to different servers. This method provides basic load without requiring specialized software, though it relies on client-side DNS caching behaviors that may lead to uneven if not managed carefully. For more granular clustering, distinct subdomains like mail1.[example.com](/page/Example.com) and mail2.[example.com](/page/Example.com) can each resolve to separate IP addresses, facilitating where shifts to healthy servers upon detection of outages via health checks integrated with DNS providers. Load balancing with subdomains extends this capability by integrating DNS resolution with advanced tools and services, optimizing for performance, geography, and resource utilization. Tools like can be configured to listen on subdomain-specific ports or virtual hosts, routing incoming requests from subdomains such as app1.example.com to a pool of upstream servers based on algorithms like least connections or hashing, thereby mitigating single points of failure and scaling horizontally. In cloud environments, services like AWS Route 53 leverage subdomains for sophisticated geo-routing, where latency-based or geolocation policies direct traffic from eu.api.example.com to the nearest regional endpoint, reducing response times and supporting global for applications handling high volumes of requests. Scalability examples illustrate subdomains' effectiveness in content delivery networks (CDNs) and modern architectures. CDNs such as employ subdomains like static.example.com to route requests to edge servers optimized for caching static assets, where DNS and subdomain delegation enable global replication and automatic to reduce in typical deployments. In microservices architectures, service-specific subdomains—e.g., api.example.com for backend APIs and auth.example.com for authentication—allow independent scaling of components, with tools like using ingress controllers to map these subdomains to dynamically provisioned pods, supporting elastic growth in containerized environments. In the 2020s cloud context, subdomains facilitate by routing to ephemeral instances that scale automatically with demand. Platforms like AWS API Gateway assign custom subdomains such as serverless.example.com to functions, where DNS records point to regional endpoints that invoke compute resources on-the-fly, eliminating the need for persistent servers and enabling cost-efficient handling of variable workloads up to millions of requests per second. This approach, often combined with wildcard DNS records for dynamic subdomain creation, further enhances flexibility in hybrid serverless setups.

Regional and Specialized Uses

Subdomains enable geographic targeting by allowing organizations to host region-specific content and data on dedicated servers, facilitating compliance with local regulations such as data residency requirements under the EU's GDPR, which requires appropriate safeguards for the transfer of outside the (EEA), such as adequacy decisions or standard contractual clauses. For instance, a company might use eu.example.com to serve users from servers in an member state, ensuring data localization and avoiding cross-border transfer issues post-GDPR enforcement in 2018. In the , subdomains have historically played a key role under the .co.uk , which was established for commercial entities and allowed for structured regional targeting since its introduction in the 1980s as part of the .uk namespace. Post-Brexit in 2020, UK-based organizations lost eligibility for new .eu domain registrations and considered alternatives such as .co.uk or .com to maintain online presence while aligning with the UK's GDPR extension and separate adequacy decisions for data flows. Specialized uses of subdomains include isolating email functions, such as .example.com for mailing lists, which helps protect the main domain's sender reputation by separating promotional traffic and enabling targeted authentication protocols like , DKIM, and . Similarly, testing and staging environments often employ subdomains like dev.example.com to mirror production setups without affecting live sites, allowing developers to test updates in isolation before deployment. Internationally, subdomains support Internationalized Domain Names (IDNs) in non-Latin scripts, enabling multilingual sites under country-code top-level domains (ccTLDs) like .eu, where characters from supported European scripts such as Cyrillic or Greek can be used—for example, поддержка.example.eu for a Russian-language support section. This aligns with IDNA standards, allowing seamless integration of native scripts in subdomains to cater to diverse linguistic audiences across the European Union.

Comparisons and Alternatives

Subdomains vs Subdirectories

Subdomains and subdirectories offer distinct methods for structuring website content, each with unique technical foundations. A subdomain, exemplified by , functions as an independent DNS entity that can resolve to a separate or from the root domain, enabling isolated hosting and . In comparison, a subdirectory, such as , operates as a simple path extension within the root domain's hierarchy, sharing the same DNS resolution and typically hosted on the identical infrastructure. This structural divergence allows subdomains greater autonomy in allocation, while subdirectories maintain tighter integration with the primary site. From an SEO perspective, subdomains are generally regarded by search engines as separate entities from the root , resulting in limited automatic inheritance of link equity or , whereas subdirectories consolidate these benefits under a single for enhanced ranking potential. Google's has indicated that the search engine treats subdomains and subdirectories equivalently in terms of crawling and indexing, yet experts observe that subdomains often require independent building. Subdirectories thus facilitate faster gains by pooling resources like backlinks across the site, making them advantageous for content closely related to the main . Management of subdomains provides pros such as independent tracking, dedicated hosting environments, and improved through load balancing across multiple servers, which is beneficial for resource-intensive sections. However, these advantages come with cons including the need for cross-domain configuration, separate SSL certificates, and more complex to ensure consistency. Subdirectories simplify management with unified , shared hosting, and streamlined updates under one domain, though they can constrain by centralizing all traffic on a single , potentially leading to performance bottlenecks at scale. In practice, subdomains suit use cases involving isolated applications, such as a standalone at forum.example.com, where separate development teams or security protocols are required to minimize risks to the main site. Subdirectories, by contrast, are ideal for integrated content like a at example.com/, promoting a seamless and leveraging the domain's established for better cohesion and discoverability.

Subdomains vs Separate Domains

Subdomains and separate domains serve distinct purposes in , with subdomains operating as extensions of a parent (e.g., blog.example.com) while separate domains require independent registration as new top-level or second-level names (e.g., exampleblog.com). The choice between them impacts cost, branding, operational management, and strategic alignment, often depending on whether the content represents an internal extension or a standalone entity. One primary difference lies in cost and registration processes. Creating a subdomain incurs no additional fees beyond the existing parent , as it is managed entirely under the owner's control through DNS configuration. In contrast, registering a separate involves annual fees set by ICANN-accredited registrars, typically ranging from $10 to $20 for a standard .com as of 2025, plus potential renewal costs that can vary by extension and promoter. This makes subdomains a cost-effective option for expansions without ongoing financial commitments for new registrations. Branding considerations further highlight their divergence. Subdomains benefit from inheriting the established reputation and trust of the parent domain, allowing users to associate the subsection with the main brand's without rebuilding from scratch. Separate domains, however, function as independent entities that demand full , including efforts to establish recognition and , which can be advantageous for creating distinct identities but requires more investment in visibility. Management overhead also varies significantly. Subdomains enable centralized control through a single and account, simplifying updates, configurations, and for enterprises handling multiple site sections. Separate domains necessitate multiple accounts, separate , and potentially disparate hosting setups, increasing administrative and the risk of inconsistencies across properties. Organizations typically choose subdomains for internal divisions or related content streams, such as departmental sites (e.g., support.example.com), where alignment with the core is desired. Separate domains are preferred for distinct brands or spin-offs, like when launching a new product line under a unique identity (e.g., a corporate divestiture), to allow independent growth and tracking without diluting the parent domain's focus.

Security Considerations

Vulnerabilities

Subdomain takeover represents a significant where attackers exploit misconfigured or abandoned DNS records to gain control over a subdomain of a target domain. This typically occurs through dangling CNAME records pointing to deleted or expired third-party services, such as AWS S3 buckets, allowing the attacker to claim the associated resource and redirect traffic to malicious content. Successful takeovers enable a range of attacks, including , distribution, and via stolen credentials or cookies. Reports have identified thousands of vulnerable subdomains across top domains, with one study detecting over 10,000 at risk from hosting-based dangling records in major domains. Subdomain enumeration facilitates by uncovering hidden or forgotten subdomains, expanding the for further . Attackers use tools like Sublist3r, which leverages OSINT sources such as search engines and logs, to systematically discover subdomains without direct interaction with the target. This process aids in identifying entry points for campaigns, distributed denial-of-service (DDoS) attacks, or targeted intrusions by revealing internal applications and services not intended for public exposure. Cookie scope issues arise when cookies are set with a domain attribute like .example.com, making them accessible across all subdomains and potentially leaking sensitive information between isolated services. For instance, a cookie set on the domain can be read by an attacker-controlled subdomain, enabling or . In misconfigured environments, this broad scoping exacerbates (CSRF) risks, as malicious subdomains can leverage shared to forge requests on behalf of users authenticated to the parent . Recent threats through 2025 have elevated subdomain risks, particularly in supply chain attacks targeting compromised (CDN) subdomains. For example, the 2024 Polyfill.io incident involved attackers injecting malicious into a widely used CDN service, affecting over 100,000 websites and enabling widespread distribution via subdomain integrations. Subdomain takeovers have increasingly been weaponized as vectors, allowing attackers to hijack development or third-party subdomains for broader ecosystem compromise. Additionally, exploits have persisted, using subdomains to bypass restrictions and access internal resources, as seen in vulnerabilities like CVE-2024-28224 affecting local services. In 2025, threat actors such as Hazy Hawk exploited DNS record flaws to hijack subdomains of high-profile entities like the CDC, facilitating scam and malware campaigns. Later in the year, a July 2025 incident involved DNS takeover of an Cloud tenant, enabling cross-organization and access to . Reports also indicated a 220% surge in subdomain takeovers in August 2025, often linked to cookie misconfigurations bypassing (MFA).

Best Practices and Mitigation

To secure subdomains effectively, organizations should implement regular monitoring and to detect unauthorized or forgotten subdomains that could serve as entry points for attacks. Tools such as DNS Dumpster and Amass enable comprehensive scanning of DNS records to identify exposed subdomains, allowing administrators to maintain an up-to-date inventory. Implementing a centralized subdomain registry, often through internal documentation or automated systems, helps track all active subdomains and prevents oversight during domain migrations or expansions. Secure delegation of subdomains requires validation mechanisms to ensure only authorized entities control them. provides cryptographic signing of DNS records, enabling subdomain validation and preventing spoofing or unauthorized delegation. Administrators should avoid dangling DNS records—those pointing to non-existent services—by conducting timely cleanup audits, which can be automated using scripts that query DNS zones periodically. Configuration best practices focus on isolating subdomains to limit the blast radius of potential breaches. For , specify exact domains like .sub.example.com instead of broad wildcards to prevent cross-subdomain access by malicious scripts. Enforcing across all subdomains via with the includeSubDomains directive ensures encrypted connections and mitigates man-in-the-middle risks. In the , modern cloud-native tools enhance subdomain security through proactive alerting and policy enforcement. Integration with platforms like Azure Sentinel allows for real-time monitoring of subdomain takeovers by analyzing DNS changes against known service fingerprints. Organizations should adopt policies limiting wildcard DNS records to essential cases, preferring explicit A or CNAME records for better control and auditability.

References

  1. [1]
    RFC 1034 - Domain names - concepts and facilities - IETF Datatracker
    This RFC introduces domain style names, their use for Internet mail and host address support, and the protocols and servers used to implement domain name ...
  2. [2]
    RFC 1591 - Domain Name System Structure and Delegation
    This memo provides some information on the structure of the names in the Domain Name System (DNS), specifically the top-level domain names; and on the ...
  3. [3]
    Create subdomain records - DNS - Cloudflare Docs
    May 29, 2025 · Most subdomains serve a specific purpose within the overall context of your website. For example, blog.example.com might be your blog, ...Manage subdomainsDelegate subdomains
  4. [4]
    RFC 1034 - Domain names - concepts and facilities - IETF
    This RFC is an introduction to the Domain Name System (DNS), and omits many details which can be found in a companion RFC, "Domain Names - Implementation and ...
  5. [5]
    RFC 1035: Domain Names - Implementation and Specification - IETF
    The DNS specifications attempt to be as general as possible in the rules for constructing domain names. The idea is that the name of any existing object can be ...
  6. [6]
    RFC 3596: DNS Extensions to Support IP Version 6
    The AAAA resource record type is a record specific to the Internet class that stores a single IPv6 address. The IANA assigned value of the type is 28 (decimal).
  7. [7]
    RFC 4592 - The Role of Wildcards in the Domain Name System
    This is an update to the wildcard definition of RFC 1034. The interaction with wildcards and CNAME is changed, an error condition is removed.
  8. [8]
    [PDF] Development of the Domain Name System* - cs.Princeton
    In the fall of 1985, the two mail gateways to the. DARPA Internet were converted to depend on the. DNS, this meant the entire campus had to adopt do- main ...
  9. [9]
    RFC 882: Domain names: Concepts and facilities
    ### Extracted Sections and Summary
  10. [10]
    RFC 883: Domain names: Implementation specification
    This memo discusses the implementation of domain name servers and resolvers, specifies the format of transactions, and discusses the use of domain names.
  11. [11]
    A Brief History of the DNS and BIND
    The first working domain name server, called “Jeeves,” was written in 1983-84 by Paul Mockapetris for operation on DEC Tops-20 machines located at the ...Missing: origins subdomains
  12. [12]
  13. [13]
    [PDF] SAC067 Overview and History of the IANA Functions - icann cdn
    Aug 15, 2014 · increased growth and commercialization during the 1990s. This trend ... Internet DNS can be modified. Therefore, any requested change ...Missing: subdomain | Show results with:subdomain
  14. [14]
    [PDF] History of IANA - Internet Society
    Jan 6, 2017 · This document presents a timeline of the history of IANA, the Internet Assigned Numbers Authority, from its birth in 1972 to the end of 2016 ...
  15. [15]
    RFC 2606: Reserved Top Level DNS Names
    ### Summary of RFC 2606: Reserved Top Level DNS Names
  16. [16]
    RFC 3490: Internationalizing Domain Names in Applications (IDNA)
    **Summary of RFC 3490: Introduction of IDNA for Non-ASCII Domain Names Including Subdomains**
  17. [17]
    [PDF] Two Days in the Life of the DNS Anycast Root Servers - CAIDA
    We study DNS traffic collected over a two-day period in January 2006 at anycast instances for the C, F and K root nameservers. We analyze how anycast DNS ...Missing: integration resolution
  18. [18]
    History of the New gTLD Program - ICANN
    In January 2012, ICANN launched the New gTLD Program and subsequently received 1,930 gTLD applications. Since the launch of the New gTLD Program, more than ...
  19. [19]
    RFC 8484: DNS Queries over HTTPS (DoH)
    ### Summary of DNS over HTTPS (DoH) in RFC 8484 and Benefits for Subdomain Query Privacy
  20. [20]
    [PDF] NIST SP 800-81r3 initial public draft, Secure Domain Name System ...
    Apr 10, 2025 · This document provides Domain Name System (DNS) deployment guidelines to secure the DNS protocol and infrastructure, mitigate misuse or ...
  21. [21]
    What is a Subdomain? Guide to Setup and Use - Squarespace
    Mar 18, 2025 · A subdomain is a prefix added to a URL to create a new section for your website—an extension of the root domain that forwards to your site ...Common Benefits Of... · Common Uses For A Subdomain · Subdomains Vs...
  22. [22]
    How To Use Vanity URLs and Avoid SEO Self-Cannibalization - Moz
    Feb 18, 2015 · Vanity URLs are a useful, creative way to expand the reach of your brand while retaining the SEO-integrity of your main web domain.
  23. [23]
    How to Build Your Personal Brand Using WordPress - WPBeginner
    Oct 22, 2025 · In this guide, we're going to show you how to build your personal brand by creating a website using WordPress.Step 2: Get a Personal... · Step 3: Create Content for...
  24. [24]
    What is a Subdomain? Beginner's Guide & SEO Setup 2025 - Bluehost
    May 21, 2025 · With a subdomain like 'blog.[example].com', you can keep your articles and updates separate from your main site, while still building your brand ...
  25. [25]
    What Is a Subdomain? A Beginner's Guide - Semrush
    Sep 15, 2023 · A subdomain is an extension of your main domain that helps you organize content and expand your business offerings.
  26. [26]
    Managing Multi-Regional and Multilingual Sites | Documentation
    Multi-regional and multilingual sites can be optimized for Search. Learn more about managing SEO for sites with multiple languages.
  27. [27]
    Localizing Your Website: ccTLDs vs. Subdomains vs. Subdirectories
    Subdomains are a way to organize your website's content for different languages or regions within your main domain. For example, if your website sells shoes ...
  28. [28]
    .uk vs .co.uk Domains: Pros, Cons, and Best Use Cases - Aveshost
    May 7, 2025 · The main difference is that .co.uk is the traditional domain for UK businesses, while .uk is a shorter, newer alternative introduced in 2014.
  29. [29]
    Loss of .EU Domains for UK Businesses Post Brexit - Lexology
    Oct 9, 2020 · Forfeited domains will be held by EURid for one year and then released for general registration by eligible third parties. Any individuals or ...
  30. [30]
    Everything You Need to Know About Email Subdomains - Litmus
    Apr 12, 2024 · Email subdomain best practices · Set up the correct email authentication protocols · Warm up your new subdomains · Link to your root domain within ...
  31. [31]
    What Is a Subdomain? A Complete Guide for Beginners (SEO, Use ...
    Oct 29, 2025 · Common Uses: Subdomains are ideal for staging sites (staging.), support portals (support.), separate business branches (nyc.), and apps (app.).
  32. [32]
    Internationalized Domain Names - ICANN
    ### Summary of Internationalized Domain Names (IDNs)
  33. [33]
    Domain names with special characters (IDNs) - EURid
    Internationalised Domain Names (IDNs) are domain names with characters from any official EU language script, including non-Latin scripts like Greek and ...<|separator|>
  34. [34]
    Subdomain vs. Subdirectory: What They Are & Which Is Better for SEO
    Nov 10, 2023 · The Traditional View on How Subdirectories Affect SEO. Many SEOs believe that subdirectories are more SEO-friendly compared to subdomains.
  35. [35]
    When to Use Subdomains & How They Impact SEO (Infographic)
    Nov 15, 2023 · Use subdomains for international markets, different brand experiences, or mobile-focused sites. There's no set rule, it depends on the case.
  36. [36]
    How much does a domain name cost in 2025 + Can I get one for free
    Sep 1, 2025 · The average domain name cost in 2025 is around $10-20/year. Learn six key factors that affect domain pricing.
  37. [37]
    Domain Name Cost: Pricing Breakdown & Guide (2025) - Shopify
    Aug 27, 2025 · On average, you can expect to pay between $10 and $20 per year to register and own a domain name. However, some domain registrars offer ...Domain name price... · Examples of domain name... · What affects domain pricing?
  38. [38]
    How Much Does a Domain Name Cost in 2025?
    A new, standard .com registration will typically cost $10-$20 per year, but registrars will often provide short-term promotional discounts, sometimes as low as ...
  39. [39]
    Root Domains vs. Subdomains vs. Subfolders - Moz
    Jan 29, 2009 · It's easy to sell off a domain and the business beneath it, but much harder if it's in a subdomain or subfolder.
  40. [40]
    Subdomains vs. Subfolders: Which Is Better for SEO & Why?
    Feb 12, 2021 · The use of a subdomain or a subfolder has SEO, user experience, and other implications. Learn about the pros, cons, and use cases of each ...
  41. [41]
    What's better for SEO: subdomain, subdirectory or a new domain?
    Oct 18, 2024 · If you want to modify the structure of your website, you can go with a straightforward solution like a subdomain or a subdirectory.<|control11|><|separator|>
  42. [42]
    Root Domain vs. Subdomain: Which Is Better for Ecommerce SEO?
    May 15, 2020 · It will actually be easier to serve all your different regions on one ecommerce engine on a subdomain, than it will to attach ecommerce engines ...<|separator|>
  43. [43]
    What are the SEO Impacts of a Subdomain vs Subdirectory?
    Sep 30, 2024 · However, the SEO impact of subdomains may not be as significant as that of subdirectories, as they are considered separate entities. 5. What is ...What's the Difference Between... · Subdomain SEO Impacts
  44. [44]
    Subdomain takeover - Security - MDN Web Docs
    Sep 10, 2025 · Subdomain takeover. A subdomain takeover occurs when an attacker gains control over a subdomain of a target domain.
  45. [45]
    Prevent dangling DNS entries and avoid subdomain takeover
    Apr 16, 2025 · Subdomain takeovers enable malicious actors to redirect traffic intended for an organization's domain to a site performing malicious activity. A ...What is a subdomain takeover? · The risks of subdomain takeover
  46. [46]
    Test for Subdomain Takeover - WSTG - Latest | OWASP Foundation
    If the subdomain takeover is successful, a wide variety of attacks are possible (serving malicious content, phishing, stealing user session cookies, credentials ...Test For Subdomain Takeover · How To Test · Testing Dns A, Cname Record...
  47. [47]
    [PDF] Detecting and Measuring Security Risks of Hosting-Based Dangling ...
    We evaluate the effectiveness of HostingChecker and eventually detect 10,351 subdomains from Tranco Top-1M apex domains vulnerable to domain takeover, which are ...
  48. [48]
    aboul3la/Sublist3r: Fast subdomains enumeration tool for ... - GitHub
    Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains ...Security · Issues · Pull requests 84 · Actions<|separator|>
  49. [49]
    The dangerous art of subdomain enumeration - Outpost24
    May 21, 2025 · One of the most popular open source tools for subdomain enumeration, is called Sublist3r. It aggregates output from many different sources, ...
  50. [50]
    Why Scoping Cookies to Parent Domains is a Bad Idea - Acunetix
    Dec 18, 2018 · Scoping cookies to parent domains allows all subdomains to access them, even if not needed, and can enable attacks like stored XSS, as seen in ...
  51. [51]
    Secure cookie configuration - MDN Web Docs
    Jun 24, 2025 · Unauthorized access to cookies, therefore, can cause a host of problems, including privacy issues, (Cross-site scripting (XSS)) attacks, Cross- ...
  52. [52]
    Polyfill Supply Chain Attack Impacts 100K+ Sites - Arctic Wolf
    Jul 2, 2024 · On June 24, 2024 a security advisory was published detailing how an associated Polyfill domain was being used to insert malicious code in ...
  53. [53]
    Re-Assessing Risk | Subdomain Takeovers As Supply Chain Attacks
    Apr 10, 2025 · A subdomain takeover happens when an attacker gains control of an organization's improperly configured or unused subdomain.
  54. [54]
    Ollama DNS Rebinding Attack (CVE-2024-28224) | NCC Group
    Apr 8, 2024 · 1.29. Ollama users should update to this version, or later. Impact: The Ollama DNS rebinding vulnerability grants attackers full access to the ...
  55. [55]
    Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate ...
    May 20, 2025 · Hazy Hawk hijacked CDC and Deloitte subdomains via DNS flaws, flooding users with scams and malware ... 2024 as being exploited by bad ...Missing: rebinding | Show results with:rebinding<|control11|><|separator|>