I scraped every domain name I could find: Certificate Transparency logs, ICANN zone files, passive DNS, web crawls, and more. The result is probably the biggest domain list that exists. Free, no strings attached.
Where it comes from
I pulled from every public source I could find. Here's what went into it.
Full replay of all public CT logs: Google Argon & Xenon, Cloudflare Nimbus, DigiCert Yeti & Nessie, Let's Encrypt Oak, and more. Every SSL/TLS certificate ever issued reveals its domains.
~1.2B domainsComplete zone data for all ICANN-delegated gTLDs via the Centralized Zone Data Service, plus all ccTLD zone files accessible through bilateral agreements and public mirrors.
~400M domainsAggregated from passive DNS sensors worldwide. Every query response ever observed, deduplicated and normalized into a comprehensive domain graph with historical depth.
~600M domainsPetabytes of web crawl data from the Common Crawl corpus processed to extract every unique hostname observed across billions of indexed web pages spanning over a decade.
~300M domainsFull IPv4 space PTR record enumeration combined with targeted IPv6 scanning, recovering domains attached to network infrastructure that appear nowhere else.
~150M domainsBulk WHOIS and RDAP snapshots from registrar feeds, third-party aggregators, and historical dumps going back to the early 2000s, including expired and deleted domains.
~200M domainsHow it works
Fully automated pipeline running 24/7, ingesting, normalizing, and deduplicating across all sources.
Continuous real-time ingestion of CT log streams, zone file deltas, and passive DNS feeds via purpose-built high-throughput collectors.
Every domain is punycode-decoded, lowercased, and canonicalized. Wildcard and internal entries are filtered out automatically.
Probabilistic and exact deduplication using Bloom filters and LSM-tree storage eliminates duplicates across billions of records in real time.
Plain text, one domain per line, gzip-compressed. No sign-up, no API key, no rate limit. Download it, use it however you want.
Download alldomains.txt.gzUse cases
Map newly registered domains, detect phishing infrastructure, and track threat actor domain patterns across the entire internet's namespace.
Enumerate every domain belonging to an organization — including subsidiaries, acquired assets, and forgotten infrastructure — instantly.
Detect typosquatting, brand abuse, and look-alike domains at internet scale the moment they are issued a certificate or registered.
Study the entire domain namespace — TLD distribution, certificate issuance trends, DNS infrastructure patterns, and global routing changes.
Cross-reference domains against email addresses, ASNs, IP ranges, and TLS fingerprints to build comprehensive infrastructure graphs.
The most complete snapshot of the internet's domain namespace ever assembled — ideal for longitudinal internet measurement studies.