SecurityTrails
Overview
The SecurityTrails integration connects the Praetorian Guard Platform (PGP) with SecurityTrails to enrich your attack surface with historical DNS data, WHOIS records, and comprehensive subdomain information. SecurityTrails maintains one of the largest databases of historical internet records, and this integration brings that intelligence directly into PGP for continuous asset discovery and attack surface mapping.
Organizations often have forgotten subdomains, legacy DNS records, and historical infrastructure that remains exposed to attackers. By importing SecurityTrails data, PGP can identify these hidden assets and incorporate them into your attack surface model. This includes subdomains that may not be discoverable through active scanning, historical IP resolutions that reveal infrastructure relationships, and WHOIS data that helps attribute assets to your organization.
This integration uses the SecurityTrails API in a read-only capacity. PGP queries SecurityTrails for domain and IP intelligence and does not modify any data in your SecurityTrails account.
What the Integration Does
The SecurityTrails integration queries the SecurityTrails API to retrieve subdomain enumerations, historical DNS records, and WHOIS information for domains in your attack surface. For each seed domain configured in PGP, the integration discovers associated subdomains, resolves their current and historical DNS records, and imports the results as assets and seeds into PGP.
The integration processes DNS record types including A, AAAA, MX, NS, SOA, TXT, and CNAME records. Historical data is used to identify infrastructure that was previously associated with your domains, which may still be active or exploitable. WHOIS records provide ownership and registration details that help PGP attribute discovered assets to your organization.
All operations are strictly read-only. PGP does not modify, create, or delete any data in your SecurityTrails account.
Prerequisites
Before setting up the SecurityTrails integration, ensure you have:
A SecurityTrails account with API access enabled
A SecurityTrails API key with sufficient query quota for your domain count
Seed domains already configured in PGP that you want to enrich with SecurityTrails data
Creating an API Key
Sign in to the [SecurityTrails Portal](https://securitytrails.com/).
Navigate to your account settings or the API section.
Copy your existing API key or generate a new one.
Ensure your plan includes sufficient monthly API query credits for the number of domains you plan to monitor.
Setup
In PGP, navigate to the Integrations page.
Select SecurityTrails from the list of available integrations.
Enter your SecurityTrails API key in the configuration form.
Save the integration. PGP will validate connectivity to the SecurityTrails API automatically.
Field Reference
What Data Is Synced
Subdomains (Seeds)
The integration discovers subdomains associated with your seed domains and imports them as new seeds into PGP for further scanning and analysis.
DNS Records (Assets)
Historical and current DNS records are imported to map your domain infrastructure.
WHOIS Data
Domain registration information is imported to help attribute assets to your organization.
API Endpoints Used
The integration uses pagination where supported and respects SecurityTrails API rate limits. All requests are authenticated using the API key passed in the apikey header.
Required API Permissions
Troubleshooting
Security and Data Handling
The SecurityTrails integration operates in a strictly read-only mode. It queries the SecurityTrails API to retrieve domain intelligence data and does not modify any account settings or data within SecurityTrails.
Credentials are handled securely within PGP. The SecurityTrails API key is encrypted at rest and used exclusively for authenticating API requests during sync operations. The key is not exposed in logs or transmitted to any third party.
PGP imports only domain metadata, DNS records, and WHOIS registration information. No authentication credentials, private zone data, or account-level information from SecurityTrails is accessed or stored.