Carter, a professional hacker, was tasked with fetching valuable information from the rival organization. For this purpose, Carter started enumerating the target network to identify existing vulnerabilities. He executed an nmap command to retrieve all the subdomains associated with the target network. Identify the command executed by Carter in the above scenario.