Blog & How To Guides | WhoisXML API

WhoisXML API Blog

APTLD Hosts WhoisXML API for an Exclusive Cybersecurity Webinar

APTLD Hosts WhoisXML API for an Exclusive Cybersecurity Webinar

In line with WhoisXML API’s goal to help make the Internet a safer and more secure environment, we launched the Data Contribution and Exchange Program. As part of this program, we partner with Internet registries and registrars in various ways, notably to facilitate and expedite critical cyber threat data collection and distribution.

To prevent abuse on the Internet and attain our ultimate goal, we raise awareness about cybercrime trends, threat detection techniques, and threat hunting best practices.

Thus, it was not by coincidence that APTLD invited the WhoisXML API team to share their expertise on cybersecurity with the APTLD community at an exclusive cybersecurity webinar held on 9 June 2021.

Download WhoisXML API daily data ASAP part 2: An application with trending English words in .com

In the first part of this blog, we demonstrated how to download data from WhoisXML API's daily data feeds right after their publication by using the recently introduced RSS feed as the activator of download. In particular, we showed how to download the list of domains newly registered in the .com top-level domain (TLD). 

Now, to make the task a bit more interesting we demonstrate the use of our domain list with a showcase application: we calculate the list of the most frequent English words in the domain names on that day. This can be interesting in various applications. Domainers, for instance, can get information on the newest trends in domain registrations. Journalists and researchers can get a clue on a topic gaining popularity, etc.

Download WhoisXML API daily data ASAP part 1: RSS-activated download

This technical blog aims to demonstrate how to download data from WhoisXML API's daily data feeds right after their publication. Obtaining lists of newly registered domains and their WHOIS data can be critical in many applications. (We will showcase such an application in the second part of this blog.) Recently an RSS feed has been introduced for the service that informs about data publication immediately, which makes this easy. As a demonstration, we shall go through a particular task: download the list of domains newly registered in the .com top-level domain (TLD). 

We will use a Linux system and its understanding requires intermediate programming and command-line skills. We will use BASH but it is also easy to modify for zsh, which is the default on Mac OS X. We assume Python, with pip and virtualenv.  

IP Address Research: 5 Ways to Do It Explained

IP Address Research: 5 Ways to Do It Explained

Personalization is the way to go when it comes to targeted marketing and advertising. Customers, existing and potential alike, want to feel that the brands they support care about their needs and try to predict what they might want. That’s what makes IP address research critical for digital marketers and advertisers. 

But they aren’t the only ones who can benefit from IP geolocation data, cybersecurity pros, fraud protection agents, and market researchers do, too. Every computer or mobile device, after all, has a designated IP address that helps today’s companies and individuals pinpoint where their strongest markets are, identify where threats likely come from, detect potentially fraudulent transactions, and predict consumption patterns and trends.

Blockchain Domains: What Are They? How Do They Work?

Blockchain Domains: What Are They? How Do They Work?

If you’ve heard the news about the Disaster Girl meme going for $500,000 as a nonfungible token (NFT), then you know that the blockchain is becoming increasingly more common in people’s lives. The technology is felt in finance, music, and insurance, among many other sectors. 

Blockchain applications also go beyond cryptocurrency and NFTs, and are now starting to penetrate the domain name industry in the form of blockchain domains. This post explores some of the details about blockchain domains, including what they are, how they differ from regular domains, and what they can do.

What SIEM Data Sources Should You Integrate into Your Platform?

What SIEM Data Sources Should You Integrate into Your Platform?

In a perfect world, there would not be any need to mull over what data sources to integrate into an organization’s security information and event management (SIEM) solution. All kinds of data that can be used and abused by threat actors should be added. After all, attacks can hide behind seemingly innocuous logs.

But in reality, each data source comes at an additional cost since most SIEM solution providers typically charge per gigabyte. Thus, organizations have to strike a balance between budget constraints and security. However, one should not necessarily suffer for the sake of the other. But that requires careful strategizing in terms of what data sources to integrate into SIEM solutions.

This post takes a deep dive into SIEM data sources to help organizations understand the following:

  • What SIEM data sources are
  • Factors to consider when choosing SIEM data sources to feed to solutions
  • Potential data sources to integrate into SIEM solutions

Typosquatting Feed data for a DNS firewall

There is a tremendous number of domain names registered daily which resemble legitimate domains of brands or organizations, or whose names imply being related to a known service or product. Domains suggesting to be a “support” or “account-verification” or “support page” are also common for containing such strings. Initially, many of these are parked and some become used in malicious activities such as being sold at an inflated price to the legitimate owner, being used as botnet Command & Control servers, or in phishing campaigns to host fake pages to have the victim's sensitive data typed in and sent to the miscreants. 

Subdomain Finder Tools and Data Sources: Top 4 Cybersecurity Applications

Subdomain Finder Tools and Data Sources: Top 4 Cybersecurity Applications

Subdomains are useful as they help domain owners organize their websites. They identify specific pages on a company’s site, guiding customers and internal and external users to where they will find the information they need or product they wish to buy.

But while using subdomains indeed has advantages, it has disadvantages as well. Cybercriminals can use them for malicious campaigns that rely on subdomain takeovers, among other cyberattacks. Threat actors can also create subdomains and hide them under what seems to be totally legitimate domains to evade detection.

Subdomain-related threats are addressable, at least to some extent, with the help of a subdomain finder that enumerates the subdomains of a particular domain. This post explains how to go about it.

Try our WhoisXML API for free
Get started