WhoisXML API Blog

The host Command Explained

Modern operating systems offer a variety of tools to retrieve DNS records. One of the simplest and most efficient tools for this purpose is the host command, a lightweight utility designed for quick, human-readable DNS queries on Linux and Unix-like systems.

In this guide, we’ll explain how it works, break down its syntax and options, and walk you through some practical examples. Whether you’re troubleshooting DNS issues or performing quick lookups, you’ll learn how to use host effectively — as well as what its limitations are and when you might want to consider alternatives like nslookup, dig, or a DNS Lookup API.

March 2026: Domain Activity Highlights

WhoisXML API analyzed 8.9+ million domains registered between 1 and 31 March 2026 that appeared in Newly Registered Domains to identify the most popular registrars, TLD extensions, and other global domain registration trends. This number rose by 1.7% from 8.7+ million NRDs last month.

We also determined the top TLD extensions used by 2.1+ million domains registered with malicious intent from the First Watch Malicious Domains Data Feed in March 2026. This number decreased by 11.6% from the previous month.

Next, we studied the top TLD extensions of 1.1+ million confirmed malicious domains from the Threat Intelligence Data Feeds this month, which rose by 4.8% from 1.0+ million in February.

Finally, we summed up our findings and provided links to the threat reports produced using DNS and domain intelligence sources during the period.

Asset Discovery, Attribution, and the Shift Toward Exposure and Risk Management in Modern Security Programs

Asset Discovery, Attribution, and the Shift Toward Exposure and Risk Management in Modern Security Programs

A conversation with Jeff Foley, Amass leader and Senior Advisor for External Exposure Research, Internet Abuse Signal Collective

We are pleased to welcome Jeff Foley, creator of OWASP Amass and a long-time contributor to attack surface research, to WhoisXML API’s Internet Abuse Signal Collective (IASC) as a Senior Advisor for External Exposure Research.

In this interview, Jeff shares his perspective on how asset discovery is evolving into exposure management, why attribution is more critical than ever, and how better data and collaboration can augment security programs.

Understand Your Domain’s Name Server Better With Reverse NS API

Understand Your Domain’s Name Server Better With Reverse NS API

Understanding a domain’s infrastructure starts with knowing where it points, and one of the things to check is name servers — the servers that store DNS records and answer queries about domain names, translating them into IP addresses. Name servers are one of the components that make DNS resolution possible, and they are defined by NS records.

Every domain is associated with at least one NS record, and so, NS records could be a valuable source of information when investigating something domain-related. For example, many threat actors tend to use the same DNS setup across their domain-based campaigns. So, in many cases, a group of malicious domains would have the same NS records. Find one such domain, look up its NS record — and it becomes a signal for identifying other domains in the cluster used by the same threat actor.

For identifying such domain clusters that share the same DNS delegation patterns, you’ll need to do a reverse NS lookup. This post explains what it is, how it works, and how to do it.

February 2026: Domain Activity Highlights

WhoisXML API analyzed 8.7+ million domains registered between 1 and 28 February 2026 that appeared in Newly Registered Domains to identify the most popular registrars, TLD extensions, and other global domain registration trends. This number dropped by 0.5% from 8.8+ million NRDs last month.

We also determined the top TLD extensions used by 2.3+ million domains registered with malicious intent from the First Watch Malicious Domains Data Feed in February 2026. This number increased by 5.4% from the previous month.

Finally, we summed up our findings and provided links to the threat reports produced using DNS and domain intelligence sources during the period.

8 Domain Risks and How to Manage Them

What could possibly go wrong when managing a domain? Buy it once, don’t forget to renew later — and that’s it, right? Well, those who do it for a living know that it’s more than just a set-it-and-forget-it task — there are plenty of other domain risks.

Why it matters (and why admins keep waking up at nights wondering whether they did something wrong with domain configurations) is that the price of making a mistake is very high when it comes to domain management. A single mistake can take down your website, affect email deliverability, or damage customer trust. 

This post breaks down some of the biggest risks associated with domains, illustrates them with real-life examples, and provides a remediation/mitigation/prevention plan.

Cybersecurity Attribution: Why Is It Important and How Does Internet Intelligence Help?

Cyber attribution — the process of identifying the person or group behind a cyber attack or other activity — is, perhaps, one of the most interesting tasks in cybersecurity. It feels like detective work. You find clues and use them to identify the murderer, but in the case of cybersecurity, a) it’s not always the gardener, and b) you’re looking for cyber threat actors rather than murderers.

At the same time, cyber attribution is very challenging — those clues are often needles in large haystacks, and attributing something to a specific threat group is often quite difficult and time-consuming. Not to mention that the majority of analysts’ time is usually spent on threat containment. 

And yet, cyber attribution has to be done. 

Try our WhoisXML API for free

Get Started

Have questions?

We are here to listen. For a quick response, please select your request type. By submitting a request, you agree to our Terms of Service and Privacy Policy.