We are really excited to launch our Affiliate Partner Program, with the primary goal of providing unhindered domain data & threat Intel to enterprises & government agencies on a requirement based approach. Our new partner program is uniquely designed to provide our partner network with the full advantage of our solid foundation & innovations thereby jointly delivering next-generation threat intelligence solutions. We offer a variety of programs to meet various business objectives of small consulting organizations with strong intelligence backgrounds and subject matter expertise, leading Value-Added-Resellers (VARs), System Integrators, Managed Security Service Providers (MSSP), Managed Detection and Response Services (MDR), Security Orchestration & Automation (SOAR), Threat Intelligence platforms, Information Security Operations Center (SOC), etc.Continue reading
In this technical blog we offer some hints and tips to those who want to have an interactive tool for the analysis of WHOIS and IP resolution data. In particular, the MITRE Corporation, a not-for-profit company that operates multiple federally funded research and development centres and provides software for this purpose under the General Public License. It is available on GitHub at https://github.com/MITRECND/WhoDatContinue reading
In the mid-90’s, when Tim Berners-Lee created the foundational elements of what would later become the World Wide Web, business and society entered the digital age. One of the many innovations that accompanied this technological transformation was email, which rapidly grew into the primary business communication medium.
Since then, the infiltration of social media and instant messaging apps have been chipping away at the dominance of email, but it still remains a critical component of modern IT architectures. However, due to its ubiquity, email is a common threat vector utilized by cybercriminals for nefarious purposes.
Whois XML API provides infosec professionals with tools to reduce the risk of hackers using email to infect devices and steal user credentials.Continue reading
The first line of defense for companies that want to protect their staff or customers from bogus websites is monitoring domain names.Hackers will use variations of domain names to lure unsuspecting users onto portals whose purpose is to steal private information and drop viruses onto devices.
Whois XML API offers a Domain Research Suite that provides users with the ability to watch whether new domain names closely resemble existing registrations, which may be intended to trap internet users.Continue reading
Cyber attacks and data breaches make the news on a regular basis. However, with over 50% of U.S. businesses experiencing some form of cyberattack in 2017 alone, the scale of the problem is much larger than the fraction reported by the media. Organizations of all sizes and in every industry are under constant attack, but who is behind these cyber assaults and where are the perpetrators located?
It is essential to understand the origin of a cyber attack and to find who is responsible for it. Not only can this evidence help bring cybercriminals to justice, but it also assists defenders with the information they need to prevent similar incidents from reoccurring.Continue reading
Today's lesson is about history.
Both are tools for tracking historical WHOIS records of domain names to find out how their ownership has changed over time. We've been doing it for more than 10 years and have compiled more than 300 million active domain names, 1 billion history domain names, and 5 billion historical WHOIS records in our database.
Everything is available to our users.Continue reading
Government agencies, large-scale enterprises, SMBs & many other businesses investigating cyber crime, detecting & accessing threats, tracking down malicious entities or monitoring a bad actor’s infrastructure to predict a future attack, need various kinds of Internet data sets to help them in characterizing & connecting domains. Also, with the rise in security breaches, professionals are no longer looking for just raw data, but Intel, to take timely action against the surfacing bad actors. Whois API, Inc. has been working with many such senior security professionals since the past decade and creating suitable data products & solutions which can act as building blocks in their toolkit for domain research & investigation. With the plethora of solutions we offer, data planning can sometimes become a task in itself & to that effect, we are now providing our users with Enterprise Packages. These are designed specifically keeping such large-scale agencies in mind, to help provide predictability to their data planning, along with, a comprehensive investigation pathway. Our latest Enterprise level solution, Enterprise Tools Package, provides our users with accessible domain Intel, in an easier & visual format.Continue reading
The last twenty years have seen the rise of two business developments among others: consumer product development cycle times have decreased and the number of new products companies bring to market in a year have increased. A “flatter” world has also increased global competition in marketplaces that regional players had historically dominated.
Keeping up with the competition is no longer an option. Industry analysts and marketing professionals now need every tool that technology has to offer to stay ahead of the pack. One of the richest resources for anticipating when and what brands will be rolling out is the Whatis database.Continue reading