Blog & How To Guides | WhoisXML API



WhoisXML API Blog

Is It Time for an IP Geolocation Registry?

Is It Time for an IP Geolocation Registry?

IP geolocation is the kind of thing people don’t think about—until it goes wrong. In an age of increasingly precise, tailored searches, consumers want relevant results, and when those results appear in the wrong language, or refer to distant resources, everyone loses. Sometimes, the problem is within the search engine itself, but more often this kind of problem arises from inaccurate data regarding the searcher’s location.

Media Partnership: 6 WhoisXML Products at the Service of Journalism

Media Partnership: 6 WhoisXML Products at the Service of Journalism

These days, media specialists are gathering information not just from traditional offline sources but from the deep levels of online resources. In fact, in 2017, 42% of journalist surveyed across various countries stated they were already using digital data in their stories twice or more per week — indicating that this data is getting more and more important.

To support this trend, our media partnership service provides the appropriate tools to collect and deliver information or supplement the search of data for journalists, influencers, bloggers, editors, and other media professionals.

Introducing Whois API, Inc. Affiliate Partner Program - To Help Deliver World Class Cyber-Security!

Introducing Whois API, Inc. Affiliate Partner Program - To Help Deliver World Class Cyber-Security!

We are really excited to launch our Affiliate Partner Program, with the primary goal of providing unhindered domain data & threat Intel to enterprises & government agencies on a requirement based approach. Our new partner program is uniquely designed to provide our partner network with the full advantage of our solid foundation & innovations thereby jointly delivering next-generation threat intelligence solutions. We offer a variety of programs to meet various business objectives of small consulting organizations with strong intelligence backgrounds and subject matter expertise, leading Value-Added-Resellers (VARs), System Integrators, Managed Security Service Providers (MSSP), Managed Detection and Response Services (MDR), Security Orchestration & Automation (SOAR), Threat Intelligence platforms, Information Security Operations Center (SOC), etc.

Using the WhoDat Analytics Tool with WhoisXML API Data

Introduction

In this technical blog we offer some hints and tips to those who want to have an interactive tool for the analysis of WHOIS and IP resolution data. In particular, the MITRE Corporation, a not-for-profit company that operates multiple federally funded research and development centres and provides software for this purpose under the General Public License. It is available on GitHub at https://github.com/MITRECND/WhoDat

Email Verification Reduces Phishing

Email Verification Reduces Phishing

In the mid-90’s, when Tim Berners-Lee created the foundational elements of what would later become the World Wide Web, business and society entered the digital age. One of the many innovations that accompanied this technological transformation was email, which rapidly grew into the primary business communication medium.

Since then, the infiltration of social media and instant messaging apps have been chipping away at the dominance of email, but it still remains a critical component of modern IT architectures. However, due to its ubiquity, email is a common threat vector utilized by cybercriminals for nefarious purposes.

Whois XML API provides infosec professionals with tools to reduce the risk of hackers using email to infect devices and steal user credentials.

Monitoring Newly Registered Domains

Monitoring Newly Registered Domains

The first line of defense for companies that want to protect their staff or customers from bogus websites is monitoring domain names.Hackers will use variations of domain names to lure unsuspecting users onto portals whose purpose is to steal private information and drop viruses onto devices.

Whois XML API offers a Domain Research Suite that provides users with the ability to watch whether new domain names closely resemble existing registrations, which may be intended to trap internet users.

IP Geolocation Finds Hacker Origins of Attack

IP Geolocation Finds Hacker Origins of Attack

Cyber attacks and data breaches make the news on a regular basis. However, with over 50% of U.S. businesses experiencing some form of cyberattack in 2017 alone, the scale of the problem is much larger than the fraction reported by the media. Organizations of all sizes and in every industry are under constant attack, but who is behind these cyber assaults and where are the perpetrators located?

It is essential to understand the origin of a cyber attack and to find who is responsible for it. Not only can this evidence help bring cybercriminals to justice, but it also assists defenders with the information they need to prevent similar incidents from reoccurring.

WHOIS History Lookup: 6 Illustrative Use Cases

WHOIS History Lookup: 6 Illustrative Use Cases

Today's lesson is about history.

Specifically, about WHOIS History Lookup and WHOIS History API.

Both are tools for tracking historical WHOIS records of domain names to find out how their ownership has changed over time. We've been doing it for more than 10 years and have compiled more than 300 million active domain names, 1 billion history domain names, and 5 billion historical WHOIS records in our database.

Everything is available to our users.

Try our WhoisXML API for free
Get started