How Access Now Strengthened Digital Rights Protection with WHOIS API
Access Now cuts phishing investigation time by 60% on its Digital Security Helpline using WhoisXML API's WHOIS API and MCP Server via Gemini CLI.
Read postToday’s cyber threats move faster, hide deeper, and hit harder. Registrars and hosting providers are flooded with abuse reports, while SOCs and security vendors hold fragmented yet invaluable insights into APT actors and malware families. The absence of a complete view often leaves ample room for attackers to operate unseen until the damage is done.
The IASC is here to fight back, and this isn’t just data sharing; it’s a fortress of intelligence, pooling insights from the sharpest minds across the internet ecosystem. Law enforcement, U.S. military, intelligence agencies, and top cybersecurity players join forces here, creating a single, relentless stream of visibility. We’re exposing threat actors, tracking malware victims, and uncovering the attack patterns others miss.
Q4 2025 Update – Network visibility up 40% after onboarding new top-tier upstream peers.
Access Now cuts phishing investigation time by 60% on its Digital Security Helpline using WhoisXML API's WHOIS API and MCP Server via Gemini CLI.
Read postAlex Ronquillo and Ed Gibbs joined hundreds of detection engineering experts at DEATHCon 2025. Here’s a recap of the event’s major themes.
Read postWhoisXML API’s Ed Gibbs participated in the FIRST’s Mexico City Technical Colloquium and spoke about modern threat hunting using DNS and NetFlow telemetry.
Read postLearn how the National Child Protection Task Force (NCPTF) found 25 missing children in a multi-organizational operation that included WhoisXML API.
Read postLearn how WhoisXML API helped a Darksight Analytics investigator analyze a network of invoice factories involved in a fraud scheme.
Read postWhoisXML API attended ICANN82 to engage in key cross-community talks and gain insights from the event's major sessions and leaders.
Read postWhoisXML API shows how leveraging a satellite view of the global DNS can help identify, expand, and contextualize potential counterfeit domains. Read the report now.
Read postIn this webinar, WhoisXML API and Maltego experts will take a deeper look into these websites and connections between them using the capabilities of Maltego and historical WHOIS data from WhoisXML API.
Read postThe research aimed to detect malicious IP addresses in IP blocks associated with VPN usage. The findings could serve as a warning to both cloud users and service providers.
Read postWe’re building an elite cybersecurity force, uniting experts in threat intelligence, global internet registries, ISPs, DNS resolvers and more. Join a trusted network focused on relentless defense.
You want power and speed. Here’s both. Join the DNS visibility network trusted by 60+ Cyber 150 IT-Harvest companies and over 80% of Gartner’s top cybersecurity leaders. Gain insights into attack patterns, tactics, and hidden networks.
Stop working in the dark. Access the full global threat landscape with real-time intelligence you can’t find in your own logs. Every attack pattern and vulnerability is laid out. Don’t just react—anticipate. Outmaneuver threats before they strike.
End repeat-offenders and bad actors who are notorious for abusing other ISPs and registrars services. Gain visibility into suspicious domains and abusers across the internet. Join us, and safeguard the internet ecosystem.
The program welcomes contributions in many different forms, some crowd favorites of high-impact are below:
Domain names
Domain history
Brands
Registrants
Corporate firmographic data
Email addresses
IP addresses
DNS History
Domain, IP, URL IoCs
DNS & NetFlow traffic flows
Credential harvesting page paths
Malvertising & spam websites
Malware infrastructure
Command & control attack infrastructure
Phishing attack infrastructure















