Attack Surface Intelligence | WhoisXML API

Attack Surface Intelligence

Achieve new levels of visibility into attack surfaces with real-time and historical coverage of Internet events.

Have questions?

Contact us at

Attack Surface Intelligence
4.2 Billion+Domains and subdomains
14.3 Billion+WHOIS records
4 Billion+DNS records
11+Years of data crawling

How Do You Scope Attack Surfaces with a Satellite View of the Internet?

BUSINESS PROBLEM

Threat actors weaponize and exploit almost everything they can get their hands on, from hostnames, subdomains, and open ports to countless other resources. They can turn endpoints into entry points, endlessly giving birth to attack vectors and continuously expanding attack surfaces. One way to keep up is to increase attack surface visibility. But the Internet has many blind spots that can obstruct your view of connectivity-reliant IT ecosystems. To ensure that there are no costly oversights, you need all the transparency you can get to create, monitor, and prioritize an expanding inventory of every possible attack vector.




DATA-DRIVEN SOLUTION

Extensive and continuous attack surface visibility requires an unbridled view of the DNS for complete Internet asset discovery and enumeration. You need to take your blinders off and get Internet-wide visibility for accurate asset vulnerability and configuration assessment. WHOIS, domain, IP, and other Internet intelligence sources are critical additions to your existing and evolving attack surface intelligence, helping you—and everyone relying on you—keep up with your ever-growing attack surface.

How Do You Scope Attack Surfaces with a Satellite View of the Internet?

Our Enterprise Value Proposition

Scalable data access. Flexible licensing models. Better coverage and higher total value delivered. Those are just a few differentiators of our enterprise data solutions and packages tailored to your business priorities.

  • Diamond: Includes all products listed below with Premium SLA
  • Gold: Pick 2 of each Tier, includes Gold SLA
  • Silver: Pick 1 of each Tier, includes Silver SLA
  • Starter: Pick 1 Tier-1 product, 1 Tier-2 product
Tier Product Frequency/updates
P Real-time & Historic Whois Streaming Real-time Stream, Daily & Quarterly Feed, Real-time API Lookups
P Real-time & Historic Passive DNS Coverage Daily + Weekly Feed, Real-time API Lookups
P Enterprise APIs & Threat Intelligence APIs Enterprise APIs T5 & Threat Intelligence APIs (1M CPM)
1 Real-time Whois Data Coverage Daily & Quarterly Feed, Real-time API
1 Real-time DNS Coverage Weekly Feeds, Real-time API
1 IP Geolocation & Netblocks Data Coverage Daily Feeds
1 Website Contacts & Categorization Feed Daily Feed
2 Subdomains Database Feed Daily Feed
2 IP Netblocks (IPv4 + IPv6) Daily Feed
2 IP Geolocation Database Daily Feed
2 Typosquatting Data Feed (Enriched) Daily Feed
2 Disposable Email Domains Feed Daily Feed
2 MAC Address Vendor Database Daily Feed

Check Out Our Intelligence

See what complete domain and DNS intelligence looks like in practice.

Download Data Sample

Request Enterprise Demo

Talk to us. We’re eager to listen and find innovative ways to contribute to your success.

Contact Us

Gain a Satellite View of the World’s DNS Today

The WhoisXML API data engine is built and frequently upgraded to offer you the most complete, updated, and unique Internet intelligence footprints since 2010. Don’t get lost in all the red tape and unforeseen technical complexities of finding your own domain and DNS data. Our technology is ready to give back months or years of development cycle time to your most pressing and mission-critical projects and deployments.

Practical usage

Our Internet intelligence footprints have supported multiple processes related to attack surface management (ASM), such as:

Digital Asset Discovery

Digital assets accumulate unprecedentedly, as new SaaS services and cloud infrastructure get deployed, following business expansions, acquisitions, and new partnerships. Use DNS, WHOIS, and other Internet data sources to boost your capabilities to identify all connected digital assets.

Dangerous Asset Detection

Dangerous assets can take on many forms, including but not limited to dangling DNS records, subdomains added by threat actors, and typo variants of your domains and subdomains. DNS intelligence can help with the detection and attribution of these assets.

Digital Asset Scoring

Security teams need an objective method to prioritize vulnerabilities, risks, and threats. Use DNS, WHOIS, and other Internet data sources to assign quantitative scores to digital assets, making it possible to rank them for remediation prioritization.

Remediation Prioritization

Among the marks of effective ASM is proper and efficient allocation of IT resources. DNS intelligence sources are valuable additions to help assess risks and vulnerabilities so security teams know which ones to prioritize in remediation activities.

Third-Party Inventory and Observation

Extensive ASM pays attention to third-party services since threat actors can exploit third party-allocated assets and connections. Utilize DNS, domain, and IP intelligence to discover and track third-party services, and perform security analyses on resources relevant to them.

Real-Time Monitoring

ASM is a never-ending process that requires continuous detection and monitoring of digital assets. Observe critical business assets round-the-clock for vulnerabilities, misconfigurations, and risk exposure by monitoring the DNS and various security data feeds for asset additions, changes, and other activities.

What Our Clients Say

"WhoisXML API is giving us access to DNS and WHOIS coverage that has proven to be unique to our environment. My team used the data to bolster asset discovery reach and enhance the precision of our attributions and vulnerability detection analyses."

CTO
ASM Solutions Provider

"We’re constantly comparing the data. With subdomains, you guys again have more, better data. The one other company we were using for subdomains has fewer observations and they do not include dates. Also, your WHOIS history has more, and more accurate data. Your data is pound for pound a much better value. By far."

Thomas Derenthal, Penetration Tester & Founder
CyberIQ

For pricing details and building your customized solution, please contact us!