Passive DNS Database
Achieve complete visibility of the DNS. Get access to the largest DNS database with the most unique coverage.
DownloadProvide current and historical ownership information on domains / IPs. Identify all connections between domains, registrants, registrars, and DNS servers.
Look into all current and historical DNS / IP connections between domains and A, MX, NS, and other records. Monitor suspicious changes to DNS records.
Get detailed context on an IP address, including its user’s geolocation, time zone, connected domains, connection type, IP range, ASN, and other network ownership details.
Access our web-based solution to dig into and monitor all domain events of interest.
Get access to a web-based enterprise-grade solution to search and monitor domain registrations and ownership details for branded terms, fuzzy matches, registrants of interest, and more.
Detect and block access to and from dangerous domain names before malicious actors can weaponize them. Contact us today for more information.
Unlock integrated intelligence on Internet properties and their ownership, infrastructure, and other attributes.
Our complete set of domain, IP, and DNS intelligence available via API calls as an annual subscription with predictable pricing.
Offers complete access to WHOIS, IP, DNS, and subdomain data for product enrichment, threat hunting and more.
Multi-Level API User Administration Now Available - Manage individual API keys for team members in your organization.
Learn MoreMake your threat intelligence more comprehensive and relevant with a complete view of the DNS.
You can also download a data sample for a complete highlight of our intelligence.
Cyber threat intelligence lies behind most cybersecurity strategies, platforms, or operation centers. Yet the scale and scope of today’s ever-dynamic and geographically dispersed threat landscape means organizations cannot settle for partially informed or run-of-the-mill threat intelligence. Accounting for every bit of information, including countless real-time and historical Internet events, matters to proactively notice, monitor, and protect networks from threat actors.
Cyber threat intelligence can only be as good as the raw data used in its development. Historical coverage of DNS, WHOIS, and other Internet records facilitates malicious infrastructure investigation and disruption by exposing otherwise hidden connections. These critical Internet events significantly contribute to every stage of the threat intelligence development cycle—enabling early threat detection, real-time threat analysis, broader threat expansion, and timely threat disruption.
Our enterprise packages offer scalable data access, flexible licensing models, and better coverage and higher total value delivered. Contact us for information on our packages and the contained premium, tier 1, and tier 2 products.
Premium |
|
Tier 1 |
|
Tier 2 |
See what complete domain and DNS intelligence looks like in practice.
Download Data SampleTalk to us. We’re eager to listen and find innovative ways to contribute to your success.
Contact UsThe WhoisXML API data engine is built and frequently upgraded to offer you the most complete, updated, and unique Internet intelligence footprints since 2010. Don’t get lost in all the red tape and unforeseen technical complexities of finding your own domain and DNS data. Our technology is ready to give back months or years of development cycle time to your most pressing and mission-critical projects and deployments.
Our Internet intelligence sources enriched the various processes required in the development of cyber threat intelligence, including:
Detect suspicious domains, subdomains, nameservers, IP addresses, and other Internet-related records as soon as they get added, updated, or dropped, including cyber properties that seem to imitate legitimate brands and those that currently or historically share the same infrastructure as known threats.
Gather accurate geolocation, ownership, administration, DNS infrastructure details, and other Internet intelligence raw materials needed to deepen threat contextualization and bring you one step closer to fully understanding and pinning down threat actors.
Analyze tactics, techniques, and procedures (TTPs) in real-time by observing and detecting old and new patterns in domain registration events, nameserver assignments, registrar affiliation, top-level domains (TLDs), IP geolocation, and other data that can be associated with threat actors.
Anticipate the badness of a domain, subdomain, or IP address before they are weaponized by following breadcrumbs left behind by the adversaries’ inevitable reuse of digital assets, such as nameservers, registrars, IP ranges, Secure Sockets Layer (SSL) certificates, and suspicious domain types.
Track down malicious properties to their respective owners, registrars, registries, and Internet service providers (ISPs) to intercept threat actors. Expose their domain, DNS, and IP connections to take steps toward disrupting malevolent infrastructure.
Pinpoint domains, subdomains, and IP addresses that currently share the same details or infrastructure as those used in confirmed threats or have recently or historically done so to support threat prevention efforts, from preemptive blocking to fueling security heuristics analysis and threat prevention models.
Achieve complete visibility of the DNS. Get access to the largest DNS database with the most unique coverage.
DownloadAccess up-to-date lists of newly registered, recently expired, and just expired domains for analysis, monitoring, and research.
DownloadWe are here to listen. For a quick response, please select your request type. By submitting a request, you agree to our Terms of Service and Privacy Policy.