Law Enforcement Solutions

Law enforcement and government agencies often use domain WHOIS data to verify and check on domains or IP addresses. These WHOIS records provide a lot of handy information such as the registrant name, country of registration, contact specifics, created date, etc., that can come in handy during investigations.

Have questions?

Contact us at

Get started
5 billion+
WHOIS records
300 million+
Domain names tracked
TLDs & ccTLDs
99.5 %
IP addresses in use covered

Customizable solution components

Enterprise API Package

Cyber security professionals can obtain domain WHOIS data via API access. Designed especially for business, Enterprise API Package is a balanced solution that offers truly comprehensive and relevant data that covers all the major tasks when it comes to enhancing your cyber security.

Domain Research Suite

You can greatly enhance your domain research toolkit with our enterprise-grade web-based solution that will be invaluable in searching and monitoring domain-related data. You can also integrate our monitoring and search facilities into your applications and immediately access one of the largest databases of WHOIS IPA data.

Threat Intelligence Platform

We provide a handy tool and APIs for a breakdown of hosts and their infrastructure. The platform obtains data from various providers and our own substantial internal databases (put together for over 10 years) analyzes host configurations in real time and offers an in-depth perspective of the target host. It is a building block in your toolkit for threat detection.

You can select all of the mentioned components or pick those you specifically need. For pricing and details contact us.

Practical usage

  • Collect appropriate information to support communication with courts, administrative agencies and government authorities and agencies.
  • Collect information for order preparation to quickly seize or take down domains. [1]
  • Collect information to prepare prosecutions in support of the Fraudulent Online Identity Sanctions Act. [2]
  • Use domain owner information to quickly locate and communicate with site owners and their service providers via email, phone and fax.
  • Discover and connect all fraudulent sites operated by offenders and discover new possible threats and illegal activity – phishing groups often use a single or small set of unique names, addresses, phone numbers, or contact email addresses to control their portfolio of fraudulent domains.
  • Investigate leads to credit card data used to pay for fraudulent website domain registrations.
  • Recognize “drop accounts” - email accounts that phishers use to collect stolen credentials and personal information of their victims.

Customer success stories

Dark Crawler, a Useful Tool to Assess Child Exploitation from Online Communities

Child sexual offenders have always been quick to adapt technological advances, such as photography and film for the purposes of exploiting children. The move of child exploitation material (CEM) to the Internet has enabled them to form online communities which allow easier access to CEM, recruiting co offenders and business partners, as well as validating their deviant behavior amongst other offenders.

Despite the established harm inherent within child exploitation imagery and distribution online, current attempts to limit such content have been largely unsuccessful.

Dark Crawler is a tool used by search-engines to automatically navigate the Internet and collect information about each website and webpage which can be used to seek out specific content, such as child exploitation material ...

Read full story

Trusted by
the smartest

For pricing details and building your customized solution,
please contact us!

Have questions?
We will get back to you within a day.


Contact us