Provide current and historical ownership information on domains / IPs. Identify all connections between domains, registrants, registrars, and DNS servers.
Look into all current and historical DNS / IP connections between domains and A, MX, NS, and other records. Monitor suspicious changes to DNS records.
Get detailed context on an IP address, including its user’s geolocation, time zone, connected domains, connection type, IP range, ASN, and other network ownership details.
Access our web-based solution to dig into and monitor all domain events of interest.
Get access to a web-based enterprise-grade solution to search and monitor domain registrations and ownership details for branded terms, fuzzy matches, registrants of interest, and more.
Our complete set of domain, IP, and DNS intelligence available via API calls as an annual subscription with predictable pricing.
Downloadable domain, IP, and DNS datasets for efficient and unrestricted access to all of our intelligence sources within your network perimeter.
Access to our domain and threat intelligence tools in combo with package discounts for enterprise and government customers.
Packages designed to augment commercial and in-house security platforms, support managed security services, and facilitate investigations.
Carry a complete threat intelligence analysis for a given domain or IP address and get access to a report covering 120+ parameters including IP resolutions, website analysis, SSL vulnerabilities, malware detection, domain ownership, mail servers, name servers, and more.
Gather threat intelligence via API calls covering Domain’s Infrastructure analysis, SSL Certificates Chain, SSL Configuration Analysis, Domain Malware Check, Connected Domains, and Domain Reputation Scoring.
Bolster enterprise security with our feeds covering Typosquatting domains, Disposable domains, Phishing URLs, Domain & IP reputation, Malicious URLs, Botnet C&C, and DDoS URLs.
MSSPs can readily ensure their clients’ cyber safety with the right solutions. Our APIs, tools, and data feed packages help them proactively thwart external attacks against clients’ networks, expose vulnerabilities from within, and significantly reduce the margin of error for incident identification and remediation.
We empower MSSPs by providing them with access to near-real-time datasets; email, IP geolocation, domain research and monitoring tools; and threat intelligence feeds so they can offer round-the-clock protection. Users can manage safety audits, deploy customized updates, and monitor IT compliance with our enterprise packages.
Contact us at
A suite of WHOIS, Domain, and IP intelligence packages designed to meet the needs of the most advanced cybersecurity users — in-house security departments, managed security service providers, and cyber forensics investigators and threat hunters.
A set of tools and platforms that's useful for domain research & monitoring, threat investigation, threat intelligence and general cyber-security research.
A comprehensive set of APIs for domain, WHOIS, DNS and IP research & monitoring, plus threat investigation, threat defense and SIEM (security information & event management) data enrichment.
A comprehensive set of data feeds that contain both real-time and historic domains, WHOIS, DNS, IP and cyber threat intelligence datasets that are useful for efficient big data infosec analytics, forensic analysis, SIEM (security information & event management) data enrichment. Ideal when enterprise or government security policies prohibit the use of API calls outside the internal network.
Entrepreneurship is the central process through which economic growth and performance is fostered in a regional economy. Its evaluation is thus of paramount importance for policymakers and economists. However, the quantification of entrepreneurship, that is, introduction of measures to describe the attempts to start growth-oriented business, the likelihood of their success, the ability to raise venture capital, etc. is a challenging task due to the lack of globally available and accurate input data on e.g. business registration.
In a recent working paper a new approach is proposed to overcome this issue by using WHOIS registration data. The approach is applied to companies in Oxford and Cambridge, UK as a demonstration, by using data purchased from WhoisXML API.
One of the cornerstones of cybersecurity is threat intelligence sharing. Maintenance of our IT systems' security and their protection against malicious activity require up-to-date knowledge of the entire field. There are significant efforts to assist experts in this activity, including those of market leaders such as IBM X-Force Exchange.
Due to the decentralized architecture of the Internet, however, the collaboration of the actors as well as voluntary campaigns in order to detect vulnerabilities are also of utmost importance. If, however, the owners of the affected systems cannot be notified, these efforts can hardly achieve their positive goal. And in this notification process, WHOIS data have their use...
We are here to listen. For a quick response, please select your request type or check our Contact us page for more information. By submitting a request, you agree to our Terms of Service and Privacy Policy.
WhoisXML API uses cookies to provide you with the best user experience on our website. They also help us understand how our site is being used. Find out more here. By continuing to use our site you consent to the use of cookies.