with WHOIS XML API
for Working with WHOIS Data
The MITRE Corporation  is a not-for-profit company providing innovative solutions to critical challenges in various security related domains including cybersecurity. They operate multiple federally funded research and development centers. They assist the US government with several activities such as scientific research and analysis, development and acquisition, systems engineering and integration. In order to provide cutting-edge solutions to these important challenges they run an independent research program.
As the analysis and research of WHOIS data is crucial in cyber security, MITRE develops a front-end for WhoisXML API data in support of researchers' and analysts' work. The front-end is developed in the framework of the project named “WhoDat”, publicly available at GitHub  under General Public License . It integrates WHOIS data, current IP resolutions and DNS Database.
A legacy version of WhoDat written in PHP by Chris Clark is available in the repository, too. The current version under the name of PyDat is written by Wesley Shields and Murad Khan. It is entirely implemented in Python . This makes it especially handy for researchers as Python is one of the most prevalent languages in scientific computing. Once data is accessible in this framework, it can be further processed by a large variety of software libraries. The front-end provides a flexible and extensible tool for searching and analyzing current and historic data. It includes a scriptable API to make search requests and obtain JSON data. Version 3.0 of the software provides an experimental support for the ElasticSearch  distributed search and analytics engine, facilitating large-scale distributed processing.
An example of the practical use of PyDAT is described in Ref. . Spear-phishing attacks are directed at individuals and companies by adversaries aiming at obtaining sensitive information with malicious goals. These attacks occur very frequently: according to Ref. , this is the most successful technique on the Internet today, accounting for 91% of attacks.
When cyber threat intelligence analysts are facing such threats they need to collect intelligence information on the adversary’s infrastructure. The technique for searching on a spear-phishing link domain is WHOIS pivoting. It consists in looking up suspicious domains and pivoting on each result to find additional information on the domain registrations. In this way as the cited article  concludes, “Gathering intelligence about an adversary infrastructure could be methodically achieved just by using WHOIS information, making note of missing or incorrect information as you traverse and retrace each finding”.
The research and analysis of WHOIS data is an important branch of cybersecurity generating challenging novel ideas  for research. Obviously such research tasks are of high technical importance and, owing to the broad significance of cyber security, they potentially have a high societal impact. The data provided by WhoisXML API can serve as a solid basis of such activity, as demonstrated by the MITRE Corporation. It can be directly useful in security analytics, e.g. revealing spear-phishing domains by WHOIS pivoting. Moreover, their front-end is open-source, and it is fully available to the community.
 W. Shields: Using WHOIS and Passive DNS for Intelligence, MITRE Corporation, 2015.
 D. Stephenson: Spear Phishing: Who’s Getting Caught? Firmex. https://www.firmex.com/thedealroom/spear-phishing-whos-getting-caught
 A. Kott, C. Wang, R. F. Erbacher (eds.): Cyber Defense and Situational Awareness, Springer International Publishing, 2014. https://www.springer.com/us/book/9783319113906See other success stories
We work hard to improve our services for you. As part of that, we welcome your feedback, questions and suggestions. Please let us know your thoughts and feelings, and any way in which you think we can improve our product.
For a quick response, please select the request type that best suits your needs. For more info regarding the request types, see the Contact us page.