Challenge

Manual WHOIS Commands Could Not Support Large-Scale Domain Analysis

To evaluate the security of DNS communications from multiple perspectives, the research team needed to identify which types of domains were most vulnerable. This required acquiring WHOIS data for a massive volume of domains to perform statistically meaningful analysis. 

Initial attempts relied on automated scripts and standard WHOIS commands. However, rate limits and technical restrictions slowed the process.

Collecting enough data took more than three days, delaying the next stage of the research and putting it at risk.

Solution

Transitioning to Bulk WHOIS API Streamlined Data Collection

After finding that manual scripting and standard APIs could not provide the necessary scale, the team implemented WhoisXML API’s Bulk WHOIS API. 

The researcher chose this solution because it allowed large-scale WHOIS queries without the strict rate limits typically imposed by conventional WHOIS services, which made it suitable for large-scale academic research.

The implementation proved highly efficient. The team used the tool’s asynchronous processing feature by simply uploading CSV files of domain lists. The system then returned the results automatically, which included key WHOIS data points:

  • Country of registration

  • Registrar details

  • Domain age

Using Bulk WHOIS API, the team avoided the implementation challenges they had experienced with other tools.

Results

Easy Data Retrieval and Organization Enabled Deeper and More Comprehensive Statistical Analysis

Using the Bulk WHOIS API significantly improved the team’s research workflow.

  • Drastic time reduction: Data collection time dropped from more than three days using conventional WHOIS queries to just a few minutes with the Bulk WHOIS API.

  • Superior data coverage: The team collected three to four times more WHOIS information per domain than with conventional methods.

  • Enhanced analytical capability: With richer data and faster access, the researchers were able to conduct deeper statistical analysis of DNS vulnerabilities.

Furthermore, CSV-formatted results also simplified data organization and post-processing.

The success of this integration has created a reliable research process for future informatics students at the university.