Whois

Sponsored
by

Noteworthy

WHOIS History API: Powering Domain Investigations

Reverse WHOIS: A Powerful Process in Cybersecurity

Domain Research and Monitoring: Keeping an Eye on the Web for You

Whois / Featured Blogs

Consistency, Urgency, and Transparency Needed for Registrant Data Requests

As we reported in our Post-GDPR Compliance Rate retrospective in January 2020, registrar compliance rates in response to verified requests for redacted registrant information using the Appdetex WHOIS Requestor System was 25 percent. Our most recent report shows the compliance rate has increased to 27 percent, based upon a total of 243 requests for redacted WHOIS information sent to 68 registrars over the period starting January 1, 2020, through February 24, 2020. more

2019 Domain Name Year in Review

And so it goes, we are coming to the end of 2019, and that can mean only one thing. It's time for another Domain Name Year in Review. And unlike years past, this year was a real doozy. So without further ado, here are the domain name industry's top 10 biggest stories for 2019... To date, 48 leading registries and registrars have signed onto the "Framework to Address Abuse." The initiative was launched in November 2019, just prior to the ICANN meeting in Montreal. more

Why the EPDP is Essential for a Long-Term Solution for WHOIS

Major European legislation, the General Data Protection Regulation, evoked substantial change in the way we deal with the visibility of domain name registration information, and understandably those that use that data to solve problems are concerned about these changes, and some have even called for a U.S. legislative fix. However, a more in-depth look at the issue and the policy-making surrounding it will show that there is, in fact, a process already well underway to address the situation. more

If ICANN Won't Stand Up to EU in WHOIS Dispute, Then the U.S. Congress Should

The early designers of the Internet quickly realized that as the number of domain names flourished, there was a need for tracking domain name owners to resolve questions and conflicts that might arise. To that end, they created WHOIS, a public database with the names, phone numbers, email addresses, and mailing addresses of registered domain owners and operators. more

More Privacy for Domain Registrants – Heightened Risk for Internet Users

A recent exchange on CircleID highlighted a critical need for data to inform the debate on the impact of ICANN's post-GDPR WHOIS policy that resulted in the redaction of domain name registrant contact data. A bit of background: in my original post, I made the point that domain name abuse had increased post-GDPR. A reader who works with a registrar (according to his bio) commented: "Can you back up that statement with data? Our abuse desk has actually seen a reduction in abuse complaints." more

Cybercriminals Benefitting from Stalled Privacy/Proxy Policy

We've seen alarmingly BIG increases in multiple abusive behaviors – like phishing, hacking and malware – that often leverage the domain name system (DNS) and privacy/proxy services. Cybercriminals capitalize on gaps in DNS security measures, and ICANN is holding the door open for them by failing to implement their privacy/proxy policy. If you are ever targeted, you are not alone. more

The End of the Road: ICANN, Whois, and Regulation

There's a well-documented crisis facing the domain name system: very few who rely on domain name registration data from the Whois database to perform vital functions can do so any longer, which is escalating consumer harm and abuse on the internet worldwide. And the problems, thanks to ICANN's overly restrictive policy post-GDPR and a failing policy process, are piling up. more

The Utility Formerly Known As WHOIS

Muscle memory is a funny thing. We don't even think about it really, but when we do the same thing over and over again, it just becomes second nature to us. This is how we've come to use WHOIS over the past two decades to get contact information for registered domain names. If you wanted to see who owned a domain, you'd simply do a WHOIS search. I've probably done hundreds of thousands of them during my time in the industry. Well as of this week, a major step in the retirement of WHOIS officially took place. more

How Domain Data Helps Thwart BEC Fraud

It's true, domain data has many practical uses that individuals and organizations may or may not know about. But most would likely be interested in how it can help combat cyber threats, which have been identified as the greatest risks businesses will face this year. Dubbed as the greatest bane of most organizations today, cybersecurity can actually be enhanced with the help of domain data. How? more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

Industry Updates

How a Passive DNS Database Can Help Improve Cyber Resilience

Preventing Media Theft with an IP Geolocation Database

Beefing Up Trademark Monitoring with Domain Brand Monitoring Solutions

2 Ways Content Filtering With Website Contacts and Categorization Can Help Businesses

Using Email Validation Tools to Stop Malspam Campaigns in Their Tracks

How to Build an Attack Profile with WHOIS Database Download as a Starting Point

Prevent Network Users from Visiting Fake Domains and Settlement Pages with WHOIS Lookups

How IP Geolocation Lookups Help Thwart Cyber Attacks

Why Typosquatting Protection Is a Must for Settlement Pages

Phishing Attacks Still Haunt Banking Institutions: How Can Domain Reputation Checks Help?

How to Protect Your Brand with WHOIS-Powered Domain Brand Protection Solutions

Using WHOIS Domain Lookup Tools to Identify Malicious Domains and Prove Misuse

Fight Against Phishing: Email Address Verification as a Cybersecurity Process

How to Avoid IP Spoofing with a Reverse IP Address Lookup Service

Online Brand Protection Tips with Domain Brand Protection Software