Whois

Sponsored
by

Noteworthy

WHOIS History API: Powering Domain Investigations

Domain Research and Monitoring: Keeping an Eye on the Web for You

Reverse WHOIS: A Powerful Process in Cybersecurity

Whois / Most Viewed

Spammers Operating Anonymously via Whois Privacy

The amount of message board spam has been escalating dramatically since mid-2005, according to experts and a search of Google shows a number of frequently recurring domains are appearing in bogus comments on message boards all over the internet.

Domains such as 888.typo7.com, e-casinoroom.com, HobbyWorkshop.com, onlinepokerment.com, TopSitesRanking.com and g4h5.com all appear in bogus postings which reference online gaming. Many of the actual sites link through to more than one established poker site. more

Domain Related Crime: The 4 Steps of Effective Investigations

There is no rest for the wicked. If you think that 2018 was the climax of cybercrime, wait until you see what happens in the next few years as cybercriminals are constantly learning new ways to strike. Take for instance domain-related attacks now coming in a variety of forms. There's domain hijacking which involves gaining of access to domains and making changes without owners' permission. You have typosquatting where phishing is often utilized to steal valuable information. more

US Government to ICANN - Move Quickly

David Redl has written to ICANN in relation to the ongoing work around whois and GDPR. The letter, which was shared with the GNSO Council last night, is a mixed bag. On the one hand, it offers the carrot in relation to what's been done so far, but then there's the not so veiled threat, which isn't a revelation by any means, of "domestic legislation." more

Why the EPDP is Essential for a Long-Term Solution for WHOIS

Major European legislation, the General Data Protection Regulation, evoked substantial change in the way we deal with the visibility of domain name registration information, and understandably those that use that data to solve problems are concerned about these changes, and some have even called for a U.S. legislative fix. However, a more in-depth look at the issue and the policy-making surrounding it will show that there is, in fact, a process already well underway to address the situation. more

Registration Operations Workshop at ICANN57 Hyderabad

Following a very successful series of workshops held during IETF meetings, the next Registration Operations Workshop (ROW) is now being held during the upcoming ICANN meeting in Hyderabad, India. While the previous workshops were of advanced topics attended by industry experts, the current one will be more of a tutorial and is open to all interested parties. more

6th Registration Operations Workshop (ROW), Madrid, Friday May 12th 2017

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 6th ROW will be held in Madrid, on Friday May 12th 2017 in the afternoon, immediately after the GDD Industry Summit and prior to ICANN DNS Symposium and OARC 26, using the same venue as all above-mentioned events. more

Maintaining Trust, Respecting Privacy and Due Process

In order for the Internet to function properly, there has to be "trust". Trust in "online" is something that has ebbed and flowed over the years, but over the past two decades more and more of our daily lives are linked closely to "digital". Our banks encourage us to use online banking and their mobile apps. Government agencies share (and collect) information from private citizens and businesses online. And of course we all do more and more of our shopping online... more

8th Registration Operations Workshop (ROW), May 9th, 2019, Bangkok

The Registration Operations Workshop (ROW) was conceived as an informal industry conference that would provide a forum for discussion of the technical aspects of registration operations in the domain name system. The 8th ROW will be held in Bangkok, Thailand on Thursday, May 9th, 2019 in the afternoon, at the end of the GDD Industry Summit, in the same venue. more

WHOIS Database Download: Proactive Defense Against the Rising Tide of BEC Fraud

How many times have you heard that humans are the weakest link in cybersecurity? The headlines have proven that over and over again. In particular, business email compromise or BEC (also known as email account compromise or EAC) scams, which typically target an employee with access to the financial resources of his company -- this could be a C-level executive or any high-ranking officer -- for fraud are still on a constant uphill trend. more

The geoTLD GDPR Survey 2018

The application of the European General Data Protection Regulation (GDPR) to the DNS is a hot topic within the ICANN community. However, since the implementation of the GDPR on May 25th, 2018, there has been little public data on: how many WHOIS data requests have been made at the registry level, and; how the registries are handling them. To further the factual and evidence-based discussion within the ICANN community, we gathered quantitative data about WHOIS access post-GDPR... more

Industry Updates

The Perils of Typosquatting: The Likely Targets and the Price They Pay

Domain Squatting Disputes: How WHOIS Lookup Tools Can Help

Post-GDPR WHOIS Domain Search: Are Cybercrime Investigations More Difficult to Do?

How to Avoid Fraudulent Classifieds Sites with WHOIS Domain Name Search Tools

How Domain Reputation API Can Help Detect HTTPS-Protected Phishing Sites

How to Avoid Fake Product Support Pages with WHOIS API's Help

How to Safeguard Against Domain Look-Alikes with Domain and Brand Monitoring Services

Reverse Domain Hijacking and the Use of WHOIS and Domain Brand Monitoring Tools

Addressing Cybersquatting Dangers Using Brand Alert API and WHOIS Lookup

Retrospective: Post-GDPR Compliance Rates for Domain Enforcement

Fake Airline Ticket Scams: Domain Spoofing and Other Red Flags

Take Brand Protection Up a Notch with Domain Research and Monitoring Tools

Mitigating Phishing Attacks on Cloud/File Storage Services through Domain Reputation API

Taking a Closer Look at Reverse Domain Name Hijacking (RDNH) with WHOIS Search and Brand Monitor

Legal Services as a Phishing Target: How Domain Reputation Checks Can Help