Provide current and historical ownership information on domains / IPs. Identify all connections between domains, registrants, registrars, and DNS servers.
Look into all current and historical DNS / IP connections between domains and A, MX, NS, and other records. Monitor suspicious changes to DNS records.
Get detailed context on an IP address, including its user’s geolocation, time zone, connected domains, connection type, IP range, ASN, and other network ownership details.
Access our web-based solution to dig into and monitor all domain events of interest.
Get access to a web-based enterprise-grade solution to search and monitor domain registrations and ownership details for branded terms, fuzzy matches, registrants of interest, and more.
Our complete set of domain, IP, and DNS intelligence available via API calls as an annual subscription with predictable pricing.
Offers complete access to WHOIS, IP, DNS, and subdomain data for product enrichment, threat hunting and more.
Enjoy priority data access with our premium API services topped with extra perks including dedicated team support, enterprise-grade infrastructure, and SLAs for full scalability and high performance.
Carry a complete threat intelligence analysis for a given domain or IP address and get access to a report covering 120+ parameters including IP resolutions, website analysis, SSL vulnerabilities, malware detection, domain ownership, mail servers, name servers, and more.
Gather threat intelligence via API calls covering Domain’s Infrastructure analysis, SSL Certificates Chain, SSL Configuration Analysis, Domain Malware Check, Connected Domains, and Domain Reputation Scoring.
Bolster enterprise security with our feeds covering Typosquatting domains, Disposable domains, Phishing URLs, Domain & IP reputation, Malicious URLs, Botnet C&C, and DDoS URLs.
We offer comprehensive services for the integration of our data – from consultations to the precise definition of the basic needs of the business to increase the work efficiency.
Set up and manage public WHOIS servers for your business. Our WHOIS parsing system is a utility that collects extensive information about any given domain by sending series of DNS and WHOIS queries. The report is generated in raw as well as in parsed format.
Regardless of whether you are a startup, a small business or a global one, our team is always ready to help you. Enterprises operating on a scale can also choose special premium support management with high priority 24/7 email and telephone responses and other professional services.
Get customized reports on TLDs covering datasets falling under domain name, WHOIS and DNS category.
Many organizations only consider domain reputation in the context of email services and deliverability. They believe that scores only have to do with whether or not sites are seen as reputable email senders. However, that is not always the case. Domain reputation covers far more than that.
A good domain reputation score can be a stamp of confidence when it comes to website security. Therefore, it is imperative for organizations to regularly carry out domain reputation lookups with a tool like Domain Reputation API or Domain Reputation Lookup to assess both their own websites and those of external stakeholders to improve their security posture. Let’s take a closer look at why it matters.Continue reading
We see about 500 new threats emerge every minute, and most of them come with unique or enhanced techniques. The rise of new technologies and trends in the way we do things, which include the adoption of the bring-your-own-device (BYOD) concept, cloud services, and the ubiquity of Internet of Things (IoT) devices, among others, are also posing more dangers. All these changes have widened the perimeter that businesses need to protect.
In response, a majority of companies have started using threat intelligence to bolster their cybersecurity measures. They believe their threat intelligence investments have generated an estimated $2.26 million in cost savings, higher than the returns they got from investing in other technologies like artificial intelligence (AI) and automation.
That said, we can conclude how beneficial and crucial the need for reliable threat intelligence is. Threat intelligence helps organizations identify and understand threats better and alert them to potential perils or attacks. With it, companies can create tailor-fit security measures and policies.
Perhaps, the only remaining question is how users can maximize the full potential and benefits of threat intelligence?
This post discusses the challenges that come with collecting, analyzing, and using threat intelligence to make the most out of it. We’ll also give users an idea as to how they can prioritize threat alerts using Domain Reputation API, which can be a challenge amid the ensuing lack of skilled cybersecurity specialists and budgets.Continue reading
The job of managed detection and response (MDR) teams, as their name suggests, is not limited to detecting cybersecurity threats. They are also responsible for carrying out the right actions in response to specific threat alerts.
If there were less than a hundred alerts, and they were all black or white, everything would go smoothly; at least when it comes to following up with the appropriate responses. Alerts with a definite malicious component would then be processed easily to quarantining and blocking stages, while benign alerts are ignored. But the cybersecurity landscape has become more complicated than that, for several reasons...Continue reading
Real-time threat detection is tantamount to up-to-date protection, which should be the only kind of cyberdefense. The key to any good defense, however, is to think and act like there is always a threat. This is true in the virtual realm, to some great extent, where we see a hacker attack every 39 seconds.
For this reason, the use of security information and event management (SIEM) solutions is gaining popularity among security operations centers (SOCs). Security teams are gearing up for when and not if they are attacked. And it’s real-time threat detection and protection that is their goal.
Following that train of thought, this post examines how correlating Web traffic logs with website reputation scores returned by Domain Reputation API help SIEM solutions detect and protect against threats in real time.Continue reading
Indicators of compromise (IoCs) are crucial elements of the incident response process. From identification and containment up to eradication and recovery, security teams need to be on the lookout for IoCs to detect the presence of a threat in real time. When so, responses to cybersecurity incidents are quicker, more effective, and less costly.Continue reading
In this series of blogs, we investigate the background of individual spam mail cases. By using tools provided by WhoisXML API: the domain reputation, WHOIS, and e-mail verification APIs, we unfold the background of these messages. This approach also reveals interesting details about the behavior and habits of spammers and cybercriminals using e-mail, typically for phishing.Continue reading
In spite of all the effort e-mail providers put in worldwide, every user receives a tremendous amount of unwanted and malicious mail to any e-mail account. It is indeed annoying, but let's look on the bright side: we can use these examples to demonstrate how useful the APIs by WhoisXML API can be in the battle against unwanted spam e-mails. In today's example we'll be using the e-mail verification API, the domain reputation API and the WHOIS API to analyze a spam email message which was not caught by a well-configured open-source spam filtering system.Continue reading
In the digital world, just as in the real one, reputation matters. While in real-world dealings and transactions there exist multiple ways in which we can gauge the reputation of a person or organization with which we have to engage in any capacity, the complexity and sheer volume of the web makes this task exponentially difficult in the virtual world.
The modern economic and technological landscape has silently nudged us into a world of online social interactions, financial transactions as well as business dealings. This has resulted in a large amount of data being stored in and exchanged across digital media on a daily basis.
Consequently, data has emerged as the new currency in the cyber-world, and this is exactly where cyber criminals can take advantage of security loopholes and compromise sensitive and financially significant information.Continue reading