Donate
BETA

WHOIS Lookup

Look up WHOIS/RDAP records for domains and IPs

What is WHOIS and ?

and provide registration and ownership information for domains and IP ranges. RDAP is the modern, structured replacement for legacy WHOIS.

How to read WHOIS results correctly

and records often show registrar-level or allocation-level ownership, not necessarily the person behind every activity. For domains, privacy services can mask registrant details. For IP ranges, ownership can reflect a provider or hosting network while real traffic originates from downstream customers.

Step-by-step WHOIS lookup workflow

Start with the exact domain or IP you want to verify. Run WHOIS first to capture registrar-level details, then compare with RDAP output for cleaner structured fields. If records are privacy masked, focus on dates, registrar, status, and authoritative network ownership rather than expecting a personal identity.

For domain checks, validate nameservers and status flags, then cross-check DNS behavior using DNS Lookup and Reverse DNS. For IP checks, compare WHOIS allocation with ASN lookup and IP location context before making any trust or abuse decisions.

This combined workflow reduces false positives, especially when traffic passes through VPN exits, hosting providers, , or enterprise gateways that can hide the original endpoint.

Common WHOIS and fields

Key fields to watch are registrar, registration and expiration dates, status flags (for example clientTransferProhibited), and nameserver data. For IP allocations, focus on net range, country, and organization references, then validate operational context with routing and tools.

Treat WHOIS as one signal, not final proof. Good investigations always combine multiple sources and the exact timestamp of the observed event.

WHOIS vs RDAP vs DNS: when to use each tool

WHOIS is useful when you want a quick human-readable registration summary, while gives you cleaner structured fields and better machine-readable status data. In practice, domain investigations usually start with WHOIS or RDAP to confirm registrar, important dates, and high-level ownership references, then move into DNS tools to validate how the domain is actually configured right now.

That distinction matters because a domain can look legitimate in a registrar record while still pointing to suspicious name servers, broken mail routes, or generic parking infrastructure. The reverse situation also happens: privacy masking in WHOIS can make a domain look anonymous even when DNS, hosting, and ASN signals clearly indicate a normal business setup. Good analysis means comparing registration context with live technical behavior instead of relying on one source alone.

For IP addresses, RDAP and WHOIS usually tell you who received the allocation, not who generated a specific connection. That is why abuse review and trust checks should continue with reverse DNS, ASN mapping, blacklist status, and traffic context. The more you align those signals, the less likely you are to misread a VPN exit, a hosting range, or a privacy-protected domain as final proof of identity.

Frequently asked questions

What data does WHOIS show?
WHOIS can show registrar details, registration dates, and contact information for a domain, though much of it is now privacy-protected.
What is RDAP?
RDAP is the modern, JSON-based protocol that replaces legacy WHOIS for registries and RIRs.
Does WHOIS show the real owner?
Not always. Many domains use privacy protection, which hides personal details from public WHOIS records.
What should I check after a WHOIS lookup?
Cross-check DNS, reverse DNS, ASN ownership, and blacklist reputation so you can validate context before acting on one record.
Can WHOIS prove who made malicious traffic?
Usually no. WHOIS can identify registrar or allocation ownership, but endpoint attribution requires broader forensic evidence.