Skip to content

WHOIS Lookup

ShadowMap includes a built-in WHOIS lookup utility for querying domain and IP registration information. WHOIS data is also surfaced automatically within the Web Applications detail view for any discovered asset.

Overview

WHOIS Lookup

The WHOIS view displays registration data in a split-panel layout. The left panel shows domain WHOIS data (by hostname), and the right panel shows IP WHOIS data (by IP address). Both panels render the raw WHOIS response in a preformatted code block for readability.

Data Returned

Domain WHOIS

FieldDescription
RegistrantOrganization or individual who registered the domain (if not privacy-protected)
RegistrarThe domain registrar through which the domain was registered (e.g., GoDaddy, Namecheap, Cloudflare)
Registration DateWhen the domain was originally registered
Updated DateWhen the domain registration was last modified
Expiry DateWhen the domain registration expires. Domains approaching expiry are at risk of hijacking if not renewed.
Name ServersThe DNS servers configured for the domain. Changes in nameservers can indicate domain takeover.
Domain StatusRegistration status codes (e.g., clientTransferProhibited, serverDeleteProhibited). Status codes indicate what operations are locked or allowed.

IP WHOIS

FieldDescription
Network RangeThe CIDR block or IP range the address belongs to
OrganizationThe entity that owns or operates the IP block
ISP / Hosting ProviderThe internet service provider or hosting company
CountryGeographic registration of the IP block
Abuse ContactEmail address for reporting abuse related to this IP range

Use Cases

Investigating Suspicious Domains

When ShadowMap's brand protection or phishing detection modules flag a suspicious domain:

  1. Run a WHOIS lookup on the flagged domain
  2. Check the registrant -- is it your organization or an unknown entity?
  3. Check the registration date -- recently registered domains mimicking your brand are highly suspicious
  4. Check the registrar -- some registrars are more responsive to takedown requests than others
  5. Use the registrar and abuse contact information to initiate a takedown

Verifying Asset Ownership

Confirm that domains in your asset inventory are registered to your organization:

  • Compare registrant details with your organization's registration records
  • Identify domains that may have been registered by employees, subsidiaries, or former contractors
  • Flag domains with registrant privacy protection that cannot be verified

Monitoring Domain Expiry

Expired or soon-to-expire domains are a security risk:

  • Attackers monitor domain expiry dates and register lapsed domains to capture residual traffic
  • Lapsed domains may still receive email, API calls, or user traffic intended for your organization
  • Review expiry dates periodically and ensure critical domains are set to auto-renew

Investigating IP Ownership

When an unfamiliar IP appears in your attack surface:

  • WHOIS reveals who owns the IP block -- is it your hosting provider, a CDN, or an unexpected third party?
  • The organization and ISP fields help determine whether an IP is legitimately associated with your infrastructure
  • Abuse contact information is essential for reporting if the IP is involved in attacks against you

ShadowMap by Security Brigade