whois

Query domain and IP registration data from WHOIS / RDAP servers.

Network Recon & Monitoring Built-in OS CLI Practiced in lab Windows Linux macOS

Cyber Kill Chain & Defender Lifecycle

Attacker — Kill Chain
1 Reconnaissance
2 Weaponization
3 Delivery
4 Exploitation
5 Installation
6 Command & Control
7 Actions on Objectives
Defender — IR Lifecycle
8 Detection / Monitoring
9 Containment & Eradication
10 Post-incident Forensics

Description

whois queries the registry data behind a domain name or IP address block: registrar, registrant (when not redacted), name servers, creation/expiry dates, ASN owner, and abuse contact.

In threat-intel work this is bedrock OSINT:

  • Newly-registered domain is a strong phishing indicator.
  • Same registrant or e-mail across multiple domains exposes attacker infrastructure clusters.
  • Abuse contact at the netblock owner is who you e-mail to take down a malicious IP.

Modern WHOIS is being replaced by RDAP (rdap CLI), which returns structured JSON.

Use cases

  • Triaging a phishing domain (age, registrar, contact)
  • Finding sibling domains under the same registrant
  • Identifying the abuse contact for a malicious netblock

Example

whois example.com
whois 8.8.8.8