Domain Research Suite Blog & How To Guides & FAQ

Posted on November 8, 2019

Are You Keeping An Eye On Your & Your Adversary’s Domain Activity? – Part 2

In the last blog, we discussed the various features of all the Online Monitoring & Search tools that you can avail with our Domain Research Suite. The next question is naturally, how professionals from different industries can take advantage of these power tools to enhance their domain research? So, today we will be covering several use-cases of DRS to help make you understand its importance in today’s day & age.

Continue reading

Posted on November 8, 2019

Are You Keeping An Eye On Your & Your Adversary’s Domain Activity? – Part 1

If the answer to the above question is “no”, “looking forward to, but don’t know how”, or god forbid, “why would I want to do that?”, then you are just in the right place! Businesses always need to protect their brand from bad actors who can spoil their reputation, while at the same time, also try & stay a step ahead of their competition. And why only businesses, security teams also need to constantly keep a track of threats in order to pre-empt & proactively curb online attacks. The internet has made a lot of information easily accessible, but getting relevant, timely & proactive Intel is the key for staying a step ahead whether it is to protect your brand or to prevent a hacker from committing an online crime. Reactive in today’s day & age is longer a solution for success.

If you want to be a notch above the rest, Domain Research Suite (DRS) is just the tool for you. DRS provides a bundle of tools in the form of an easy-to-use web-app which will definitely benefit your domain investigation & management with automated monitoring & timely alerts combined with extensive research tools!

Continue reading

Posted on November 5, 2019

4 Roles of Domain Name Monitoring in Making Cybersecurity Decisions

You might be surprised to find out, but there’s a lot you can tell about a domain name or a group of them from the cybersecurity standpoint. You may attempt to understand what the intentions of a registrant are, check for the consistency of data provided across touchpoints, get some insights into the scale of online operations, and more.

Overall, gathering and applying domain intelligence allows cybersecurity specialists to decide whether it’s in the company’s best interests to let information flow with unknown external agents. Or if, on the contrary, the risks outweigh the benefits so much that interactions should be at least heavily scrutinized or blocked altogether.

This post explores a variety of more specific situations where domain intelligence can help in making the right cybersecurity call at different levels of the organization and beyond it.

Continue reading

Posted on October 24, 2019

The Domain Research Suite That Aids Financial Fraud Investigations

Bitsane, a cryptocurrency exchange based in Ireland, vanished in the June of 2019. Its founders took with them the crypto deposits of 246,000 users. The platform traded an average of $7 million each day.

Worldwide, fraudsters stole nearly $1.5 billion’s worth of cryptocurrencies in the first two months of 2018 alone. It’s estimated that since then, criminals have made off with an average of $9 million a day.

So how can law enforcement authorities, legitimate financial institutions, and even individuals know whether a cryptocurrency exchange is planning to steal customer investments?

WHOISXMLAPI.com’s Domain Research Suite can reveal indicators that financial institutions like cryptocurrency exchanges may be committing fraud.

Continue reading

Posted on October 15, 2019

The Role of Domain Search and Monitoring in Enabling MDR and MSSP Teams

Based on findings by ESG, more than 80% of cybersecurity professionals today agree that their organizations are seeking to enhance their threat detection and response capabilities. In fact, 77% said their business managers are constantly pressuring them to do so.

The problem, however, is that enhancing threat detection and response is no mean feat. In fact, 76% of those surveyed mentioned that this has become more challenging compared to a couple of years back. Cybersecurity professionals are pointing to concerns such as the surge in the sophistication and volume of threats, a growing attack surface, and increasing workload. Additionally, many firms lack the right skills and staff to make significant changes in this area.

So rather than deploy new tools that they are not even sure to work, many CISOs are now turning their attention toward asking third-party service providers for help. This is where managed detection and response (MDR) and managed security service providers (MSSPs) come in.

But despite their growing demand and popularity, these services face some major challenges that can hinder many providers and have already done so.

In this post, we’ll take a look at the hurdles these two are contending with right now and how domain search and monitoring tools can enhance their overall effectiveness.

Continue reading

Posted on September 22, 2019

How Brand and Domain Name Monitoring Can Counteract Cybersquatting

The Web is a huge and unregulated space made up of countless online content locations. There are more than 300 million active websites today with an additional 25 million registered each year. It’s only inevitable then that there will be intense competition between registrants and, therefore, demand for domain names, especially for those that use the most recognizable words and identifiers.

In fact, conflicts between trademark holders and domain registrants looking to own the rights to specific domains are common. Numerous disputed domains nowadays are registered either by accident or with the intent to gain money from those who are interested in them. This tactic is known as “cybersquatting,” which can have severe consequences for your brand if you don’t pay attention to it.

In this article, we’ll discuss cybersquatting and how domain name monitoring can protect your business from it.

Continue reading

Updated on September 22, 2019

Brand Monitor and Brand Alert API: How to Combat Brand Misrepresentation in the Retail Fashion Industry

Misrepresentations together with negative brand equity are probably the biggest nightmares of today’s most prominent companies — and more often than not, that’s connected to cybersecurity and data breaches.

For example, the latest stats show that one in every 99 emails you get each day has ties to a phishing attack, the majority of which come laced with malware specially crafted to harvest victims’ financial credentials or use popular brands as social engineering bait.

A great example would be an email offering a considerable discount that the victim may find very hard to resist. So she clicks the link to a site where she’s asked to fill in her personal data, including the credit card, for instance, that she plans to use to purchase goods. She doesn’t get the items she supposedly bought and so complained to the store via all possible means — email, phone, and social media.

What’s worse, others who fall for the same ruse join the frenzy, dragging the brand’s name through the muck. What can the victimized company do? Could it have prevented the phishing attack? These are just some of the things this article answers by analyzing Zara’s real-life case study.

Continue reading

Posted on August 19, 2019

Research Any Domain’s History with WHOIS History API!

With thousands of new domain names registered every day, billions and billions have been registered over the years. And these have undergone multiple ownerships or even registration changes over time. These could be modifications to the domain’s registrar or associated name servers or even changes in contact details, to name just a few.

Aging domains have a history and we at WhoisXML API can help you delve deeper to understand a given domain’s past with WHOIS History API. Professionals conducting research for cybersecurity or investment purposes can hugely benefit from uncovering a domain’s lifecycle to find out if it has ever had a checkered past or draw connections that may not be easy to see at the surface level.

Continue reading

Posted on May 23, 2019

Brand Monitor: Typo generation FAQ

Expand your monitoring field by adding automatically generated typos to all possibly misspelled domain names. Prevent abuse of your brand by identifying typosquatting and blocking IDN homograph attacks. Learn more about our new feature: automatic typos generation.

Continue reading

Posted on May 23, 2019

Protecting Brands & Trademarks On The Internet!

The ease & gigantic potential that the Internet provides to businesses to expand their reach amongst their customers and tap markets that traditionally would have required way too much effort & resources is definitely remarkable. Being present on the Web via their websites has become a cornerstone for businesses to create brand awareness, showcase their products & service and also for selling their offerings directly online. And with each passing day, people are beginning to rely more and more on this virtual presence of brands and are increasingly interacting with them.

Domain names to that effect have become a very critical component for expanding and building a brand identity online. And just like any valuable asset in plain sight, there are a lot of bad guys who either want to cause harm or exploit your brand’s potential for their own benefit. Which is of course not a great news for you!

Continue reading

Posted on May 16, 2019

Uncover Domain Spoofing Using AI Driven Predictive Monitors

Spoofing is a situation in which an entity (person or software program) successfully impersonates and masquerades as another successful one, with the purpose of gaining an advantage with regards to personal or business information or brand goodwill. Domain spoofing occurs when an attacker appears to use a company’s domain to impersonate and masquerade a company and or its products or brands. The domain spoofer may later use the deceived domain name to induce fraudulent practice like phishing i.e. sending deceptive emails pretending to be from a reputed company in order to induce individuals to reveal passwords, credit card numbers or download malicious files.

Continue reading

Posted on February 24, 2019

Reverse WHOIS in action:
find all domains or websites of a company, and more

See Reverse WHOIS service in action by searching for all Internet domains a company owns or is related to. We shall use the web-based reverse WHOIS service. An alternative would be to use the reverse WHOIS API, a RESTful solution which is also available with the same capabilities. We shall pick a popular brand, the Eastman Kodak Company, as an example for our investigation, although it works for any other one you might be interested in. If you are a domainer, a marketer, a legal investigator, an IT security expert, or anyone interested in or working with Internet domains, you are in the right place. We present the Swiss Army knife designed to fit in your very pocket.

Continue reading