Tag: dns

  • Whois API free

    Whois API free

    Are you looking for a reliable, easy-to-use, and free Whois API? Our new Whois API service offers fast, accurate domain information data, making it an ideal solution for security researchers, SOC analysts etc The Whois API provides the creation date and registrar name. The API requires no registration or token generation. The above request, returns…

  • APAC DNS Forum

    APAC DNS Forum

    Our CEO Swapneel Patnekar recently delivered a presentation titled “Who is living off your domain name?” at the ICANN APAC DNS Forum 2024. About APAC DNS Forum The Asia Pacific Domain Name System Forum is a meaningful platform for the regional DNS community to network, exchange ideas, and explore collaboration opportunities in relation to the…

  • ShadowFindr – Uncover domain shadowing attacks

    ShadowFindr – Uncover domain shadowing attacks

    At the DNS Community Day organized by DNS-OARC at the APRICOT 2024/APNIC 57 conference, we released ShadowFindr, a web tool to detect potential domain shadowing attacks. Who is living off your domain name? ShadowFindr is a web tool built for domain name registrants that helps identify potential domain shadowing attacks. We have written about domain…

  • DNS-OARC DNS Community Day

    DNS-OARC DNS Community Day

    The DNS-OARC folks organized a DNS Community Day at the APRICOT 2024/APNIC 57 conference on 26th February 2024. About DNS-OARC The DNS Operations, Analysis, and Research Center (DNS-OARC) brings together key operators, implementors, and researchers on a trusted platform so they can coordinate responses to attacks and other concerns, share information and learn together. The…

  • Domain shadowing

    Domain shadowing

    Domain shadowing is a technique listed by MITRE ATT&CK as T1584.001 sub-technique of T1584 This technique is not to be confused with subdomain hijacking What is a domain shadowing attack? Threat actors gain control of the DNS control panel of legitimate domain names by brute force and stealthily insert subdomains pointing to the attackers’ network…