SlideShare a Scribd company logo
What is WHOIS?!
2
+ Internet Protocol you can use to
search registry and registrar
databases and discover who
registered a domain name or IP
address
+ Includes contact information for
registrant
WHOIS is not an acronym!
3
A typical WHOIS entry!
•  Registrant name !
•  Street address!
•  Email !
•  Telephone number!
•  Creation date!
•  Expiration date!
4
+ Helps network administrators find
and fix system problems and maintain
Internet stability
+ Manages registration status of
domain names
+ Assists in fighting abusive use of
Internet
Why is WHOIS important?!
5
Accuracy of WHOIS data is
important!
•  WHOIS records
are created when
a domain name is
registered!
•  Information
changes over time
and should be
updated so that
registrants can be
easily contacted!
•  Inaccurate records
can lead to the
domain name’s
cancellation!
6
+ Send complaint to ICANN about
inaccurate or missing WHOIS data
+ http://www.icann.org/en/resources/
compliance/complaints/whois/
inaccuracy-form 
Who do I tell if WHOIS information
is wrong or missing?!
7
ICANN requires all accredited registrars and
registries to provide contact information for
registrants and managers via WHOIS.

Some registrars offer privacy or proxy services
that show the contact information of the service
instead of the registrant’s.

These are not truly anonymous. A registrar may
be legally compelled to release information in
some cases or will voluntarily release
information in accordance with its policies.


What if I don’t want to share my personal
information in the WHOIS database?!
8
ICANN does not require registries or registrants
to break laws in order to address conflicts
between the collection of WHOIS data by a
registry or registrar and sovereign privacy laws
and regulations.

Registries or registrars that can demonstrate
national laws prohibiting the collection or
publication of personal data can seek a waiver
from this requirement.
What if my country’s privacy laws prohibit
collection of this data?!
9
An Expert Working Group has proposed a
complete overhaul to how registrant information
is provided to users.

Proposed Next Generation gTLD Directory
Services Model would streamline the way data
is retrieved and validated. 

It would also help safeguard data against
illegitimate uses.


WHOIS may change dramatically in future!
10
+ WHOIS Informational website will
launch in next few months
+ Make your voice heard at meetings
and public comment periods
Coming milestones!
Thank You &
Questions?!

More Related Content

What's hot

OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
Marco Morana
 

What's hot (20)

DoS or DDoS attack
DoS or DDoS attackDoS or DDoS attack
DoS or DDoS attack
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 
Dos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle AttackDos & Ddos Attack. Man in The Middle Attack
Dos & Ddos Attack. Man in The Middle Attack
 
Computer security
Computer securityComputer security
Computer security
 
DDoS Attacks
DDoS AttacksDDoS Attacks
DDoS Attacks
 
Denial of service
Denial of serviceDenial of service
Denial of service
 
Web security
Web securityWeb security
Web security
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Public key infrastructure
Public key infrastructurePublic key infrastructure
Public key infrastructure
 
User authentication
User authenticationUser authentication
User authentication
 
Xss attack
Xss attackXss attack
Xss attack
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
 
Assingement on dos ddos
Assingement on dos  ddosAssingement on dos  ddos
Assingement on dos ddos
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
DDoS - Distributed Denial of Service
DDoS - Distributed Denial of ServiceDDoS - Distributed Denial of Service
DDoS - Distributed Denial of Service
 
OWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root CausesOWASP Top 10 And Insecure Software Root Causes
OWASP Top 10 And Insecure Software Root Causes
 
SSL
SSLSSL
SSL
 
DNS spoofing/poisoning Attack
DNS spoofing/poisoning AttackDNS spoofing/poisoning Attack
DNS spoofing/poisoning Attack
 

Similar to What is WHOIS?

New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
New Zealand | LEI Registry Numbering in the Future (Justin Hygate)New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
Corporate Registers Forum
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
Craig Mullins
 

Similar to What is WHOIS? (20)

GDPR and Whois at ICANN
GDPR and Whois at ICANNGDPR and Whois at ICANN
GDPR and Whois at ICANN
 
New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
New Zealand | LEI Registry Numbering in the Future (Justin Hygate)New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
New Zealand | LEI Registry Numbering in the Future (Justin Hygate)
 
WHOIS
WHOISWHOIS
WHOIS
 
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTSTECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
TECHNOLOGY FOR HANDLING FOIA & PUBLIC DISCLOSURE REQUESTS
 
2018 Social Media Tools for Lawyers
 2018 Social Media Tools for Lawyers 2018 Social Media Tools for Lawyers
2018 Social Media Tools for Lawyers
 
Strong Host Security Policies are Good Business
Strong Host Security Policies are Good BusinessStrong Host Security Policies are Good Business
Strong Host Security Policies are Good Business
 
5 ways to Streamline Your Freedom Of Information Requests
5 ways to Streamline Your Freedom Of Information Requests5 ways to Streamline Your Freedom Of Information Requests
5 ways to Streamline Your Freedom Of Information Requests
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
UKSG Conference 2016 Breakout Session - Who’s reading your valuable content a...
UKSG Conference 2016 Breakout Session - Who’s reading your valuable content a...UKSG Conference 2016 Breakout Session - Who’s reading your valuable content a...
UKSG Conference 2016 Breakout Session - Who’s reading your valuable content a...
 
What the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for CybersecurityWhat the Redaction of WHOIS Data Means for Cybersecurity
What the Redaction of WHOIS Data Means for Cybersecurity
 
Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309Mexico Registries Registrars Abuse Domains 030309
Mexico Registries Registrars Abuse Domains 030309
 
Registrars and Abuse of Domains
Registrars and Abuse of DomainsRegistrars and Abuse of Domains
Registrars and Abuse of Domains
 
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
OpenText SlideShare – Mitigate Compliance Risks through secure information ex...
 
Popi and Sharepoint 2010
Popi and Sharepoint 2010Popi and Sharepoint 2010
Popi and Sharepoint 2010
 
UN INCB: RIRs and LEAs
UN INCB: RIRs and LEAsUN INCB: RIRs and LEAs
UN INCB: RIRs and LEAs
 
Is Crawling Legal? Web Crawling legal Policies
Is Crawling Legal? Web Crawling legal PoliciesIs Crawling Legal? Web Crawling legal Policies
Is Crawling Legal? Web Crawling legal Policies
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
TrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data GraveyardsTrustArc Webinar: Challenges & Risks Of Data Graveyards
TrustArc Webinar: Challenges & Risks Of Data Graveyards
 
Simon Rawson
Simon RawsonSimon Rawson
Simon Rawson
 
Discovering Abuse via Geographic
Discovering Abuse via GeographicDiscovering Abuse via Geographic
Discovering Abuse via Geographic
 

More from ICANN

More from ICANN (20)

Call for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PTCall for Volunteers: Accountability & Transparency Review Team_PT
Call for Volunteers: Accountability & Transparency Review Team_PT
 
Call for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZHCall for Volunteers: Accountability & Transparency Review Team_ZH
Call for Volunteers: Accountability & Transparency Review Team_ZH
 
Call for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ESCall for Volunteers: Accountability & Transparency Review Team_ES
Call for Volunteers: Accountability & Transparency Review Team_ES
 
Call for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_ARCall for Volunteers: Accountability & Transparency Review Team_AR
Call for Volunteers: Accountability & Transparency Review Team_AR
 
Call for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FRCall for Volunteers: Accountability & Transparency Review Team_FR
Call for Volunteers: Accountability & Transparency Review Team_FR
 
Call for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RUCall for Volunteers: Accountability & Transparency Review Team_RU
Call for Volunteers: Accountability & Transparency Review Team_RU
 
Call for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review TeamCall for Volunteers: Accountability & Transparency Review Team
Call for Volunteers: Accountability & Transparency Review Team
 
ICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | FrenchICANN Expected Standards of Behavior | French
ICANN Expected Standards of Behavior | French
 
ICANN Expected Standards of Behavior
ICANN Expected Standards of BehaviorICANN Expected Standards of Behavior
ICANN Expected Standards of Behavior
 
ICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | RussianICANN Expected Standards of Behavior | Russian
ICANN Expected Standards of Behavior | Russian
 
ICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | ArabicICANN Expected Standards of Behavior | Arabic
ICANN Expected Standards of Behavior | Arabic
 
ICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | ChineseICANN Expected Standards of Behavior | Chinese
ICANN Expected Standards of Behavior | Chinese
 
ICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | SpanishICANN Expected Standards of Behavior | Spanish
ICANN Expected Standards of Behavior | Spanish
 
Policy Development Process Infographic Turkish
Policy Development Process Infographic TurkishPolicy Development Process Infographic Turkish
Policy Development Process Infographic Turkish
 
Policy Development Process Infographic Russian
Policy Development Process Infographic RussianPolicy Development Process Infographic Russian
Policy Development Process Infographic Russian
 
Policy Development Process Infographic Portuguese
Policy Development Process Infographic PortuguesePolicy Development Process Infographic Portuguese
Policy Development Process Infographic Portuguese
 
Policy Development Process Infographic Spanish
Policy Development Process Infographic SpanishPolicy Development Process Infographic Spanish
Policy Development Process Infographic Spanish
 
Policy Development Process Infographic French
Policy Development Process Infographic FrenchPolicy Development Process Infographic French
Policy Development Process Infographic French
 
Policy Development Process Infographic English
Policy Development Process Infographic EnglishPolicy Development Process Infographic English
Policy Development Process Infographic English
 
Policy Development Process Infographic Chinese
Policy Development Process Infographic ChinesePolicy Development Process Infographic Chinese
Policy Development Process Infographic Chinese
 

Recently uploaded

Recently uploaded (20)

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Intelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdfIntelligent Gimbal FINAL PAPER Engineering.pdf
Intelligent Gimbal FINAL PAPER Engineering.pdf
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Server-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at PricelineServer-Driven User Interface (SDUI) at Priceline
Server-Driven User Interface (SDUI) at Priceline
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Motion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in TechnologyMotion for AI: Creating Empathy in Technology
Motion for AI: Creating Empathy in Technology
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

What is WHOIS?

  • 2. 2 + Internet Protocol you can use to search registry and registrar databases and discover who registered a domain name or IP address + Includes contact information for registrant WHOIS is not an acronym!
  • 3. 3 A typical WHOIS entry! •  Registrant name ! •  Street address! •  Email ! •  Telephone number! •  Creation date! •  Expiration date!
  • 4. 4 + Helps network administrators find and fix system problems and maintain Internet stability + Manages registration status of domain names + Assists in fighting abusive use of Internet Why is WHOIS important?!
  • 5. 5 Accuracy of WHOIS data is important! •  WHOIS records are created when a domain name is registered! •  Information changes over time and should be updated so that registrants can be easily contacted! •  Inaccurate records can lead to the domain name’s cancellation!
  • 6. 6 + Send complaint to ICANN about inaccurate or missing WHOIS data + http://www.icann.org/en/resources/ compliance/complaints/whois/ inaccuracy-form Who do I tell if WHOIS information is wrong or missing?!
  • 7. 7 ICANN requires all accredited registrars and registries to provide contact information for registrants and managers via WHOIS. Some registrars offer privacy or proxy services that show the contact information of the service instead of the registrant’s. These are not truly anonymous. A registrar may be legally compelled to release information in some cases or will voluntarily release information in accordance with its policies. What if I don’t want to share my personal information in the WHOIS database?!
  • 8. 8 ICANN does not require registries or registrants to break laws in order to address conflicts between the collection of WHOIS data by a registry or registrar and sovereign privacy laws and regulations. Registries or registrars that can demonstrate national laws prohibiting the collection or publication of personal data can seek a waiver from this requirement. What if my country’s privacy laws prohibit collection of this data?!
  • 9. 9 An Expert Working Group has proposed a complete overhaul to how registrant information is provided to users. Proposed Next Generation gTLD Directory Services Model would streamline the way data is retrieved and validated. It would also help safeguard data against illegitimate uses. WHOIS may change dramatically in future!
  • 10. 10 + WHOIS Informational website will launch in next few months + Make your voice heard at meetings and public comment periods Coming milestones!