GET /explore/padns/lookup/uld/{qtype}/{qname}/{qanswer}Similar A records in similar domains in/not in networks specified by qanswer, netmask, and network parameters, where the similar domain is on/not on name servers specified by one or more nsname parameters.
The default is to look at new records with a first_seen timestamp within the last 30 days, but the exact time period can be defined explicitly.
This can be used to find spoofing domains hosted on unsanctioned infrastructure.
Query Parameters: |
|
Request headers: |
|
Note
reduce=host gives aggregation on hostname without pairing the IP resolutions - this gives observation dates for the hostname regardless of IP history.
Note
Wildcards (*) are supported in qname and nsname parameters.
Example request
https://api.silentpush.com/api/v1/merge-api/explore/padns/lookup/uld/a/well*rgo.*/159.45.71.0 \
?netmask=20 \
&network=159.45.170.0/20 \
&nsname=*.wf.com \
&nsname=*.wellsfargo.com \
&nsname=*.markmonitor.com \
&asname_starts_with=wellsfargo \
&asn=notin \
&net=notin \
&match=neq \
&last_seen_after=2021-07-01 \
&limit=2Example response
{
"status_code": 200,
"error": null,
"response": {
"records": [
{
"answer": "192.187.111.222",
"asn": 33387,
"count": 3,
"domain": "wellxsfargo.com",
"first_seen": "2021-06-25 20:27:29",
"last_seen": "2021-07-10 19:56:31",
"query": "wellxsfargo.com",
"type": "A"
},
{
"answer": "63.141.242.44",
"asn": 33387,
"count": 2,
"domain": "wellsfaprgo.com",
"first_seen": "2021-07-07 10:51:36",
"last_seen": "2021-07-10 19:56:30",
"query": "wellsfaprgo.com",
"type": "A"
}
]
}
}