WHOIS Scanner

Prev Next

Silent Push performs comprehensive WHOIS scanning to extract, enrich, and correlate registrar-based ownership data for domains observed globally. This process aids SOC teams and security analysts in infrastructure mapping, threat actor attribution, and campaign tracking.

What We Collect

Registrant Name & Email: Enables identification of individual or organizational ownership.

Registrar Information: Tracks registration through known registrars, especially those commonly used in abuse.

Domain Creation, Update, and Expiry Dates: Vital for identifying domain age, renewal behaviors, and suspicious time-based patterns.

WHOIS Server: Useful for source tracing and validation.

Nameservers: Allows detection of shared infrastructure and DNS hosting patterns.

Organization & Address Info: Additional signals for corporate vs. individual ownership.

Use the WHOIS Scanner

To investigate domain ownership and registration patterns:

  1. From the Silent Push homepage, select WHOIS Data > WHOIS Scanner.

  2. Build Your Query:

    • In Field Name, type or select a WHOIS field (e.g., name, email, created, etc.).

    • Choose an Operator (equals, !=, contains, >, <, etc.).

    • Enter the Value.

    • Optionally add multiple conditions using  .

  3. Click Search.

Results Table

Result Type

Description

scan_date

Date/time of the WHOIS scan.

domain

Queried domain name.

created

Original domain registration date/time.

expires

Expiry date unless renewed.

name

Registered owner name.

organization

Associated organization.

registrar

Registrar name.

zipcode

Owner's postal code.

state

Owner's registered state.

updated

Last modification of WHOIS details.

nshash

Hash of the nameserver value.

nameserver

Nameserver used to link to hosting IP.

email

Registered email address.

country

Registered country.

address

Street address.

city

Registered city.

Manage Results

Feature

Function

Select All

Bulk-select results.

Copy

Copy selected/visible records.

Export

Export current or selected data.

Filter

Customize visible columns.

Basic Raw Data

Download results in JSON format.

Compare

Compare any two records.

Save

Save search for reuse.

Hunting Example – Lumma Stealer

Use WHOIS pivots to trace threat actor patterns. Investigate a suspicious domain like:

 elephancouped[.]fun
  • PADNS tab: Identifies  ASN = 13335 (Cloudflare)
    image.png

  • WHOIS tab: reveals registrant: Klim Puzharskiy
    image.png

  • Search Klim Puzharskiy via WHOIS Scanner → 51 linked domains.

    • Common traits: .fun TLD, same registrar (PDR), same registration time.
      image.png

Advanced Query Example

To investigate using the Advanced Search function:

  1. From the Silent Push homepage, select Web Data > Web Scanner > WHOIS Scan.

  2. Select the Advanced Search tab.

    1. Common attributes for precise fingerprinting: .fun TLD, same registrar (PDR), same registration time, nameserver information, and utilization of wildcards.

datasource = "whois" AND created > "2025-02-21 09:36:40" AND registrar = "PDR Ltd. d/b/a PublicDomainRegistry.com" AND nameserver = "*.ns.cloudflare.com" AND domain = "*.fun"

Additional Pivots

  • Email field: Search for domains linked to *@inbox.eu

  • Name pattern regex: Use name ~= "^[A-Z][a-z]+ [A-Z][a-z]+$" to identify domains with similar name patterns.

Advanced Query with multiple attributes

datasource = "whois" AND created > "2025-02-21 09:36:40" AND registrar = "PDR Ltd. d/b/a PublicDomainRegistry.com" AND nameserver = "*.ns.cloudflare.com" AND domain = "*.fun" AND email = "*@inbox.eu" AND name ~= "^[A-Z][a-z]+ [A-Z][a-z]+$"

Benefits

Silent Push’s WHOIS-based pivots enable users to:

  • Trace threat actor infrastructure despite DNS/hosting obfuscation.

  • Identify campaign clusters using registrar, time, email, and other metadata.

  • Enhance threat attribution when DNS or SSL data is insufficient.