WHOIS / RDAP Lookup
Domain and IP ownership lookup with RDAP first, WHOIS fallback, plus summary cards.
Summary
Key fields from RDAP (and WHOIS when available).
About
This WHOIS / RDAP lookup gives you a structured ownership snapshot for domains and IP ranges without jumping between registrars. RDAP responses arrive as JSON with explicit fields and links; if a registry lacks RDAP, the tool falls back to classic WHOIS text so you still get a raw record. You can see who owns the object, which contacts or roles are published, the registration timeline, and live nameserver/DNSSEC signals—ideal when you need to verify a transfer, check expiry risk, or confirm that a domain really belongs to the party claiming it.
For domains, the summary surfaces registrar name, registrant or organization when available, creation/updated/expiry dates, current statuses (clientTransferProhibited, redemptionPeriod and similar), plus active nameservers. The DNSSEC flag shows whether the zone is signed. Copy the RDAP link to visit the authoritative source or provide the WHOIS text to support teams during escalations. Status fields often explain why an action fails (locked domains cannot transfer; redemption means pending deletion), so you can resolve blockers faster.
For IP addresses, RDAP reveals which network announces the block, the start/end range, country codes and any remarks set by the operator. Entities and handles help you spot whether an address belongs to an ISP, hosting provider, cloud/VPN, or an upstream carrier. That context is essential when you allowlist traffic, respond to abuse complaints, or need to justify that an exit node is residential versus data-center. Parent handles point to broader allocations if you need to widen or narrow a policy.
Use the raw outputs when automation needs canonical data: incident responders attach RDAP JSON to tickets; SOC teams paste WHOIS text into SIEM/IR playbooks; deliverability engineers quote registrar information when asking registrants to fix DNSSEC, NS glue or expiry issues. Because RDAP is structured, you can also map statuses and dates to monitoring alerts that warn before a domain lapses. Outputs are transient—no data is stored server-side.
Practical scenarios: validating that SPF/DKIM domains are truly under your control, confirming that a phishing lookalike sits at a different registrar, checking whether an IP range belongs to a VPN so you can tighten rate limits, or sharing the RDAP link with a registrar agent to expedite updates. Everything runs server-side with SSRF guards so internal networks stay protected.
FAQ
›When is RDAP used instead of WHOIS?
›Why do some fields show as empty?
›What do domain statuses mean?
›How do I confirm DNSSEC?
›What about IP ranges?
›Can I trust the raw text?
Related Tools
- Ping Test/tools/network/ping
- Traceroute / MTR/tools/network/traceroute
- Port Checker/tools/network/port-check
- DNS Propagation Checker/tools/network/dns-check
- HTTP Headers & Redirects/tools/network/headers