WHOIS IP Lookup Guide

How to find out who owns any IP address using WHOIS

Advertisement

WHOIS IP Lookup: How to Find Out Who Owns Any IP Address

February 12, 2026 · 17 min read · Guides

The Myth: "I'll WHOIS This IP and Find Out Who's Behind It"

It shows up in forum posts, Reddit threads, and even some security tutorials: "Just run a WHOIS on the IP and you'll see who it belongs to." The implication is that WHOIS will reveal the person sitting at the keyboard — the individual sending spam, launching attacks, or visiting your website.

That is not what WHOIS does. Not even close.

A WHOIS lookup on an IP address tells you who the address block is registered to. In the vast majority of cases, that's an Internet Service Provider, a hosting company, or a large enterprise — not an individual end user. When you WHOIS a residential IP address like one from Comcast or Vodafone, you'll see Comcast or Vodafone's registration information. You will not see the subscriber's name, their street address, or any personally identifying information about the person using that IP at any given moment.

This distinction matters because acting on WHOIS results with the wrong mental model leads to dead ends at best and legal problems at worst. If someone's attacking your server from a Comcast IP, WHOIS tells you to contact Comcast's abuse team — it doesn't tell you which of Comcast's tens of millions of subscribers is responsible. Only Comcast knows that, and they'll only share it with law enforcement under a valid legal order.

Understanding what WHOIS actually returns — and what it doesn't — makes the tool far more useful. It answers the right questions: Which organization controls this IP block? What network does it belong to? Who do I contact about abuse? Where in the global allocation hierarchy does this address sit?

WHOIS doesn't answer "who is using this IP address right now?" It answers "who is this IP address block registered to?" — and that answer is almost always an ISP or hosting provider, not an individual person.

What WHOIS Actually Is: The Internet's Original Directory

WHOIS (pronounced "who is") is one of the oldest protocols still in active use on the internet. It dates back to the early 1980s and the ARPANET era, when the internet was a small research network and you could literally look up who was responsible for any connected system.

The original WHOIS service was formalized in RFC 812 in 1982 by Ken Harrenstien and Vic White at SRI International. The concept was simple: a query-response protocol running on TCP port 43 that let you look up registration information for network resources. In the ARPANET days, with only a few hundred connected hosts, this worked like a phone book. You could find out which person at which institution was responsible for any address on the network.

As the internet grew from hundreds of hosts to billions of connected devices, the WHOIS system had to scale. The responsibility for maintaining registration data was distributed across five Regional Internet Registries (RIRs), each covering a different geographic region. IP address blocks are allocated in a hierarchy: the Internet Assigned Numbers Authority (IANA) allocates large blocks to RIRs, RIRs allocate smaller blocks to ISPs and organizations, and those organizations assign individual addresses to end users.

WHOIS sits at the RIR and organization level of this hierarchy. It can tell you that a /16 block was allocated to AT&T by ARIN in 2003. It can tell you the /24 sub-block was assigned to a specific data center. But the individual /32 assignment to a home router? That's internal ISP data, not public WHOIS data.

1982
Year WHOIS was formalized (RFC 812)
5
Regional Internet Registries worldwide
4.3B
IPv4 addresses tracked in WHOIS databases

WHOIS vs. IP Geolocation: When to Use Which

WHOIS and IP geolocation answer fundamentally different questions about the same IP address. Confusing the two leads to using the wrong tool for the job. Here's when each one is the right choice.

Factor WHOIS IP Lookup IP Geolocation
Primary question Who owns/controls this IP block? Where is this IP physically located?
Returns Organization name, network range, abuse contacts, registration dates Country, city, coordinates, ISP name, timezone
Data source RIR registration databases (authoritative) Commercial geolocation databases (estimated)
Accuracy type Factual — registration data is definitive Approximate — city-level estimates vary by region
Best for Abuse reporting, network analysis, security investigation Fraud detection, content localization, visitor analytics
Identifies individuals No (shows organizations/ISPs) No (shows approximate area)
Protocol WHOIS (TCP 43) or RDAP (HTTPS) Proprietary database queries
InfoSniper tool WHOIS Lookup IP Geolocation Lookup

In practice, experienced analysts use both together. WHOIS tells you the IP belongs to a DigitalOcean server block registered in 2019. Geolocation tells you that specific IP routes through a data center in Frankfurt. The IP reputation check tells you whether that address has a history of abuse. Each layer adds context that the others miss.

How to Perform a WHOIS IP Lookup

There are several ways to run a WHOIS query. The fastest for most people is a web-based tool. Here's the step-by-step process.

Using InfoSniper's WHOIS tool

  1. Go to infosniper.net/whois.php — the WHOIS lookup form accepts any IPv4 or IPv6 address.
  2. Enter the IP address you want to investigate. Example: 8.8.8.8 (Google's public DNS).
  3. Review the results — the tool queries the appropriate Regional Internet Registry and returns the full WHOIS record, including the network range, organization, abuse contact, and registration dates.
  4. Follow up — use the abuse contact email for reporting, or run a geolocation lookup on the same IP for location data.
Your WHOIS Query IP: 203.0.113.42 or domain name WHOIS Tool Determines correct RIR for this IP range ARIN RIPE NCC APNIC / Others WHOIS Record Returned NetRange, OrgName, CIDR, AbuseContact, RegDate, AS Number, Network Name What the WHOIS Record Tells You Block Owner Which ISP or organization registered this IP range Network Size The CIDR range showing how many IPs are in the block Abuse Contact Email for reporting spam, attacks, and policy violations Registration Dates When the block was allocated and last updated

Using the command line

Most Linux and macOS systems have a whois command built in. Windows users can install it via WSL or use third-party tools.

Command-Line WHOIS Query
$ whois 8.8.8.8

NetRange:       8.8.8.0 - 8.8.8.255
CIDR:           8.8.8.0/24
NetName:        LVLT-GOGL-8-8-8
NetHandle:      NET-8-8-8-0-2
Parent:         NET8 (NET-8-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       AS15169
Organization:   Google LLC (GOGL)
RegDate:        2023-12-28
Updated:        2023-12-28

OrgName:        Google LLC
OrgId:          GOGL
Address:        1600 Amphitheatre Parkway
City:           Mountain View
StateProv:      CA
PostalCode:     94043
Country:        US

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName:   Abuse
OrgAbusePhone:  +1-650-253-0000
OrgAbuseEmail:  [email protected]

This output is from ARIN (the North American registry) because 8.8.8.8 falls within an IP range allocated to a US-based organization. If you query an IP registered in Europe, the results will come from RIPE NCC with a slightly different format. The output format varies by registry, which is one of the headaches the newer RDAP protocol solves.

Reading WHOIS Results: A Field-by-Field Breakdown

WHOIS output can look intimidating the first time you see it — a wall of labels and values without obvious structure. Here's what each important field means and why it matters.

Field Example Value What It Means
NetRange 8.8.8.0 - 8.8.8.255 The start and end IP addresses of the registered block. Every IP in this range shares the same WHOIS record.
CIDR 8.8.8.0/24 Same range expressed in CIDR notation. /24 = 256 addresses. /16 = 65,536 addresses. The smaller the number after the slash, the larger the block.
NetName LVLT-GOGL-8-8-8 An internal identifier for this network block. Often contains abbreviated organization names.
NetType Direct Allocation How the block was obtained. "Direct Allocation" means from a RIR. "Reassignment" means from an ISP.
OriginAS AS15169 The Autonomous System number that announces this prefix via BGP. Useful for identifying the actual network operator.
OrgName Google LLC The organization that holds the registration for this IP block.
RegDate 2023-12-28 When this registration record was created. Older dates often indicate established, legitimate organizations.
OrgAbuseEmail [email protected] The designated contact for reporting abuse originating from IPs in this block. This is where you send abuse complaints.

The parent/child relationship

WHOIS records often show hierarchical allocations. A large ISP might hold a /12 block (over 1 million addresses), which is subdivided into /16 and /24 sub-blocks reassigned to regional operations or customers. When you query a specific IP, the WHOIS system returns the most specific matching record. The "Parent" field in the output shows the larger block it's carved from.

This hierarchy matters for abuse reporting. Sometimes the most specific record shows a hosting customer, with the parent record showing the hosting provider. If the customer's abuse contact doesn't respond, escalate to the parent organization.

Example: Hierarchical WHOIS Record (ISP Sub-Allocation)
NetRange:       203.0.113.0 - 203.0.113.255
CIDR:           203.0.113.0/24
NetName:        EXAMPLE-HOSTING-NET3
NetType:        Reassigned
OriginAS:       AS64496
Organization:   Example Hosting Inc. (EHI-2)
RegDate:        2021-06-15
Updated:        2024-01-10

Parent:
NetRange:       203.0.0.0 - 203.0.255.255
CIDR:           203.0.0.0/16
NetName:        APNIC-EXAMPLE-NET
NetType:        Direct Allocation
Organization:   Example Telecom Ltd (ETL)

OrgAbuseEmail:  [email protected]
OrgTechEmail:   [email protected]
Advertisement

The Five Regional Internet Registries

Every public IP address on the internet is ultimately allocated by one of five Regional Internet Registries. Which RIR holds the record for a given IP determines which WHOIS server you need to query — though most tools handle the routing automatically.

Regional Internet Registries (RIRs) — Global Coverage ARIN North America Caribbean whois.arin.net Founded 1997 RIPE NCC Europe, Middle East Central Asia whois.ripe.net Founded 1992 APNIC Asia-Pacific Oceania whois.apnic.net Founded 1993 AFRINIC Africa whois.afrinic.net Founded 2004 LACNIC Latin America Caribbean whois.lacnic.net Founded 2002 IANA (Internet Assigned Numbers Authority) Allocates blocks to RIRs from global pool Each RIR maintains its own WHOIS database. Queries are automatically routed to the correct registry based on the IP range.
Registry Region WHOIS Server RDAP Endpoint
ARIN US, Canada, Caribbean, North Atlantic islands whois.arin.net rdap.arin.net/registry
RIPE NCC Europe, Middle East, Central Asia whois.ripe.net rdap.db.ripe.net
APNIC Asia, Australia, New Zealand, Pacific Islands whois.apnic.net rdap.apnic.net
AFRINIC Africa whois.afrinic.net rdap.afrinic.net/rdap
LACNIC Latin America, parts of Caribbean whois.lacnic.net rdap.lacnic.net/rdap

When you use a web-based WHOIS tool or the command-line whois utility, it typically queries ARIN first (or a referral server), and ARIN either responds directly or redirects the query to the appropriate RIR. This referral process is invisible to the user but explains why you sometimes see "ReferralServer" in WHOIS output — the query was handed off to a different registry.

Output format differences between registries

Each RIR uses a slightly different output format, which can be confusing when comparing records. ARIN uses a proprietary format with fields like "NetRange" and "OrgName." RIPE NCC uses the RPSL (Routing Policy Specification Language) format with "inetnum" and "descr" fields. APNIC's format resembles RIPE's but has some APNIC-specific extensions. This inconsistency is one of the key problems that RDAP was designed to solve.

WHOIS Privacy and GDPR: How Regulations Changed the Data

Before May 2018, a WHOIS lookup for a domain name or an IP block registered by a European entity would typically include the registrant's full name, street address, phone number, and email. Then the EU's General Data Protection Regulation (GDPR) took effect, and WHOIS data changed significantly.

GDPR classifies personal data in WHOIS records as protected information that requires a lawful basis for processing and sharing. In response, RIPE NCC and European registrars began redacting personal contact details from public WHOIS output. Where you once saw a network administrator's name and direct phone number, you now see "REDACTED FOR PRIVACY" or a generic organizational contact.

Before GDPR, WHOIS was an open book. After GDPR, European WHOIS records redact personal names, phone numbers, and direct email addresses. The organizational data (company name, abuse contact, network ranges) remains public.

The impact varies by record type and registry:

For security professionals, the practical consequence is that WHOIS alone may no longer provide a direct contact person for a network issue in Europe. You'll need to use the organizational abuse contact email and be prepared for a less direct path to resolution. Some organizations now use the RDAP protocol's access control features to provide different levels of detail to verified researchers versus anonymous queries.

Practical Use Cases for WHOIS IP Lookups

Abuse reporting

This is the most common practical use of IP WHOIS. When you see malicious traffic hitting your server — brute-force SSH attempts, spam relay abuse, DDoS packets — WHOIS gives you the abuse contact for the network that owns the source IP.

Effective abuse reports include:

Send the report to the OrgAbuseEmail address from the WHOIS record. If you don't get a response within a few business days, escalate to the parent network's abuse contact or file a report directly with the RIR.

Network troubleshooting

When diagnosing routing issues, peering problems, or packet loss, WHOIS helps identify who operates the networks along the path. Run a traceroute, then WHOIS the IP addresses at each hop. This reveals the autonomous systems involved and their administrative contacts — essential information when you need to coordinate with upstream providers to resolve a routing problem.

Security investigation

During incident response, WHOIS provides critical context about attacker infrastructure. Key questions it answers:

Pairing WHOIS data with IP reputation checks gives you both the ownership context and the behavioral history of an IP address. Used together with geolocation data, you build a comprehensive picture: who owns the IP, where it routes to, and whether it has a history of abuse.

Competitive analysis and infrastructure research

WHOIS reveals the hosting infrastructure behind any website or service. By querying the IP addresses that a competitor's domain resolves to, you can identify their hosting provider, CDN, and network size. This information is useful for understanding their infrastructure investment and technical decisions. Large organizations that hold their own AS numbers and IP blocks have a different cost and operational profile than those renting individual servers.

~80%
Of abuse reports cite the WHOIS abuse contact as first point of contact
48 hrs
Typical response time for major ISP abuse desks

RDAP: The Modern Replacement for the WHOIS Protocol

The WHOIS protocol has served the internet since 1982, but it has well-known problems: inconsistent output formats between registries, no standardized authentication or access control, no support for internationalized characters, and plain-text queries that can be intercepted. RDAP — the Registration Data Access Protocol — was developed to address all of these.

Defined in RFC 7480-7484, RDAP is an HTTP-based protocol that returns structured JSON responses. All five RIRs now support RDAP endpoints, and ICANN mandated RDAP support for all domain registrars starting in 2019.

What RDAP improves over legacy WHOIS

Feature Legacy WHOIS RDAP
Transport TCP port 43, plain text HTTPS (encrypted)
Output format Free-form text, varies by registry Standardized JSON (machine-readable)
Internationalization ASCII only Full Unicode support
Access control None (public or nothing) Role-based access (tiered detail levels)
Referral handling Ad-hoc, inconsistent Standardized bootstrap mechanism
Error handling Free-form error text HTTP status codes + structured errors
RDAP Query Example (ARIN)
$ curl -s "https://rdap.arin.net/registry/ip/8.8.8.8" | python3 -m json.tool

{
    "handle": "NET-8-8-8-0-2",
    "name": "LVLT-GOGL-8-8-8",
    "type": "DIRECT ALLOCATION",
    "startAddress": "8.8.8.0",
    "endAddress": "8.8.8.255",
    "entities": [
        {
            "handle": "GOGL",
            "vcardArray": [
                "vcard",
                [
                    ["fn", {}, "text", "Google LLC"],
                    ["adr", {}, "text", [
                        "", "", "1600 Amphitheatre Parkway",
                        "Mountain View", "CA", "94043", "US"
                    ]]
                ]
            ],
            "roles": ["registrant"]
        }
    ],
    "status": ["active"],
    "cidr0_cidrs": [
        {"v4prefix": "8.8.8.0", "length": 24}
    ]
}

For most end users, the transition from WHOIS to RDAP is invisible — web-based tools query whichever protocol provides the best results. For developers building tools that consume registration data, RDAP's structured JSON output is significantly easier to parse than the free-form text of legacy WHOIS. If you're integrating WHOIS data into automated workflows, check whether the InfoSniper API already includes the registration data you need, which saves you from having to query RIR endpoints directly.

Command-Line WHOIS vs. Web-Based Tools

Both approaches query the same underlying RIR databases, but they have different strengths depending on your workflow.

Command-Line WHOIS + Scriptable / automatable + No third-party dependencies + Raw, complete output + Can pipe to grep/awk for parsing - Requires terminal access - Output format varies by RIR Web-Based WHOIS Tools + No software installation needed + Formatted, readable output + Often enriched with geolocation data + Works from any device with a browser - Rate limited by the tool provider - May not show full raw WHOIS output

For one-off lookups or if you're not comfortable with the terminal, web-based tools like InfoSniper's WHOIS lookup are the practical choice. They handle the RIR routing, format the output, and often combine WHOIS data with geolocation and reputation data in a single view.

For automated workflows — processing log files, building monitoring scripts, integrating with SIEM systems — the command line is more appropriate. You can script batch lookups, parse output with standard Unix tools, and integrate results into your existing pipeline.

For developers building applications that need registration data at scale, the InfoSniper API or direct RDAP queries to RIR endpoints provide the best balance of structured data and reliability. If you need to process large batches of IPs for both WHOIS and geolocation data, the bulk upload tool handles the volume without requiring you to build your own query infrastructure.

Rate limiting: RIR WHOIS servers enforce rate limits to prevent abuse. ARIN typically allows around 100 queries per 5-minute window from a single IP. If you need high-volume lookups, use RDAP (which has more generous limits) or a commercial API that handles caching and rate management for you.

Putting It Together: A Complete Investigation Example

To show how WHOIS fits into a real workflow, here's how a security analyst might investigate a suspicious IP that appeared in server logs.

Scenario: Your web application firewall flagged repeated SQL injection attempts from IP 198.51.100.73.

  1. WHOIS lookup — Query the IP to identify the network owner. The result shows it's registered to a small hosting company with a /22 block (1,024 addresses). Registration date: 3 months ago. This is a relatively new allocation.
  2. Geolocation lookupRun the IP through InfoSniper to find the physical location. It resolves to a data center in Eastern Europe.
  3. Reputation checkCheck the IP's reputation. It appears on multiple blacklists for web scraping and brute-force attacks.
  4. AS number research — The OriginAS from the WHOIS record leads to a BGP analysis showing the AS has very few peers and announces a small number of prefixes — consistent with a bullet-proof hosting operation.
  5. Action — Block the /22 range at the firewall, file an abuse report with the hosting company (using the OrgAbuseEmail from WHOIS), and report the AS to the upstream transit providers listed in the BGP data.

Each tool contributes a piece of the picture. WHOIS alone wouldn't tell you the IP is in Eastern Europe (that's geolocation). Geolocation alone wouldn't give you the abuse contact or the registration date (that's WHOIS). Neither alone would tell you about the IP's behavioral history (that's reputation data). The combination is what makes the investigation effective.

Run a WHOIS IP Lookup Now

Enter any IP address and instantly see the full WHOIS registration record — network owner, block size, abuse contact, AS number, and registration dates.

WHOIS Lookup Tool

Frequently Asked Questions

Does WHOIS tell you who is using an IP address?
No. WHOIS tells you who the IP address block is registered to, which is typically an ISP, hosting provider, or large organization. It does not identify the individual end user currently assigned that IP. To find out who is actually using an IP at a specific time, the ISP would need to check their internal DHCP logs, which requires a legal process like a court order or subpoena.
What is the difference between WHOIS and IP geolocation?
WHOIS tells you the organizational owner of an IP block: who registered it, their contact information, and which network it belongs to. IP geolocation tells you the approximate physical location (country, city, coordinates) associated with an IP address. WHOIS answers "who owns it"; geolocation answers "where is it." For a complete picture, use both together.
Is WHOIS data free to access?
Yes. WHOIS data is publicly available and free to query through web-based tools, command-line utilities, and the APIs provided by Regional Internet Registries (ARIN, RIPE NCC, APNIC, AFRINIC, LACNIC). However, some registries implement rate limiting to prevent abuse, and GDPR regulations have caused some European records to redact personal contact details.
Why does a WHOIS lookup show an ISP instead of a person's name?
ISPs purchase large blocks of IP addresses from Regional Internet Registries and then dynamically assign individual addresses to their customers. The WHOIS record reflects the block-level registration (the ISP), not the individual customer assignment. This is why a WHOIS lookup for a residential IP almost always returns the ISP name — like Comcast, AT&T, or Vodafone — rather than a person's name.
What is RDAP and is it replacing WHOIS?
RDAP (Registration Data Access Protocol) is the modern, standards-based replacement for the legacy WHOIS protocol. It returns structured JSON data instead of free-form text, supports HTTPS for secure queries, and has built-in support for internationalized data and access controls. All five Regional Internet Registries now support RDAP, and ICANN has mandated its adoption for domain registrars. The legacy WHOIS protocol still works but is being gradually phased out.
How do I report abuse for an IP address I found via WHOIS?
Look for the OrgAbuseEmail or abuse-mailbox field in the WHOIS results. This is the designated email address for reporting abuse (spam, hacking attempts, DDoS attacks) related to IP addresses in that network block. Include the IP address, timestamps (with timezone), relevant log excerpts, and a description of the abusive behavior. Most ISPs and hosting providers have abuse desks that investigate these reports.

Sources

  1. IETF — "NICNAME/WHOIS" (RFC 812, original WHOIS specification) — datatracker.ietf.org
  2. IETF — "HTTP Usage in the Registration Data Access Protocol (RDAP)" (RFC 7480) — datatracker.ietf.org
  3. ARIN — "WHOIS Help: Understanding WHOIS Output" — arin.net
  4. RIPE NCC — "RIPE Database Documentation" — ripe.net
  5. ICANN — "Registration Data Access Protocol (RDAP) Implementation" — icann.org
  6. APNIC — "Understanding IP Address Allocation" — apnic.net
  7. European Commission — "General Data Protection Regulation (GDPR) and WHOIS" — commission.europa.eu