In This Guide
- The Myth: WHOIS Tells You Who Is Using an IP
- What WHOIS Actually Is
- WHOIS vs. IP Geolocation: When to Use Which
- How to Perform a WHOIS IP Lookup
- Reading WHOIS Results: Field-by-Field Breakdown
- The Five Regional Internet Registries
- WHOIS Privacy and GDPR
- Practical Use Cases
- RDAP: The Modern Replacement for WHOIS
- Command-Line WHOIS vs. Web-Based Tools
- Frequently Asked Questions
The Myth: "I'll WHOIS This IP and Find Out Who's Behind It"
It shows up in forum posts, Reddit threads, and even some security tutorials: "Just run a WHOIS on the IP and you'll see who it belongs to." The implication is that WHOIS will reveal the person sitting at the keyboard — the individual sending spam, launching attacks, or visiting your website.
That is not what WHOIS does. Not even close.
A WHOIS lookup on an IP address tells you who the address block is registered to. In the vast majority of cases, that's an Internet Service Provider, a hosting company, or a large enterprise — not an individual end user. When you WHOIS a residential IP address like one from Comcast or Vodafone, you'll see Comcast or Vodafone's registration information. You will not see the subscriber's name, their street address, or any personally identifying information about the person using that IP at any given moment.
This distinction matters because acting on WHOIS results with the wrong mental model leads to dead ends at best and legal problems at worst. If someone's attacking your server from a Comcast IP, WHOIS tells you to contact Comcast's abuse team — it doesn't tell you which of Comcast's tens of millions of subscribers is responsible. Only Comcast knows that, and they'll only share it with law enforcement under a valid legal order.
Understanding what WHOIS actually returns — and what it doesn't — makes the tool far more useful. It answers the right questions: Which organization controls this IP block? What network does it belong to? Who do I contact about abuse? Where in the global allocation hierarchy does this address sit?
What WHOIS Actually Is: The Internet's Original Directory
WHOIS (pronounced "who is") is one of the oldest protocols still in active use on the internet. It dates back to the early 1980s and the ARPANET era, when the internet was a small research network and you could literally look up who was responsible for any connected system.
The original WHOIS service was formalized in RFC 812 in 1982 by Ken Harrenstien and Vic White at SRI International. The concept was simple: a query-response protocol running on TCP port 43 that let you look up registration information for network resources. In the ARPANET days, with only a few hundred connected hosts, this worked like a phone book. You could find out which person at which institution was responsible for any address on the network.
As the internet grew from hundreds of hosts to billions of connected devices, the WHOIS system had to scale. The responsibility for maintaining registration data was distributed across five Regional Internet Registries (RIRs), each covering a different geographic region. IP address blocks are allocated in a hierarchy: the Internet Assigned Numbers Authority (IANA) allocates large blocks to RIRs, RIRs allocate smaller blocks to ISPs and organizations, and those organizations assign individual addresses to end users.
WHOIS sits at the RIR and organization level of this hierarchy. It can tell you that a /16 block was allocated to AT&T by ARIN in 2003. It can tell you the /24 sub-block was assigned to a specific data center. But the individual /32 assignment to a home router? That's internal ISP data, not public WHOIS data.
WHOIS vs. IP Geolocation: When to Use Which
WHOIS and IP geolocation answer fundamentally different questions about the same IP address. Confusing the two leads to using the wrong tool for the job. Here's when each one is the right choice.
| Factor | WHOIS IP Lookup | IP Geolocation |
|---|---|---|
| Primary question | Who owns/controls this IP block? | Where is this IP physically located? |
| Returns | Organization name, network range, abuse contacts, registration dates | Country, city, coordinates, ISP name, timezone |
| Data source | RIR registration databases (authoritative) | Commercial geolocation databases (estimated) |
| Accuracy type | Factual — registration data is definitive | Approximate — city-level estimates vary by region |
| Best for | Abuse reporting, network analysis, security investigation | Fraud detection, content localization, visitor analytics |
| Identifies individuals | No (shows organizations/ISPs) | No (shows approximate area) |
| Protocol | WHOIS (TCP 43) or RDAP (HTTPS) | Proprietary database queries |
| InfoSniper tool | WHOIS Lookup | IP Geolocation Lookup |
In practice, experienced analysts use both together. WHOIS tells you the IP belongs to a DigitalOcean server block registered in 2019. Geolocation tells you that specific IP routes through a data center in Frankfurt. The IP reputation check tells you whether that address has a history of abuse. Each layer adds context that the others miss.
How to Perform a WHOIS IP Lookup
There are several ways to run a WHOIS query. The fastest for most people is a web-based tool. Here's the step-by-step process.
Using InfoSniper's WHOIS tool
- Go to infosniper.net/whois.php — the WHOIS lookup form accepts any IPv4 or IPv6 address.
- Enter the IP address you want to investigate. Example:
8.8.8.8(Google's public DNS). - Review the results — the tool queries the appropriate Regional Internet Registry and returns the full WHOIS record, including the network range, organization, abuse contact, and registration dates.
- Follow up — use the abuse contact email for reporting, or run a geolocation lookup on the same IP for location data.
Using the command line
Most Linux and macOS systems have a whois command built in. Windows users can install it via WSL or use third-party tools.
$ whois 8.8.8.8 NetRange: 8.8.8.0 - 8.8.8.255 CIDR: 8.8.8.0/24 NetName: LVLT-GOGL-8-8-8 NetHandle: NET-8-8-8-0-2 Parent: NET8 (NET-8-0-0-0-0) NetType: Direct Allocation OriginAS: AS15169 Organization: Google LLC (GOGL) RegDate: 2023-12-28 Updated: 2023-12-28 OrgName: Google LLC OrgId: GOGL Address: 1600 Amphitheatre Parkway City: Mountain View StateProv: CA PostalCode: 94043 Country: US OrgAbuseHandle: ABUSE5250-ARIN OrgAbuseName: Abuse OrgAbusePhone: +1-650-253-0000 OrgAbuseEmail: [email protected]
This output is from ARIN (the North American registry) because 8.8.8.8 falls within an IP range allocated to a US-based organization. If you query an IP registered in Europe, the results will come from RIPE NCC with a slightly different format. The output format varies by registry, which is one of the headaches the newer RDAP protocol solves.
Reading WHOIS Results: A Field-by-Field Breakdown
WHOIS output can look intimidating the first time you see it — a wall of labels and values without obvious structure. Here's what each important field means and why it matters.
| Field | Example Value | What It Means |
|---|---|---|
| NetRange | 8.8.8.0 - 8.8.8.255 | The start and end IP addresses of the registered block. Every IP in this range shares the same WHOIS record. |
| CIDR | 8.8.8.0/24 | Same range expressed in CIDR notation. /24 = 256 addresses. /16 = 65,536 addresses. The smaller the number after the slash, the larger the block. |
| NetName | LVLT-GOGL-8-8-8 | An internal identifier for this network block. Often contains abbreviated organization names. |
| NetType | Direct Allocation | How the block was obtained. "Direct Allocation" means from a RIR. "Reassignment" means from an ISP. |
| OriginAS | AS15169 | The Autonomous System number that announces this prefix via BGP. Useful for identifying the actual network operator. |
| OrgName | Google LLC | The organization that holds the registration for this IP block. |
| RegDate | 2023-12-28 | When this registration record was created. Older dates often indicate established, legitimate organizations. |
| OrgAbuseEmail | [email protected] | The designated contact for reporting abuse originating from IPs in this block. This is where you send abuse complaints. |
The parent/child relationship
WHOIS records often show hierarchical allocations. A large ISP might hold a /12 block (over 1 million addresses), which is subdivided into /16 and /24 sub-blocks reassigned to regional operations or customers. When you query a specific IP, the WHOIS system returns the most specific matching record. The "Parent" field in the output shows the larger block it's carved from.
This hierarchy matters for abuse reporting. Sometimes the most specific record shows a hosting customer, with the parent record showing the hosting provider. If the customer's abuse contact doesn't respond, escalate to the parent organization.
NetRange: 203.0.113.0 - 203.0.113.255 CIDR: 203.0.113.0/24 NetName: EXAMPLE-HOSTING-NET3 NetType: Reassigned OriginAS: AS64496 Organization: Example Hosting Inc. (EHI-2) RegDate: 2021-06-15 Updated: 2024-01-10 Parent: NetRange: 203.0.0.0 - 203.0.255.255 CIDR: 203.0.0.0/16 NetName: APNIC-EXAMPLE-NET NetType: Direct Allocation Organization: Example Telecom Ltd (ETL) OrgAbuseEmail: [email protected] OrgTechEmail: [email protected]
The Five Regional Internet Registries
Every public IP address on the internet is ultimately allocated by one of five Regional Internet Registries. Which RIR holds the record for a given IP determines which WHOIS server you need to query — though most tools handle the routing automatically.
| Registry | Region | WHOIS Server | RDAP Endpoint |
|---|---|---|---|
| ARIN | US, Canada, Caribbean, North Atlantic islands | whois.arin.net | rdap.arin.net/registry |
| RIPE NCC | Europe, Middle East, Central Asia | whois.ripe.net | rdap.db.ripe.net |
| APNIC | Asia, Australia, New Zealand, Pacific Islands | whois.apnic.net | rdap.apnic.net |
| AFRINIC | Africa | whois.afrinic.net | rdap.afrinic.net/rdap |
| LACNIC | Latin America, parts of Caribbean | whois.lacnic.net | rdap.lacnic.net/rdap |
When you use a web-based WHOIS tool or the command-line whois utility, it typically queries ARIN first (or a referral server), and ARIN either responds directly or redirects the query to the appropriate RIR. This referral process is invisible to the user but explains why you sometimes see "ReferralServer" in WHOIS output — the query was handed off to a different registry.
Output format differences between registries
Each RIR uses a slightly different output format, which can be confusing when comparing records. ARIN uses a proprietary format with fields like "NetRange" and "OrgName." RIPE NCC uses the RPSL (Routing Policy Specification Language) format with "inetnum" and "descr" fields. APNIC's format resembles RIPE's but has some APNIC-specific extensions. This inconsistency is one of the key problems that RDAP was designed to solve.
WHOIS Privacy and GDPR: How Regulations Changed the Data
Before May 2018, a WHOIS lookup for a domain name or an IP block registered by a European entity would typically include the registrant's full name, street address, phone number, and email. Then the EU's General Data Protection Regulation (GDPR) took effect, and WHOIS data changed significantly.
GDPR classifies personal data in WHOIS records as protected information that requires a lawful basis for processing and sharing. In response, RIPE NCC and European registrars began redacting personal contact details from public WHOIS output. Where you once saw a network administrator's name and direct phone number, you now see "REDACTED FOR PRIVACY" or a generic organizational contact.
The impact varies by record type and registry:
- IP address WHOIS (all registries): Less affected than domain WHOIS, because IP blocks are typically registered to organizations, not individuals. You'll still see the organization name, abuse contact, and network details. Personal fields (admin name, direct phone) may be redacted in RIPE records.
- Domain WHOIS (primarily ICANN registrars): Heavily affected. Most domain registrars now hide registrant details behind generic contacts or privacy services by default. This does not directly affect IP WHOIS but is worth understanding if you query domain names through the same tools.
- ARIN records: Less affected by GDPR (US-based), but ARIN has its own privacy policies and allows organizations to request redaction of certain fields.
For security professionals, the practical consequence is that WHOIS alone may no longer provide a direct contact person for a network issue in Europe. You'll need to use the organizational abuse contact email and be prepared for a less direct path to resolution. Some organizations now use the RDAP protocol's access control features to provide different levels of detail to verified researchers versus anonymous queries.
Practical Use Cases for WHOIS IP Lookups
Abuse reporting
This is the most common practical use of IP WHOIS. When you see malicious traffic hitting your server — brute-force SSH attempts, spam relay abuse, DDoS packets — WHOIS gives you the abuse contact for the network that owns the source IP.
Effective abuse reports include:
- The offending IP address
- Timestamps with timezone (UTC preferred)
- Relevant log excerpts showing the abusive behavior
- The type of abuse (spam, intrusion attempt, DDoS, etc.)
- Your contact information for follow-up
Send the report to the OrgAbuseEmail address from the WHOIS record. If you don't get a response within a few business days, escalate to the parent network's abuse contact or file a report directly with the RIR.
Network troubleshooting
When diagnosing routing issues, peering problems, or packet loss, WHOIS helps identify who operates the networks along the path. Run a traceroute, then WHOIS the IP addresses at each hop. This reveals the autonomous systems involved and their administrative contacts — essential information when you need to coordinate with upstream providers to resolve a routing problem.
Security investigation
During incident response, WHOIS provides critical context about attacker infrastructure. Key questions it answers:
- Is this a known hosting provider? Attacks originating from AWS, Azure, or DigitalOcean IP ranges suggest compromised cloud instances or malicious tenants. The response strategy differs from attacks from residential ISP ranges.
- When was this network block registered? Recently registered blocks (especially very large allocations to unknown organizations) can indicate bullet-proof hosting operations set up specifically for malicious activity.
- What AS number announces the prefix? Cross-referencing the AS number with BGP route data reveals the network's peering relationships and whether it has a history of hosting abuse.
- Is the registration consistent? Legitimate organizations have consistent WHOIS data across their IP blocks. Inconsistent registration details across related IPs can indicate compromised or hijacked address space.
Pairing WHOIS data with IP reputation checks gives you both the ownership context and the behavioral history of an IP address. Used together with geolocation data, you build a comprehensive picture: who owns the IP, where it routes to, and whether it has a history of abuse.
Competitive analysis and infrastructure research
WHOIS reveals the hosting infrastructure behind any website or service. By querying the IP addresses that a competitor's domain resolves to, you can identify their hosting provider, CDN, and network size. This information is useful for understanding their infrastructure investment and technical decisions. Large organizations that hold their own AS numbers and IP blocks have a different cost and operational profile than those renting individual servers.
RDAP: The Modern Replacement for the WHOIS Protocol
The WHOIS protocol has served the internet since 1982, but it has well-known problems: inconsistent output formats between registries, no standardized authentication or access control, no support for internationalized characters, and plain-text queries that can be intercepted. RDAP — the Registration Data Access Protocol — was developed to address all of these.
Defined in RFC 7480-7484, RDAP is an HTTP-based protocol that returns structured JSON responses. All five RIRs now support RDAP endpoints, and ICANN mandated RDAP support for all domain registrars starting in 2019.
What RDAP improves over legacy WHOIS
| Feature | Legacy WHOIS | RDAP |
|---|---|---|
| Transport | TCP port 43, plain text | HTTPS (encrypted) |
| Output format | Free-form text, varies by registry | Standardized JSON (machine-readable) |
| Internationalization | ASCII only | Full Unicode support |
| Access control | None (public or nothing) | Role-based access (tiered detail levels) |
| Referral handling | Ad-hoc, inconsistent | Standardized bootstrap mechanism |
| Error handling | Free-form error text | HTTP status codes + structured errors |
$ curl -s "https://rdap.arin.net/registry/ip/8.8.8.8" | python3 -m json.tool
{
"handle": "NET-8-8-8-0-2",
"name": "LVLT-GOGL-8-8-8",
"type": "DIRECT ALLOCATION",
"startAddress": "8.8.8.0",
"endAddress": "8.8.8.255",
"entities": [
{
"handle": "GOGL",
"vcardArray": [
"vcard",
[
["fn", {}, "text", "Google LLC"],
["adr", {}, "text", [
"", "", "1600 Amphitheatre Parkway",
"Mountain View", "CA", "94043", "US"
]]
]
],
"roles": ["registrant"]
}
],
"status": ["active"],
"cidr0_cidrs": [
{"v4prefix": "8.8.8.0", "length": 24}
]
}
For most end users, the transition from WHOIS to RDAP is invisible — web-based tools query whichever protocol provides the best results. For developers building tools that consume registration data, RDAP's structured JSON output is significantly easier to parse than the free-form text of legacy WHOIS. If you're integrating WHOIS data into automated workflows, check whether the InfoSniper API already includes the registration data you need, which saves you from having to query RIR endpoints directly.
Command-Line WHOIS vs. Web-Based Tools
Both approaches query the same underlying RIR databases, but they have different strengths depending on your workflow.
For one-off lookups or if you're not comfortable with the terminal, web-based tools like InfoSniper's WHOIS lookup are the practical choice. They handle the RIR routing, format the output, and often combine WHOIS data with geolocation and reputation data in a single view.
For automated workflows — processing log files, building monitoring scripts, integrating with SIEM systems — the command line is more appropriate. You can script batch lookups, parse output with standard Unix tools, and integrate results into your existing pipeline.
For developers building applications that need registration data at scale, the InfoSniper API or direct RDAP queries to RIR endpoints provide the best balance of structured data and reliability. If you need to process large batches of IPs for both WHOIS and geolocation data, the bulk upload tool handles the volume without requiring you to build your own query infrastructure.
Putting It Together: A Complete Investigation Example
To show how WHOIS fits into a real workflow, here's how a security analyst might investigate a suspicious IP that appeared in server logs.
Scenario: Your web application firewall flagged repeated SQL injection attempts from IP 198.51.100.73.
- WHOIS lookup — Query the IP to identify the network owner. The result shows it's registered to a small hosting company with a /22 block (1,024 addresses). Registration date: 3 months ago. This is a relatively new allocation.
- Geolocation lookup — Run the IP through InfoSniper to find the physical location. It resolves to a data center in Eastern Europe.
- Reputation check — Check the IP's reputation. It appears on multiple blacklists for web scraping and brute-force attacks.
- AS number research — The OriginAS from the WHOIS record leads to a BGP analysis showing the AS has very few peers and announces a small number of prefixes — consistent with a bullet-proof hosting operation.
- Action — Block the /22 range at the firewall, file an abuse report with the hosting company (using the OrgAbuseEmail from WHOIS), and report the AS to the upstream transit providers listed in the BGP data.
Each tool contributes a piece of the picture. WHOIS alone wouldn't tell you the IP is in Eastern Europe (that's geolocation). Geolocation alone wouldn't give you the abuse contact or the registration date (that's WHOIS). Neither alone would tell you about the IP's behavioral history (that's reputation data). The combination is what makes the investigation effective.
Run a WHOIS IP Lookup Now
Enter any IP address and instantly see the full WHOIS registration record — network owner, block size, abuse contact, AS number, and registration dates.
WHOIS Lookup ToolFrequently Asked Questions
Sources
- IETF — "NICNAME/WHOIS" (RFC 812, original WHOIS specification) — datatracker.ietf.org
- IETF — "HTTP Usage in the Registration Data Access Protocol (RDAP)" (RFC 7480) — datatracker.ietf.org
- ARIN — "WHOIS Help: Understanding WHOIS Output" — arin.net
- RIPE NCC — "RIPE Database Documentation" — ripe.net
- ICANN — "Registration Data Access Protocol (RDAP) Implementation" — icann.org
- APNIC — "Understanding IP Address Allocation" — apnic.net
- European Commission — "General Data Protection Regulation (GDPR) and WHOIS" — commission.europa.eu