Blog & How To Guides | WhoisXML API



IP Netblocks API and Database Blog

Secure Your Ssh Server with Iptables and IP Netblocks API

Secure shell (ssh) is the typical tool for getting secure command-line access to Linux (and other Unix flavor) systems. Notably, most Linux-based servers are administered remotely via ssh access. Hence the security of the ssh service is of paramount importance, especially since it is often a very attractive part of the attack surface of an organization. 

The present blog provides a discussion on setting up efficient firewall rules for the ssh service, and extending the whitelist easily with the help of WhoisXML API's IP Netblocks API. The method also works for other services using inbound tcp connections. We discuss a typical iptables firewall on a Linux system. Basic expertise in Linux tools and firewalls is assumed. The recipe works as it is, or with minor modifications also on other systems. 

Relieving Network Concentration Risks Aided by IP Netblocks Lookup

Relieving Network Concentration Risks Aided by IP Netblocks Lookup

It is normal for large enterprises, especially multinational corporations (MNCs), to maintain an IP netblock or several IP ranges for their website hosting requirements. This approach allows them to quickly set up sites as the need arises. There might be problems, though, when a company relies on a single service provider. Any operational disruption on the provider’s part means a halt to its business as well.

This post tackles the challenges that relying on a single web host brings and how access to an IP Netblocks WHOIS database may help alleviate them. In case you are not fully familiar with the notion of netblocks, check this post for an introduction to the subject.

How to Find My or Someone Else’s IP Range with IP Netblocks WHOIS Database and IP Netblocks API

How to Find My or Someone Else’s IP Range with IP Netblocks WHOIS Database and IP Netblocks API

Hackers are known to hijack IP addresses for use in various illegal activities. They could thus use your IP address in a malicious campaign, but that doesn’t mean you’re guilty. And so, your infosec team needs to gather enough evidence to counter accusations of foul play against you. You may also need to help the authorities by looking into who is behind a threat. 

The first step in that direction is answering the question: What is my IP range? Solutions like IP Netblocks API or IP Netblocks WHOIS Database could be of help. That’s not where the buck stops, though, you’ll need to use a host of IP and domain intelligence tools next. For this reason, we created this guide for you.

Why You Need an IP Netblocks WHOIS Database for IoC Enrichment

Why You Need an IP Netblocks WHOIS Database for IoC Enrichment

Indicators of compromise (IoCs) are anomalous network or computer artifacts such as malware signatures, file hashes, or domains that point to a possible breach. This data is aggregated from multiple external threat feeds and log files from internal applications and systems. The analysis of IoCs is part and parcel of an infosec professional’s daily workload. After all, an organization’s security hinges on its ability to detect and act on IoCs that could lead to full-blown cyber attacks timely.

Every day, analysts encounter IoCs of varying severity, as reported by their organization’s security orchestration, automation, and response (SOAR) and security information and event management (SIEM) solutions. The problem with such alerts is that some may be associated with old IoCs that are no longer active or are now being used for legitimate purposes.

That explains the need for constant IoC management. By monitoring IoCs in context, security analysts can find out which ones warrant their attention most as the volume of alerts can easily overwhelm an understaffed security team. But was does “context” mean here? And which sources of data can support in providing it? 

Among other data feeds, IP Netblocks WHOIS Database can ease the burden of IoC enrichment activities for analysts. Let’s find out how.

IP Netblocks API to Fight Cybercrime: Performing an IP Range Lookup & Other Steps

IP Netblocks API to Fight Cybercrime: Performing an IP Range Lookup & Other Steps

It is pretty standard for cybercriminals to spend time exploring a network for weaknesses they can exploit. That’s why cybersecurity experts must continuously monitor their systems and logs for any signs of future attacks. They can do so with various IP and domain intelligence tools, notably using IP Netblocks API as a first step.

How exactly? In this post, we provide a demonstration of how organizations can better ensure their infrastructure’s security and possibly even prevent breaches.

Essential tools for server operators in action

Essential tools for server operators in action

The Internet is a very dangerous place. A server with a public IP address could become the subject of an attack virtually at any time of its operation. Indeed, any service that is vulnerable to any extent is likely to be exploited at some point if left this way; no server operator can deny playing this cat-and-mouse game with hackers. 

Not all hackers meet the stereotypes attributed to them, though. One does not have to be an ingenious IT specialist with very tricky ideas to try and exploit servers. Picking an exploit kit written by someone else, and letting it run on arbitrary IP addresses is essentially free, and it will surely harvest something: sooner or later it will run into a content management system on a website whose owner failed to apply some important security update, or web-based database management console left open to the public. All these could result in an administrator’s access to the server, which may lead to dramatic consequences for the owner. 

It is always instructive, for instance, to frequently take a good look at the access log of your web servers. Let us conduct a bit of an investigation to illustrate what is typically going on.

IP Netblocks WHOIS Database and IP Netblocks API: Two Relevant Ways to Search for LACNIC IP Block Owners

IP Netblocks WHOIS Database and IP Netblocks API: Two Relevant Ways to Search for LACNIC IP Block Owners

We recently announced that our IP netblocks services underwent data enrichment. Users of our database and API should be delighted to know that our ratio of IP netblocks from Latin America and the Caribbean with some meaningful contact information increased from 0% to 61%. Most of the entries previously showed redacted results, but that is no longer the case. We have substantially improved the ratio of IP netblocks with said information for other regions as well.

In light of this welcome development, we wrote this article for users looking for LACNIC netblock data for different purposes. The post includes some background on LACNIC and shows how to search for available IP blocks and effectively assess those they come into contact with by using our IP Netblocks WHOIS Database and IP Netblocks API.

Posted on April 10, 2020

Looking Up AFRINIC IP Addresses and Ownership Information with IP Netblocks WHOIS Database

Searching IP address data to find more clues for cybercrime investigations has become common practice. And for those who are dealing with cybercriminal suspects from Africa, getting real-time and comprehensive IP address ownership information is possible with an IP Neblocks WHOIS Database that contains information on AFRINIC IP addresses.

With these insights, users will be able, for example, to investigate the so-called “Nigerian scams,” which the region has become notorious for. You may be wondering what these scams are, so let us tell you all about them and how our IP Netblocks services can help.

Continue reading
Posted on April 2, 2020

How to Look Up an ARIN IP Address with IP Netblocks WHOIS Database

Why does it matter who’s behind an IP address? Knowing the identity of IP addresses’ owners, whether they are individuals or organizations, helps users determine if they can be trusted or are potential scammers out to carry fraud.

However, that information is not always readily available, and nor is it publicly accessible due to a variety of reasons. So, how can users obtain such data? One resource that may help is an IP Netblocks WHOIS Database. In a nutshell, it lets users know what IP netblock or range an IP address belongs to and who owns it.

This post discusses how users can find an American Registry for Internet Numbers (ARIN) IP address by using an IP netblock database. But first, let’s find out what ARIN is.

Continue reading
Posted on March 16, 2020

How to Find an IP Block Owner with IP Netblocks WHOIS Database

An IP netblock can be a critical piece of information for the companies that engage in online activities. Whether it’s for competitor research or to prevent IP address hijacking, IP netblock data allows technology professionals to deduce who owns a group of IP addresses to pursue their objectives and take relevant action from there.

That said, the ability to quickly derive this information could sometimes spell the difference between success and a missed opportunity, or mitigating or not a cybersecurity threat before it can affect one’s systems and networks.

In this post, we’ll discuss how general users and tech-savvy cybersecurity professionals can obtain IP block data by using a variety of online technologies such as IP Netblocks WHOIS Database and others.

Continue reading
Posted on February 27, 2020

IP and WHOIS Database: How to Find APNIC Block Owners

In the 1980s, detectives, investigators, and regular people who wanted to solve a mystery would need to sit in a car for hours, wear a disguise, and follow their subjects everywhere, be it on foot or by car.

The nature of crimes, however, has changed today. Most of them no longer happen physically; they’re committed in the virtual realm. And so, they call for new methods of investigation where legwork (in the physical sense, that is) is no longer required. Tracing the identity of a cybercriminal, for instance, now requires the right information and sources like an IP WHOIS database.

In this post, we delve into the methods and tools that can help users find the owner of an Asia Pacific Network Information Centre (APNIC) IP block in particular.

Continue reading
Posted on February 17, 2020

How to Conduct a RIPE NCC IP Lookup with an IP Netblocks WHOIS Database

Both the burgeoning use of the Internet and the growing incidence of cybercrime call for insightful information on IP addresses that may be involved in malicious activities. As part of its mandate to maintain Web integrity, the Internet Assigned Numbers Authority (IANA) coordinates the global assignment of IP addresses and Autonomous System Numbers (ASNs).

IANA specifically works with the regional Internet registry (RIR) Réseaux IP Européens Network Coordination Centre (RIPE NCC) to maintain a database of IP addresses for Europe, West Asia, and the former Soviet Union. And so, anyone who wishes to find more information about an IP address from this region must do a RIPE NCC IP lookup.

Continue reading
Posted on January 27, 2020

How to Find a Netblock Owner with an IP Netblocks WHOIS Database

IP netblocks can be considered a neighborhood to which consecutive IP addresses belong. As in the real world, there are good and bad neighborhoods. Fortunately, sophisticated threat intelligence tools enable security engineers to distinguish one from the other.

Traditionally, users can check computers communicating over a network by using a simple ping command to find unresponsive or misbehaving nodes. A ping test sends packets to a server and reveals if the same number of packets were returned, as well as how long it took the destination to issue a response.

Ping tests may be sufficient for network discovery, especially in private networks. However, other tasks may require critical IP intelligence data, such as a WHOIS IP block, for threat hunting and marketing applications. An IP Netblocks WHOIS Database can provide complete ownership histories of IP ranges that can help users determine if these were involved in previous attacks.

Continue reading
Posted on January 10, 2020

From IANA to Using IP Netblocks WHOIS Database for IP Range Lookups

More and more professionals rely on IP intelligence sources such as IP Netblocks WHOIS Database to learn more about IP addresses and their ranges (consecutively numbered sets of IP addresses). Many, however, do not have a full understanding of how IP netblocks and addresses are broken down in the first place and why this information can be useful.

Essentially, IP addresses are numbers from 0 to 536,870,911. Their distribution amongst users is done by Classless Inter-Domain Routing (CIDR). The idea is that the whole interval is split into parts assigned to different bodies responsible for them. These bodies will then split their IP address intervals into smaller ones and delegate their administration to other bodies or end-users. So finally the smallest intervals will have actual owners, or, vice versa, owners will have one or more intervals.

These points are further tackled in this blog post, starting with a short primer about the relevance of the Internet Assigned Numbers Authority (IANA) in the IP address allocation process just mentioned.

Continue reading
Posted on December 20, 2019

Now, You Can Get More Information from Our Updated IP Netblocks WHOIS Database

More comprehensive IP intelligence means more value to our clients. That’s why we are proud to announce an important update on our IP Netblocks WHOIS Database, which now has significantly higher proportions of non-empty or non-redacted fields across IP netblocks.

Empty and redacted fields can create significant challenges for IP netblocks users. Cybersecurity professionals, for example, may not be able to check if certain IP addresses in a given netblock belong to the same registrant or someone else. When investigating an attack involving several individuals, it may also be harder, for example, to pinpoint if several compromised addresses are all from one IP netblock and are, therefore, linked.

Marketing professionals, on the other hand, could make the mistake of bundling an IP address with the wrong netblock that’s assigned to a different organization than the one of interest. Other professionals researching specific companies that share a netblock may have a hard time identifying the addresses that actually belong to them. Incomplete data might lead to faulty assumptions and thus results.

In short, we know how vital IP intelligence information is to organizations and how the lack of it can spell trouble for different types of professionals.

With higher proportions of non-empty or non-redacted fields across RIRs, IP netblocks users can now get more actionable information from their queries. With that in mind, let us elaborate on what has changed exactly and the corresponding benefits.

Continue reading
Posted on February 20, 2019

IP WHOIS lookups vs. an IP Netblocks WHOIS database

In many of the aforementioned applications, it is equally important to find out who an actual IP address is assigned to and which part of the network it belongs to. Technically, it necessary and sufficient for a device to have an IP address to be able to communicate on the network. As it is sufficient, there are nodes which are not assigned a domain name. However, in every communication it is necessary for the IP address to be able to be tracked back at least. This makes IP WHOIS data useful in many of the aforementioned applications, and indeed essential for IT security. In a typical server log, for instance, we have IP addresses whose ownership can be identified via its IP WHOIS record obtainable by the WHOIS protocol...

Continue reading
Updated on February 20, 2019

Who owns the Internet? IP Netblocks WHOIS Data will tell you

The virtual world of the Internet can be linked to physical entities such as organizations or individuals via only a few techniques. One of the possibilities is to start from the IP address: the unique number associated with each machine connected to the Internet. As such an address is technically essential for any networked machine to operate and each Internet communication to take place, it is a very efficient and viable approach revealing the ownership of the infrastructure and the hierarchy behind its definition...

Continue reading
Try our WhoisXML API for free
Get started