IP WHOIS: a beginner's guide
Get WHOIS registration data for an IP
IP WHOIS: how to find out who owns the address attacking you
IP WHOIS is the registry that tells you which organization is responsible for a particular IP address. Every public IP on the internet was originally allocated by one of the five Regional Internet Registries (RIRs) — ARIN (North America), RIPE NCC (Europe and the Middle East), APNIC (Asia-Pacific), LACNIC (Latin America and the Caribbean), and AFRINIC (Africa). When you do an IP WHOIS lookup, you are querying the RIR that holds the original allocation, and you get back the organization name, the address ranges they were assigned, the abuse-contact email, and (sometimes) the parent organization that the IPs are sub-allocated from. IP WHOIS has been gradually replaced by a newer protocol called RDAP (Registration Data Access Protocol), which returns the same data in a structured JSON format, but the underlying registry is the same.
You should care because IP WHOIS is the only authoritative way to figure out who is responsible for abusive traffic from an IP address. When you see a brute-force attack, a scraping run, or a denial-of-service attempt in your logs, the IP WHOIS lookup is the first step toward filing an abuse report with the right organization. Most reputable networks publish an `abuse@` email address that monitors and acts on credible complaints — but only if you can find the right address. IP WHOIS is also the standard input for any security investigation that involves attributing traffic to an organization.
The five things every IP WHOIS lookup returns:
The allocating RIR. Which of the five regional registries handed out this address block.
The organization (or owner of record). The company or institution that the IPs are registered to.
The address range. The specific CIDR block this IP belongs to, which is often larger than just the single IP you queried.
The abuse contact. An email address (and sometimes a phone number) for reporting abuse from this network.
The country. The country the organization is registered in, which may differ from where the IPs are actually used.
Three questions an IP WHOIS lookup answers:
Who owns this IP address, and where do I file an abuse report?
Is this IP part of a known cloud provider, a hosting reseller, or a residential ISP?
For an investigation, what is the parent organization's contact info and registration history?
The cost of skipping IP WHOIS is firing abuse reports into the void instead of at the right contact. The fix is one query per IP. The official IP WHOIS data is available through ICANN's lookup, the per-RIR portals (ARIN, RIPE, APNIC, LACNIC, AFRINIC), and a host of free tooling.
The IP WHOIS endpoint, in plain language
In one sentence: Get [WHOIS (who is)](/guides/dns-whois) registration data for an [IP (Internet Protocol address)](/guides/ip-geolocation)
Returns comprehensive WHOIS/RDAP registration data for an IP (Internet Protocol address) address. Includes the owning organization, allocated IP range (start, end, CIDR (Classless Inter-Domain Routing)), network name and handle, registration and last-changed dates, Regional Internet Registry (ARIN, RIPE, APNIC, LACNIC, AFRINIC), RDAP (Registration Data Access Protocol) status codes, and all contacts — including abuse, administrative, registrant, and technical roles — each with name, email, phone, and organization. Also detects bogon (reserved/private) addresses. Results are cached for 1 hour.
Don't worry if some of the words above are still unfamiliar — there's a plain-language glossary at the bottom of this page, and most of the terms link to their own beginner guides if you want to learn more.
What is actually happening when you call it
Here's what's actually happening behind the scenes when you call this endpoint:
Queries the appropriate Regional Internet Registry (RIR) RDAP (Registration Data Access Protocol) endpoint to retrieve IP (Internet Protocol address) allocation data. Uses the IANA RDAP bootstrap (the official internet standard) to automatically route queries to the correct RIR. Parses the full RDAP entity tree to extract all contacts by role (abuse, administrative, registrant, technical) with details from jCard/vCard data (name, email, phone, organization). Returns the allocated IP range in CIDR (Classless Inter-Domain Routing) notation, network name, RDAP handle, registration and update dates, RIR source, and RDAP status codes. Short-circuits for bogon/reserved IPs without external API (Application Programming Interface) calls.
If you're using an AI assistant through MCP, you don't need to understand any of the technical details — the assistant calls the tool and translates the result for you.
Why this specific tool matters
Let's skip the marketing fluff and answer the only question that actually matters: why should you, a real human with a real to-do list, care about the IP WHOIS tool? Here's the plain-English version, written the way you'd hear it from a friend who happens to do this for a living.
IP (Internet Protocol address) WHOIS (who is) data is critical for incident response, threat attribution, abuse reporting, and due diligence. During security incidents, responders need to quickly identify who operates an attacking IP and find the abuse contact to report malicious activity. This endpoint is the single source for IP registration data and abuse contact information, replacing the need for separate lookups. For compliance, verifying IP ownership confirms vendor and partner infrastructure claims.
Picture this in real life. Imagine an incident responder. Here's the situation they're walking into: During an active security incident, quickly identify the organization, ISP, or cloud provider operating the attacking IPs to coordinate takedown and notify the responsible party. Without the right tool, that person would be stuck copy-pasting between five browser tabs, reading documentation written for engineers, and crossing their fingers that the answer they cobble together is correct. With the IP WHOIS tool, the same person gets a clear answer in seconds — no spreadsheets, no guessing, no waiting for someone on the infrastructure team to free up.
Three questions this tool answers in plain English. If any of these have ever crossed your mind, the IP WHOIS tool is built for you:
Where in the world is this server actually located, and who runs the network it sits on?
How fast does traffic move between my users and my service?
Is the IP address I am looking at part of a residential network, a data center, or something suspicious?
You can either click the tool and get the answer yourself, or ask your AI assistant — connected through MCP (Model Context Protocol) — to ask the question for you and translate the answer into something you can paste into Slack.
Who gets the most out of this. Network engineers, IT admins, sales teams qualifying enterprise prospects, and product teams building geo-personalization or fraud rules. If you see yourself in that list, this is one of the EdgeDNS tools you should bookmark today.
What happens if you skip this entirely. Skip it and you can't tell where your users actually are, who runs the network they're on, or why they're seeing slow page loads. That's why running this check — even once a month — is one of the cheapest forms of insurance you can give your domain.
Available on the developer plan. The technical details: `GET /v1/ip/whois`.
When would I actually use this?
If you're still on the fence about whether the IP WHOIS tool belongs in your toolbox, this section is for you. Below you'll meet three real people — an incident responder, a security operations, and a compliance officer — facing three real situations where this tool turns a stressful afternoon into a five-minute task. Read whichever story sounds closest to your week.
Story 1: Incident Response & Attribution
Imagine you're an incident responder. During an active security incident, quickly identify the organization, ISP, or cloud provider operating the attacking IPs to coordinate takedown and notify the responsible party.
Why it matters: Immediate attribution and contact information for rapid incident containment and coordinated response.
Story 2: Abuse Report Filing
Imagine you're a security operations. Identify the registered organization and correct RIR for malicious IP (Internet Protocol address) traffic to file properly formatted abuse reports with the responsible network operator.
Why it matters: Route abuse reports to the correct organization with proper registry reference for faster resolution.
Story 3: Vendor & Infrastructure Verification
Imagine you're a compliance officer. Verify that IP (Internet Protocol address) addresses used by vendors, partners, or third-party services are actually registered to the claimed organizations as part of vendor due diligence.
Why it matters: Confirm infrastructure ownership claims and detect potential supply chain risks through IP (Internet Protocol address) registration verification.
Common situations across teams. Beyond the three stories above, here are the everyday workplace moments when people across the company reach for the IP WHOIS tool — or one of the tools right next to it in this category. If any of these are on your calendar this month, that's your sign:
When a customer reports that your site is slow specifically from their region.
When you need to know whether traffic is coming from a residential network or a data center.
When planning a CDN, points of presence, or geographic expansion.
During an outage, to see exactly where in the route packets are getting lost.
If you can see yourself in even one of those bullets, the IP WHOIS tool will pay for itself the first time you use it.
Still not sure? Here's the easiest test in the world. Open Claude, ChatGPT, Gemini, or any other AI assistant connected to the EdgeDNS MCP server and ask, in your own words: "Is the IP WHOIS tool useful for my job?" The assistant will look at the tool, ask you a couple of follow-up questions about what you're trying to accomplish, and give you a straight answer in plain English. No commitment, no signup forms, no jargon.
The easiest way: just ask your AI assistant
If you've connected the EdgeDNS MCP server to Claude, ChatGPT, Gemini, Cursor, or any other AI assistant, you don't need to write any code. Just ask in plain English:
"Use the IP WHOIS tool to check example.com and explain anything that looks wrong in plain language."
The AI will figure out which tool to call, fill in the right parameters, run it, and then explain the result back to you. No copy-pasting between tabs. No reading raw JSON. No memorizing endpoint names.
MCP (Model Context Protocol) access is free on every plan, including the free tier. One API key works for both REST and AI — you do not have to choose.
The technical way: call it from code
If you're a developer and want to call the endpoint from a script or your own application, here's the simplest possible example. Replace the placeholder API key with the real one from your dashboard.
# Replace edns_live_YOUR_KEY with your real API key from the dashboard
curl -H "Authorization: Bearer edns_live_YOUR_KEY" \
"https://api.edgedns.dev/v1/ip/whois?ip=8.8.8.8"What you need to provide
There's just one piece of information you need to provide. The table below explains exactly what it is and what a real value looks like.
| Field | Type | Required? | What it means | Example |
|---|---|---|---|---|
ip | string | Yes | The IPv4 (Internet Protocol version 4) or IPv6 (Internet Protocol version 6) address to query WHOIS (who is) data for | 8.8.8.8 |
What you get back
When you call this tool, you'll get back a JSON object with the fields below. If you're talking to it through an AI assistant, the assistant reads these for you and explains them in plain language — you don't need to memorize them.
| Field | Type | What you'll see in it |
|---|---|---|
ip | string | The queried IP (Internet Protocol address) address |
range.start_address | string | Start of allocated IP (Internet Protocol address) range |
range.end_address | string | End of allocated IP (Internet Protocol address) range |
range.cidr | string | CIDR (Classless Inter-Domain Routing) notation of the allocation |
name | string | Network name from RDAP (Registration Data Access Protocol) |
handle | string | RDAP (Registration Data Access Protocol) registration handle |
organization | string | Registered organization name |
registration_date | string | When the range was allocated |
last_changed | string | Last update date of the registration |
rir | string | Regional Internet Registry: ARIN, RIPE, APNIC, LACNIC, or AFRINIC |
status | array | RDAP (Registration Data Access Protocol) status codes (e.g., active, reserved) |
contacts | array | All contacts (abuse, administrative, registrant, technical) — each with role, name, email, phone, and organization |
contacts_truncated | boolean | Whether the contacts list was truncated (max 50 contacts) |
is_bogon | boolean | Whether the IP (Internet Protocol address) is a bogon (reserved/private) address |
bogon_type | string | Bogon classification (e.g., rfc1918_private, rfc5737_documentation) |
Words you might be wondering about
If any words on this page felt like jargon, here's a plain-language version. Click any linked term to read a full beginner-friendly guide.
IP (Internet Protocol address) — A unique number that identifies a computer on the internet, like a phone number for a server.
API (Application Programming Interface) — A way for one program to ask another program for something — like a waiter taking your order to the kitchen.
WHOIS (who is) — A public record that tells you who registered a domain name, when, and through which company. Modern WHOIS is now called RDAP but most people still say 'WHOIS'.
RDAP (Registration Data Access Protocol) — The modern, structured replacement for WHOIS. Returns the same kind of information (who owns this domain?) but in a format computers can read more easily.
CIDR (Classless Inter-Domain Routing) — A shorthand way of describing a range of IP addresses, like 192.168.1.0/24. The number after the slash says how many addresses are in the range.
RFC (Request for Comments) — The official internet standards documents. When someone says 'RFC 8484' they mean a specific numbered standards document — in that case, the one defining DNS over HTTPS.
Need Programmatic Access?
Automate domain intelligence with 100+ API endpoints and a free MCP server for AI integration.