Types of Databases

Domain Whois

Includes registrant information for a domain name, aggregated from multiple trusted sources across the internet using advanced crawlers and scrapers. This Whois data is especially useful for cold outreach, lead generation, and targeted marketing efforts, providing insights into ownership, contact details, and domain history to support more informed engagement strategies.

IP WHOIS Database

DNS Data

Includes comprehensive DNS configuration data such as A, AAAA, NS, MX, SOA, SPF, TXT, and CNAME records. This information is valuable for threat analysis and domain categorization, offering insights into how a domain and its services are structured. By examining DNS records, security teams can identify misconfigured servers, spoofing risks, or links to suspicious infrastructure. These insights support better incident response and more accurate domain reputation scoring.

IP WHOIS Database

Subdomains Data

Subdomains play a critical role in threat detection, and their misconfigurations can lead to significant security exposure. Access to comprehensive subdomain data is essential for security analysts to identify vulnerabilities and assess risk effectively. This data helps uncover shadow IT, detect phishing infrastructure, and monitor domain footprint expansion across evolving threat surfaces.

IP WHOIS Database

IP WHOIS

The IP WHOIS database is a centralized resource containing detailed registration information for IP addresses. It provides data about the IP address owner, including organizational and contact details. The database records important registration dates and status information for each IP address. It also links IP addresses to their associated Autonomous Systems for network identification and management.

IP WHOIS Database

ASN WHOIS

The ASN WHOIS database is a powerful resource offering comprehensive data on Autonomous System Numbers (ASNs) worldwide. It includes detailed ownership information and the specific IP blocks assigned to each ASN. The database identifies the organization responsible for the ASN along with its registered country. It also provides essential technical, abuse, and administrative contact details, such as email addresses and phone numbers.

ASN WHOIS Database

IP to ISP

Our IP to ISP Database offers detailed insights into the Internet Service Providers linked to IP addresses. It helps identify the network source, aiding in traffic analysis and policy enforcement. This data is vital for optimizing network performance and implementing effective security strategies. It also supports content delivery improvements by understanding user connection types and providers.

IP to ISP Database

IP to ASN

Lookup Autonomous System Number (ASN) details by providing an IP address or ASN using our comprehensive ASN database. Autonomous Systems (ASes) are collections of IP networks managed by a single organization or entity. Each AS operates under a unified routing policy and plays a key role in the structure of the internet. This data is essential for understanding network ownership, routing paths, and enhancing network visibility.

IP to ASN Database

Geolocation

Provides IP-to-precise-geolocation mapping for pinpointing the exact location of users or devices. This data is highly useful for identifying the origin of cyber threats or suspicious activity. It also helps in delivering region-specific or personalized content to enhance user experience. Additionally, it supports applications in fraud detection, compliance, and targeted marketing.

Geolocation Database

Features

VPN and Proxy Detection

With our security solution, you can easily distinguish between organic traffic and scraping activity. This data enables you to effectively detect and block scrapers, protecting your digital assets.

Threat score

Our composite threat score rolls VPN/proxy use, Tor exit status, bot activity, spam history, and other risk signals into one decisive metric - enough to flag a suspicious IP instantly.

Network Details

We provide the AS Number and organization details about an IP address which enables easier detection of service providers as well as potential malicious networks.

Supported Formats

Our system supports two widely-used data formats: CSV (Comma-Separated Values) for easy data manipulation and compatibility, and MMDB (MaxMind Database) for efficient, high-performance geolocation lookups. This ensures flexible integration with various workflows and applications.

Expose hidden threats, enhance security, and outsmart cyber-attackers rapidly

Common Use Cases

VPN and Proxy Detection Fraud Prevention, Ad Traffic Filtering, Rate Limiting or CAPTCHA Enforcement, Bot Detection.
Threat Score Real-Time Risk Assessment, Firewall/Edge Blocking, Fraud Analytics, Threat Intelligence Dashboards.
Owner Information (WHOIS Data) Phishing and Brand Protection, B2B Lead Generation, Compliance and Due Diligence, Security Investigations.
Network Details (ASN, Organization) ISP-Based Blocking or Throttling, Network Mapping, Attribution.
Geolocation Personalized Content, Geo-Based Access Control, Threat Localization, Regulatory Compliance.
DNS Data Domain Misconfiguration Detection, Phishing Site Identification, Brand Monitoring, Security Audits.
Subdomain Data Attack Surface Management, Shadow IT Detection, Phishing Detection, Bug Bounty & Pen Testing.



FAQs

Can we rely on geolocaiton data precision?

Yes, You can rely on geolocation data precision as we offer the city level accuracy in majority of the data while the town and street level accuracy for some data as well.

Does the DNS Information contains histoical records as well?

Yes, The DNS Database will cover the hostprical data as well. and in each update you will only receive the updated data.

Do we get the snap shot of Databases or the Updates only?

For most databases that are hundreds of gigabytes in size, we provide updates only, as processing full snapshots can be challenging due to their large size. However, for smaller databases - typically just a few gigabytes - we do offer full snapshots.

Is it possible to subscribe to a few selected databases, or do we need to subscribe to all of them?

Yes, you can subscribe to a single database, multiple databases, or all of them - based entirely on your needs. We offer full flexibility, allowing you to choose exactly what fits your use case.

What data formats does your security database support for threat intelligence?

Our security database supports two key data formats: CSV (Comma-Separated Values) for seamless data management and broad tool compatibility, and MMDB (MaxMind Database) for fast, precise threat intelligence queries. This combination delivers both versatility and high efficiency for your security needs.