Blog
Written By Qasim, WhoisFreaks Team Published: March 13, 2025, Last Updated: April 10, 2026
Reverse WHOIS lookup by email lets you find every domain name registered using a specific email address. Instead of starting with a domain and looking up its owner, you start with a known owner attribute and retrieve the complete list of domains connected to it. This makes reverse WHOIS one of the most direct methods for mapping domain portfolios, tracing threat actor infrastructure, and identifying brand infringements.
WhoisFreaks indexes more than 3.6 billion WHOIS records and supports reverse searches by email address, registrant name, organization name, phone number, and keyword. Results include both active and historical registrations, which means domains registered before GDPR privacy protections took effect in 2018 remain searchable even if their current records are redacted.
This guide explains how reverse WHOIS by email works, when to use it, what its limitations are, and how to run it manually through a lookup tool or at scale through the API.
Reverse WHOIS lookup is the process of querying a WHOIS database using a registrant attribute, such as an email address, person name, or company name, and retrieving all domain names linked to that attribute. It inverts the standard WHOIS direction: standard WHOIS takes a domain and returns its owner data, while reverse WHOIS takes owner data and returns all associated domains.

Before diving into Reverse WHOIS, it's important to understand the WHOIS system. Every domain on the internet has a WHOIS record, which contains vital information about its ownership.
A WHOIS Lookup provides information such as:
This data is publicly accessible unless the domain owner has opted for WHOIS privacy protection, which masks certain details.
Unlike a standard WHOIS lookup, which searches for information about one domain name, a Reverse WHOIS Lookup allows users to find all domains that share a common WHOIS detail, such as:
For example, if a cybersecurity researcher wants to find all domains registered by a known attacker, they can perform a Reverse WHOIS Lookup using the attacker’s email address.

This will return a list of all domains linked to that email, helping to identify other websites potentially involved in phishing campaigns, malware distribution, or fraudulent activities.
For example, in the attached Reverse WHOIS Lookup using Email of an attacker, the tool showed 266 records.
The following steps work for both the free tool and the API. Use the tool for one-off lookups. Use the API when you need to process multiple email addresses or integrate results into a workflow.
Navigate to the WhoisFreaks Reverse WHOIS tool. The search interface accepts four types of input: email address, registrant name, organization name, and keyword. Select "Email" as your search type.
Paste the full email address you want to investigate. Use the exact registrant email as it would appear in a WHOIS record, for example [email protected]. Partial matches are supported using the keyword field and for the email regex search option is available.
WhoisFreaks returns results in standard mode by default, which includes all the details WHOIS provides. If you need only the registrant name, organization, registration date, and domain name use the mini mode, this will reduce response size.
Each result row shows the domain name, the registrant details matched to your email, and the registration date. Domains that no longer use that email but used it at any prior point in registration history will appear in the results. Review for patterns: shared nameservers, registration clusters on specific dates, or related domain naming conventions often indicate a coordinated campaign or a single operator's full portfolio.
For exports above the tool's display limit, use the Reverse WHOIS API to retrieve results programmatically. A basic API call for email-based reverse lookup takes the form:
GET https://api.whoisfreaks.com/v1.0/whois?apiKey=YOUR_KEY&whois=reverse&[email protected]For full parameter documentation, authentication setup, and pagination reference, see the Reverse WHOIS API product page.
Since GDPR took effect in May 2018, most domain registrars in the European Union and many outside it began redacting registrant contact data, including email addresses, from publicly accessible WHOIS records. This means that domains registered or renewed after mid-2018 by privacy-conscious registrants will often show a proxy email such as [email protected] rather than the actual registrant email.
First, if the email address was used before privacy redaction and the registrant did not update their records or transfer the domain, historical WHOIS records preserve the original contact data. WhoisFreaks indexes WHOIS history records going back to 1986, and pre-2018 records for millions of domains retain the original registrant email.
Second, some registrars do not participate in GDPR redaction because they operate in jurisdictions that do not require it. Domains registered through these registrars continue to expose registrant email in current WHOIS records.
Third, if a threat actor or registrant reuses the same proxy email across multiple registrations, a reverse WHOIS search on the proxy email address will still surface all domains that share it, even if the proxy obscures the actual registrant.
Reverse WHOIS by email is most reliable for pre-2018 registrations and for investigations where the target has not used WHOIS privacy services. For newer registrations with redacted contacts, pair reverse WHOIS with other pivot points such as shared nameservers, SSL certificate organizational data, or IP address clustering.
Reverse WHOIS supports four primary search attributes. Each produces different results and is suited to different investigation or research scenarios.
| Search Input | Best Used When | Typical Result Set | Precision |
|---|---|---|---|
| Email address | You have a specific registrant email from a prior WHOIS record, threat intel feed, or data breach | All domains ever registered using that exact email | High |
| Registrant name | You have a person's full name as it appears in WHOIS records | All domains registered under that name across all registrars | Medium (name collisions are common) |
| Organization name | You want the full domain portfolio of a company | All domains where the registrant organization matches your search term | Medium to high |
| Keyword | You want to find domains containing a specific term in any WHOIS field | Broader results including partial matches in company name, address, or registrar notes | Low to medium |
When researching a company's domain portfolio, an organization name search is usually broader and more complete because the company may use multiple email addresses across different registrants or departments. Email-based searches are more precise but may miss domains registered by other employees or subsidiaries using different email addresses. The most thorough approach combines both: run an organization name search first, then pivot on any email addresses that appear in the results.
This is a different task from reverse WHOIS. To find all email addresses associated with a specific domain, you need a standard WHOIS or WHOIS History lookup on that domain, not a reverse lookup. The WHOIS record for any domain includes the registrant, admin, and technical contact email addresses used at registration. WHOIS History lookup will show you every email address that has ever been associated with the domain, including addresses changed or redacted over time.
Cybersecurity professionals use Reverse WHOIS to track down attackers and identify malicious domains.
Many cybercriminals register multiple web addresses using the same email address or company name. By performing this type of WHOIS Lookup, security analysts can:
Businesses often use WHOIS Lookup to conduct market research and competitive analysis. By searching for a competitor's company name, they can:
perform a reverse WHOIS company lookup for your competitor like the one performed below:

Companies frequently perform Reverse WHOIS Lookups to protect their trademarks and brand identity. If a third party registers a web address similar to a well-known brand, businesses can take action by:
For ongoing monitoring rather than one-off lookups, Registrant Monitoring alerts your team automatically when a known registrant email or name registers new domains.
Organizations that own multiple domains use Reverse Lookup to track all domains registered under their name. This helps them:
Most reverse WHOIS lookups by email work as expected for registrations made before mid-2018, when WHOIS privacy redaction became widespread. For investigations that require coverage of post-2018 domains with redacted contacts, the Reverse WHOIS API supports historical record queries going back to 1986, which means pre-redaction registrant data is accessible even when current records are masked. Pair email-based reverse lookups with organization name searches on the same dataset to build the most complete picture of a registrant's domain activity.

ExpiredDomains.net does not offer any API to integrate its services into customer infrastructure. To access expired or deleted domain names via an API, you would need to rely on scraping or third‑party providers.
9 min read

WhoisFreaks offers daily & historical domain data with WHOIS/DNS insights for threat analysis.
9 min read

Historical WHOIS data is the digital fingerprint of domain activity. WhoisFreaks tools help security teams trace attackers, rebuild attack timelines, preserve court-ready evidence, and detect threats early, strengthening incident response and proactive cybersecurity defenses.
9 min read