Blog
Written By Qasim, WhoisFreaks Team Published: January 12, 2026, Last Updated: April 30, 2026
WHOIS history is the archived record of who owned a domain at each point in time, including registrant name, contact details, registrar, and name servers. Incident responders use these records as forensic evidence to attribute attacks, map attacker infrastructure, and reconstruct timelines. The WHOIS protocol itself is defined by RFC 3912, and most WHOIS data is public by design, which makes it admissible in legal and regulatory proceedings if it is collected and preserved correctly.
That last condition is where most investigations stumble. A raw WHOIS lookup is just a query result until the responder records when it ran, which tool and endpoint returned it, how the output was saved, and every hand-off after that. Without that audit trail, the same data that could identify an attacker becomes inadmissible in court and weak in an internal audit. This guide covers how DFIR teams use WHOIS history during live incidents, how to preserve it as legal evidence, and which WhoisFreaks tools fit each step of the workflow.
WHOIS history as evidence refers to archived domain registration records that investigators use to attribute attacks, document infrastructure changes, and establish timelines. A WHOIS history lookup returns a domain's previous registrants, registrar transfers, contact detail changes, and name server updates across time. For this data to hold up in court or in a compliance audit, it must be collected through a documented chain of custody: the query time, the tool and API call used, the raw output, and every transfer between analysts.
A current WHOIS record shows who owns a domain right now. Historical WHOIS shows who owned it on every day that came before, which is what turns a single lookup into an investigative trail. Investigators care about the delta: the previous registrant email that still appears across three other domains, the name server change that lined up with a phishing campaign, the sudden shift to a privacy service two weeks after the domain was used in an attack.
Redaction under GDPR and ICANN policy obscures most current WHOIS records for individuals, but historical archives built before and outside those redactions often retain the pre-redaction fields. That is why a current public WHOIS query can return "REDACTED FOR PRIVACY" while a paid historical lookup on the same domain returns a registrant email from 2019 that ties the domain to a known actor. Historical WHOIS fills the gap redaction creates.
In practice, investigators use historical records to answer three questions: who controlled this domain when the incident occurred, what infrastructure changes correlate with the attack timeline, and which other domains share registration patterns with this one. The rest of this guide walks through those use cases and the preservation workflow that keeps the answers legally defensible.
Historical WHOIS shows up at two stages of incident response: reactive analysis during a live incident, and proactive threat hunting before an attack lands. On the reactive side, an analyst who pulls the WHOIS history for a suspicious domain can often identify the registrant's email at the time of the attack, even if the domain was later moved to a privacy service. If that same email appears across two or three other domains flagged in unrelated incidents, one investigator's alert becomes a portfolio-level attribution finding.
On the proactive side, WHOIS history feeds into domain monitoring. A security team adds its brand variants and recent typosquats to a monitoring list, and when someone registers a lookalike domain, the monitoring service returns the WHOIS details inside minutes. The same pattern catches attacker infrastructure before it is weaponized: a newly registered domain with an email that already links to known malicious infrastructure is a high-confidence pre-attack signal.
The Kelihos botnet was a global peer-to-peer network of tens of thousands of infected computers used for spam distribution, credential theft, banking malware deployment, and pump-and-dump stock fraud. The US Department of Justice announced the takedown on April 10, 2017, following the arrest in Spain of Peter Yuryevich Levashov, a 38-year-old Russian national from St. Petersburg, Russia, who operated the botnet under the aliases "Peter Severa" and "Petr Severa".
Kelihos was a distributed peer-to-peer botnet, not a single command server. The operator pushed instructions through layers of infected intermediaries, which meant investigators could not kill the network by seizing a central IP. Attribution required identifying the human operator and the registration patterns behind the domains he controlled.
Court filings from the District of Connecticut show that the investigation combined domain registration data with network-level intelligence to establish operator identity. The 8-count indictment returned on April 21, 2017 charged Levashov with fraud, conspiracy, intentional damage to a protected computer, and aggravated identity theft. Domain-data evidence in cases of this type typically serves four functions:
The evidentiary value comes from the fact that WHOIS records are timestamped and archived. A registration from 2013 that ties an email alias to a command domain is still queryable in 2017 even after the attacker abandons the infrastructure.
The combined intelligence enabled three outcomes. First, the DOJ used a court order to redirect Kelihos traffic away from the attacker-controlled infrastructure, severing the botnet from its operator. Second, Levashov was extradited from Spain to the United States on February 2, 2018 and pleaded guilty in District of Connecticut on September 12, 2018 to the full indictment. Third, the domain evidence entered into the court record is now publicly cited case law that security teams can reference when building attribution arguments in their own investigations.
The Kelihos prosecution is an unusually clean illustration of the WHOIS-as-evidence principle. When WHOIS records are combined with network telemetry, payment trails, and timestamped infrastructure changes, the trail survives proxy services, rapid domain rotation, and attempts to fragment the command-and-control layer.
WhoisFreaks provides a suite of tools to automate each step of WHOIS-based investigation:
Each tool is available through the WhoisFreaks API as well as the web interface. For DFIR teams integrating WHOIS evidence into SIEM, SOAR, or case management systems, API access means the query, the timestamp, and the raw response can be logged automatically, which shortens the manual steps in the chain of custody workflow.
Chain of custody is the documented record of who collected a piece of evidence, when, how it was preserved, and every hand-off that followed. For WHOIS data, the standard is the same one applied to any other digital artifact: the record must show that the data presented in court or in an audit is identical to the data originally returned by the query. NIST's definition of chain of custody applies directly. Five practices meet that bar for WHOIS evidence:
Followed end to end, these five steps produce an evidence package that an internal auditor, an external forensic reviewer, or a court can trace from the original query to the analytical conclusion. Missing any one of them creates a gap that opposing counsel or an audit reviewer can exploit to have the evidence excluded.
A broken chain of custody does not automatically invalidate the underlying WHOIS data as a fact. The domain was registered to that email on that date whether or not anyone documented the query. What breaks is the admissibility of the record as evidence. Three common failure modes produce the same outcome:
Missing timestamps or unsynchronized clocks between the analyst workstation and the WHOIS source mean opposing counsel can argue the query was run at a different time than the log claims. If the time difference is material to the timeline, the record may be excluded.
Edited or re-exported evidence files without the original artifacts on record allow a challenge that the evidence was altered after collection. SHA-256 hashes computed at collection time defeat this challenge. Without them, the defense position is often strong enough to have the file excluded.
Undocumented hand-offs between analysts, teams, or organizations leave gaps in the chain. Even a brief gap is enough for a court to rule the evidence unreliable. The remedy is documenting every transfer, not recovering after the fact.
In US federal practice, the Federal Rules of Evidence require authentication before evidence is admitted. For digital evidence, authentication typically rests on the chain of custody record. The standard is the same across most regulatory audits. For WHOIS data specifically, the point of failure is almost always the same: the data is real, but nobody documented the query.
WHOIS history is one of the few forensic data sources that survives attacker rotation, privacy services, and infrastructure takedowns because the records are archived at the moment of registration, not reconstructed later. For DFIR teams, the operational pattern is consistent across incident types: use Historical WHOIS to establish who controlled a domain when the incident occurred, use Reverse WHOIS to pivot from one identifier to the full portfolio, use Bulk WHOIS to process the portfolio at scale, and use Domain Monitoring to catch the next change in real time.
The chain of custody rules do the work of keeping that evidence admissible. Log every query, preserve the raw outputs, hash them, archive monitoring alerts, and document every hand-off. None of the individual steps is complicated. Missing any one of them costs the evidence its legal weight.
If your team is building a WHOIS-based evidence workflow, start with the WhoisFreaks Historical WHOIS tool to run point queries during active incidents, and review the pricing page for API access if you need to integrate historical lookups into your SIEM, SOAR, or case management system.

ExpiredDomains.net does not offer any API to integrate its services into customer infrastructure. To access expired or deleted domain names via an API, you would need to rely on scraping or third‑party providers.
9 min read

WhoisFreaks offers daily & historical domain data with WHOIS/DNS insights for threat analysis.
9 min read