Study of whois Command
Experiment
Study of whois Command
π― Aim
To retrieve domain registration and ownership information using the whois command.
π Objective
By the end of this experiment, students will be able to:
- Query domain registration details
- Identify domain owner and registrar
- Find domain creation and expiry dates
- Understand public domain database records
π Theory
The whois command is used to:
- Fetch information about domain names and IP addresses
- Query public databases maintained by domain registrars
π It provides details such as:
- Domain owner (if not private)
- Registrar name
- Registration and expiry dates
- Name servers
π It works using the WHOIS protocol (TCP port 43).
π§Ύ Syntax
π§ Common Usage
- Query a domain:
- Query an IP address:
π§° Prerequisites
- Linux system
- Internet connectivity
-
whoispackage installed
Installation:
π¬ Procedure & Commands
1️⃣ Query a Domain Name
2️⃣ Query a Popular Website
3️⃣ Query an IP Address
4️⃣ Save Output to File
π₯️ Sample Output (Simplified)
π Output Interpretation
| Field | Meaning |
|---|---|
| Domain Name | Registered domain |
| Registrar | Company managing the domain |
| Creation Date | When domain was registered |
| Expiry Date | When domain registration ends |
| Name Server | DNS servers for the domain |
π Exercises for Students
- Find registrar details of a given domain.
- Identify creation and expiry dates of a domain.
- Query an IP address and note organization details.
- Compare WHOIS results of two different domains.
- Save and analyze WHOIS output in a file.
❓ Viva Questions
-
What is the purpose of
whois? - What protocol does WHOIS use?
- What is a domain registrar?
- Why are some WHOIS details hidden?
- Difference between domain and IP WHOIS lookup?
⚠️ Precautions
- Some information may be hidden due to privacy protection (WHOIS privacy)
- Excessive queries may be rate-limited
- Data accuracy depends on registrar updates
✅ Result
The whois command is a useful tool for retrieving domain and IP registration details, widely used in network administration and cybersecurity.
Comments
Post a Comment