Domain Intelligence: WHOIS + DNS Bulk Lookup avatar

Domain Intelligence: WHOIS + DNS Bulk Lookup

Pricing

Pay per usage

Go to Apify Store
Domain Intelligence: WHOIS + DNS Bulk Lookup

Domain Intelligence: WHOIS + DNS Bulk Lookup

Pass a list of domains, get WHOIS data, DNS records, and inferred signals like email provider, DNS provider, and SPF/DMARC presence. Built for SDRs, brand protection teams, and email deliverability consultants. One row per domain. Pay per lookup.

Pricing

Pay per usage

Rating

0.0

(0)

Developer

Ken M

Ken M

Maintained by Community

Actor stats

0

Bookmarked

2

Total users

1

Monthly active users

a day ago

Last modified

Share

Pass a list of domains. Get back WHOIS, DNS records, and inferred signals per domain in one row each. Built for sales prospecting, brand protection, and email deliverability audits.

Use it to

  • Segment a cold outbound list by email platform (Google Workspace vs Microsoft 365)
  • Audit DMARC and SPF posture across your customer or partner list
  • Check WHOIS expiry dates on a domain portfolio
  • Identify the DNS provider (Cloudflare, Route 53, Azure, GoDaddy) for tech-stack research

What you get in 30 seconds

flowchart LR
A[Input: list of domains] --> B[RDAP lookup<br/>registrar, dates, org]
A --> C[DNS resolution<br/>A, MX, NS, TXT]
A --> D[DMARC check<br/>_dmarc.domain]
B --> E[Inferred signals<br/>email + dns provider, SPF, DMARC]
C --> E
D --> E
E --> F[(Apify dataset<br/>JSON, CSV, Excel)]

One row per domain. JSON, CSV, or Excel.


Sample output

{
"domain": "stripe.com",
"whois": {
"registrar": "MarkMonitor Inc.",
"created_at": "1995-09-21",
"expires_at": "2027-09-20",
"org": "Stripe, Inc.",
"country": "US",
"status": ["client transfer prohibited"]
},
"dns": {
"a": ["3.18.12.63"],
"mx": ["aspmx.l.google.com", "alt1.aspmx.l.google.com"],
"ns": ["ns-1098.awsdns-09.org", "ns-2010.awsdns-59.co.uk"],
"txt": ["v=spf1 include:_spf.google.com ~all", "google-site-verification=..."]
},
"signals": {
"email_provider": "Google Workspace",
"dns_provider": "AWS Route 53",
"has_spf": true,
"has_dmarc": true,
"dmarc_policy": "reject"
},
"scraped_at": "2026-05-07T18:42:11.421Z"
}

Who this is for

RoleWhat you use it for
SDR / outbound repSegment your prospect list by email platform. Different cold email templates for Google Workspace vs Microsoft 365 inboxes.
Brand protection teamBulk audit registrar, expiry dates, and unauthorized lookalike registrations across a domain portfolio.
Email deliverability consultantCheck SPF and DMARC posture across a client's entire customer base.
Sales engineerIdentify the DNS or hosting provider on a target account list to tailor pitches.
Security analystInventory MX and DMARC records across an organization's owned domains.

Pricing vs typical alternatives

ToolEffective price per lookup
WhoisXML API$0.01 to $0.04
Whoxy$0.0009 (cheap but slow, no DNS, no signals)
MXToolbox$9 a month, capped at 1,000 lookups
This actor$0.005 with first 10 free per run

You get WHOIS, DNS, and the inferred signals layer in one call. Most alternatives charge separately for each.


Inferred signals reference

Email provider is inferred from MX records. Supported labels: Google Workspace, Microsoft 365, GoDaddy Email, Zoho Mail, Proton Mail, Rackspace, Amazon SES, SendGrid, Mailgun, Proofpoint, McAfee MX, Mimecast, Fastmail, Yandex Mail.

DNS provider is inferred from NS records. Supported labels: Cloudflare, AWS Route 53, Google, Azure DNS, NS1, DNSimple, DNS Made Easy, GoDaddy, Namecheap, Network Solutions, DigitalOcean, Hurricane Electric.

If no rule matches, the signal is null and the raw records are still in the row.


Input fields

FieldTypeDefaultNotes
domainsarray of stringsrequiredPlain domains or full URLs. Up to 10,000 per run.
includeWhoisbooleantrueRDAP lookup for registrar and dates.
includeDnsbooleantrueA, MX, NS, TXT records.
includeDmarcbooleantrueDMARC TXT lookup at _dmarc.<domain>.
concurrencyinteger10Parallel lookups. Range 1 to 50.

Run it from the API

curl -X POST "https://api.apify.com/v2/acts/scrapemint~domain-intelligence/runs?token=YOUR_TOKEN" \
-H "Content-Type: application/json" \
-d '{
"domains": ["stripe.com", "linear.app", "vercel.com"]
}'

Pull the dataset:

$curl "https://api.apify.com/v2/datasets/RUN_DATASET_ID/items?format=csv&token=YOUR_TOKEN" > domains.csv

What this actor does NOT do (yet)

  • Subdomain enumeration. Input is root domains only.
  • HTTPS certificate inspection. TLS chain and expiry are out of scope. Pair with a TLS scanner for that.
  • Reverse WHOIS lookups. No "find all domains owned by Org X" queries.
  • WHOIS history snapshots. v1 returns the current record. Historical data is not available via RDAP.

Cross sell

Pair this actor with:

  • Lead Enrichment Pipeline for domain to contacts, then segment by email platform from this actor
  • Website Content Crawler for full text content per domain
  • GitHub Issue Monitor for tech-team activity on target accounts

Compliance posture

WHOIS via RDAP and DNS records are public registry data, designed for programmatic access. No authentication or scraping bypasses are involved. Personal data in WHOIS records is redacted by registries per GDPR for individual registrants and is not surfaced by this actor.