You've got valuable starting data with Whois. Now it's time to take that information and make deeper connections to profile attackers, guide online fraud investigations, and map attacker infrastructure. Reactions: 105le, subworld23, ghosttor and 2 others