Whois Toolkit

v1.0.0

Domain WHOIS lookup toolkit for querying registrar, creation/expiry dates, nameservers, status, and registrant info. Use when looking up domain ownership, ch...

0· 192·0 current·0 all-time
byJohn Wang@johnnywang2001

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for johnnywang2001/whois-toolkit.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Whois Toolkit" (johnnywang2001/whois-toolkit) from ClawHub.
Skill page: https://clawhub.ai/johnnywang2001/whois-toolkit
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install whois-toolkit

ClawHub CLI

Package manager switcher

npx clawhub@latest install whois-toolkit
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included Python script: the code performs socket-based WHOIS queries and parses registrar, dates, nameservers, and registrant fields. No unexplained credentials, binaries, or external deps are requested.
Instruction Scope
SKILL.md directs the agent to run the bundled script with command-line flags. The instructions and script only perform WHOIS queries and formatting; they do not read unrelated files, environment variables, or send data to unexpected endpoints. The server override flag lets a user point to an arbitrary WHOIS server (user-specified input).
Install Mechanism
No install spec or external downloads; the skill is instruction-only with an included script. Nothing is written to disk by an installer step beyond the existing bundle.
Credentials
No environment variables, credentials, or config paths are required. The script does not access hidden secrets or unrelated config.
Persistence & Privilege
The skill does not request persistent/always-enabled presence, does not modify other skills or system configs, and uses no privileged operations.
Assessment
This skill appears to be what it says: a standalone WHOIS lookup tool. Before running, note that: (1) WHOIS queries go over the network to remote WHOIS servers and those servers (and any intermediary) can log the querying IP and requested domain names; (2) the --server option will send queries to whatever host you provide, so avoid pointing it to untrusted endpoints; (3) WHOIS responses can include personal/identifying information depending on the domain and privacy settings; (4) parsing is heuristic and may miss or misinterpret some registrar formats—treat results as informational. If you plan to run it at scale or in an automated agent, consider rate limits and privacy implications. If you have strict security requirements, review the script locally before use and run it in a controlled environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97aw2sj9fcwezzwdbd1jz4hw983a2n4
192downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

WHOIS Toolkit

Query WHOIS data for any domain — registrar, dates, nameservers, expiry warnings.

Quick Start

# Basic WHOIS lookup
python3 scripts/whois_lookup.py example.com

# Multiple domains at once
python3 scripts/whois_lookup.py example.com example.org example.io

# JSON output
python3 scripts/whois_lookup.py example.com --json

# Expiry check only (great for monitoring)
python3 scripts/whois_lookup.py example.com example.org --expiry-only

# Show raw WHOIS response
python3 scripts/whois_lookup.py example.com --raw

# Use a specific WHOIS server
python3 scripts/whois_lookup.py example.com --server whois.verisign-grs.com

Features

  • Structured parsing: registrar, dates, nameservers, status, organization
  • Expiry warnings: color-coded alerts at 30, 90 day thresholds
  • Multi-domain batch queries
  • Raw WHOIS passthrough mode
  • Built-in WHOIS server mapping for 25+ TLDs
  • Zero dependencies (uses raw socket queries)

Flags

  • --json — Machine-readable JSON output
  • --raw — Include raw WHOIS response text
  • --expiry-only — Show only domain and expiry date
  • --server <host> — Override the WHOIS server

Comments

Loading comments...