Whoislookup

v1.0.0

Look up domain WHOIS registration info — registrar, creation date, expiry date, nameservers, and domain status. Use when asked to check who owns a domain, wh...

0· 106·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for rogue-agent1/whoislookup.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Whoislookup" (rogue-agent1/whoislookup) from ClawHub.
Skill page: https://clawhub.ai/rogue-agent1/whoislookup
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install whoislookup

ClawHub CLI

Package manager switcher

npx clawhub@latest install whoislookup
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, SKILL.md, and included Python scripts all implement direct WHOIS lookups via sockets. No unrelated binaries, credentials, or config paths are requested. The pair of identical Python files is redundant but consistent with the stated purpose.
Instruction Scope
Instructions only run the included Python script(s) to query WHOIS servers and parse results. This legitimately contacts external WHOIS servers. Note: a --server option allows contacting arbitrary WHOIS servers (user-specified host), so the tool can be used to make outbound TCP connections to arbitrary hosts if misused or if run in a sensitive internal network.
Install Mechanism
No install spec — instruction-only with included scripts. Nothing is downloaded or written to disk by an installer; the user runs the provided Python script directly.
Credentials
The skill requests no environment variables, credentials, or config paths and the code does not read any. That is proportional to the simple WHOIS lookup functionality.
Persistence & Privilege
always:false and no self-modifying or persistent behavior. The skill does not request elevated privileges or modify other skills or system configuration.
Assessment
This skill appears internally consistent and does what it says: it contacts WHOIS servers via sockets and parses responses. Before installing, consider: (1) source is unknown — prefer code from a trusted source or inspect the scripts (they are short and included). (2) WHOIS queries go to third-party servers and may be logged by registrars — don't query sensitive/private hostnames. (3) The --server option lets callers specify arbitrary hosts, so avoid running this in environments where making arbitrary outbound TCP connections to internal services would be dangerous. If you have concerns, run the script manually in a restricted/isolated environment to verify behavior.

Like a lobster shell, security has layers — review code before you run it.

latestvk9707dh4q1svsa9jb3xr9w29ad83pxax
106downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

whoislookup 🔍

Domain WHOIS lookup with parsed output. Queries WHOIS servers directly via socket.

Commands

# Look up one or more domains
python3 scripts/whoislookup.py github.com openclaw.ai

# Raw WHOIS response
python3 scripts/whoislookup.py --raw example.com

# Parsed JSON output
python3 scripts/whoislookup.py --json github.com

# Custom WHOIS server
python3 scripts/whoislookup.py --server whois.verisign-grs.com example.com

Output Fields

  • Registrar name
  • Created / Expires / Updated dates
  • Nameservers (up to 4)
  • Domain status (EPP codes)

Supported TLDs

com, net, org, io, dev, app, ai, co, me, xyz, info, uk, de, fr, eu, ca, au — auto-detects WHOIS server. Falls back to whois.nic.{tld} for others.

Comments

Loading comments...