You've got valuable starting data with Whois. Now it's time to take that information and make deeper connections to profile attackers, guide online fraud investigations, and map attacker infrastructure. Reactions: david li, sonicplay, 105le and 4 others