What Is RDAP?
RDAP stands for Registration Data Access Protocol. It's a query protocol that retrieves registration information for domain names, IP addresses, and autonomous system numbers—the same data traditionally accessed through WHOIS, but delivered through modern technology.
When you look up domain registration information today, whether through a web tool or command line, you're increasingly querying RDAP servers rather than legacy WHOIS servers—even if the interface still says "WHOIS lookup."
RDAP was developed by the Internet Engineering Task Force (IETF) and standardized in RFC 7480-7484 (2015). ICANN required deployment starting in 2019.
What RDAP provides:
- Domain registrant information (subject to privacy rules)
- Registration and expiration dates
- Registrar details
- Name server information
- Domain status codes
- Contact information for abuse reporting
Why RDAP Replaced WHOIS
WHOIS served the internet for decades but had fundamental problems:
Inconsistent formatting: Every registry and registrar formatted WHOIS responses differently. Automated parsing required custom code for each provider, and responses frequently broke when providers changed their output format.
No encryption: WHOIS transmitted queries and responses as plain text over port 43. Anyone monitoring network traffic could see what domains you were looking up.
No authentication: WHOIS was all-or-nothing—anyone could query any data. There was no way to provide more information to verified users (law enforcement, trademark holders) while protecting privacy from anonymous queries.
Poor internationalization: WHOIS struggled with non-ASCII characters. Domain names and registrant information in Chinese, Arabic, Cyrillic, or other scripts often displayed incorrectly.
No access control: With GDPR and privacy regulations requiring data protection, WHOIS had no mechanism for tiered access—showing different data to different users based on their verified role.
RDAP addresses all these limitations with modern protocol design.
How RDAP Works
RDAP operates as a RESTful web service over HTTPS:
Query process:
- Client sends HTTPS GET request to an RDAP server
- Server authenticates the request (if credentials provided)
- Server determines access level based on authentication
- Server returns JSON response with appropriate data
- Client parses structured response—no custom parsing needed
Example query:
https://rdap.verisign.com/com/v1/domain/example.com
This returns a JSON object containing registration data for example.com.
Bootstrap process:
RDAP clients need to know which server handles which TLD. IANA maintains a bootstrap registry mapping TLDs to their RDAP endpoints. Clients consult this registry to route queries correctly.
Query types:
- Domain lookups: Registration data for a specific domain
- Name server lookups: Information about specific name servers
- Entity lookups: Information about registrants or registrars by handle
- Help queries: Server capabilities and supported features
RDAP vs. WHOIS
| Feature | WHOIS | RDAP |
|---|---|---|
| Data format | Plain text, inconsistent | Structured JSON |
| Transport | Unencrypted (port 43) | HTTPS (encrypted) |
| Authentication | None | Supported |
| Access control | All-or-nothing | Tiered levels |
| Internationalization | Poor | Full Unicode |
| Referrals | Manual | Automatic |
| Standardization | Loose conventions | IETF RFCs |
| Machine parsing | Difficult | Easy |
For end users: The experience is similar—you enter a domain and see registration data. The underlying protocol is different, but results look comparable.
For developers: RDAP is dramatically better. Consistent JSON responses eliminate parsing headaches. HTTPS provides security. Standardization means code works across all providers.
RDAP Response Structure
RDAP returns well-defined JSON objects. A domain lookup response includes:
Core fields:
objectClassName: Response type ("domain")handle: Registry's unique identifierldhName: Domain in LDH (letters, digits, hyphens) formatunicodeName: Domain with international charactersstatus: Array of status codes
Registration data:
events: Timestamps for registration, expiration, last updateentities: Associated contacts (registrant, admin, tech) with rolesnameservers: Array of name server objects
Metadata:
links: URLs for related resourcesnotices: Legal notices, terms of serviceremarks: Additional information from registry/registrar
This structure is consistent across all RDAP providers, unlike WHOIS's variable formatting.
Tiered Access in RDAP
RDAP's most significant improvement is differentiated access:
Anonymous access:
Unauthenticated queries receive minimal data—typically registration dates, registrar info, name servers, and status. Personal contact information is redacted, similar to post-GDPR WHOIS.
Authenticated access:
Users who authenticate may see additional data based on their verified role:
- Law enforcement: Full registrant data for criminal investigations
- Trademark holders: Contact data for domains matching their marks
- Security researchers: Expanded access for investigating domain abuse
- Registrars: Full data for domains they manage or transfer verification
How authentication works:
RDAP supports standard web authentication mechanisms. Specific implementation varies by registry and registrar. ICANN has developed frameworks for standardized access, though adoption remains inconsistent across providers.
Privacy by design:
Unlike WHOIS (which exposed everything by default), RDAP was built with privacy as a core feature. Redaction is the default; expanded access requires verification.
Using RDAP
Web lookup tools:
Most "WHOIS lookup" websites now query RDAP behind the scenes. Enter a domain, receive formatted results—the underlying protocol is invisible to users.
Direct queries:
Query RDAP servers directly via browser or command line:
curl https://rdap.verisign.com/com/v1/domain/example.com
Returns raw JSON for programmatic use.
RDAP clients:
Command-line tools and libraries handle bootstrap routing, redirects, and response parsing automatically:
- Python:
python-rdap - JavaScript:
rdap-client - Go:
rdap
Finding RDAP servers:
IANA's bootstrap registry (https://data.iana.org/rdap/) lists endpoints for all TLDs. Most queries route automatically through bootstrap.
RDAP and Privacy
RDAP was designed with post-GDPR privacy requirements in mind:
Redaction by default:
Anonymous queries return redacted personal data. This isn't a workaround—it's intended behavior reflecting modern privacy law.
Legitimate purpose access:
The tiered system enables disclosure to parties with valid reasons while protecting registrants from bulk data harvesting.
Audit capabilities:
RDAP servers can log authenticated queries, creating accountability for data access that WHOIS never provided.
Consent mechanisms:
RDAP can indicate whether registrants consented to data publication, allowing differentiated treatment.
Data minimization:
Responses can include only fields relevant to the query type and access level, rather than exposing everything.
RDAP Adoption Status
Registry adoption:
All gTLD registries (.com, .net, .org, etc.) support RDAP. Most ccTLD registries have implemented it, though some smaller country codes lag behind.
Registrar adoption:
ICANN-accredited registrars must support RDAP. Major registrars (GoDaddy, Namecheap, Cloudflare) provide RDAP endpoints.
Tool adoption:
Major lookup services have transitioned to RDAP. Many still label their interfaces "WHOIS" for user familiarity while using RDAP underneath.
WHOIS sunset:
ICANN hasn't mandated shutting down legacy WHOIS servers. Many providers maintain both for backward compatibility. WHOIS will gradually fade as tools and users complete the transition.
RDAP for Developers
If you're building tools that query registration data, use RDAP:
Implementation tips:
Bootstrap first: Query IANA's bootstrap file to find the correct RDAP server for any TLD. Cache results and refresh periodically.
Handle redirects: RDAP servers may redirect queries. Follow HTTP redirects to reach the authoritative server.
Parse JSON: Responses follow RFC 9083 structure. Use standard JSON libraries—no custom parsing needed.
Respect rate limits: RDAP servers impose query limits. Implement backoff for 429 responses.
Check status codes: HTTP status indicates results (200 success, 404 not found, 403 forbidden).
Implement authentication: If your use case qualifies for elevated access, implement the provider's credential system.
Cache appropriately: Registration data doesn't change frequently. Cache responses to reduce server load.
RDAP Limitations
Inconsistent credentialing:
No universal system exists for identity verification and access grants. Each registry or registrar may have different processes for elevated access.
Incomplete adoption:
Some TLDs, especially smaller ccTLDs, don't fully support RDAP yet.
Rate limiting:
Providers restrict query volume more aggressively than legacy WHOIS, which can complicate bulk research.
Search limitations:
RDAP's search capabilities vary by provider. Pattern matching and wildcard searches aren't universally available.
No historical data:
RDAP provides current snapshots only. Historical registration data requires commercial services that archive records over time.
Frequently Asked Questions
What is RDAP?
RDAP (Registration Data Access Protocol) is the modern standard for querying domain name registration information. It replaced WHOIS with a secure, standardized protocol that delivers structured data over HTTPS and supports tiered access based on user verification.
What does RDAP stand for?
RDAP stands for Registration Data Access Protocol. It's an IETF-standardized protocol for accessing domain registration data, IP address information, and autonomous system number details.
Is RDAP the same as WHOIS?
RDAP serves the same purpose—looking up domain registration information—but uses modern technology. RDAP returns structured JSON over encrypted HTTPS connections with support for authenticated access, while WHOIS returns inconsistent plain text over unencrypted connections.
How do I use RDAP?
Most "WHOIS lookup" tools now use RDAP automatically. For direct queries, access RDAP endpoints via HTTPS (e.g., https://rdap.verisign.com/com/v1/domain/example.com). Libraries exist for Python, JavaScript, Go, and other languages.
Why did RDAP replace WHOIS?
WHOIS had critical limitations: inconsistent formatting, no encryption, no authentication, poor international character support, and no mechanism for privacy-compliant tiered access. RDAP addresses all these issues with modern protocol design built for current privacy requirements.
Is RDAP data public?
Basic information (registration dates, registrar, name servers, status) is public. Personal registrant data is typically redacted for anonymous queries. Verified users—law enforcement, trademark holders, security researchers—can request access to additional information through authentication.
When was RDAP required?
ICANN mandated RDAP support from gTLD registries and ICANN-accredited registrars starting in 2019. Most providers now offer RDAP, though legacy WHOIS servers often remain available for backward compatibility.