šµļøāāļø How I Tracked Down a Domain Bought Using My Debit Card
A Real-World OSINT Investigation
Recently, I found myself in a bizarre situation.
Someone I know purchased a domain using my debit card details.
At that point, it wasn't about the money anymore.
It was about reputation.
And I was determined to find that domain.
š§¾ What I Knew
I wasn't starting blind. I had:
- Exact transaction timeĀ
- Registrar: NamecheapĀ
- Strong suspicion about who bought itĀ
- High probability it was a personal domain This quickly turned into a mini cyber-investigation.
š Attempt 1: Reverse WHOIS API
My first step was obvious: search the internet.
I wanted to find domains registered by an email within a date range.
I discovered the WHOISXML Reverse WHOIS API.
Approach
- Logged in using a
.eduemail (Gmail accounts aren't allowed) - Queried using: ā-āRegistrar ā NamecheapĀ ā-āDate range ā the purchase dayĀ ā-āKeyword ā suspected email #### Problem Reverse WHOIS stores data date-wise, not at minute-level precision. So I fetched all domains registered via Namecheap that day. ā” Result: ~23,000 domains Too many.
- - ### š Narrowing the Search Space I looked for patterns. What did I know?
- Likeliest use ā personal websiteĀ
- Premium pricing suggested serious intentĀ
- Indian personal domains rarely choose
.xyz,.ai, etc.Ā -
.comfelt most likely ā” Reduced list: ~5,200 domains Still too many to verify manually.
š¤ AI Filtering Experiment
I asked AI to generate a script that would:
- batch 1,000 domains
- send them to Gemini API
- prompt: identify domains that look like personal websites for Indian males It returned filtered results. But the domain I wanted wasn't there. Reverse WHOIS can miss:
- privacy-protected registrationsĀ
- uncached entriesĀ
- delayed listeners Result: Attempt 1 Failed
š¦ Attempt 2: Contacting the Registrar
I contacted Namecheap support:
A fraudulent transaction was made using my card.
They:
- blocked the accountĀ
- refunded my money But refused to reveal the domain. Result: Attempt 2 Failed
- - ### š Attempt 3: ICANN CZDS Zone Files I requested zone files via ICANN CZDS. Problems:
- approvals take timeĀ
.comrequests take longerĀ- backdated downloads aren't availableĀ
- the domain had already been taken down Result: Inconclusive
š Attempt 4: Certificate Transparency Logs (crt.sh)
I learned about certificate transparency logs.
If the domain hosted HTTPS, its SSL certificate must exist in CT logs.
I tried:
- querying crt.shĀ
- connecting via PostgresĀ
- batch queries in 5-minute windows #### Issues
- connection breakagesĀ
- SSL errorsĀ
- slow processingĀ
- and my impatience š Progress: YesĀ Success: Not yet
š Attempt 5: Google BigQuery + crt.sh Dataset
This changed everything.
The crt.sh dataset is available via Google BigQuery.
Steps
- Connected the datasetĀ
- Queried certificates issued during the purchase hourĀ
- Filtered
.comdomainsĀ - Reduced the time window further ā” 700 ā 200 domains Manual scan⦠Four entries later⦠šÆ Found it. Matched the domain to the person. Result: SUCCESS
𤯠Plot Twist
Later, I discovered something surprising.
The domain was present in my Reverse WHOIS results.
I ignored it because:
- I doubted dataset completenessĀ
- I trusted AI filtering too much If I had manually verified the 5,200 domains⦠I would have found it earlier.
š§ Lessons Learned
ā Always verify your dataĀ
AI helpsā-ābut never assume completeness.
ā Internet datasets are imperfectĀ
Each dataset captures only part of reality.
ā OSINT requires patienceĀ
Impatience slows investigations more than complexity.
ā Automation helps, manual validation wins
ā Certificate Transparency logs are gold
š§āš» A Step Toward Ethical Hacking
This wasn't hacking.
It was understanding how internet infrastructure works:
- WHOIS & Reverse WHOISĀ
- RegistrarsĀ
- Certificate TransparencyĀ
- DNS zone filesĀ
- Data aggregation gaps And the caveats between them.
š Final Thoughts
If you take anything from this:
Double-check your data.Ā
Trust, but verify.Ā
And cultivate patience.
Because the internet always leaves tracesā-ā
you just need to know where to look.
Adios.
Top comments (0)