Solved

What is CLIENT TRANSFER PROHIBITED in whois information of dot com

Posted on 2006-10-26
5
1,072 Views
Last Modified: 2008-01-09
Could somebody explain me what happen when a dot com domain have CLIENT TRANSFER PROHIBITED in the whois information?

This domain is register by a big company domain recollector to resell it

Thank you
0
Comment
Question by:lnrivera
  • 2
5 Comments
 
LVL 54

Expert Comment

by:b0lsc0tt
ID: 17815291
lnrivera,

That means that the group or individual that registered the name has prohibited the name from being transfered.  This can be changed by the registar only.  It really is just a lock, no matter what you would need permission from the registar to get the domain.

Let me know if you have any questions or need more information.

b0lsc0tt
0
 

Author Comment

by:lnrivera
ID: 17815318
I see some information about epp Status in

http://www.wdbc.com/domain/status-codes.cfm

It's possible that this domain with CLIENT TRANSFER PROHIBITED status, are in problems with another owner of this dot.com?

This domain will experired in 50 days, it's possible to register by another person, then it's free in 50 days?

Thank you
0
 
LVL 54

Accepted Solution

by:
b0lsc0tt earned 500 total points
ID: 17815605
> It's possible that this domain with CLIENT TRANSFER PROHIBITED status,
> are in problems with another owner of this dot.com?
That status doesn't mean that there is someone else with rights to it or that there is a disagreement over them.  It is just a way for the registar to obviously protect the domain.

> This domain will experired in 50 days, it's possible to register by
> another person, then it's free in 50 days?
It doesn't happen that quick.  There is a period when the registar can still renew and then there is a time when it is possible for the name registrar of the domain to sell it.  After that it is normally openly available for purchase often through a drop registrar.

I hope this helps.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Introduction HTML checkboxes provide the perfect way for a web developer to receive client input when the client's options might be none, one or many.  But the PHP code for processing the checkboxes can be confusing at first.  What if a checkbox is…
Using SQL Scripts we can save all the SQL queries as files that we use very frequently on our database later point of time. This is one of the feature present under SQL Workshop in Oracle Application Express.
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
This video teaches users how to migrate an existing Wordpress website to a new domain.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now