The Assignation Authority for “.es” domain names is going to revoke the accreditation of three Registrar Agents (Chivalges, Siosi and DocumentData), for failing to fulfil the contract signed with Red.s. From 3 March 2015 on, said Registrar Agents will not be able to mediate in the assignation of new “.es” domain names. However, in order to cause the least possible setback to the affected domain name holders, the actual withdrawal will be deferred to 3 April 2025.

In the framework of 37 Law/2007, of November 16, concerning re-usage of public sector information (henceforward “37Law/2007), the service to access to “.es” domain name list is already available. This service enables carrying out the “.es” domain name list download. Moreover, in those cases in which the holder is a legal entity, it will be included the holder data together with its Identity Number – as long as this number correction has been confirmed. This folder update will be monthly made.

The “.es” domain portal published instructions from the general director of on how to install DNSSEC security protocols for “.es” domain names. This new system, aimed at improving security for ".es" domain names, will come into operation on 8 July, once the public notification period is over and the relevant international organisations and accredited registrars have been notified.

The statistics on the “.es” top level domain for April show that of 3,451,863 total domain names registered in Spain, more than half of them, 50.04%, are “.es”. There are now 1,727,169 of this type of domain, one that is clearly identified with Spain and the Spanish language. This is half a million more than the “.com” domains, which rank second at 35.29%, over fourteen percentage points lower. They are followed by “.net” (4.61%), “.org” (3.13%), “.eu” (3.09%), “.cat” (2.17%), “.info” (1.28%) and “.biz” domains (0.38%).

Recently it has been detected a serious vulnerability on OpenSSL, a very common software used for Internet traffic encryption. From, Internet domains registry in Spain, we would like to indicate that none of our services have been affected. We recommend you check if your online services are within the scope of this vulnerability. For more information visit the following web page (