Domain Impersonation Scanner

Detect lookalike domains, typosquatting, and phishing attempts targeting your brand. Scan for domain impersonation threats with advanced similarity detection.

Domain Impersonation Scanner

Scan for lookalike domains, typosquatting, and potential phishing attempts targeting your brand.

Understanding Domain Impersonation and Typosquatting

Overview

Domain impersonation is a critical cybersecurity threat where attackers register domains that closely resemble legitimate brands to conduct phishing attacks, distribute malware, or commit fraud. These lookalike domains exploit user trust and typing mistakes to intercept sensitive information, steal credentials, or damage brand reputation.

Types of Domain Impersonation

Typosquatting

Typosquatting exploits common typing mistakes users make when entering URLs:

  • Character omission: exmple.com (missing "a")
  • Character addition: exammple.com (extra "m")
  • Character swap: exmaple.com ("ma" instead of "am")
  • Keyboard proximity: wxample.com ("w" next to "e" on keyboard)
  • Wrong TLD: example.co, example.cm, example.om

Character Substitution (Homograph Attacks)

Attackers replace characters with visually similar alternatives:

  • Number substitution: examp1e.com (1 for l), g00gle.com (0 for o)
  • Character lookalikes: exarnple.com (rn for m)
  • Unicode homoglyphs: Using Cyrillic а (U+0430) instead of Latin a (U+0061)
  • Case confusion: ExampIe.com (capital I for lowercase l)

Combosquatting

Adding keywords to legitimate brand names to appear official:

  • example-secure.com, example-login.com, example-verify.com
  • secure-example.com, login-example.com, verify-example.com
  • examplesupport.com, examplehelp.com, exampleofficial.com

Bitsquatting

Exploiting bit-flip errors in computer memory to register domains one bit different:

  • example.com → exaople.com (bit flip in "m" to "o")
  • Rare but can catch traffic from hardware errors

How Domain Impersonation Attacks Work

Phishing Emails

Attackers use lookalike domains to send emails that appear to come from your brand:

  • Email from support@examp1e.com instead of support@example.com
  • Recipients see familiar brand name and trust the message
  • Emails contain malicious links, credential harvesting forms, or malware
  • DMARC does not protect against lookalike domains (only exact domain spoofing)

Clone Websites

Impersonators create replica websites on lookalike domains:

  • Identical design and branding to legitimate site
  • Captures login credentials when users attempt to sign in
  • Collects payment information during fake checkout process
  • May redirect to real site after stealing credentials to avoid suspicion

Traffic Interception

Typosquatting domains catch misdirected traffic:

  • Users mistype your domain and land on impersonator site
  • Impersonator shows ads, affiliate links, or competitors
  • Traffic monetization at your brand's expense
  • May redirect users to competitor websites

Brand Damage

Impersonation sites can harm reputation:

  • Scam sites using your brand to defraud customers
  • Adult content or malware associated with lookalike domains
  • Customer support scams collecting sensitive information
  • Negative SEO from impersonator content

How the Scanner Works

Variation Generation

The scanner generates potential typosquatting variations using multiple techniques:

  • Character omission: Remove each character individually
  • Character addition: Duplicate each character
  • Character swap: Swap adjacent character pairs
  • Keyboard proximity: Replace with nearby keyboard keys
  • Common substitutions: Test known lookalike replacements (0/o, 1/l, rn/m)
  • TLD variations: Test common alternative TLDs (.co, .net, .org, .io)

Similarity Calculation

Levenshtein distance algorithm measures string similarity:

  • Calculates minimum number of single-character edits needed to transform one string to another
  • Edits include insertions, deletions, and substitutions
  • Similarity score = (1 - distance/max_length) × 100%
  • Domains above 70% similarity threshold are flagged as potential threats

DNS Validation

When enabled, the scanner performs DNS lookups to identify active threats:

  • A records: Check if domain has valid DNS (is registered and active)
  • MX records: Verify if email is configured (can send phishing emails)
  • NS records: Identify nameservers (hosting infrastructure)
  • DNS validation is slower but identifies real threats vs theoretical variations

Severity Scoring

Each detected domain receives a severity score based on multiple factors:

  • Similarity score: Higher similarity = higher severity
  • DNS status: Active DNS significantly increases severity
  • Email capability: MX records indicate phishing capability
  • Character substitution: Homograph attacks are weighted higher
  • TLD matching: Same TLD increases impersonation risk

Interpreting Scan Results

Critical Severity (Score 90+)

  • Domain is highly similar to yours (90%+ match)
  • DNS is active (domain is registered and configured)
  • Often has MX records (capable of sending phishing emails)
  • Action required: Contact registrar abuse department immediately
  • Consider legal action if trademark infringement is clear
  • Document all evidence for potential legal proceedings

High Severity (Score 80-89)

  • Domain is very similar (80-89% match)
  • May or may not have active DNS
  • If MX records exist, phishing risk is significant
  • Action required: Submit abuse complaint to registrar
  • Monitor closely for activation or email configuration
  • Consider defensive domain registration

Medium Severity (Score 70-79)

  • Domain is moderately similar (70-79% match)
  • Lower immediate threat but worth monitoring
  • If DNS is active, investigate further
  • Action required: Add to monitoring watchlist
  • Document for future reference
  • Evaluate for defensive registration based on brand value

Low Severity (Score <70)

  • Lower similarity score or unregistered variation
  • Primarily informational
  • Keep on watchlist for periodic rescanning
  • Action required: Monitor periodically for registration

Protection Strategies

Defensive Domain Registration

  • Register common typo variations of your primary domain
  • Secure alternative TLDs (.com, .net, .org, .io, .co) for exact brand
  • Register character substitution variations flagged as critical
  • Redirect defensive domains to legitimate site or show coming soon page
  • Renew defensive domains indefinitely to prevent expiration takeover

DMARC Protection

  • Implement strict DMARC policy (p=reject) on your legitimate domain
  • Prevents attackers from spoofing your exact domain in email
  • Does NOT protect against lookalike domains (separate threat)
  • Educate users to check sender domain carefully
  • Publish SPF and DKIM records to enable DMARC

Trademark Monitoring

  • Register trademarks for your brand name
  • Use Uniform Domain-Name Dispute-Resolution Policy (UDRP) for clear infringement
  • Submit abuse complaints to domain registrars
  • Report phishing sites to browsers and search engines
  • Take legal action against persistent infringers

Regular Scanning

  • Scan monthly for new domain registrations
  • Enable DNS checking to detect newly activated domains
  • Monitor high-risk variations continuously
  • Track changes in DNS configuration and email capability
  • Document evidence when new threats are identified

User Education

  • Train employees to verify sender domains carefully
  • Educate customers about official communication channels
  • Publish list of official domains on your website
  • Encourage URL verification before entering credentials
  • Provide reporting mechanism for suspected phishing

Taking Action Against Impersonators

Document Evidence

  • Screenshot the impersonation website before reporting
  • Save WHOIS records showing registration details
  • Document DNS records (A, MX, NS)
  • Archive phishing emails if applicable
  • Record timestamps of discovery and reporting

Report to Registrar

  • Use WHOIS to identify domain registrar
  • Submit abuse complaint to registrar's abuse contact
  • Include evidence of impersonation and trademark
  • Reference terms of service violations
  • Follow up if no response within 3-5 business days

Report to Hosting Provider

  • Identify hosting provider via reverse IP lookup
  • Submit abuse complaint to hosting provider
  • Often faster takedown than registrar action
  • Hosting providers typically respond within 24-48 hours

File UDRP Complaint

  • Use Uniform Domain-Name Dispute-Resolution Policy for clear trademark infringement
  • Requires: (1) domain identical/confusingly similar, (2) registrant has no rights, (3) registered in bad faith
  • Costs $1,500-$2,500 per complaint
  • Resolution typically takes 60-90 days
  • High success rate for clear impersonation cases

Legal Action

  • Consult intellectual property attorney for persistent infringement
  • Cease and desist letters often effective for opportunistic squatters
  • Litigation appropriate for ongoing business harm
  • Anti-Cybersquatting Consumer Protection Act (ACPA) in US
  • Can recover damages and legal fees in successful cases

Best Practices

  • Proactive scanning: Run monthly scans to detect new registrations early
  • Enable DNS checking: Slower but identifies real active threats vs theoretical risks
  • Prioritize critical threats: Focus resources on highly similar active domains first
  • Register defensively: Secure critical variations before attackers do
  • Implement DMARC: Prevent exact domain spoofing in addition to lookalike monitoring
  • Act quickly: Early reporting increases takedown success rate
  • Track trends: Monitor for patterns in impersonation attempts
  • Educate users: Trained users are best defense against impersonation