Skip to main content

Typosquatting Detection

Overview

Typosquatting detection identifies domain names that impersonate your brand. Detect phishing infrastructure, protect customers, and take down malicious domains.

What is Typosquatting?

Definition

Typosquatting uses domains similar to legitimate ones:

  • Typos: gooogle.com, gogle.com
  • Character substitution: g00gle.com, goog1e.com
  • Homoglyphs: gοοgle.com (Greek letters)
  • TLD variations: google.co, google.net
  • Additions: google-login.com, google-secure.com

Attacker Goals

GoalExample
PhishingFake login pages
MalwareDrive-by downloads
BECEmail impersonation
Traffic TheftAd revenue from typos
Brand DamageDefamatory content

Detection

How Detection Works

  1. Generate Variations

    Create possible typosquatting variations.

  2. Check Registration

    Query if domains are registered.

  3. Analyze Content

    Check what's hosted (if anything).

  4. Assess Risk

    Determine threat level.

  5. Alert

    Notify for action.

Detection Methods

MethodWhat It Finds
Character SwapTransposed letters
Missing CharacterDropped letters
Extra CharacterAdded letters
Adjacent KeyKeyboard typos
HomoglyphLook-alike characters
Bit FlipSingle bit changes
TLD SwapDifferent extensions

Monitoring Dashboard

Key Metrics

MetricDescription
Total VariationsPossible typosquat domains
RegisteredActually registered
ActiveHosting content
MaliciousConfirmed threats
Taken DownSuccessfully removed

Domain List

View detected domains:

ColumnDescription
DomainTyposquatted domain
SimilarityHow close to original
StatusActive, parked, for sale
ContentWhat's hosted
RiskThreat level
ActionsTakedown status

Risk Assessment

Risk Factors

FactorImpact
Content TypePhishing > parked
MX RecordsEmail-enabled domains
SSL CertificateLooks more legitimate
TrafficHigher visibility
SimilarityMore confusing

Risk Levels

LevelDescriptionAction
CriticalActive phishingImmediate takedown
HighSuspicious contentUrgent review
MediumParked with contentMonitor
LowParked, no contentWatch
InfoFor saleOptional acquisition

Domain Details

Viewing Details

Click on a domain to see:

  • Registration information
  • DNS records
  • Screenshot (if active)
  • Historical data
  • Similar domains

WHOIS Information

When available:

  • Registrar
  • Registration date
  • Expiration date
  • Registrant info (if not private)

Content Analysis

For active domains:

  • Screenshot
  • Technologies detected
  • Similar to your branding
  • Forms or login pages
  • Malware indicators

Takedown Process

Takedown Options

MethodSpeedSuccess Rate
Registrar Report1-7 daysMedium
Hosting Report1-3 daysHigh
DMCA Notice3-10 daysMedium
Legal ActionWeeksHigh
Domain AcquisitionVariesHigh (if for sale)

Initiating Takedown

  1. Select domain
  2. Click Initiate Takedown
  3. Choose method
  4. Provide evidence
  5. Submit request
  6. Track status

Takedown Workflow

Identified → Reported → Acknowledged → In Progress → Completed

Escalated

Evidence Package

Takedown requests include:

  • Domain similarity evidence
  • Screenshots
  • Trademark documentation
  • Abuse evidence (if phishing)

Monitoring Configuration

Adding Protected Domains

  1. Navigate to InfrastructureTyposquatting
  2. Click Add Domain
  3. Enter your domain
  4. Configure monitoring options
  5. Save

Monitoring Options

OptionDescription
FrequencyHow often to scan
DepthNumber of variations
AlertsNotification settings
Auto-TakedownAutomatic reporting

Alerting

Alert Configuration

Set alerts for:

Alert TypeTrigger
New RegistrationTyposquat domain registered
Content ChangePreviously parked now active
Phishing DetectedLogin form detected
Email EnabledMX records added

Reporting

Typosquatting Reports

Generate reports:

  • Current threats
  • Takedown history
  • Trend analysis
  • Risk summary

Compliance Evidence

Documentation for:

FrameworkRequirement
SOC 2CC3.2
ISO 27001A.6.1.2

Proactive Protection

Domain Acquisition

Consider acquiring:

  • Common typos of your domain
  • Variations in popular TLDs
  • Homoglyph versions

DMARC/DKIM/SPF

Email authentication prevents:

  • Email spoofing
  • Brand impersonation
  • Phishing effectiveness

Best Practices

Monitor Continuously

New typosquat domains are registered constantly. Continuous monitoring is essential.

Act Quickly

The faster you take down threats, the fewer victims. Prioritize active phishing.

Register Defensively

Own common typos of your domain before attackers do.

Educate Users

Train employees and customers to verify URLs before entering credentials.

Next Steps