Skip to content

Domain Squatting

ShadowMap monitors for domains registered using variations of your brand name -- a technique known as domain squatting. These lookalike domains are commonly used as launchpads for phishing campaigns, brand abuse, credential harvesting, or competitor impersonation. This module surfaces every suspicious domain so your team can investigate and act before damage occurs.

Overview

Domain Squatting

View Modes

The page supports two view modes via the toggle in the header:

  • Card View (Expanded) -- Each domain displayed as a card showing favicon, domain name, live status, registrar, organizations, nameservers, keyword, registration dates, and first seen date. Best for investigative review.
  • Compact View -- A condensed card layout for scanning large volumes quickly.

Data Per Domain

Each domain card displays the following information:

FieldDescription
Domain NameThe squatted domain (e.g., shad0wmap.com)
FaviconThe favicon served by the domain (or a default icon if none)
Is LiveWhether the domain currently resolves and serves content
StatusCurrent workflow status (see Status Tabs below)
KeywordThe brand keyword this domain was matched against
RegistrarThe domain registrar where it was registered
OrganizationsOrganizations detected in WHOIS or certificate data
NameserversDNS nameservers assigned to the domain
Registered OnDomain registration date
Expires OnDomain expiration date
First SeenWhen ShadowMap first detected this domain (relative time)

DNS Records (Detail View)

Clicking into a domain opens its detail page, which includes a DNS Records table with:

ColumnDescription
TypeDNS record type (A, AAAA, MX, CNAME, NS, TXT, etc.)
IPThe IP address or value of the record
GeolocationGeographic location of the resolved IP
ASN IDAutonomous System Number for network attribution
Reverse DNS IDReverse DNS lookup result

The detail view also shows a Summary section with Targeted Domain, Is Live status, Status, URL Fuzzer type, Domain Registrar, registration/expiration dates, and Nameserver tags. A Technologies section lists detected web technologies.

Status Tabs

Findings are organized into workflow tabs:

TabDescription
OnlineDomains that are currently live and resolving (default landing tab)
Requested TakedownDomains for which a takedown has been requested
AcceptedDomains confirmed as genuine threats by your team
ReviewedDomains investigated and marked as false positives or non-threats
TakendownDomains that have been successfully taken down
MonitoringDomains being actively watched -- registered but not yet weaponized
Custom SearchSearch across all domains regardless of status

Actions

Single-Item Actions (via three-dot menu)

  • Mark as Online -- Move back to the Online tab for re-review
  • Mark as Accepted -- Confirm as a genuine brand threat
  • Request Takedown -- Initiate a takedown request to the registrar
  • Mark as Reviewed -- Dismiss as a false positive after investigation
  • Mark as Monitoring -- Place under passive monitoring

Bulk Actions (multi-select)

Select multiple domains using checkboxes and use the action bar:

  • Online -- Bulk-move to Online status
  • Accepted -- Bulk-confirm as threats
  • Reviewed -- Bulk-dismiss as false positives
  • Monitoring -- Bulk-place under monitoring

Additional Features

  • Export -- Download findings in Excel format with applied filters
  • Comments -- Add internal notes to any domain finding
  • Per-page control -- Adjust results per page (25, 50, 100, 200)
  • Search Filters -- Filter by keyword, status, registrar, nameserver, or other fields

Types of Domain Squatting

ShadowMap detects multiple squatting techniques:

TypeExampleDescription
Typosquattingshadwmap.comCommon misspellings and keyboard-adjacent character substitutions
Homograph Attackshad0wmap.comSubstituting visually similar characters (0 for o, l for 1, rn for m) including internationalized domain names (IDN homographs)
TLD Squattingshadowmap.xyzYour exact brand name registered on a different top-level domain (.xyz, .io, .net, .info, etc.)
Combosquattingshadowmap-login.comYour brand combined with common words (login, secure, verify, update, support, etc.)
Subdomain Abuseshadowmap.malicious-host.comYour brand name used as a subdomain on an attacker-controlled domain
Bitsquattingshadowmaq.comSingle-bit errors that occur during DNS resolution

The URL Fuzzer field in the detail view indicates which fuzzing technique originally identified the domain.

  1. Start with the Online tab -- review live domains that need immediate attention
  2. Investigate each domain -- click through to see DNS records, technologies, and WHOIS data
  3. Prioritize domains with active content -- live domains hosting phishing pages are the highest priority
  4. Place emerging threats on Monitoring -- newly registered domains that are parked may become active later
  5. Request takedowns for confirmed malicious domains
  6. Mark false positives as Reviewed -- legitimate partner or subsidiary domains that match keywords

Use Cases

  • Pre-emptive defense -- Detect and take down lookalike domains before they are used in phishing campaigns
  • Domain portfolio protection -- Identify TLD squatting opportunities for defensive registration
  • Threat intelligence -- Track registrar patterns and infrastructure used by attackers targeting your brand
  • Compliance -- Maintain evidence of brand protection activity for regulatory or legal purposes

ShadowMap by Security Brigade