What Is Typosquatting?

Typosquatting (also called URL hijacking) is a cyberattack where attackers register domain names that closely resemble legitimate websites. They use common typos and character substitutions to create convincing fakes. When users accidentally visit these domains, attackers harvest credentials or distribute malware.

The attack exploits predictable human behavior. We transpose letters and miss keystrokes. Attackers register domains that capture these errors. For example, ‘rnicrosoft.com’ replaces ’m’ with ‘rn’, which looks nearly identical in most fonts.

Typosquatting is different from cybersquatting, which involves registering a trademarked name to resell it. Typosquatting specifically targets typing mistakes to intercept traffic meant for legitimate sites.

When typosquatting attacks succeed, stolen credentials end up on dark web markets within hours. Continuous domain monitoring detects these lookalike domains before attackers use them against your employees and customers.
Dashboard showing typosquatting domain detection results

How Does Typosquatting Threaten Your Organization?

Credential Theft

Fake login pages harvest employee usernames and passwords. Attackers use stolen credentials directly or sell them on criminal marketplaces for premium prices.

Phishing Campaigns

Typosquatted domains provide convincing infrastructure for spear phishing. Links to ‘amaz0n.com’ or ‘paypa1.com’ bypass casual inspection and add credibility to social engineering attacks.

Malware Distribution

Users downloading software from lookalike domains install infostealers, ransomware, or remote access trojans instead of legitimate applications.

Typosquatting Detection Trusted by Security Teams Worldwide

How Does Breachsense Detect Typosquatting?

Add Your Domains

We Scan for Lookalikes

Get Domain Alerts

Shut Down Impersonating Domains

Frequently Asked Questions

Typosquatting is a cyberattack where attackers register domain names that mimic legitimate websites using common typing errors. For example, ‘gogle.com’ instead of ‘google.com’ or ‘arnazon.com’ instead of ‘amazon.com’. When users accidentally visit these fake domains, attackers steal their login credentials, install malware, or redirect them to fraudulent sites. Also called URL hijacking, typosquatting exploits predictable human typing mistakes to bypass security controls that focus on technical vulnerabilities.

Yes, typosquatting is illegal in most jurisdictions. In the United States, the Anticybersquatting Consumer Protection Act (ACPA) allows trademark holders to sue for damages up to $100,000 per domain. Internationally, ICANN’s Uniform Domain-Name Dispute-Resolution Policy (UDRP) lets trademark owners reclaim infringing domains. Facebook won a $2.8 million judgment against typosquatters using these legal frameworks. However, enforcement requires discovering the domains first, which is why continuous monitoring matters.

Protect your domain through defensive registration and continuous monitoring. Register common misspellings, character substitutions, and alternative TLDs for your primary domains before attackers do. Monitor certificate transparency logs for new SSL certificates issued to similar domains. Use external attack surface management to detect lookalike domains as they’re registered. Implement DNS filtering to block known typosquatted domains at the network level. When you find infringing domains, file UDRP complaints or pursue legal action under ACPA.

One common technique replaces ’m’ with ‘rn’ in domains like ‘rnicrosoft.com’ because they look identical in most fonts. Another swaps ’l’ with ‘1’, like ‘paypa1.com’. Attackers also register wrong TLDs like ‘amazon.co’ instead of ‘.com’. See our phishing domain examples for more attack patterns.

Character substitution is the most common tactic. Attackers replace letters with visually similar characters: ‘rn’ for ’m’, ‘1’ for ’l’, ‘0’ for ‘O’, or ‘vv’ for ‘w’. Other tactics include missing characters (‘gogle.com’), extra characters (‘googgle.com’), transposed letters (‘amazno.com’), wrong TLDs (‘amazon.co’ instead of ‘.com’), and homoglyph attacks using Unicode characters from different alphabets that look identical to Latin letters. Learn more about these techniques in our typosquatting guide.

Cybersquatting is registering a trademarked domain name (like ‘cocacola.net’) to resell it for profit. Typosquatting is registering a misspelled version of a domain (‘cocacola.com’ vs ‘cocacola.cm’) to intercept traffic and steal credentials. Cybersquatting targets the brand owner’s wallet. Typosquatting targets the brand’s users.

Detect typosquatting through domain permutation monitoring, certificate transparency logs, and dark web intelligence. Tools like dnstwist generate possible variations of your domain and check which are registered. Certificate transparency logs reveal when attackers obtain SSL certificates for lookalike domains. Dark web monitoring detects stolen credentials when typosquatting attacks succeed. For comprehensive detection, use a typosquatting checker or continuous monitoring through an attack surface management platform.

Typosquatting & Phishing Domain Resources

Guides and tools for typosquatting detection

What Is Typosquatting? Detection & Protection Guide

How fake domains steal credentials, common attack techniques, and how to defend against them.

Learn More

Best Typosquatting Checkers: Detect Lookalike Domains

Compare free and enterprise typosquatting detection tools. Find the best domain scanners for security teams and brand protection.

Learn More

Phishing Domains: How Attackers Impersonate Brands

Understand how attackers create phishing domains and use them to steal credentials. Detection strategies for security teams.

Learn More

Phishing Domain Examples: Spot & Stop Attacks

Real-world phishing domain examples showing typosquatting, homoglyph attacks, and combosquatting techniques attackers use in the wild.

Learn More

Best Phishing Protection Software Solutions

Compare phishing protection tools for domain monitoring, email security, and credential theft prevention.

Learn More

External Attack Surface Management

Monitor your organization’s external attack surface including typosquatted domains, exposed assets, and brand impersonation threats.

Learn More

Detect Typosquatting Domains Targeting Your Brand

Book a demo