How Hackers Use "Typosquatting" to Trick You (and How to Spot It)
Jean-Vincent QUILICHINI
The Art of the Typo
Have you ever typed gogle.com instead of google.com? Hackers count on it. Typosquatting (or URL hijacking) is a technique where attackers register domains that are very similar to popular websites, hoping you'll make a mistake.
Common Typosquatting Tactics
- The Missed Key:
facebok.com(missing 'o'). - The Fat Finger:
twitter.comvstwiiter.com(keys near each other). - The Wrong Extension:
amazon.netinstead ofamazon.com. - The Combo:
apple-support.com(adding words to look official).
The Danger
If you land on a typosquatted site, it might look exactly like the real thing.
- Phishing: You enter your login details, and the hacker captures them.
- Malware: The site automatically downloads a virus to your computer.
- Ad Fraud: You are bombarded with spammy ads.
How to Spot a Fake Domain
- Check the URL: Look closely at the address bar. Is it
microsoft.comorrnicrosft.com? - Use a URL Scanner: Before clicking a link in an email, copy and paste it into our URL Scanner. We'll tell you if the domain is suspicious or malicious.
- Bookmark Important Sites: Don't type your bank's URL every time. Use a bookmark to ensure you always go to the right place.
Your eyes can be tricked, but data doesn't lie. Always verify the domain before you trust the site.
Related articles
Dec 12, 2024Harnessing Public Sources for IP and Domain Maliciousness DetectionLearn how public sources like IP sets and blocklists can enhance your cybersecurity defenses by providing actionable insights into IP and domain maliciousness. Discover how to integrate these resources into WAF solutions like Fortinet and Imperva.
Dec 5, 2025Proactive Threat Defense: Monitoring Malicious IP and Domain ReputationShift from reactive to proactive cybersecurity. Learn how monitoring malicious IP and domain reputation helps identifying threats early and stopping phishing attacks before they succeed.
Dec 6, 2025How to Detect Malicious Domains and IPs: A Reputation GuideA practical guide on detecting malicious domains and IPs using reputation data. Learn to spot phishing threats and secure your applications with real-time threat intelligence.
Protect Your Infrastructure
Check any IP or domain against our threat intelligence database with 500M+ records.
Try the IP / Domain Checker