Look Up DNS Records
Query DNS records for any domain to inspect A, AAAA, MX, CNAME, TXT, and NS configurations.
Investigate suspected phishing domains through registration analysis, DNS inspection, geolocation, and evidence capture.
Phishing attacks rely on infrastructure that mimics legitimate brands through lookalike domains, cloned websites, and convincing email setups. Quickly investigating and documenting phishing infrastructure is critical for takedown requests, abuse reports, and protecting users from ongoing campaigns.
This workflow provides a structured investigation approach: analyzing domain registration for attribution clues, examining DNS configuration to map the full phishing infrastructure, geolocating hosting providers for targeted takedown requests, and capturing visual evidence for abuse reports and legal proceedings. Speed is essential as phishing sites are often short-lived.
Look up the suspected phishing domain registration to identify the registrant, creation date, and registrar for attribution.
Examine the DNS setup of the suspected phishing domain to identify hosting infrastructure and related domains.
Identify the geographic location and hosting provider of the phishing infrastructure for takedown requests.
Take screenshots of the phishing site for evidence preservation and abuse reporting to registrars and hosting providers.