01
Generate
Apply 8+ mutation strategies: TLD swaps, typos, homoglyphs, and dot tricks to enumerate every plausible lookalike.
02
Probe
Check DNS records (A/MX/CNAME) and WHOIS registration, then geolocate IP addresses to map infrastructure.
03
Classify
Score each domain by risk. Active mail servers and DNS records reveal the highest-priority threats.